From b3758c72b8c399ac65a71684434597f9f1d8938e Mon Sep 17 00:00:00 2001 From: Baohua Yang Date: Mon, 23 Sep 2019 18:06:37 -0700 Subject: [PATCH] Add HLF v1.4.3 --- hyperledger_fabric/README.md | 3 +- hyperledger_fabric/v1.4.3/.env | 4 + .../v1.4.3/2orgs-4peers-solo.yaml | 95 + hyperledger_fabric/v1.4.3/Makefile | 300 + hyperledger_fabric/v1.4.3/base-dev.yaml | 97 + hyperledger_fabric/v1.4.3/base-event.yaml | 78 + hyperledger_fabric/v1.4.3/base-kafka.yaml | 276 + hyperledger_fabric/v1.4.3/base-raft.yaml | 198 + hyperledger_fabric/v1.4.3/base-solo.yaml | 190 + hyperledger_fabric/v1.4.3/base.yaml | 163 + .../example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../example.com/ca/IssuerRevocationPublicKey | 5 + .../example.com/ca/ca.example.com-cert.pem | 14 + .../example.com/ca/ca.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...8d4bf2e735befe20a1138c57cdd2b74c48da14d_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + .../example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../example.com/tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...7fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | Bin 0 -> 32 bytes .../tlsca/tlsca.example.com-cert.pem | 14 + .../example.com/tlsca/tlsca.example.com_sk | 5 + .../fabric-ca-client-config.yaml | 162 + ...a798a30ef7e72c099dc45d5af032767bc56db90_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...7ae6ab6beed584000c446a5a22373fb366a4987_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...87de44c9d630428d49fe82ac730959ada6d3eb7_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../org1.example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../ca/IssuerRevocationPublicKey | 5 + .../ca/ca.org1.example.com-cert.pem | 14 + .../ca/ca.org1.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../org1.example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + ...bbca7d9485e5f138aa75f4c82cd0f74c14b5e56_sk | 5 + .../fabric-ca-client-config.yaml | 162 + ...105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + ...7b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org1-example-com-7054.pem | 14 + ...821de931526774ad9c6aa12865161208628bb4a_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../org1.example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | 1 + ...253fa86a004a246b452decd4f6aae2f1013583f_sk | 5 + .../tlsca/tlsca.org1.example.com-cert.pem | 14 + .../tlsca/tlsca.org1.example.com_sk | 5 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...90da9b01265e5e06e555889ea72e8b1925271f6_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...0e74d67380e9ea6514c6620cf570f8caa27b9b9_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...8cc6f90f9aa11513ab46453f26b2751fca86458_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...c4f7cd804ad237fd6759fc58d7bdfe070489749_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...47c4bfba74bf006c94ec88d283e9d4850ba3c28_sk | 5 + .../msp/signcerts/cert.pem | 16 + .../org2.example.com/ca/IssuerPublicKey | Bin 0 -> 843 bytes .../ca/IssuerRevocationPublicKey | 5 + .../ca/ca.org2.example.com-cert.pem | 14 + .../ca/ca.org2.example.com_sk | 5 + .../ca/fabric-ca-server-config.yaml | 134 + .../org2.example.com/ca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...3e73807cda5f167f219b0c7687bb06baf3b5e60_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../ca/msp/keystore/IssuerSecretKey | 1 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...959dfd2ecaa5135b935a001a4164a19a04ef791_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...7c3bd09974abc6156c0968ec242e31c90a3b22a_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../msp/cacerts/ca-org2-example-com-7054.pem | 14 + ...a630ece99c0354257389a79ee3d89b2043a4e51_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../fabric-ca-client-config.yaml | 162 + .../msp/IssuerPublicKey | Bin 0 -> 843 bytes .../msp/IssuerRevocationPublicKey | 5 + .../cacerts/tlsca-org2-example-com-7054.pem | 14 + ...46a489481db47142530f5acce617b92d911a9a8_sk | 5 + .../msp/signcerts/cert.pem | 19 + .../org2.example.com/tlsca/IssuerPublicKey | Bin 0 -> 843 bytes .../tlsca/IssuerRevocationPublicKey | 5 + .../tlsca/fabric-ca-server-config.yaml | 134 + .../tlsca/fabric-ca-server.db | Bin 0 -> 61440 bytes ...e6b0fa8845ef93eb7f2e9b801e11f5b07852aeb_sk | 5 + .../msp/keystore/IssuerRevocationPrivateKey | 6 + .../tlsca/msp/keystore/IssuerSecretKey | Bin 0 -> 32 bytes .../tlsca/tlsca.org2.example.com-cert.pem | 14 + .../tlsca/tlsca.org2.example.com_sk | 5 + .../v1.4.3/ca-test/docker-compose.yaml | 92 + hyperledger_fabric/v1.4.3/ca-test/run.sh | 12 + .../v1.4.3/ca-test/scripts/ca_server_start.sh | 54 + .../v1.4.3/ca-test/scripts/client-test.sh | 182 + .../v1.4.3/ca-test/scripts/env.sh | 166 + hyperledger_fabric/v1.4.3/crypto-config.yaml | 99 + ...ea10990c276478419a17aef025478292708a0a2_sk | 5 + .../example.com/ca/ca.example.com-cert.pem | 15 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 15 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 15 + ...ca810bd6011a47f4af82b6357ba3bd5773d146f_sk | 5 + .../signcerts/orderer0.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer0.example.com/tls/ca.crt | 15 + .../orderer0.example.com/tls/server.crt | 15 + .../orderer0.example.com/tls/server.key | 5 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 15 + ...d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk | 5 + .../signcerts/orderer1.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer1.example.com/tls/ca.crt | 15 + .../orderer1.example.com/tls/server.crt | 15 + .../orderer1.example.com/tls/server.key | 5 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 15 + ...4d8a03269922fc7169acb53b7eb458386e72ab3_sk | 5 + .../signcerts/orderer2.example.com-cert.pem | 14 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../orderers/orderer2.example.com/tls/ca.crt | 15 + .../orderer2.example.com/tls/server.crt | 15 + .../orderer2.example.com/tls/server.key | 5 + ...f27022fdefdc3badae0b251d14ab6234ff4cb26_sk | 5 + .../tlsca/tlsca.example.com-cert.pem | 15 + .../msp/admincerts/Admin@example.com-cert.pem | 13 + .../msp/cacerts/ca.example.com-cert.pem | 15 + ...837bd2a9859141bd4da4c3b6d208eb36138f549_sk | 5 + .../msp/signcerts/Admin@example.com-cert.pem | 13 + .../msp/tlscacerts/tlsca.example.com-cert.pem | 15 + .../users/Admin@example.com/tls/ca.crt | 15 + .../users/Admin@example.com/tls/client.crt | 14 + .../users/Admin@example.com/tls/client.key | 5 + ...e39d53850847c0170753f7ddc0e5180bdcc981e_sk | 5 + .../ca/ca.org1.example.com-cert.pem | 15 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../org1.example.com/msp/config.yaml | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../peer0.org1.example.com/msp/config.yaml | 14 + ...5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk | 5 + .../signcerts/peer0.org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../peers/peer0.org1.example.com/tls/ca.crt | 15 + .../peer0.org1.example.com/tls/server.crt | 15 + .../peer0.org1.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../peer1.org1.example.com/msp/config.yaml | 14 + ...9049c1cc386e6ec81844084542de2b75654b61b_sk | 5 + .../signcerts/peer1.org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../peers/peer1.org1.example.com/tls/ca.crt | 15 + .../peer1.org1.example.com/tls/server.crt | 15 + .../peer1.org1.example.com/tls/server.key | 5 + ...695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk | 5 + .../tlsca/tlsca.org1.example.com-cert.pem | 15 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../Admin@org1.example.com/msp/config.yaml | 14 + ...47bb34b21a27ab9686fa91bc2953e33c46b3145_sk | 5 + .../signcerts/Admin@org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../users/Admin@org1.example.com/tls/ca.crt | 15 + .../Admin@org1.example.com/tls/server.crt | 14 + .../Admin@org1.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org1.example.com-cert.pem | 15 + .../User1@org1.example.com/msp/config.yaml | 14 + ...b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk | 5 + .../signcerts/User1@org1.example.com-cert.pem | 14 + .../tlsca.org1.example.com-cert.pem | 15 + .../users/User1@org1.example.com/tls/ca.crt | 15 + .../User1@org1.example.com/tls/client.crt | 14 + .../User1@org1.example.com/tls/client.key | 5 + ...e79e141950837075de34d2274819d75c2ccb4d4_sk | 5 + .../ca/ca.org2.example.com-cert.pem | 15 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../org2.example.com/msp/config.yaml | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../peer0.org2.example.com/msp/config.yaml | 14 + ...68fa42f092d8501f6920cc447b4ff30acc3bfb6_sk | 5 + .../signcerts/peer0.org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../peers/peer0.org2.example.com/tls/ca.crt | 15 + .../peer0.org2.example.com/tls/server.crt | 15 + .../peer0.org2.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../peer1.org2.example.com/msp/config.yaml | 14 + ...3056416cda61ae34b36fed34f35fdaa122a677c_sk | 5 + .../signcerts/peer1.org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../peers/peer1.org2.example.com/tls/ca.crt | 15 + .../peer1.org2.example.com/tls/server.crt | 15 + .../peer1.org2.example.com/tls/server.key | 5 + ...1a96b9251fca66802dedc35127a9ee9cb587495_sk | 5 + .../tlsca/tlsca.org2.example.com-cert.pem | 15 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../Admin@org2.example.com/msp/config.yaml | 14 + ...ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk | 5 + .../signcerts/Admin@org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../users/Admin@org2.example.com/tls/ca.crt | 15 + .../Admin@org2.example.com/tls/server.crt | 14 + .../Admin@org2.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org2.example.com-cert.pem | 15 + .../User1@org2.example.com/msp/config.yaml | 14 + ...501988cc9745adcf540ffb162af91f3e339ac7c_sk | 5 + .../signcerts/User1@org2.example.com-cert.pem | 14 + .../tlsca.org2.example.com-cert.pem | 15 + .../users/User1@org2.example.com/tls/ca.crt | 15 + .../User1@org2.example.com/tls/client.crt | 14 + .../User1@org2.example.com/tls/client.key | 5 + ...27bffbceb93e3a04d8f363cbdd7c2ea21308511_sk | 5 + .../ca/ca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../org3.example.com/msp/config.yaml | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer0.org3.example.com/msp/config.yaml | 14 + ...dc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk | 5 + .../signcerts/peer0.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer0.org3.example.com/tls/ca.crt | 15 + .../peer0.org3.example.com/tls/server.crt | 15 + .../peer0.org3.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer1.org3.example.com/msp/config.yaml | 14 + ...3b1b9b5966572baab8230648d91cc64de786c60_sk | 5 + .../signcerts/peer1.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer1.org3.example.com/tls/ca.crt | 15 + .../peer1.org3.example.com/tls/server.crt | 15 + .../peer1.org3.example.com/tls/server.key | 5 + ...9ec854e62dc923fae5ef35247d240f3d7ecf698_sk | 5 + .../tlsca/tlsca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com/msp/config.yaml | 14 + ...6e200267221ffe74cb73c548de4da80b461d8ea_sk | 5 + .../signcerts/Admin@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/Admin@org3.example.com/tls/ca.crt | 15 + .../Admin@org3.example.com/tls/server.crt | 14 + .../Admin@org3.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../User1@org3.example.com/msp/config.yaml | 14 + ...f568f9849322eb6c5cea704eb5199cd1506c5a6_sk | 5 + .../signcerts/User1@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/User1@org3.example.com/tls/ca.crt | 15 + .../User1@org3.example.com/tls/client.crt | 14 + .../User1@org3.example.com/tls/client.key | 5 + .../docker-compose-1orgs-1peers-dev.yaml | 92 + .../docker-compose-2orgs-4peers-couchdb.yaml | 107 + .../docker-compose-2orgs-4peers-event.yaml | 59 + .../docker-compose-2orgs-4peers-kafka.yaml | 134 + .../docker-compose-2orgs-4peers-raft.yaml | 76 + .../docker-compose-2orgs-4peers-solo-be.yaml | 82 + .../docker-compose-2orgs-4peers-solo.yaml | 73 + .../chaincode/go/cc02_mockTest/README.md | 23 + .../chaincode/go/cc02_mockTest/cc_test.go | 58 + .../go/cc02_mockTest/chaincode_example02.go | 200 + .../chaincode_example01.go | 104 + .../chaincode_example02.go | 193 + .../chaincode_example02_test.go | 112 + .../chaincode_example03.go | 100 + .../chaincode_example03_test.go | 72 + .../chaincode_example04.go | 174 + .../chaincode_example04_test.go | 119 + .../chaincode_example05.go | 215 + .../chaincode_example05_test.go | 128 + .../chaincode/go/enccc_example/README.md | 80 + .../go/enccc_example/enccc_example.go | 223 + .../chaincode/go/enccc_example/enccc_test.go | 234 + .../chaincode/go/enccc_example/utils.go | 147 + .../chaincode/go/eventsender/eventsender.go | 92 + .../invokereturnsvalue/invokereturnsvalue.go | 133 + .../invokereturnsvalue_test.go | 97 + .../v1.4.3/examples/chaincode/go/map/map.go | 200 + .../chaincode/go/map/map_experimental.go | 311 + .../go/marbles02/marbles_chaincode.go | 627 + .../marbles02_private/collections_config.json | 18 + .../collections_config_new.json | 16 + .../collectionMarbles/indexes/indexOwner.json | 1 + .../go/marbles_chaincode_private.go | 634 + .../chaincode/go/passthru/passthru.go | 72 + .../examples/chaincode/go/sleeper/sleeper.go | 124 + .../examples/chaincode/go/utxo/Dockerfile | 40 + .../examples/chaincode/go/utxo/README.md | 79 + .../examples/chaincode/go/utxo/chaincode.go | 104 + .../chaincode/go/utxo/consensus/consensus.go | 482 + .../go/utxo/consensus/consensus_wrap.cxx | 812 + .../examples/chaincode/go/utxo/store.go | 91 + ...ransactions_base64_encoded_on_testnet3.txt | 908 + ...for_first_500_transactions_on_testnet3.txt | 908 + .../examples/chaincode/go/utxo/util/dah.pb.go | 197 + .../examples/chaincode/go/utxo/util/dah.proto | 43 + .../examples/chaincode/go/utxo/util/store.go | 72 + .../examples/chaincode/go/utxo/util/util.go | 104 + .../examples/chaincode/go/utxo/util/utxo.go | 144 + .../chaincode/go/utxo/util/utxo_test.go | 206 + .../v1.4.3/explorer-artifacts/config.json | 57 + .../explorer-artifacts/fabricexplorer.sql | 115 + hyperledger_fabric/v1.4.3/kafka/README.md | 8 + hyperledger_fabric/v1.4.3/kafka/configtx.yaml | 764 + .../v1.4.3/kafka/logs/dev_all.log | 2307 + .../v1.4.3/kafka/logs/dev_orderer.log | 229 + .../v1.4.3/kafka/logs/dev_peer0.log | 220 + hyperledger_fabric/v1.4.3/network_config.json | 65 + .../v1.4.3/network_generator/__init__.py | 0 .../network_generator/config_manager.py | 6 + .../v1.4.3/network_generator/network.py | 13 + .../network_generator/network_generator.py | 242 + .../v1.4.3/network_generator/node.py | 15 + .../v1.4.3/network_generator/orderer.py | 9 + .../v1.4.3/network_generator/requirements.txt | 6 + hyperledger_fabric/v1.4.3/orderer.yaml | 36 + hyperledger_fabric/v1.4.3/org3/configtx.yaml | 54 + .../v1.4.3/org3/crypto-config.yaml | 23 + ...27bffbceb93e3a04d8f363cbdd7c2ea21308511_sk | 5 + .../ca/ca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../org3.example.com/msp/config.yaml | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer0.org3.example.com/msp/config.yaml | 14 + ...dc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk | 5 + .../signcerts/peer0.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer0.org3.example.com/tls/ca.crt | 15 + .../peer0.org3.example.com/tls/server.crt | 15 + .../peer0.org3.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../peer1.org3.example.com/msp/config.yaml | 14 + ...3b1b9b5966572baab8230648d91cc64de786c60_sk | 5 + .../signcerts/peer1.org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../peers/peer1.org3.example.com/tls/ca.crt | 15 + .../peer1.org3.example.com/tls/server.crt | 15 + .../peer1.org3.example.com/tls/server.key | 5 + ...9ec854e62dc923fae5ef35247d240f3d7ecf698_sk | 5 + .../tlsca/tlsca.org3.example.com-cert.pem | 15 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../Admin@org3.example.com/msp/config.yaml | 14 + ...6e200267221ffe74cb73c548de4da80b461d8ea_sk | 5 + .../signcerts/Admin@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/Admin@org3.example.com/tls/ca.crt | 15 + .../Admin@org3.example.com/tls/server.crt | 14 + .../Admin@org3.example.com/tls/server.key | 5 + .../msp/cacerts/ca.org3.example.com-cert.pem | 15 + .../User1@org3.example.com/msp/config.yaml | 14 + ...f568f9849322eb6c5cea704eb5199cd1506c5a6_sk | 5 + .../signcerts/User1@org3.example.com-cert.pem | 14 + .../tlsca.org3.example.com-cert.pem | 15 + .../users/User1@org3.example.com/tls/ca.crt | 15 + .../User1@org3.example.com/tls/client.crt | 14 + .../User1@org3.example.com/tls/client.key | 5 + hyperledger_fabric/v1.4.3/peer.yaml | 37 + hyperledger_fabric/v1.4.3/prometheus.yml | 45 + hyperledger_fabric/v1.4.3/raft/README.md | 8 + .../raft/channel-artifacts/Org1MSP.json | 170 + .../raft/channel-artifacts/Org1MSPanchors.tx | Bin 0 -> 296 bytes .../raft/channel-artifacts/Org2MSP.json | 170 + .../raft/channel-artifacts/Org2MSPanchors.tx | Bin 0 -> 296 bytes .../raft/channel-artifacts/Org3MSP.json | 170 + .../raft/channel-artifacts/businesschannel.tx | Bin 0 -> 1600 bytes .../channel-artifacts/businesschannel.tx.json | 230 + .../channel-artifacts/businesschannel_0.block | Bin 0 -> 25815 bytes .../businesschannel_0.block.json | 1105 + .../businesschannel_0.block.json-flat.json | 399 + .../channel-artifacts/businesschannel_1.block | Bin 0 -> 25491 bytes .../businesschannel_1.block.json | 985 + .../businesschannel_1.block.json-flat.json | 364 + .../channel-artifacts/businesschannel_2.block | Bin 0 -> 25496 bytes .../businesschannel_2.block.json | 968 + .../businesschannel_2.block.json-flat.json | 359 + .../channel-artifacts/businesschannel_3.block | Bin 0 -> 4537 bytes .../businesschannel_3.block.json | 156 + .../businesschannel_3.block.json-flat.json | 59 + .../channel-artifacts/businesschannel_4.block | Bin 0 -> 3997 bytes .../businesschannel_4.block.json | 166 + .../businesschannel_4.block.json-flat.json | 61 + .../channel-artifacts/businesschannel_5.block | Bin 0 -> 3999 bytes .../businesschannel_5.block.json | 166 + .../businesschannel_5.block.json-flat.json | 61 + .../channel-artifacts/businesschannel_6.block | Bin 0 -> 38502 bytes .../businesschannel_6.block.json | 1360 + .../businesschannel_6.block.json-flat.json | 497 + .../businesschannel_config.block | Bin 0 -> 38502 bytes .../businesschannel_config.block.json | 968 + ...usinesschannel_config.block.json-flat.json | 359 + .../raft/channel-artifacts/config_delta.json | 308 + .../raft/channel-artifacts/config_delta.pb | Bin 0 -> 5880 bytes .../channel-artifacts/config_delta_env.json | 320 + .../channel-artifacts/config_delta_env.pb | Bin 0 -> 8706 bytes .../channel-artifacts/orderer0.genesis.block | Bin 0 -> 20295 bytes .../orderer0.genesis.block.json | 756 + .../orderer0.genesis.block.json-flat.json | 273 + .../orderer0.genesis.block_updated.block | Bin 0 -> 20294 bytes .../orderer0.genesis.block_updated.json | 756 + .../channel-artifacts/orderer1.genesis.block | Bin 0 -> 20295 bytes .../orderer1.genesis.block.json | 756 + .../orderer1.genesis.block.json-flat.json | 273 + .../channel-artifacts/orderer2.genesis.block | Bin 0 -> 20295 bytes .../orderer2.genesis.block.json | 756 + .../orderer2.genesis.block.json-flat.json | 273 + .../channel-artifacts/original_config.json | 778 + .../raft/channel-artifacts/original_config.pb | Bin 0 -> 21369 bytes .../channel-artifacts/testchainid_0.block | Bin 0 -> 20295 bytes .../testchainid_0.block.json | 756 + .../testchainid_0.block.json-flat.json | 273 + .../channel-artifacts/testchainid_1.block | Bin 0 -> 27706 bytes .../testchainid_1.block.json | 1129 + .../testchainid_1.block.json-flat.json | 411 + .../testchainid_config.block | Bin 0 -> 20295 bytes .../testchainid_config.block.json | 756 + .../testchainid_config.block.json-flat.json | 273 + .../channel-artifacts/updated_config.json | 948 + .../raft/channel-artifacts/updated_config.pb | Bin 0 -> 26900 bytes hyperledger_fabric/v1.4.3/raft/configtx.yaml | 795 + .../v1.4.3/raft/logs/dev_all.log | 35214 ++++++++++++++++ .../v1.4.3/raft/logs/dev_orderer.log | 9497 +++++ .../v1.4.3/raft/logs/dev_peer0.log | 24357 +++++++++++ .../v1.4.3/scripts/download_images.sh | 67 + .../v1.4.3/scripts/env_cleanup.sh | 17 + .../v1.4.3/scripts/env_setup.sh | 30 + hyperledger_fabric/v1.4.3/scripts/func.sh | 973 + .../v1.4.3/scripts/gen_channelArtifacts.sh | 81 + .../v1.4.3/scripts/gen_config_channel.sh | 44 + .../v1.4.3/scripts/gen_config_crypto.sh | 41 + .../v1.4.3/scripts/gen_cryptoArtifacts.sh | 37 + .../v1.4.3/scripts/init_chaincode_dev.sh | 67 + .../v1.4.3/scripts/initialize_peer0.sh | 40 + .../v1.4.3/scripts/json_flatter.py | 104 + .../v1.4.3/scripts/start_eventsclient.sh | 24 + .../v1.4.3/scripts/test_cc_approve.sh | 25 + .../v1.4.3/scripts/test_cc_commit.sh | 23 + .../v1.4.3/scripts/test_cc_install.sh | 28 + .../v1.4.3/scripts/test_cc_instantiate.sh | 23 + .../v1.4.3/scripts/test_cc_invoke_query.sh | 37 + .../v1.4.3/scripts/test_cc_list.sh | 16 + .../v1.4.3/scripts/test_cc_peer0.sh | 32 + .../v1.4.3/scripts/test_cc_queryapprove.sh | 25 + .../v1.4.3/scripts/test_cc_querycommit.sh | 25 + .../v1.4.3/scripts/test_cc_upgrade.sh | 32 + .../v1.4.3/scripts/test_channel_create.sh | 22 + .../v1.4.3/scripts/test_channel_getinfo.sh | 25 + .../v1.4.3/scripts/test_channel_join.sh | 23 + .../v1.4.3/scripts/test_channel_list.sh | 23 + .../v1.4.3/scripts/test_channel_update.sh | 43 + .../v1.4.3/scripts/test_config_update.sh | 85 + .../v1.4.3/scripts/test_configtxlator.sh | 64 + .../v1.4.3/scripts/test_cscc.sh | 30 + .../v1.4.3/scripts/test_fetch_blocks.sh | 23 + .../v1.4.3/scripts/test_lscc.sh | 67 + .../v1.4.3/scripts/test_qscc.sh | 35 + .../v1.4.3/scripts/test_sideDB.sh | 72 + .../v1.4.3/scripts/test_temp.sh | 23 + .../v1.4.3/scripts/test_update_anchors.sh | 19 + .../v1.4.3/scripts/variables.sh | 145 + hyperledger_fabric/v1.4.3/solo/README.md | 7 + hyperledger_fabric/v1.4.3/solo/configtx.yaml | 775 + .../v1.4.3/solo/logs/dev_all.log | 882 + .../v1.4.3/solo/logs/dev_orderer.log | 197 + .../v1.4.3/solo/logs/dev_peer.log | 2305 + .../v1.4.3/solo/logs/dev_peer0.log | 227 + 541 files changed, 118185 insertions(+), 1 deletion(-) create mode 100644 hyperledger_fabric/v1.4.3/.env create mode 100644 hyperledger_fabric/v1.4.3/2orgs-4peers-solo.yaml create mode 100644 hyperledger_fabric/v1.4.3/Makefile create mode 100644 hyperledger_fabric/v1.4.3/base-dev.yaml create mode 100644 hyperledger_fabric/v1.4.3/base-event.yaml create mode 100644 hyperledger_fabric/v1.4.3/base-kafka.yaml create mode 100644 hyperledger_fabric/v1.4.3/base-raft.yaml create mode 100644 hyperledger_fabric/v1.4.3/base-solo.yaml create mode 100644 hyperledger_fabric/v1.4.3/base.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/ca.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/05f1c88abe3ae35edf814c2d68d4bf2e735befe20a1138c57cdd2b74c48da14d_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/msp/keystore/b089a01c9180d928900a3d03fbbca7d9485e5f138aa75f4c82cd0f74c14b5e56_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/msp/keystore/c5dbb6f8b9c60fd02eaa67d59253fa86a004a246b452decd4f6aae2f1013583f_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/keystore/838272d7e4bcce70c0f465ccc90da9b01265e5e06e555889ea72e8b1925271f6_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/keystore/9b123a706dc6ebe86e44dac468cc6f90f9aa11513ab46453f26b2751fca86458_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/keystore/7a4420664b066c549cf1a30b247c4bfba74bf006c94ec88d283e9d4850ba3c28_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/6fa68ee91c7b1584ed81827073e73807cda5f167f219b0c7687bb06baf3b5e60_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/keystore/063ffaae647ace1302ffa661a7c3bd09974abc6156c0968ec242e31c90a3b22a_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/cacerts/tlsca-org2-example-com-7054.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/keystore/99c61eb8924af634e48b559c346a489481db47142530f5acce617b92d911a9a8_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/signcerts/cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/IssuerPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/IssuerRevocationPublicKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/290d8e2b87492d1502dc438a9e6b0fa8845ef93eb7f2e9b801e11f5b07852aeb_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/msp/keystore/IssuerSecretKey create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk create mode 100644 hyperledger_fabric/v1.4.3/ca-test/docker-compose.yaml create mode 100644 hyperledger_fabric/v1.4.3/ca-test/run.sh create mode 100644 hyperledger_fabric/v1.4.3/ca-test/scripts/ca_server_start.sh create mode 100644 hyperledger_fabric/v1.4.3/ca-test/scripts/client-test.sh create mode 100644 hyperledger_fabric/v1.4.3/ca-test/scripts/env.sh create mode 100644 hyperledger_fabric/v1.4.3/crypto-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-1orgs-1peers-dev.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-couchdb.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-event.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-kafka.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-raft.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo-be.yaml create mode 100644 hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo.yaml create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/README.md create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/cc_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/chaincode_example02.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example01/chaincode_example01.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/README.md create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_example.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/utils.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/eventsender/eventsender.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map_experimental.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02/marbles_chaincode.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config.json create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config_new.json create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/passthru/passthru.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/sleeper/sleeper.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/Dockerfile create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/README.md create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/chaincode.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/store.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.pb.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.proto create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/store.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/util.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo.go create mode 100644 hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo_test.go create mode 100644 hyperledger_fabric/v1.4.3/explorer-artifacts/config.json create mode 100644 hyperledger_fabric/v1.4.3/explorer-artifacts/fabricexplorer.sql create mode 100644 hyperledger_fabric/v1.4.3/kafka/README.md create mode 100644 hyperledger_fabric/v1.4.3/kafka/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.3/kafka/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.3/kafka/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.3/kafka/logs/dev_peer0.log create mode 100644 hyperledger_fabric/v1.4.3/network_config.json create mode 100644 hyperledger_fabric/v1.4.3/network_generator/__init__.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/config_manager.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/network.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/network_generator.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/node.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/orderer.py create mode 100644 hyperledger_fabric/v1.4.3/network_generator/requirements.txt create mode 100644 hyperledger_fabric/v1.4.3/orderer.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt create mode 100644 hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key create mode 100644 hyperledger_fabric/v1.4.3/peer.yaml create mode 100644 hyperledger_fabric/v1.4.3/prometheus.yml create mode 100644 hyperledger_fabric/v1.4.3/raft/README.md create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSP.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSP.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSPanchors.tx create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org3MSP.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_1.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_1.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_1.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_5.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_5.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_5.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_6.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_6.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_6.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_config.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_config.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_config.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/config_delta.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/config_delta.pb create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/config_delta_env.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/config_delta_env.pb create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block_updated.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block_updated.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.pb create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_1.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_1.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_1.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json-flat.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.json create mode 100644 hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.pb create mode 100644 hyperledger_fabric/v1.4.3/raft/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.3/raft/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.3/raft/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.3/raft/logs/dev_peer0.log create mode 100644 hyperledger_fabric/v1.4.3/scripts/download_images.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/env_cleanup.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/env_setup.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/func.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/gen_channelArtifacts.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/gen_config_channel.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/gen_config_crypto.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/gen_cryptoArtifacts.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/init_chaincode_dev.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/initialize_peer0.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/json_flatter.py create mode 100644 hyperledger_fabric/v1.4.3/scripts/start_eventsclient.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_approve.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_commit.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_install.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_instantiate.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_invoke_query.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_list.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_peer0.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_queryapprove.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_querycommit.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cc_upgrade.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_channel_create.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_channel_getinfo.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_channel_join.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_channel_list.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_channel_update.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_config_update.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_configtxlator.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_cscc.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_fetch_blocks.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_lscc.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_qscc.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_sideDB.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_temp.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/test_update_anchors.sh create mode 100644 hyperledger_fabric/v1.4.3/scripts/variables.sh create mode 100644 hyperledger_fabric/v1.4.3/solo/README.md create mode 100644 hyperledger_fabric/v1.4.3/solo/configtx.yaml create mode 100644 hyperledger_fabric/v1.4.3/solo/logs/dev_all.log create mode 100644 hyperledger_fabric/v1.4.3/solo/logs/dev_orderer.log create mode 100644 hyperledger_fabric/v1.4.3/solo/logs/dev_peer.log create mode 100644 hyperledger_fabric/v1.4.3/solo/logs/dev_peer0.log diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index 8ae7a831..d1fef210 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -14,6 +14,7 @@ If you're not familiar with Docker and Blockchain, can have a look at these book Fabric Release | Description --- | --- [Fabric Latest](latest/) | latest fabric code, unstable. +[Fabric v1.4.3](v1.4.3/) | stable fabric 1.4.3 release. [Fabric v1.4.2](v1.4.2/) | stable fabric 1.4.2 release. [Fabric v1.4.0](v1.4.0/) | stable fabric 1.4.0 release. [Fabric v1.3.0](v1.3.0/) | stable fabric 1.3.0 release. @@ -29,7 +30,7 @@ Fabric Release | Description ### TLDR ```bash -$ export RELEASE=v1.4.2 +$ export RELEASE=v1.4.3 ``` ```bash diff --git a/hyperledger_fabric/v1.4.3/.env b/hyperledger_fabric/v1.4.3/.env new file mode 100644 index 00000000..aca07d17 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.3 +EXT_IMG_TAG=0.4.15 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.3/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.3/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.3/Makefile b/hyperledger_fabric/v1.4.3/Makefile new file mode 100644 index 00000000..976a058d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/Makefile @@ -0,0 +1,300 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-solo.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_approve test_cc_queryapprove test_cc_commit test_cc_querycommit test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.3/base-dev.yaml b/hyperledger_fabric/v1.4.3/base-dev.yaml new file mode 100644 index 00000000..7a9b09e4 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base-dev.yaml @@ -0,0 +1,97 @@ +# This is the development compose file to config env and command +# Notice that chaincode is executed inside docker in default net mode +# https://github.com/yeasy/docker-compose-files + +# Depends on the yeasy/hyperledger-fabric image. + +version: '2' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: orderer.example.com + hostname: orderer.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # for solo case + #- ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + #- ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + # for kafka case + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + #command: bash -c 'orderer start' + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # solo mode configuration + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + #- ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + # kafka mode configuration + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./kafka/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: bash -c 'peer node start' + #command: bash -c 'peer node start --peer-chaincodedev=true' # DEV mode + + cli: + extends: + file: base.yaml + service: cli-base + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/opt/gopath/src/github.com/hyperledger/fabric + #- /tmp/:/tmp/ + - ./scripts:/tmp/scripts + # solo mode configuration + #- ./solo/channel-artifacts:/tmp/channel-artifacts + #- ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + #- ./solo/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + #- ./solo/crypto-config:/etc/hyperledger/fabric/crypto-config + #- ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples + # kafka mode configuration + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./kafka/crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./kafka/crypto-config:/etc/hyperledger/fabric/crypto-config + - ./examples:/opt/gopath/src/github.com/hyperledger/fabric/examples diff --git a/hyperledger_fabric/v1.4.3/base-event.yaml b/hyperledger_fabric/v1.4.3/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.3/base-kafka.yaml b/hyperledger_fabric/v1.4.3/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.3/base-raft.yaml b/hyperledger_fabric/v1.4.3/base-raft.yaml new file mode 100644 index 00000000..005b6821 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base-raft.yaml @@ -0,0 +1,198 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples diff --git a/hyperledger_fabric/v1.4.3/base-solo.yaml b/hyperledger_fabric/v1.4.3/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.3/base.yaml b/hyperledger_fabric/v1.4.3/base.yaml new file mode 100644 index 00000000..97f5be98 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/base.yaml @@ -0,0 +1,163 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_LOGGING_LEVEL=DEBUG + - CORE_CHIANCODE_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..2efdf85e0eae9492ed0e972d824d2e74ba57bfd8 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zARVwUTrz%e*?k%KO#g5AZEsl$~wQk@Pnd;Ls45` z7?d!;N91pd7vJ+Go?GN+t`Z=u##5|zSh(f{w_)Q?^b@>YiZ$j~`oUZV(X^%zR@rJI zL<%6IOR+^py6y;}2%s%Rprm~v$SHaw$EpD^D!X)>GAVWvATO!054lX{T7?_Jxyh<*2BeDb)h7+n$9^^NtQ zN)jM=?el)FW3xki+^8>-w>o}^e)*w-@WH5n{qp2P4Mh?nL<%6xtpmIQVl2D}v!1m+ zDky-NL2&YNa!w{QAkqwRN#_U>AoScsv!bXTStamlD>cn@fLRt~wp)WTcBiWf(6h$H z%_@ii3LrN&0@~C9eq?-~Q__+zy-cx)j%~J|igaT!d@Nlags>7I>DL~8X%kW5hcBB-9YLwfkgp9ASGS5&Tp0 zKU^Xp+G4PvQ^)u(xDyqef2$SVXG-8JCxFWNr=@Q|8Ul9jGDHd>ywXBI^g+)~dsB$~ z_AI%2{p;)cD3co!v7km3Xm7Bb5+FD`$;F@KTR$ z`_4K<3Lq!C+_dsB7Y}U9KtQId^H!1_o6#h+Qk#NA&CHw*RW%YIpD~jn>7I5ndCrbk zik`Xd{HGWSfk$3@iJ;oS$adUGLLf|&{6y6_oh->J#HJEyc1;ld6z_@j_T=9uz&l-a zq:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..64c75634968bf1e5295bcfe84a70eb3dc8b9b44b GIT binary patch literal 61440 zcmeI)&u`mQ00(fp&d;{#>!wv%Z?EYpHIQ~owr-3|$+pmib={V>h=Ra+NnTnr$Icw5 zw3;}il-sy+VdBgMG;!hp9FX`2CLtljjSCV8iOb-E;MqwRJ8ili)=4YhtWNFc_nzPT zyys`fFYDs1dClguVp>&Z)3egBB+Jq(luD8`Di$J^kXZV}GAx#WSax3W&dNT&N2RHM zYO%Hi}7XMZy~8~vJ`i-d>1jH!`toPYb|fn5-Q00bcLzZKYeClHQL zP08D)&5AlNam&^!T8Y`bu9|wedpmf!kjpOR=u-C5e2yl%cPHqiR;I6K3zx5E3zM0d znPiIAxur2(H5%0-w`fr}i*(_}5?xrHpHETNu-8mWvp3b-d{foR+;9%RJ6?&YIxBMB zO)v7ancb*&XJ&C$Hw~&8c8cH@P$MbkBA zYo<~6uJ`$1y?f}S!K(Z*YWhs(T=KCXU0%rFTF#|t&Ei7PA1g(BR3#aCB#k+(-V`>X z)xC#vTAfuc91F#-O~{gFl=(*ejxO$GRMA$ZyRG_~J?-5J3_g_d&dD?z48<3x4wQj7 zpz6!SDMIM(KsY`&CO5Ng32T;FbGjz4ch&}dWSww2*6gBvUt*$Yntn*Hw&gyn6Ow|mvW}1)B$DV!K58xgoncO-N z3dhIC zQT&bTxx78i!gw!fht}GMeyO@Z_8atl7m2iY%lRnV8uXR@27PZ5XNXsQnK&VVWdrIIRc*OlVW^BGD?_P`P25x?UAGDRs|SwfF5pGA2}lT)QPWH9q zWIU;zIGKptj+1dd|GP8$&$M1R7z7{y0SG_<0uX=z1Rwwb2tWV=&r+b@Ihga!eo0c? zcf3IW0uX=z1Rwwb2tWV=5P$##AaLXaF#mt#niLg+00bZa0SG_<0uX=z1Rwwb2=o$g z{+3^`*G_~(00Izz00bZa0SG_<0uX=z1R(Hy3t;~L`EEay9s&@600bZa0SG_<0uX=z z1R!t_0nh*cKS*@MfdB*`009U<00Izz00bZa0SG|gITUc_|7G%*B!2LM00bZa0SG_< z0uX=z1Rwwb2teRy354aK6zz*DzvBDP~1Rwwb2tWV= z5P$##AOHafK;Y>MkdQJ?4AUs_X`QcgJv|&$CWuwijEdO~IT28%NXg=5ZrB>r+o2nJfZz#bO74CJ5ExNT z%ex){C{F0ECjfoNlw{QZ0KonGe?!}n_`wST5P$##AOHafKmY;|fB*y_aHs-XoASU| zGcX$4z7dh5MbosWSh=bhr!wqR`pl^}*`4Le>BSB6Vy^UBy?X7nOY_#%8!P$3!gOYF z^&+1sr5h~&-uc2De|Oo+zjSV8Zk?BOP0WB;Hz5QwwN_tFm+z{#C)M=%qv{yt6~QJ$tl*&+kC&H=M9@%RbCcT_xy6! zbMWqB&T->%VSb+ooqA+#+tP{+ySp-P|Le^E2gw78{6xMd56Iu-mqTr8WDWrcKmY;| zfB*y_009U<00IzzzySoDuK<|VYI?fNYs|8%;vq-I{a!#V>wVQyq>WfDXR zAXHZ(=KpR!cf-1dhai9oP;dyiz%>nJoB`A-8N?eC?-C$e)DjG&p}WQSD2kyFYogHF zjQjTTL)ZK!<5Yx#`cRr0L<%4gZc0La4u>i~Gj$B2^^>u;B#u`HIH<*P>a!wDg04dn zAUN#T+=EgEi~v~5)QAbg9>C>a)x1dT67dr}`=zvGIwC|0Alf?LKR0EXB+n|(oJEz< zt*fb9u*^JMoxXL~>A1r3;1VDQH%TNKR1g!669(|83Nh^iqriK?bBJ{>tO=8#i2$M^ zL<%4$>R^>mCZV~F6t0{c__Qa-?slB92Jw0%0Ah@kY-jHhAZ;tK7X?w$k$(-tsv$6j zFzfR{=r}$Pq1_)~c9E?FE+Rwsznha zED|8|)I8yjZZRd@3OVix^U;DA(Xt@!!kQ2LEkyRa;l)@YL<%6v0%7AdiS8?`QqLQs zK4K9j$fjBO-AW1C+2VHJUqKuaAUklelETfc(BacpfSw%HW>qW5^V$KSsQ5CCd^Z4B7haWL%;Xy8Z|3 z91RpYyXfdWt!CH~MmxaQ9C80_8X#Xwf^;O6eB6Vqsl6h&TAdn9C;}n|`o_kxKqSA!pVrqu% z?*T-N;*yJ4sJ;au-$k^(Hd;&{5+Ehx*(Y$t8beu9C0J-k$?OW2y1SYERFCMp1;I5m zPsTb#3Ltco3fCwTLtkCmMuL@RfB9pod_3(P{mi6DkfSmpCMgmixz1`xLp|9FwYhi? zz5ehX%zlb!ZV1pa?8{*olC!C|LLmKwDJb~hmh)lyTk$BAj61pKj{?_%soIa`(Nk=x zY3E8HTwS6r!x-3zq;VQ=5?~;iJ(Os5ztr(Gt$x)~((+-RQXsq=Mr:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..cb70bf703c5d2da7c1f86ae1e98bc71fee345b87 GIT binary patch literal 61440 zcmeI)O>Em#00(fp&S%&3bx7T)+YDl{}UAMudgf5h5rQ5Q0VnSd!$xCYH*qP&0 z4HJiyavN7JOq{uZ5GM}6VG>skNJt#GaX|thaT#0?JUi)Pr%l(xI<)fl>ePPk`T4!y zdwzCouQ#r*=nkW0%dTn;ofk#~Q50UHR1kzQJ`+Ai_&mVp5k80bygP}z3kUoj6K4Ld zC1Ur5p;%Nnu`~41;Aina23zsP_*dk7EIRx}LXCax{yQKKL_q)o5P-n{R$%+BP&7F+ zBkov^RxntR*^XY;i<-mgs%4aV*TYNsY-TM>*D^1!Wa&h2^aP#OOY~+Yzw~M*Kb>A! zkW;kIY+W-{vr#QDn-&bKKv%D>(be^pl@!$)&W2^{PE)57_aXa#0? z+w(jf&1uwoGqagiw@j*=PKvUvnr=6#qgNSET&<<3%{Hyutfcaju`jg7s=e75Y?JRO zx4M>H&gSXm>?@h|l{Gq-qSx}d*E0EA^h);Dbf8xK>mkdnQ^V2Z)Rfq&c)(h@tQ)%K z=$2XcFAoG@{V{af)T-#Moz>)8~o*^CPYQ>AF1s>rd2!noV&EpEeG z-M>4x)wS})lab_=DN)eP65FcZG5D2?%G=8F*403>EB>|6(Dy>lJ(w25k>rh;LuJ5s zs0K1|ix9bcBAOf@7h4&xgf-i$xm}ahyGug>vTit??ksmX+C6boGa6mU^uh(+JN<3C zyO}J{4@Hv8sL8e*bwe{t2I~eITHR@fsk*7wEbGzn*tbsy0lb~a^7iRS zG&wmbzSkMuZ03zHno%!y7o&la`y%!k%zX9gl(}a>b2slDP>yWyI#gfSQ)F3Qh(?mR z$$mYSGEc z1sm6QdV7+E@t@L;thJB)RCSRYH0TFT5{iG#{VLlY^reFaeg7uz5U&O@aYI6_Tq2rG zCdKVLUJq;V-ck2Hh6By$1?|&*4nM)0w9s^zmZDCx);rkyN)Q})`3c-{Y`xInmpybX z`}$h@62mtl(Wb|jR|H}nA!BxWKV}U#*KamIIOTLH+0uX=z1Rwwb z2tWV=5P$##AOL}Bq$J`k6F!TbNmt6@jMt z6@)yEA2vl+*+^+Lm8bzk!5dXi_l57=L;*uI4Q^UYhvfmwD-aG4pb!k_3r zev3`(HalqVIn!Zwm6iCb0Bk7}Easd4xX=H?- literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk new file mode 100644 index 00000000..2681bf59 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/3295981bd696e06db41db48b17fb743d43988f16fa0b8a1ff6cc6bea7c863162_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly +UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx +QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey new file mode 100644 index 00000000..1070b843 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerRevocationPrivateKey @@ -0,0 +1,6 @@ +-----BEGIN PRIVATE KEY----- +MIGkAgEBBDALaw+r+kOT0kY5O9E91HUwvqE7p4cTqrAJQ/ZFcgtUz9b8wPL23DOi +XM8Bf77RMaCgBwYFK4EEACKhZANiAATosxBnHncqCn6C6d8Io16Gu5nLUBhDvYNx +/ORur0SLexInMKUrRyc2mFp7zT6XrUCTmKarZJC+7iWGrKyyngkwTxvxa8VVaGY5 +1C/5dObVsA83xko7GOoMHYVtvxFCYJk= +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/msp/keystore/IssuerSecretKey new file mode 100644 index 0000000000000000000000000000000000000000..d692157b964d70cbbf1254922bcb56d1c49eb5b7 GIT binary patch literal 32 ocmY$}e>x&D)=^fc(!oyn*GX-L6^T!d1SWd$sC*GgUU(%D0My_OWdHyG literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..197d49ca --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIUf6wM/e5Yoqad5ykzdyNMmFEkQpwwCgYIKoZIzj0EAwIw +aDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQK +EwtleGFtcGxlLmNvbTEOMAwGA1UECxMFdGxzY2ExGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMCAXDTE4MTAxMjA4NTYwMFoYDzIxNjgwOTA1MDg1NjAwWjBoMQsw +CQYDVQQGEwJVUzEXMBUGA1UECBMOTm9ydGggQ2Fyb2xpbmExFDASBgNVBAoTC2V4 +YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEaMBgGA1UEAxMRdGxzY2EuZXhhbXBs +ZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATgOHkZzn6C6MieVWOZjGve +0h/taMdxQKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAdBgNVHQ4E +FgQUnOwD/If5n4yCIxCc2kik9+mRsxYwCgYIKoZIzj0EAwIDSAAwRQIhAPNMC62d +5EsJjkqZLSuq9GyZDk+4fsHzNS6lgrlzZfuxAiBygZt2ee8Z8zwoZjTRXvcCj4Df +5+YwFqOjgPXdXg+nTA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk new file mode 100644 index 00000000..2681bf59 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly +UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx +QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..6b7395af --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk new file mode 100644 index 00000000..0e34740e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@ca.org1.example.com/msp/keystore/73cc881ad56def29c760c1bb0a798a30ef7e72c099dc45d5af032767bc56db90_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg8vMuirOjKSGHUNNF +qYlMP7ZlaOE8xD4BIV9UjYApuQyhRANCAATVFCmMnRB4YjYASeToLpW905Sr11d7 +eJuWWVEXxRXweujA+2XIvJnu9oJzfctuEgAixaNfNLWaHo7AAdK1WOLw +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..ef6b4f00 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk new file mode 100644 index 00000000..b2ffa67d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/keystore/44ac4b3d7f237351157123fe27ae6ab6beed584000c446a5a22373fb366a4987_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgfRcMLZfkPxSPSjxY +LOcLxIeUCd7C71EfZH9Jyj8cstqhRANCAASpl1xmXmNMex/YmPK9ew9sI4JW7w5B +e4whAaHEMEr4K9QWbmGUtZPtr3EKEHYbhA8BM2RdFkl+09fvew76T9tQ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..71cde348 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/Admin@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArOgAwIBAgIUJbPbRHo+tTwYRVq0zJ2p3bzYtdMwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEdXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABKmXXGZeY0x7H9iY8r17D2wjglbvDkF7jCEB +ocQwSvgr1BZuYZS1k+2vcQoQdhuEDwEzZF0WSX7T1+97DvpP21CjggERMIIBDTAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUPgf/xHQ/Nru2 ++JEBpLOA2OClo6AwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFm +ZmlsaWF0aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMS5leGFt +cGxlLmNvbSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQCl +X+M3Rp7MEAVT6N8D7TgqOh9Rmtrv4By1WVmeNf/ZAAIgb6Cb7Thh7y60I6OlxdOw +A3bsWxA4xq8q3gCL+/I2kDE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..cec4dbdc --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk new file mode 100644 index 00000000..5ac8d89a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@ca.org1.example.com/msp/keystore/cfdbc7a7f70d040af5879f1b7333a68dd0a48c3f71df817b7ae26bb1bd42e86d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWUNovBTSm43w0Gne +wH+gjOv4wnAUOes4Rl5xRfJNkFChRANCAAQYGe+D/gw4IbjDBD5XQutFqjELjXz+ +WayBTKOK/gZP4lqwqp9NqWNWI8uiVilHKrKD24GqsM3+h5d5q2UJG5Hf +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..47b9ce88 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk new file mode 100644 index 00000000..807469b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/keystore/c193ca45e88d8a6602450a05c87de44c9d630428d49fe82ac730959ada6d3eb7_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2PYDX6UQs548jvq0 +eP2rClDYv8JoiZeK6qJcXHzvQUqhRANCAAT6w4XqgWi8OOT6uYXZRaGkquFsFtsh +rfS8J4KB2c6WUDkUIHXOio6hLP2mNFTVNMGnRxF1LSpMPEFxie5jaN/W +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..7798a595 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/User1@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArSgAwIBAgIUH4qT7e5nHhIYhhXrdGPnEzHWMhswCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEdXNlcjEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABPrDheqBaLw45Pq5hdlFoaSq4WwW2yGt9Lwn +goHZzpZQORQgdc6KjqEs/aY0VNU0wadHEXUtKkw8QXGJ7mNo39ajggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU/fDcOzrRHtLF +QnXNHSVg2ln0UmgwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6IlVzZXIxQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoidXNlciJ9fTAKBggqhkjOPQQDAgNHADBEAiBK +C0p26m2dx0Y9IEJ93KWHgr+kCXtJHs+mLh56CbjkNwIgOyqY7vOQ6plgUpTT42b8 +Xp2CkVyqaw+hsUg+F2lxGsA= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3ec323c5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk new file mode 100644 index 00000000..e4097d65 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@ca.org1.example.com/msp/keystore/34e439a8c5fb85419ae4bb629918cc736d8a92658e79ae92d42d30a7ac98f9a0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGnD2h1/mDGeNIadf +fP/pROrbeZRifCe8Z9VIGAQ3GoShRANCAAR2wsRMRc5/mBRrTbjfZ/4FD6rb9fPz +y36ATZQx+o7Zj22paPHhXKHOOZliP/n0Ax5EPeY8DejzDY0mo3CV3voZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..e2606736 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk new file mode 100644 index 00000000..58eb32bd --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/keystore/8536a2b7d0da5fc40122f75d0a21ceba15d8a8c9797d683b2d1436889dda4e1d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWPQgr/DLwEczolSb +mEznYJZXe4gNhPPAcnMmQrLgolehRANCAARyGsnOftmnTa+flGDLKdPJbj+C0Cla +aaY5zkuAUT1ojNk/ASQv22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92J +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..42bd0c82 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/boot-admin@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICczCCAhqgAwIBAgIUc5cHVaZnLnq0g7UZ8bveQ2VJADEwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMHsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ8wDQYD +VQQLEwZjbGllbnQxEzARBgNVBAMTCmJvb3QtYWRtaW4wWTATBgcqhkjOPQIBBggq +hkjOPQMBBwNCAARyGsnOftmnTa+flGDLKdPJbj+C0ClaaaY5zkuAUT1ojNk/ASQv +22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92Jo4GEMIGBMA4GA1UdDwEB/wQEAwIB +hjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQhJFtMm0+ApEOidrRbUd466PCe4jAf +BgNVHSMEGDAWgBRYLwES7lJq4i67F2AeLU35NxkbUzAhBgNVHREEGjAYgRZBZG1p +bkBvcmcxLmV4YW1wbGUuY29tMAoGCCqGSM49BAMCA0cAMEQCICaXvUWDxu62xHmK +TXMvTTVgSYZE+Q8hCOfnlz9OQJyaAiAtKzb22ZNDjW/ZSjsKXJhsK1+CJC52CabN +ANE96bx2Xg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..5c30e6a6fcb95c1b5ac8706e24c9eed66a377164 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAUqMHeJn*kG`a+IC*R2-bLrUi(~IUA4F!!?9h0=<5fUJrB98cOi5Xl^X4@U_!P!Id@OBsLdC5^5(oQm!-26Eb zAOn2nB!+0E`o|PYCt-s-Dmc;YF%mV4jDr!6xV~U@-XcT_AY&WxQD6e0lwr%@g#=!3 zVm4qAFSLkm(G3;<|FL+H4iX^yiJ*}Iet4`9P#)wKg*4WTxc|RX;hH2khrBg@eAERZ zL<%6H#JDiM72}<{kjNClm{XSjKdb=eb3 z8kyUh(;&Nhbg(!n>Y-L6zz!M`Aoo(8<`n~ROP}XTXxxwuAD{A@o}z+oTD<1k%Hdvw zkt&D*3Lx;En~TGFC6t#83Fa+vI&m&XAg`>sx(TZ?uBvwU4mJ`XEWQnRF^(fP*xL^u z_KBynIVTd-)*tl@e*C<#rLEDJ8XzqClmJvJ2+1p{zedJ`Aw77^VKHj;9n_`W%KO&g z9v~thvrwA(W?u|nIn@<~ji|f7V^;-Q&i<`pqOLp~0q=COGDHd>j9fnj3I{;;guMM= zjr`IwXsiOg={Bx(S-*O+s-pIl5+E`Vs_?cdtgs&rX>mz8?kpX->PjbpBMYt8**4Z= zG!Z&P3Ls6}=|pg0Kgi_u*vd#QfFS4_pSrlYpAe<@5WN6kG|v(sThhjwp>G)Z~56C^+t04A{ke{&{8Sl VTY#2P&`z#G_z9V8@4Q`LqN^o*gE{~J literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey new file mode 100644 index 00000000..9091d59f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEVHAMGD123d5QVhI6LAq7sEU8frN4bN9p +gPiKwWBLljpCGQH8kBbQoyEyFFBGndyWgalkLrEXJNv/VGAWyDEeg6c8/fycfJW4 +iq8Mk1AvRAVMJIF9VwjHdwQ3rMmzC15n +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..6008c92c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICIDCCAcegAwIBAgIUDEK12gHn0vyqLETS3DWGJrqUksMwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +MS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN1A0nR0Orkp +ppOOnvCoIiIFfzpBdwWQCJ7FEx/iF2H/2PkOws6qEN2sBh2WqByWR2c7EIdmgvUu +ZxSIEXU2TO2jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBSpWdz/SpIKYXgSaEYa0XBEvF8TGzAKBggqhkjOPQQDAgNHADBE +AiAPu4EVW8V7ocl2hRGI+jAz4aBfCiiW5MX3+vYbDCtyxgIgJoeEFVulOhxdEBBe +YKUNAAVA2pkMYUzgEWT743z0jhY= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk new file mode 100644 index 00000000..f9b6b7a7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvjKIcywt9dWmrXyU +EP5BS3QS2820krnIkXpMxcUfL5qhRANCAATdQNJ0dDq5KaaTjp7wqCIiBX86QXcF +kAiexRMf4hdh/9j5DsLOqhDdrAYdlqgclkdnOxCHZoL1LmcUiBF1Nkzt +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..907fdf93 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: ca.org1.example.com + keyfile: ca.org1.example.com_sk + certfile: ca.org1.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.org1.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org1.example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..602a4e572fb291bdd121f02dc9f8e6ab7ae96b0c GIT binary patch literal 61440 zcmeI)&u`mQ00(fp&d>gO-Lxv}?X_K{29j<`*Hz)cw zdC$*|U)Ed83p!`CY}pl!(`ji)l4a?2N+n4e5epGZNGv^K84^oCEPF3`Z{?8RBU198 z>Okb7)E@~;eLMZ1^nMZjv$q+Yi+)WmM#6(%4yciDoPUSpfn5-Q00bcLzZKYiHxP~` zlk$$mwSvKl%;tJoFKV3CRLdxJZU^V{+006ou4LX=$kMUS-D7l8FVWkX{QR4l{A7A& zCZ3=*X6u@vn)OP7*|cC-1-f{1g)XixEF`E_=j)cO^M<;?8meAmrgQlH@rs&iXa#1t z=|!GgUM*2y~0G~N;N@kwrOp!k}597p3o|*bY^3)O>v;y z;!5^fHczi)uVz*kR_KKUUCQTfWb$|E_3YhAU#+^=BOY&_9t_7OCgkRt3#^sPx}j@a zx6GP%y~hXZ-9sl$t-_w7rY@u}#-9q()y3TMYBoWuHWPyWSP9ytD)Gn@Y1C=;rmzvM z?me8->RNgBR48_RLY8#1#I|bp3~?u;ing-cZPnN8DeqRG|FM*FPNunFD0VA(qzuFX zRbM7f5kmL-!m-g&xtVcGShcOH(=}PGz1Hs|YlqXx)_R*`wk(Qc)0A4*NN*9V#d(Qs^JL~hpIBAb?3WVPM*USCmn!|0?akH5k8H|zdx z+@(qVH4!<-Gz+adllYO9pEP8d{C-hN-%#RxRu4`Pj8j`vKg8#N*p% zLgCo>xcotDbhDW|!e~aV*j^3$O77Wlz+mR7SF6k&1Dcb(b3i$^!RttUVPBEs@tJTa zmK*QZGdu#~ylgu~27i-2a)z>8`e~s|&IRMl*j&{PeyWak*!}ijUJFY&X zFp9r%J(suVSs3pn?burT*e_MHlh zC3|OO_ZGu5BGHPrr83jD45K1$Qfi*D>fqaj_<&Fel20Y_g#1h%ldr@oUJ!r)1Rwwb z2tWV=5P$##AOHafyikF&!9a32YT0Y4sS>MdHg`VNr=9JyfdlrWoIMdGFg)OpT zcxN%MF>^k@a7cu9Ju;lzdZErcEA!63&isFnJd(&y, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk new file mode 100644 index 00000000..a3869e94 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@ca.org1.example.com/msp/keystore/572d73d7a08d9992a2e3024a6105fb7a47ae89aae2bb5a6d7fcd13b15a57a0e1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGbiPTe+OO8PG2TQu +00tnxr7sU1D/DrPshhXHyyND/7uhRANCAAT0Du/ENv0FsDjpCcRxrlW8zJqU3mYB +YengujzLKbirqcKlmmon2uWm4vZDiLS60b6Aa/5nfLSNatAfhyenKtez +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..2e43e9f1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk new file mode 100644 index 00000000..c1f9eb1f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/keystore/45b0f55480bae0cc9882a3563e74f7dd8f37ec0aef715a96579fb8aa941f6f4e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt8+ZSv6BYejhJK/E +peNwqBja0KCe2vKwffqny1Frd2mhRANCAAQKmzIKjGZnFmh/yK0FRRiY+dnfPubf +RsFhSlE0li5JXcBhyBpgi9+7R3280q/SW9+xuEMQK0nSqoXLPeC+UrZU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..7e06b913 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer0@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDTCCArSgAwIBAgIUB9LSFJbuP69HlDI8K2SpPTBn2nUwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABAqbMgqMZmcWaH/IrQVFGJj52d8+5t9GwWFK +UTSWLkldwGHIGmCL37tHfbzSr9Jb37G4QxArSdKqhcs94L5StlSjggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU+wgV82ZCI689 +LNyFs4c7B56yCRwwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIwQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNHADBEAiAe +MRREuRJHh2iXJ2WPf7R1KvxecnPMloR3yDG50jOYNwIgKBoK5xErYt1DWgnVkEZS +1ZEVaQDJlz/x6sEqnJmkmPg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..a6cb0e25 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://ca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk new file mode 100644 index 00000000..931f8076 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@ca.org1.example.com/msp/keystore/484740728e8bf55fe3364ea317b2de914ffa80eda3f97ba0f84ba3a6c9a4e892_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghB1MF5YZXvp0exC/ +ilHXOoMC65o9zOVFC2oc7DPGqO+hRANCAAQcmOyY+LZZTLSHLmuAUniwy5Q3mE3f +x+GHmBHaCNrIJzZUITw0XKQRS2FCT5UC89OY1SSc9WrhR+MXgJVQkvtF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..274bd58c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org1.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org1.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem new file mode 100644 index 00000000..8f5915a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/cacerts/tlsca-org1-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz +ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq +hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C +IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk new file mode 100644 index 00000000..29ad249b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/keystore/7f968e1134e56a058245eba2f821de931526774ad9c6aa12865161208628bb4a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsxgf5OvUl/sjxL9e +iu74qhsKNsyAY6u99fumKce+ooOhRANCAASx6/D/olnbL9yJRaLqZ5s78OByGvb1 +/yeEs+YxR9eyKNnZ4O6IKqf2IF3hxNP5rY+mcey3Khxi41aoDv++BOFV +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..f3f29b9d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/peer1@tlsca.org1.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDDjCCArSgAwIBAgIUDpmSDWSCx8uN1ybq8hBHpqHk4+IwCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy +MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG +A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG +ByqGSM49AgEGCCqGSM49AwEHA0IABLHr8P+iWdsv3IlFoupnmzvw4HIa9vX/J4Sz +5jFH17Io2dng7ogqp/YgXeHE0/mtj6Zx7LcqHGLjVqgO/74E4VWjggESMIIBDjAO +BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUUmH/JVFmmsgN +1VsrQfNCA63B0u4wHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD +VR0RBBowGIEWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi +YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B +ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIxQG9yZzEuZXhh +bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEA +s0HoNc7f21bNcod5zq4wjE5aKWNP4qLfePX04KGlQA0CIDZw8DUTR4AOuPoM37Dm +MKEFHoiOD9QajnX09mkaCbOf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..226a754636dac25a1a9a821bd7b07bfbaa1b43ac GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAa(w~SmWIJ_#@&8L4&Z-_=%E^)bpI}--vnQv6H$`ToNEs@eX9eAAJ{3y&M&<@Fgu6 zckYPtV4^F4at3CW1pnX~L<%614*uG1t2!?7R^CW#+~oh3ILU+cYzr-@G;AjI6hLPZ zASJT|G++p$Yim*EpVuL)P*@Fp)uZnF=5u?!9UY+w`yxaNAcIa7#I=O&lH3&jwI%LT zi#&!-7H{!R%>i0_98?IAUChTmNZ`x%e|Jr;jKRv`qT5_!-L<%6-yJ#|OF(cj3A^tcV zeMfxBTxV|N5YNrw?p3lbeqI0)ApYln)W|CWL1@@ZrCWGKU~Qp(0GzL*IO0RSzBgVR z*(!(u3Lv$HJ>?ry0-*88#g{sWa`{#jo~3z0VdS|%`SQ0FMu(Ne8dQT9Z8 zFY6*8bw<~4E%r>IJO5lw0ybleld;hjxmv&+Qj|STL+{`4GDHd>!H(}~6ImwpD^CY& z&{vV$C*?=}k9I%6juM=sF%Yea5+I;C(8aa%Lp_rVF>^2>Q0}yNpEIW`xXiB=kz6qI zrV~0u3Lr4ZVroZZ`_T`ZZ}H@3*?FM4-%2gsKq7?pm&HUdzy=Z^hiRYG98w+ihRooM zg_v3jN4zQMe5AThe=6|*{j3IoLLgJ=U4jLP9qShVLPip1uq)pKCXvk!yG?%i{y(q# z9ji(pFNqhx4A8e)g9l@P>86%YKjs7xUXQC*LAh%e-1HMJQXqiI$G69?!^rVh2&_#% Vk($L%Jcjq}W!2e#PhOvS;IH?2jpzUX literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey new file mode 100644 index 00000000..a23395d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP +9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU +JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..a5a867f8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: tlsca.org1.example.com + keyfile: tlsca.org1.example.com_sk + certfile: tlsca.org1.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.org1.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org1.example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org1.example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..2bec9c10819f8a35260b8ffc67c5ba74db37845d GIT binary patch literal 61440 zcmeI5ON`q{ddFMtms@^lW-><4++@!V)}3~DlN2S211!8GMNyPQsVPy^l_!vaBW0TLiU4!PwLAi)B;>;?#eNm1Q)OX|mZ z#`f&QTXeTX7K_EIUw!=7M}91KS*OL`XSM`BswoFy_^x=tXX{+0tOo^o= zHY!nco{c_O-Tff?(A1(;s>Ecd(nBmB-+L4t>H|}@PMndg=!2+Yxk|K9l%j=7KL02x zkG!@!FumzXSD&7kn(hRrznD*zPb^u{t@-hwOi%Vk!_~qDx;%89sOfl*qWYv~4yIAh zv~`f#?mdbQ^s(F3wG%KHFQoQ#d$kx#AA=L|1&QU@QZ&V;sY+goB9EfSC0?LPjcAT- zJX~tk)$Q2Zd-}oM?cGm54LvpHfaO-pv`pDEU1zwseq#yj;-2V3N4E8sP*DWK_g)f= zRtmgWVIM_%104`t&h;pIMN{@}{%q}j(CbeD8_?^Erwe*rZV~Tq?dCoWt(lIdPlkO9 zcrquTuiW|e$x^qYi(4DF|7nd6uBXSFTf60hS1JIU@MNiwpbA?*xV61||9ly=cZ)bm?+SK*@W1`{AwK z#~)wSh|@}(pr_xro|bQJ?>>GUdKRBoKDbzb2mmV$y8Y}DH67s0UbSOqsfkx+i$2tQ zuG)Tac|D3c`oueF%Z_I0=ZTg)^iI=GOy{KMx-YNCD{Xoi!2Be8d(S@H+TQ)-lhALS zsoOxGD~xOn)$`TurJ677xJ1kr+I3dv6+sIQUlo+MCSI>(3m2-qw-?{u+T}mF$}$!R zfa~&{)6Kj8vG#j`ls#AHHnMo#FRm|-5sP~+0lK84tKiN}@8an2?D)O8uKt3`tS@)& z!tnMcE3-JHy|vzc>q8Y0xlZ(#1_^X=E4YlqglK%6+0PjSVsi(`2qTaN(D)tLCSQcI|fP3D+R7Swh^yLvR(zPYh+@6LSBN9$*K z(1ko0$b)`#2^YP<9 z$n8|XgDCX-LH{1=6A(?Z^h4FP(NW8jgpo*+;i#n5CjfyQ-(z!Nc@Kw~jfOT;i# zi6^lZf})tN$FYR0W0uMN+B@a;K03o9Y`5A(Jh9LV0 z0zScl9?XBD^X->A4uXYdIld5O*pkGjc?Lx2=BZ(U=Tj+(VW>gbpnRUD48D@V`x2qY zolKi=wA=N8#vMECEK?KOL!U7ke9mq1vkt<7{C-&Nuz7*%auix&>9)XBtHLBbqpGw~ zsDjd@R5w0Wos!G5g|=#wL%9}j3#G1~_8Y0HDCWZKgdVH5I?3Bryir4ag{zDj80iTj z?x(1ErabFc5hYXTG$ghq(8&B`)I_Lh++-GRVC+bVWgVd$w{$M;soccM+l8?rQF_`( zCdCx%3li@aQ;P;UH1qxwIgH_KEW|a;%@NR%Wau0B%9k7+T1Q zSQ=En32Gbfftu6=TAc3-(-Wak!O|n1ZB84tct@@mI?9Y~3bcB9a9a>BuOV9ys38}g zpJ5`fTD@QapyzG${aSUNmZmN*fCeWKxG+8Kb7cW1DTC!0=4{<(GZey8^zk6o*88-a z_wo2~Ki<}?v@4hUc+Ib2Q_dsvz7sawOmo(2ip7#>Xlf$Y>9fNlxq(y*6~vdd3|p^w zxvrlS>s*$w3vP^*JBGoQf&I{_4pj^X{hbk$G}TJ7G$k-pqjB1OB}Agc%n?oTK9!=h z(|kCaHpI$NE2S1^gHp!Jr^BLCFJ#J91G5~YVjF%YFpv_`p=rZUyHusdBx!aOFUuo- zG@58e#zYJIlG@}@!RJA*g+b;LO}jqFv%dfuLz{sa8v;v=*M}h4t9BL^}DO+N|KC3!w*7=FZk<;dk9X0Fic37#?!)7_&Q8461 zsTI9WTk{$Oc3@`7mPF-f!|1oWo#L@5rYNJ3p;9zUnRG79AU!N$W7-61kUX0uW4T(! z80>eMx|hui_w9T;o?w(tx8UDa`K}mNHIt(?o}1>9DJcetB#RP`Wv4G|Omr9~-NpD{Ac#oATLN zGmX^BbwWb-Ng_4w9b+gHC}C-?gwoek!egU#G|7lZg~135?`K)MmoHLSk+Iwa^?FKp zJv5+%;))X1zlIW?t79N`X&We^1%}ErBG<^dRPv^8%3Nbqs>P=YHW@0l>PTZPHW0SU zY8ZYwh|e__lxmgYDpxU!W)@Yk>Xdg-QlQ+IgWY_{K@3V@D-16(R=B<|#7aFvV5zE< zC?r#aWb}(|vSfRMF-}j>TGiGIt)nJI@rD94k&xPLVwynsMA4dPML$f%lwoZ`;gf!{ zA2XQz{t=ILQ|xt0_`8onx9^|%guj2VqqwejAO~_t#7F`mfZ!z(1f~-}_mVLsj*=}@ zQ8XQoCE_@VATjips(y?*1Abt;|5E+bxSFZTO(*a45re2Slgd~Zv1*nA4%IvB2WEy7 zW=3UC-PeXhSyf3W2|j!37xJv%OEqefUehM0z&8M{Y{O5Vda0Q(>!VVmh8ra(+g9vC zPsIx3MPK)7S2yXW<}QpV0$;b;0Zs&P6vPQTqe`bW5hTXWj+L0`HRdXa`!$J@XhS{o z19;#j8U667Qy|c^UtlPzH06d)vE|v0B=5H@E|t$|$62Mb&mfE?%W@+=>yD_3gu0zV z_lPQs<1mKhxT3jVjU(cCHqFJvVxP)6$22$Y38dVmXC#(&agGK4GA&Se;NEIL73m{i z4DJW$aJxeZb04oH%zZ(sLxF_3%dVviu}0HkJDc_d8`-CNY|+#PC8eU_iNrCZ;~lDX z>PVIamP=7JgDy4lK3gWNY#%ohL>i;?d?gkyOu9;CMzv2*#Ijt6Y8a&^4V=MVSm|DI zLvcYaR3H~3!!vSyT&bldqXag|*txJ&7sirQHOh@9yDui&OtIxyGqNaVr!r+yUT&sf zShJAo)Q+0v&M;Tcwud=%pUEm@2SjLYZK7<9k=g1-SFvTn`7IcPndmzl>BO ze|Gmz!75xJ0Z0H6fCL}`NB|Om1Rw!O01|)%Ac0pSAZ>j9B&3rhi6L47Phu*eDoITv zumqUIg`o&|0-umk9oJ(z_NtGYHs^&B8m3_=P9}6c){+@3IbhP1y1nRo;rk~;k@Bgode!O<;AGiJZ}=c|#7y|6%+;c(W^b4;04#gZDsT z{2#{u-+ugme$55<|2H;&x)%O9_<#!}00}?>kia`i;ES!z+vMjjCk*xU%O(uH;Rp9` zX}(ZrdA?ApXO~m8GBZhz3g}enC);$U*UxnEeg55jPxM9{roGO5p?qeL zJl;2J+Hf4>!CawH&#`A?AJ6bIIj$dN@$xJj@1!#*!Mm8|7=&x|dq)kUu4h=}$o4vk z=7h+r{S24yRQpEph`?FAT6_KZLKQo6l&z+1duSBGXmvOcTi`XoBRvwU9B}Q<# zH~~{@wOqfg4oN&8FMC$`^@VWXH>ydj38oPy$#A|fO%HLEpyP=tQ}W-05MBlCTO@@3 zD^HxfMhMR)PEvYUD3#bzDVu3yW<875j$1?t&5b9z>KqG}TZ&CnTpZ~X8^OfM9PQ@f z6L!$>&{WNEs$I5O4x>%BDvPPCH9MLlhHT%-+FkqDxZ?f)m-qkRKmCUbBmfCO0+0YC z00}?>kN_kA2|xmn03-kjyu$>7`Ty|#{~hjN*fdB05`Y9C0Z0H6fCL}`NB|Om1Rw!O z01yb?{|`lez6O5a0tr9@kN_kA2|xmn03-kjKmw2eBmfCO0`C@q?a=1h&W)Y*e-G~e zVf_Ey>Ri|wNB|Om1Rw!O01|)%AOT1K5`Y9C0Z3q#0DS*{l?dF11Rw!O01|)%AOT1K z5`Y9C0Z0H6fCSz>0zv$LEArcGk^hYRbL4L$e-imaumKlH01|)%AOT1K5`Y9C0Z0H6 zfCL}`NB|Oe^8_MW>z_m%*HQIDOCReN`rhXHr;&kbIxY7s<-?8jgNQoNHQn({**Z(T zx4wQ9QT2gmwoFy_UL1b!21u4$Ez>e(&vc!$+#iJ2_af%J1aEql7R3LzB0pS<{7d8~ zkw1_8H1fm9kKTL(VTq6cBmfCO0+0YC00}?>kN_kA2|xmn03`5&KxF-s(85!It@qYH z4J|$d*!*z)Ahh}nVB_BUQRu=Wfb}5t!V`cS@2~IeEI$AU;{Tgl=-S=qx7~2#CJR>K z0tr9@kN_kA30x%b{Qb>arT1Ia*i$(HK(Byr9y#?ClExen3LI&+@f>j1REZjL5ZLL;DICC`h(9Nv|EQI-7tsV zKpq^HTuUE5c=TW_TccoSkoCcDKDs~G1|PzT$3Ff2d#EGTlJL|Kv5L(?(6g(K!?z3KqKfOQ70W!d1_Kc8AS z>~i{7o*5J*O?yGjmIz*RUg|uCuyEAM37&lU{QZp;o4EML)X!`p)#~RwhDn#ZSr<2q ze2N()eLdMjv`oA@V-JPHdcjCAjO`QCoG?6+dxI&rY!h!E_qX5VuD6Mc^jErU>6&>< zHt}ogXExyiou~}2(Fuu5VJcrV9m6iTF2WBageVrLtp*xXjtTG=#bXkyikU;RIvQoQ zbZ?xL)#3=0_=-BAS|+%1R<7#vKK@luip%+b1*-^fUzhz=mEwaNXI5bYtDpkmylV82 z(Q30jVocv|7`8H~(4^zmN24i*#hhcrNDT=ot>gXav16u{ae7jt3|zio6<=Arua)Aj zquu9*wmN=&V|IDP@Nqf*>w0-bD&CM$Je!7Y-G93A@tx;IU=)h$dIxijKN~V6%NUml zFCma-Rk5>Dr)+0%J)bp=QVlCiM~PV_-LEl+!m!2X`t}jlY1Ix-*}kGcTyzUwxEv|n z(hU$;U+ub!N31#$=!)L(j;9Z7T>}w$ouL5a7h~{h#tRm^n&I4_UP-wYu1vvLbag3KvKK5`Y9C0Z0H6fCL}`NB|Om1Rw!O0225m69`@b qa0do, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk new file mode 100644 index 00000000..e9a03b46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/keystore/56f4dfd8ed402361df82f0b52882fffd5d689e95e249b1ea1c8da2b631f47fc9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggqc1zbFFuHAzpMBx +PW/o2Nd1QaF2T2HhxnCElZs7mMihRANCAATbIGXRjemfzFkvZULl7J28kaj1LpFk +vdL/1Bugo1NOND7S3wKz4Ch0XbY5JEVnjHAstd/zgmlVOeO32LILbT7D +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..3241ba54 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDBzCCAq2gAwIBAgIUSOvvLzUR89ElH1ZGMFz9GIrxsFAwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +dXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABNsgZdGN6Z/MWS9lQuXsnbyRqPUukWS90v/UG6CjU040 +PtLfArPgKHRdtjkkRWeMcCy13/OCaVU547fYsgttPsOjggERMIIBDTAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUgmokzoyDPqRjnwgxsrSN +rHXjcU8wHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFmZmlsaWF0 +aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQDg1Ml8qNlg +w4wmPOgLUPFlgRRhRhcitTq7Ufy2KYt6SQIgOKF6UW4XT3a0eMUJeNYBfvXqbb+g +tlBmZSkhTB960JM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..bc0a4eff --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: Admin@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/Admin@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk new file mode 100644 index 00000000..a6fefb35 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/keystore/f135965b31ce005ce936b9b710e74d67380e9ea6514c6620cf570f8caa27b9b9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqnm0pBGWkoFnN+uy +qF7zUkayuu4UD3O+Zz4QoAQh6sahRANCAAQruxJMsAqp0N9niEbYOnJRaPz6nHFw +5jX4uG2WRA3BvnvpvzzARHEDdYXNdkQ1foDkR4DNXYK3MWdnJcceDk/B +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..d072cbdc --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDBzCCAq6gAwIBAgIUOrSF3KOx/0RDTXWnyzsSZkCQNAQwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +dXNlcjEfMB0GA1UEAwwWVXNlcjFAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABCu7EkywCqnQ32eIRtg6clFo/PqccXDmNfi4bZZEDcG+ +e+m/PMBEcQN1hc12RDV+gORHgM1dgrcxZ2clxx4OT8GjggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUJaJVR9h35V4NZBolzpIB +IXNxuWQwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWVXNlcjFAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6IlVzZXIxQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoidXNlciJ9fTAKBggqhkjOPQQDAgNHADBEAiB7RFHSsAcG +B/TozCo1T3/dZwXIuMrE+DW6d2tRI/wSVwIgN0W5IbMTpdj6BVFHXIfgPrDvEM7o +NA4KFpWG4k9ijBU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3d8d6cea --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: User1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/User1@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk new file mode 100644 index 00000000..518268b3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/keystore/aa805db6dcb6fb4da673f5a04c4f7cd804ad237fd6759fc58d7bdfe070489749_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgn3LOuo5Zc0F6i1Z5 +7Fgtmc1wwBs2vk9/MHGUJvCZ7+yhRANCAAR7h11jsTuxqh8je1jeT8yQ9LuK4SZU +e4rQriy2RzOPziKrg61OPuv1dSmDbo/Tx8HwjMCf/ykUFzGoNzjpBj85 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..a2dff217 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE----- +MIICbjCCAhSgAwIBAgIUWvhD/4fB//gFJOSoCfOjHTwfCswwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMHsx +CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4g +RnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMQ8wDQYDVQQLEwZj +bGllbnQxEzARBgNVBAMTCmJvb3QtYWRtaW4wWTATBgcqhkjOPQIBBggqhkjOPQMB +BwNCAAR7h11jsTuxqh8je1jeT8yQ9LuK4SZUe4rQriy2RzOPziKrg61OPuv1dSmD +bo/Tx8HwjMCf/ykUFzGoNzjpBj85o4GEMIGBMA4GA1UdDwEB/wQEAwIBhjAMBgNV +HRMBAf8EAjAAMB0GA1UdDgQWBBRoDF5pgoFgdSUIqRJ1rvVFV+RO3zAfBgNVHSME +GDAWgBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAhBgNVHREEGjAYgRZBZG1pbkBvcmcy +LmV4YW1wbGUuY29tMAoGCCqGSM49BAMCA0gAMEUCIQCBb5CGUbLWE5z4u51spZXr +n6+0OzNQ40NaMoFF4Cb62wIgDMUvns6XUCB5COg4qOzoZQz5RweXyHafoydA6kol +EsQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..3793ca60 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: boot-admin + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/boot-admin@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk new file mode 100644 index 00000000..846c914d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxsTESX7rE9B6/e4R +9lWQYTPydhzUEGyWHToFEYpUbwShRANCAAR/A7Zs7b3/ZyZds+FYaMg+zdgAKJL/ +Rpyj9BHTtaYmBW17aSSy/wARfRwRTV3hqvEX5DiC8jv7HMDzSkSyZD65 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml new file mode 100644 index 00000000..a5ce3e85 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server-config.yaml @@ -0,0 +1,134 @@ +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 +tls: + enabled: false + certfile: null + keyfile: null + clientauth: + type: noclientcert + certfiles: null +ca: + name: ca.org2.example.com + keyfile: ca.org2.example.com_sk + certfile: ca.org2.example.com-cert.pem + chainfile: null +crl: + expiry: 24h +registry: + maxenrollments: -1 + identities: + - name: boot-admin + pass: boot-pass + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: '*' + hf.Registrar.DelegateRoles: '*' + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: '*' + hf.AffiliationMgr: true +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: null + client: + certfile: null + keyfile: null +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: ca.org2.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org2.example.com + OU: ca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/ca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..f5f055a2c17b67bdd1d2b3d547db2c38c09f52de GIT binary patch literal 61440 zcmeI5ON`^#TE{D0udehXGsCoMW`UIMnbGZ{x+=Egq>@3XukARFlQ<8@&I>gqzvINQ z6UT{@T%l1n4PvAV5}Ui>iZuv<5GxkI;!12;AYB0xJ2prlBsLc$9>Z~}x;v@Y^xW>A z8TA}@S7IL@pU3Zf{-4i2=Tz0IMbp!wy5sgGFB)HaXDt+3`+hXKwzl>?@Dl+)&$f5K z&c?F?@Euy(zijt=YX|>3xOM% zRq*e!1YkHM00}?>kid7Dz>{Cw*xo%j2t9Q?Nwzdab3Icx70J^^$Bw0*J>H~vnh@xy zK#)Z`dhhJ%d(r!*8m$vNl_U83SR%3aAUe`qQ?icjabMQlsBAfMv{V+NC9zn15S7MW z$8k+>cHGlu$EK>;LH6h4Dblee$(pse9;E3>-gtC2F;|mDjvX~^??F_X4or6z^~}Bo zBKHRmqOLY^dYXC+I^(6#f!05pjHOLLMr=u-8Jdq~=qw=?g(&hMTH#ra;9JoG-MYV0 ztIO-LxA*wH+uOUJd=h$WEC5ToZd#_~nT|bL-oLg2cKJ;7zAg2&=TK1u!}p#OjEW_; zD$)<416KnCS7SYhUQ(64>pxq&8?^dkzy`GXa&|$hOZw5fTf2o%LTje2YSYos0-nq< zXe(!Ne7w@^==GJcQ;H44(86K}B5)@(U2RF8N@7@hPCKe?exXvIj zO>OjI@8$}!7va(Sr~5B(oLJ&Svc@k!Vu>WM&gC|JcG=!u{N~m!bN8~+zsTwseX)P* z@vWWh-48zuJsvNLY&*81jZQwpD@8pCi{1z2S#7ZM&3fL9FKN=%nt+t|_V&YDyAMCS ztP&@MI7UytZ#=GD-`;)rF!Us`D130U01*II8Z`UqEo$1pnZ4}9&Po+8jTXJH4IHKO z?Dl#PwY8~t+>vb6(q05w(#SgrJ2vg(f#W>CA1}4(RRD`j_V%8WC{>o|_barG!69Vs#hz>-NENh5I_!F4r} zlG92O!_&GhDRDiH#kG`lB&!mZmQrb5Ny+jNiW-iiVhENxK#>C^9YxZgBG{)0vX3C( z6Kv?g;(v5;{QSg0u#q&wmZB8R3v8C9z{uSqG|aJVhMZFrF-#hS&ys|}ierD$;(w+Y)GnBb`M?#FP_S7(JHbc{|LR2}@(Lp2AG6V!t$z1wzaE$h4fHeNJHg zaz>1E8Bzjavqe~@=a&Uy7KCvulMOHB#DJXY;+z&Zz$>T{MRJ8ImIcLbgHk32pcD;` zte#YN%9TVcI}WpSd)8_sx>B>$mFIMuBbAejJ6ts=;`tKNC5{-K#F=t*SZ$UprAzA^ zi7WyM-*40xVOiqh1W1qx$B?rjQ{(V-m@sIDqD~G7pUx2oOOVv~i0;jNYG_yEn8xy+ zkyNa#6RQjrrJ3oMbQ71`Z91bc`(bUrAFF^$E7cO(QBaJ})c1`tpEEdAHC$!d#uRHh z#mhp9=^6%I19n4Zx
    =3F&Jh6z1IlLSW*t(Ko5K(q0PKvZ)vl3;xzL#QVaaXM>M z#k`cS^XX1JQO8Sd(y`_PmJGAa(sbOY`nkX`c%(~`hM#o^F;+JdQ?sV;k1BI^-?S%E zK{EAO(VNmf8`uYr@FeN@VTPr@1R6z}f%zI7O;%euilAxT9+|Bsk0_vx!sXzgk?*u- ziGkd=5Vq@>YA%nqYwU>aXM1wP8V6zRes-i_qFJQ!PTNe7?S6Y8Ggc?8GS);k*(7TQ z7j*i?UVR+cyv(4MZ1Z`Z0_UvyyxnA{RVF=a&)IRi+3Cnla@4LRx?veZo~0^kP10JF zAg}{7pVkGUKpMud)9aQi)oO+?N;x7!(u7GK@!4E$L?}#{j0w)1a!?^2Q`>%%9djFCR_26(+D(%6Y_7@bM#arcXzs`fmk7L&9W)rcmo~ek_$%Rs zOwgswdFlB4vun!=NT_|&KBs_qN|QAm)8h#g)#ECPB~U$)#FKF(q39}_N=Z5@BMIc& zpn%wO1+0}Plj22lC&eII*PDfb+D&W_qfYk=?f$riJ6tFZh+A32@wqsnQ zmbR+n=E#<3{IDX9dmsRr#6%`Zbwvb6!WFNm6K=&QyT7<2JC1iC1u~eB^b{V~_0*99{60N}BrsgVr4*9Z<5C<|;~*H3 z6rh0Lpx;NyUEue1YR^@#G3jJtxK74mMmArrIh0=R<^*4-M*dr;db!awOwEb>iJRII z2&*n|Jm=FV9w$rtgG{S29kl!D8Sn*w%i8j@fm>6p=4c-kS`FL?^LD-?_e%o>D@~St z+RI(ql%IL-(zZc=&se}Qs7~oQ!Jm|b6R3WEBFC# z!=zuL2!cQAplEj_jHkm+s;i-0O-RkE>EgJ6*V>|nyH(emVf?&YnVSXINTTJ+c!H|6 zekLqCF=3j@`CX3EW3!%^oik2p-W`zLRKmd-8aT)#N8o{1s%CtejQQ2T?_ss5_}=>-&5;J}2~rKUf34FOwk} z1}UT)MVrazV@W^8b&~}x?F@$b7(0&B0?}DS=4qPg5-o#olWhha$i0*2hVZ!uhf8IG zBIN|dh;p$(C+7G#fsO|4rW>}C`$&0Ss^UmV;+$+2r{p9C9Hk5=PV7;#DNkN_kA2|xmn03-kjyoChBjYp3{aqLJIfw^vv?nMUI{o|KZ9ic1MJt)r=gyg|xF!IuJFolgT`>QDJ@nJH8~?cV_uva|Zvz21{tw6h;rKrs|A*uM zr!%17_&=Nh^?GMOT{TcF3okPR3XcDunHdMi|Ka$5FrzD&_X)@U;rKrs|9`XN|BHJq zc>ce(`9Evn{{tUzg9IP}NB|P}P7wI~v(4p6@&oO{WkRp{MgE&vCPZacmkDt;+9_$} zYIz#(^zyzu;7T3RqWV=6EZl+1gxO!e)|;(Tv)dODTIv>rj8rb9! zVBlc%?A4bENuHa>L@^i7BJobWQ0>cv7iQzwsE5+8Hc9?!Xy1xuLN;lArDZ~kDqXxx zhy}}pvV=(!V=z^@LeAB2g{fIgp&rZit0L;r4&|BM#(u3mE%Wo#yxqq!mSV|LWy;0! z6{pK4W4T7Iz-Tiqjn6r!6882B#WYUN*o57v>?hM#E)&`~tANP4WkRoe(DCb0K-!d3 ze(xwbE5-0aqbKmpz(fmTJJnL40=|)DLYFHb`3lQ~D7qreTiHoNNs*Pr7*#V#CtJ-W z-K^R0Ft&_UMq|Y#_Vd|%I4cb2Bco!0UjW-MQ;u6IPl;(dKH;>PrI(A8>l) zjPRt~$rK%hs?_^!FAdg@UA|BV{!^dD}J03-kjKmw2eBmfCO0+0YC00}?>kN_m` z783~8|HJ41x43~})gS>#01|)%AOT1K5`Y9C0Z0H6fCL}`Kp+_Z4@LfS4g7~2BmfCO z0+0YC00}?>kN_kA2|xmn03-kjyj=vgLz`b-AOT1K5`Y9C z0Z0H6fCL}`NB|PJhya}be-RZJ1_?j{kN_kA2|xmn03-kjKmw2eBmfD#T?B&h|EM$-Tk9W1Y{yo# zLra@z7W&TS`X>=rF>T#B4S9cK{UD;anyT5JDOsnXch=Wq5k+%7Q#TdKdv^JqYam$C zb<;8>&vfk5*zbkb_af#Z1#fm57L5OIMSi#z`G?3)B7YM3_s9<;KYslcgegJ-kN_kA z2|xmn03-kjKmw2eBmfCO0+7Hn0+IEPLQ8J}w%%F)B((ezVDtU;gV5P`02_DKW1(}e z0M>)hb8i5yy}Q1*v-$!c82{hgLf39Tz3GHo*J-c|H%I^yfCL}`NZ>qyr|)jwNI%}V zbL+QyJE5I{rn%_3znJ|oCVh+|A9pg%Vx^~ck!i8!3y0-+`%r2ewn(zu?;=QRQ1$2I zZow$zC#XBLu@Oe2*f2=(SATHNmipSgPw#c~LtZn?k>^V8A>nzhDUUsEbnn5viDZp~ z7{7Gy*B`7#pEy0uU5eqkAmVByMzbltctspZ?VI+}d0nzb8aUR1p7!3SL6S=;O0uLJ znzrdJU9rgZvI|zK#XHtYjRFE^%1hg>V_ALh?w`#p<#93nON$9|6=s8=8qeS@vbv&> z#EUV6rK`?l@aT)D?{1v2iSvI&{nRF8hGh;DDchC1iZK)BIOX7p^7ybXjyoKalZG{^ ztk$Lpn?Wds=`aZ^H$S|>CSC>WUa8*u;7IXPRu~j(I~i@eAvxHsJuB5Jy+&1euOy zrp6o{(iM!WCFNGprUb279L#&de5~nXt>PcmQgp`^O1bWgXrT$FJO(LVq7!FrLa|J6 z=bX8vzFSstG5@b%6#?$6qQ9(Cym#%?D*C`Gh(Kj8>pfJoOSD~YtQz`Jxr=k+;Zbf{ zw$Os&)*4nOg~&!hiFY#PR+^b1GgPk?XSFM=;v4KeuIvk5Z|8BLtzRM)7vsOGmCs1U zYch%_v(SyZk2gNN^|TC(LUtVQVA21cb{XTmIM0n6>2ZT|GQCzMKB;tb<rh;*HjUoWL zXFcoLi03?xvk|_c9xdH(oU!cfT%PU)wSDwOF#f+8`Lngie?|T|^0$${0lRR61Rw!O z01|)%AOT1K5`Y9C0Z0H6fCM0cZ`>JPlIsOS0_f)T^*f8ejnlK}(phZ% Pf, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk new file mode 100644 index 00000000..78d98a7b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/keystore/ffeeedde30216824902d1339d959dfd2ecaa5135b935a001a4164a19a04ef791_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtGB7iTQ879pClG40 +AtLOGPQgYBIGSFIk4NBMKGx5DzShRANCAAQhD2s2Bb1nPAT+btXQ+qBUB+qxYlrd +iDtj7LnKwPiRSRU6s7ID5SDAFovKKzTsQMfd7zHspXzi0GYipe/i8s6u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..cf18a831 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDCDCCAq6gAwIBAgIUEib8wk76yN/4KWkTRGpi1KUZ8YcwCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +cGVlcjEfMB0GA1UEAwwWcGVlcjBAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABCEPazYFvWc8BP5u1dD6oFQH6rFiWt2IO2PsucrA+JFJ +FTqzsgPlIMAWi8orNOxAx93vMeylfOLQZiKl7+Lyzq6jggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUhFCi4xC+d8Bq0OvdhVGw +2Mg1GaQwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWcGVlcjBAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIwQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEArCXGbMEa +laOtX/WWUEOuPs9TOajfHekY1QLZxlfudIkCIHHD33nUJgvD8K3vdjwqll9jraSg +vOhDLocCPVmZt940 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..7f5848a1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer0@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer0@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..26ae2817d9307ac1264fbead9409fc47c37dc7f0 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAZ*?Q%urW4ueSqn5IE-v@L(i+Wi6$eZ%Vr~iW~ms8xkNH59mCi-$0MNj+9Hmj8EsN z8h3(;Yv|#Nn`hLwT@M}_L<%5Z4abKy#Q1m^CPNI|yTu8?3Wvlb7^^U7#*DWOn1f*w zAi5${wizsWDyyE!cQ?^iiRzC+??_jmc*Tnj%CBASbk9&!3!I>UJNtod!&5 zrAh`Jii}g3vTjT170=;d9}*x;6BhUWnNvc>6{`1j{&z9SBdleGRlqt*FbguUpk3G^ zL<%6n7qfRM?W|O-tu9R?P$|+BYY1FzeVUXTncK(=YE6_9Al4iGy-}~Ajx<4fUu!!N zwjniz5JqVOD)aUl)aRi(guHl=naB(bR?L<%6IrI(4~&DRC7kCG2A z>N}PP#PUm8GFV)|zU#i`Rs0bWAd}%Y5%(_lO6GY8oB&cQPs^IeB@%7Fl~kg1j=2|@ zX)1^T3Lt9RLmmuiB8FWE1?uddFK(ZVV6e5BTFL2kQ}o3U99$A0A&>R)2ZV)o4p*&M zjZtCoWOmDWc9$|JxS_(2Kp(QY8Xy&Vi*8*csmqH((BDUw87<8ZWK$CsCnPCZ@r)hqBueq)_eb9q2#pETGDHd>GL9u1m1|XR7Dc}` z`JTMWuZz`topwQlkzmaZoKamw5+F$tjH(fg28n%NAp`lv8%E;TPtY$WA%IlA6qKpB z0GB#M3LtNYiN6{yU+^JH`E&?lAZmkK$0SYD3AbF%RiROa?9~z=w*r_46wr>VBo`_V zz3gL@ANZ8-=&a5D<^?@d8@!ODLLkIEz$OIZ>eks?VD!y`bDHjDx_YdlZj!GQkP+RQ za573D)?QhLO75enxg}H&J&Sqc!WPDuGLQ_+;FTUF4dJR7QXtNC{wfgeZm8s39 VueGA=7lW@zhNBO;*$f;@TJc_pcP;<` literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey new file mode 100644 index 00000000..6093acba --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/IssuerRevocationPublicKey @@ -0,0 +1,5 @@ +-----BEGIN PUBLIC KEY----- +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB +2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP +NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm +-----END PUBLIC KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem new file mode 100644 index 00000000..9a3fe25e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/cacerts/ca-org2-example-com-7054.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n +Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc +wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB +MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF +AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts +Kzbbqt/QA1h+00JyeT5TqHYgIwfl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk new file mode 100644 index 00000000..4c3e8917 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/keystore/06b52b2b721d0d0914d5133eaa630ece99c0354257389a79ee3d89b2043a4e51_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgKCUAyMLQ62xjUO2v +84CTmyJMMm+afMpkhqc1e+rIsOKhRANCAARW7N1MfI/r7koQn5nXByUAbyFV2DV4 +5lNBGoykw2jivQ6oTDk6sJ1RpCn0X/B+7xsMPlVNMoaykt7j+U6aaNhM +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem new file mode 100644 index 00000000..19b3e5a7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@ca.org2.example.com/msp/signcerts/cert.pem @@ -0,0 +1,19 @@ +-----BEGIN CERTIFICATE----- +MIIDCDCCAq6gAwIBAgIUMn1hNeOQOx3hkJwbpMNhBlCmQiswCgYIKoZIzj0EAwIw +bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn +Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF +MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu +IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME +cGVlcjEfMB0GA1UEAwwWcGVlcjFAb3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFbs3Ux8j+vuShCfmdcHJQBvIVXYNXjmU0EajKTDaOK9 +DqhMOTqwnVGkKfRf8H7vGww+VU0yhrKS3uP5Tppo2EyjggESMIIBDjAOBgNVHQ8B +Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUatrJ2UUH3F03hVKQmbAt +I32sk1EwHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow +GIEWcGVlcjFAb3JnMi5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsiYXR0cnMi +OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5BZmZpbGlh +dGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIxQG9yZzIuZXhhbXBsZS5j +b20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEAuNpcPBzd +PGSlGKV/HmQU1tEoCtijW+SZxORz8zZm42ICIBNPxM/JPojI6/HWHKGeye94zMoP +t+KL94ByI5nWP+69 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml new file mode 100644 index 00000000..5030ffff --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/fabric-ca-client-config.yaml @@ -0,0 +1,162 @@ + +############################################################################# +# This is a configuration file for the fabric-ca-client command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --url https://localhost:7054 +# To set the fabric-ca server url +# b) --tls.client.certfile certfile.pem +# To set the client certificate for TLS +# 2) environment variable +# Examples: +# a) FABRIC_CA_CLIENT_URL=https://localhost:7054 +# To set the fabric-ca server url +# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem +# To set the client certificate for TLS +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfiles" and "tls.client.certfile". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +############################################################################# +# Client Configuration +############################################################################# + +# URL of the Fabric-ca-server (default: http://localhost:7054) +url: http://tlsca.org2.example.com:7054 + +# Membership Service Provider (MSP) directory +# This is useful when the client is used to enroll a peer or orderer, so +# that the enrollment artifacts are stored in the format expected by MSP. +mspdir: msp + +############################################################################# +# TLS section for secure socket connection +# +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +tls: + # TLS section for secure socket connection + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# Certificate Signing Request section for generating the CSR for an +# enrollment certificate (ECert) +# +# cn - Used by CAs to determine which domain the certificate is to be generated for +# +# serialnumber - The serialnumber field, if specified, becomes part of the issued +# certificate's DN (Distinguished Name). For example, one use case for this is +# a company with its own CA (Certificate Authority) which issues certificates +# to its employees and wants to include the employee's serial number in the DN +# of its issued certificates. +# WARNING: The serialnumber field should not be confused with the certificate's +# serial number which is set by the CA but is not a component of the +# certificate's DN. +# +# names - A list of name objects. Each name object should contain at least one +# "C", "L", "O", or "ST" value (or any combination of these) where these +# are abbreviations for the following: +# "C": country +# "L": locality or municipality (such as city or town name) +# "O": organization +# "OU": organizational unit, such as the department responsible for owning the key; +# it can also be used for a "Doing Business As" (DBS) name +# "ST": the state or province +# +# Note that the "OU" or organizational units of an ECert are always set according +# to the values of the identities type and affiliation. OUs are calculated for an enroll +# as OU=, OU=, ..., OU=. For example, an identity +# of type "client" with an affiliation of "org1.dept2.team3" would have the following +# organizational units: OU=client, OU=org1, OU=dept2, OU=team3 +# +# hosts - A list of host names for which the certificate should be valid +# +############################################################################# +csr: + cn: peer1@org2.example.com + keyrequest: + algo: ecdsa + size: 256 + serialnumber: + names: + - C: US + ST: North Carolina + L: + O: Hyperledger + OU: Fabric + hosts: + - ca-client + +############################################################################# +# Registration section used to register a new identity with fabric-ca server +# +# name - Unique name of the identity +# type - Type of identity being registered (e.g. 'peer, app, user') +# affiliation - The identity's affiliation +# maxenrollments - The maximum number of times the secret can be reused to enroll. +# Specially, -1 means unlimited; 0 means to use CA's max enrollment +# value. +# attributes - List of name/value pairs of attribute for identity +############################################################################# +id: + name: + type: + affiliation: + maxenrollments: 0 + attributes: + # - name: + # value: + +############################################################################# +# Enrollment section used to enroll an identity with fabric-ca server +# +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +############################################################################# +enrollment: + profile: + label: + +############################################################################# +# Name of the CA to connect to within the fabric-ca server +############################################################################# +caname: + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section allows to select which +# crypto implementation library to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/peer1@tlsca.org2.example.com/msp/IssuerPublicKey new file mode 100644 index 0000000000000000000000000000000000000000..b473a5bf9c9239d8f798da39a5adc4e4659d7230 GIT binary patch literal 843 zcmV-R1GM}K0#8*61X6EoWeN;MZgOvIY;9$3bV)=C5K?7!Z)0I}X>V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-V>wVQyq>WfDXR zAmJNfu_v4~cP4=&*qzWBC*JX%H(m#-rtwGW_jz= zAYcrqDWGB^?$DRh#>mBSTrU$H6NgRl0U|^SAORqqy&X+mAlcb(A#6;k zQXh+))|o7pn(&HYh`;=E9TFfBuWe&X+OK#tdS|1~JSuIqsFI~p_Bo)9yDSw(O3d^k zL<%4$*|6AZ^9oHhu3thO&Z;JpzU`*lOem7+mvW(j)=xu=*?NAcc)lqW&)H^(AY3K|ARpL<%6t@vA(Om_QU-m97CA zw3g{}+NBgksKQelJF>>5H$3}c4;N0XYj&v6 zZ!H8olDhjOmgiv6$$}VcOXWv*5+E9Fw%`t?2i=#p{8pFZ7;N9uZAQHC;6a1UQAXkU zxyCv~3Lx^j9J2}@5-Q7#@{XTO$D*IeVHEluw(I)u>(n`+LY)#IP9wCZI}0S(Z3EXJ zuUJPS6WXCYN-SgjJ5tcSV(nb2LLjX%a?ypx98kSb)E>#Z>E?FrN7HycCLB*C9|*=V z1bRv!PZ*-y;};Ajnj@v-CpUGpHbo8?kSpv2tt8ILP^Gj;QXpl-S@1>2D}Sw;K>(#J VVCl;-:@:/ + tls: + certfiles: null + client: + certfile: null + keyfile: null + attribute: + names: + - uid + - member + converters: + - name: null + value: null + maps: + groups: + - name: null + value: null +affiliations: + org1: + - department1 + - department2 + org2: + - department1 +signing: + default: + usage: + - digital signature + - cert sign + - crl sign + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h +csr: + cn: tlsca.org2.example.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: North Carolina + L: null + O: org2.example.com + OU: tlsca + hosts: + - fabric-ca-server + - localhost + ca: + expiry: 1314000h + pathlength: 1 +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + keystore: msp/keystore +cacount: null +cafiles: null +intermediate: + parentserver: + url: null + caname: null + enrollment: + hosts: null + profile: null + label: null + tls: + certfiles: null + client: + certfile: null + keyfile: null diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/fabric-ca-server.db new file mode 100644 index 0000000000000000000000000000000000000000..02f22ea2d321724f5f99ac42efb3a36fe05f45cb GIT binary patch literal 61440 zcmeI5ON`q{ddFMtms?|7Gm|xX=BDxNVBKkVi=;$71_-<)MNyPQsVPwpYT-2aCMAkg zi*r&JqHOAEON>rn?ryg=PVE)2y)9MKpsFYy8(h=Q&hLzQoqK# zeq`1u+Lp*-Rk7+y@Gl1bJ>T93 zI~&grz;|S6|GM38tsVT&@b2yJuid%5z4qR-JAWAcvz`BpKHYh|^Ov#I?d^Mie)stH zkHSCKWdOq=0Z0H6fCT_AOO3aPI#nd<4>26ydldJyktNy3&UheeqquCla=cm-;?-uQ@+dBi zebXIT{_MD~&5kWqbHdACj;Bb+wj^uzB0b2{m;AAJF|&~-d9D+;9RE>Vn+~nfEbdza z4MZLcAH_%7#O-V9F&K=OLWkPmVm7um0T*Jc0?p9%c%Cj0&59659>tI9EJxJEc$pR- zuGH%KdhG2z{qWxQ?q{Dxo*E0llCE2}CHa=?c+2~@R=_Twi9d9tf%XC_ieRa|7X;(Y zD$6(NNAclE0|ZxNJ&IpbmA%_PS^Fex^{0RhX!YgGg{>~>nGd#h%b!KoEJxL*-iZx7 znPbpa?&A1(rP@b|v%UNA$C0PwMUfrXQ8e%LGrCgL)3EqMP@dHWyWFgo&G?!oU9Abod2eq&y0!cG z`s1}Wy$WD)k-fbyzOl8v`{}2V-#k;d zk+x76$@Y}<-R+fUdk3O6?tzD-`?6~KfTT}mI#1; zdCuwfy?x^_xV0IY}t-$19nHAsbKGyW6|FyOA$W z78W)J*5NHa?yWTABIt_t^T7b`#O0Z~DaHD~17_5e63-jY^b?Jn%y1ynX;KUjB7zY_@&Mtm6g6&_L=)k0gzt;1bO#nwhN*ZK{ktku5gO zT44fnQ0ceEq3z2IYRgW&RHwi>yEX52*eTECX5BeE?siNwDtAb)+rWD=hCI);sdY$u zQG(D8tWr)Fh%#vyCuYA_JL35~VN{Dmo}>wj97G%K3?f!$cC!_D0W&Hjw5mQFv(pCQ zq8&49;R5Amq<(@4SmUVNtI=&&SBL$HJ4q2qE-{a$D^-t6@^ZoSr-s4GbipkKUGLYT z3%Q`H`O6aW<@T**B_z~=8qVC2hn;FwwsUf}50&t(Dgo1#vW|rfM z35u6znKmnR_9a?GW=TJ>&(`p$&UbQT%bnHBO@s5rM0?n`uxzD^O@~IMUhe4{e&p6V zs^I2Nq++s}tJXp#tS^*M_yv_vZkGDoWUeJtgN&Y#m@JN+BCBD7#J-{u-V6;WA%8&$ zJHLPuo~vUhc7*{@LK_T~1w?A+7E;Mtfh95GxZcKRGB)+(c5AHCHXRDvRV9qR7{nKv z3v#vVxWY88npHv-tTkgDG{+I{i@|O&8EhQP1t0k-2PF0#8Wt;XK^W;Ny%9teHbF4IGR<^Y!XkW(>RXl zxwNhWjr>3K11U8R{6O>MT>T39RNGZ6#)LQA7Q-?5)}Y&};BrEFch#@xO{qCiI(1(~ zfv{TwSLXuy)GuV|V3-%%(_wdzn*rYdxUynUIQ3GCQ93{cv7IvNPRW!9)uDn_C(FL> z^{#F<$S+(No(H~ew+EaE;3)7@dQQ|&OTr1%pfr(_ye}?PFcq`~LLd$0%nx9Jn`E3s zPn`meB!enN5PXkHXUeEONp;$T&ZsjJ%cQIlT@2+7+#b_*x0f)RquD%BHq*m)o42B4 z+$0k%ZD=L=(rggSa^8fNQseYU%BBm$go;V?vYTRP;4hOLkqX^gH6PGqBH+XO0Wxa# z2yWry)wzW)Nc0F0uyEPcyur6gQYhyev;CB!HtW@FYdpo<+8h^8(&hxs6Z)wm+2Cj< zPqYnED0XHE0!i~VQ+FohNyk!Zc85u8Y^g_>rx&7WrbmcIy-Ri(bQqQU*W6HCD;Jb7 zElr3(G8?KgOGc&Xcp_Csfpd~;)yE^LG@sU_^nju|M_v^;PE0@i0C%37>(TJ@p0IZBXR$wtHShf~*o7M;00}?> zkN_kA2|xmn03-kjKmw2eB=AxMnj24^L^66Ng(u}~GKFJuT0+%SR#FrUm9i+RfQL>w zOwFhnDgCmKn>K}w?>vd5lUOz-BNCoT%E_dj&7m1Z)^%CWATp*Xnx^GasH(kerW=c* zzU~>)^+m3)d$!@00I=@7?x%R+`~T~aAFaLjcUyl8zTo!DL;%kJ!})(W{}1Q?;ru_G z|A$KWR+R9niQ*UY#KOzG2?gi>FT5cK=l|jSfB0rs_#P;n{}0~-h4cS#{{PL-|1bJn zc>jNE^WWE^KLsCfg9IP}NB|OeHwk>Xy}A6B{7}1Uz0m7^aQ}wZ3-wml3+c(aFwWN- z{z7Z%x-F;8=Yq4HPVOp2g3!R3&%6g&lyv&LSf5aq|fgy@%NA=|i zEiih`u8?JN)+LDOTxBx0MH5li;_8h--(f9}s`_ZNI9AEJMd9<&=qOXlkadQejRU-Av{;HQ>?cr7VAQ17 zs3*Z1w{F#oX0drrH6}FzJ?dpFyqvKEBWK#xEwPWaHZr zLb6w;y>e^r&G$=%>?AQsQnPt2Gvw726v8*UT=%{;wi6@N@2Q5m7;xrUs9_=tIq8AM5jIJ)Cmy5!ps&?2~vDo6m{i<9~&f(9vxN8 zQk#%oT?j?0-64DFsxvmTQB;)*f?*X#ZZ61-o3BF%uY>kA62jo67f!yE5ZXZn6N0Y7 z?F&wuPfrqQSEsW^PRkN_kA2|xmnz&lJJ zT>lU6|KH&ThE;{y!4?=^FS8H%I^yfCL}` zNB|Om1Rw!O01|)%AOT1K5_q==Y)3ZNc5dyg{|kKo|J`a>SQ|(H5`Y9C0Z0H6fCL}` zNB|Om1Rw!O;3@*}{r{_|z%WPv5`Y9C0Z0H6fCL}`NB|Om1Rw!O;N2n+&i`-4erqlE zZ?V6R{Z;IbVt)V*;06gm0+0YC00}?>kN_kA2|xmn03-kjKmxCyKx}LM)0pErigsvg z6U|27-(3GJHc~7{ch5q;v9W#-Q%0JqIld*?XQB7k*Ap>C8~K)QDU$y@`TbiUSkiUN zwj|$jowL{z_uJo&s#Wzy4Wd`60mOH`Wg#7oP!a++R;bE9zX03-kjKmw4!WdhGW*nBVdbmRWr z-|p{3cETUdMlbzv_BS!1y`sv&qyC=C7d5hHYS zcw-v_D?Md04s-m@cON*?Kzs1{15-a_G>58J9z1$5k?e68=8wSFZ#;StM^Xot zvvgjUY)=EnS~w~`_&kih99x!@L(8%Jr4)-CuS)=mP}dC0^GDL?uL4RwHVn}`N4Y5e z4bh47IfSKD7cTJRXU{&^xL^~Pe@y+%CK6V%L9}XzZVd_2bw?$tjypJt z99U+z(xueNi7SlT&f&aSX{_3W^vl?Sui1)kwu#I1FErVC=XrBB@hj_RHsJ!DXnHs4 z#JqIUVy2Z|aoT6pR*9MQ{QhAhjZ~CuJC{c06oMu_X(*-(E%&IKGQHHC8G{^ud2~Xt zEzo%{b^YhE^2U|oYW_cmRfM>2ivF@n@!_pAs~7;QAVTH7ZuGD+l|ik?nEebH6!QAe zt*YQR?0tUJPYdYLKn{+&!@1uBziNNznrMn)hJ|c-)haHI3^(fh>y?$a*5F?$EZ0lL z)%b5}L=0hpf@6JM!EM91hb=%Q*709CgZnMIg>c@t5juOBT%;%i}Y8Z8yH?9b6vk zpLh7YW@`qRu>a~57rldvS7#kx8x1rS%=Bv%0UGc5*nTnMB|`xbp8PDF|KE)La4q(a zvA>D^F!o=uf4=PU!4OCQ5`Y9C0Z0H6fCL}`NB|Om1Rw!O01|k+1j1JU+>wDEs@hN* k`QelRwsq<=hiO0Ln2A8~^|S literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..4b474ba8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLTCCAdOgAwIBAgIUOya/oTe+7qMcKY3TkoQfUUz9zE8wCgYIKoZIzj0EAwIw +cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK +ExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4 +NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw +FwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE +AxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH +A0IABMEU5dpAp0tg/aUsZbtKJawjYfU5rPXprVXtVnhWCbqTB0YqQSRhqbuLBXyZ +0fC69aj5hM/pNaZ/rQbHL1vitfKjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB +Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBTHXy/A06QOhfnvBqXicOlXG6eIJjAKBggq +hkjOPQQDAgNIADBFAiEAmsZj2wdRwaq3n4oDEp6mWvv8rcAxfuGqZJfjvhSZujMC +ID3hvwL0Y0zZEnFQozSX2bkqajwNnHiXyCbnCbwVOnE1 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk new file mode 100644 index 00000000..fbd5d2b5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2CjqsrVQX5u3VWNZ +w+pzcJL4+D02OaRoTsKY2+CeeemhRANCAATBFOXaQKdLYP2lLGW7SiWsI2H1Oaz1 +6a1V7VZ4Vgm6kwdGKkEkYam7iwV8mdHwuvWo+YTP6TWmf60Gxy9b4rXy +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/ca-test/docker-compose.yaml b/hyperledger_fabric/v1.4.3/ca-test/docker-compose.yaml new file mode 100644 index 00000000..99e68a69 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/docker-compose.yaml @@ -0,0 +1,92 @@ +version: '2' + +services: + ca.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.example.com + hostname: ca.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/ordererOrganizations/example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh example.com ca" + depends_on: + - tlsca.example.com + + ca.org1.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.org1.example.com + hostname: ca.org1.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org1.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh org1.example.com ca" + #command: fabric-ca-server start -b admin:adminpw + #--csr.names C=US,ST="California",L="San Francisco",O="org1.example.com" + depends_on: + - tlsca.org1.example.com + + ca.org2.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: ca.org2.example.com + hostname: ca.org2.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org2.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "sleep 1; bash ca_server_start.sh org2.example.com ca" + #command: fabric-ca-server start -b admin:adminpw + #--csr.names C=US,ST="California",L="San Francisco",O="org1.example.com" + depends_on: + - tlsca.org2.example.com + + tlsca.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.example.com + hostname: tlsca.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/ordererOrganizations/example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh example.com tlsca" + + tlsca.org1.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.org1.example.com + hostname: tlsca.org1.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org1.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh org1.example.com tlsca" + + tlsca.org2.example.com: + image: yeasy/hyperledger-fabric-ca + container_name: tlsca.org2.example.com + hostname: tlsca.org2.example.com + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config/peerOrganizations/org2.example.com/:/etc/hyperledger/fabric-ca-server + working_dir: /scripts + command: sh -c "bash ca_server_start.sh org2.example.com tlsca" + + ca-client: + image: yeasy/hyperledger-fabric-ca + container_name: ca-client + hostname: ca-client + #environment: + # - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-client + volumes: + - $PWD/scripts:/scripts + - $PWD/crypto-config:/etc/hyperledger/fabric-ca-client + working_dir: /scripts + depends_on: + - ca.example.com + - ca.org1.example.com + - ca.org2.example.com + - tlsca.example.com + - tlsca.org1.example.com + - tlsca.org2.example.com + #command: sh -c "while true; do sleep 1; done" + command: sh -c "sleep 4; bash client-test.sh" diff --git a/hyperledger_fabric/v1.4.3/ca-test/run.sh b/hyperledger_fabric/v1.4.3/ca-test/run.sh new file mode 100644 index 00000000..6d311234 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/run.sh @@ -0,0 +1,12 @@ +#!/usr/bin/env bash + +echo $PWD + +docker-compose rm -f + +rm -rf crypto-config/* + +echo "starting ca server" +docker-compose up + +docker-compose down diff --git a/hyperledger_fabric/v1.4.3/ca-test/scripts/ca_server_start.sh b/hyperledger_fabric/v1.4.3/ca-test/scripts/ca_server_start.sh new file mode 100644 index 00000000..a95d611c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/scripts/ca_server_start.sh @@ -0,0 +1,54 @@ +#!/usr/bin/env bash + +source env.sh + +if [ "$#" -ne 2 ]; then + echo "Illegal number of parameters" + exit 1 +fi + +ORG_NAME=$1 # org1.example.com +TYPE=$2 # ca | tlsca + +ORG_PATH=/etc/hyperledger/fabric-ca-server +CA_PATH=${ORG_PATH}/${TYPE} # e.g., /etc/hyperledger/fabric-ca-server/ca + +echo $(hostname) + +# do not recreate the credentials if existed +if [ ! -d ${CA_PATH} ]; then + mkdir -p ${CA_PATH} + cd ${CA_PATH} + echo "Generate the credentials for ${TYPE}.${ORG_NAME}" + + # generate fabric-ca-server-config.yaml + #fabric-ca-server init \ + # -H ${CA_PATH} \ + # -b ${DEFAULT_USER}:${DEFAULT_PASS} + #rm -rf msp/* ca-cert.pem # these credentials are wrong + + echo "${CA_SERVER_DEFAULT_CONFIG}" >> fabric-ca-server-config.yaml + + # Update config + echo "Update fabric-ca-server-config.yaml" + yq w -i fabric-ca-server-config.yaml ca.name "${TYPE}.${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml ca.certfile "${TYPE}.${ORG_NAME}-cert.pem" + yq w -i fabric-ca-server-config.yaml ca.keyfile "${TYPE}.${ORG_NAME}_sk" + + yq w -i fabric-ca-server-config.yaml csr.cn "${TYPE}.${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml csr.names[0].O "${ORG_NAME}" + yq w -i fabric-ca-server-config.yaml csr.names[0].OU "${TYPE}" + + yq w -i fabric-ca-server-config.yaml tls.enabled false + #yq w -i fabric-ca-server-config.yaml tls.certfile "${ORG_PATH}/tlsca/tlsca.${ORG_NAME}-cert.pem" + #yq w -i fabric-ca-server-config.yaml tls.keyfile "${ORG_PATH}/tlsca/tlsca.${ORG_NAME}_sk" + + # Generate new certs based on updated config + echo "Generate certificates for ${TYPE}.${ORG_NAME} under ${CA_PATH}" + fabric-ca-server init -H ${CA_PATH} + + cp msp/keystore/*_sk ${TYPE}.${ORG_NAME}_sk +fi + +echo "Start ${TYPE}.${ORG_NAME}..." +fabric-ca-server start -H ${CA_PATH} diff --git a/hyperledger_fabric/v1.4.3/ca-test/scripts/client-test.sh b/hyperledger_fabric/v1.4.3/ca-test/scripts/client-test.sh new file mode 100644 index 00000000..44712bde --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/scripts/client-test.sh @@ -0,0 +1,182 @@ +#!/usr/bin/env bash + +source env.sh + +CONFIG_PATH=/etc/hyperledger/fabric-ca-client + +# RegisterUser CA_URL CERT_CN CERT_O USER_NAME USER_PASS TYPE ATTRS +# RegisterUser will register a user to ca with USER_NAME:USER_PASS, TYPE, ATTRS +RegisterUser() { + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local USER_NAME=$4 + local USER_PASS=$5 + local TYPE=$6 + local ATTRS=${7} + + # Use the default user as requester + local REQUESTER_HOME=${DEFAULT_USER}@${CA_URL} + EnrollDefaultUser ${CA_URL} ${CERT_CN} ${CERT_O} ${REQUESTER_HOME} + + # register with the identity of the requester + fabric-ca-client register \ + --home ${REQUESTER_HOME} \ + --csr.cn "${CERT_CN}" \ + --csr.hosts "${CERT_CN}" \ + --csr.names C=US,ST="California",L="San Francisco",O=${CERT_O} \ + --id.name ${USER_NAME} \ + --id.secret ${USER_PASS} \ + --id.type ${TYPE} \ + --id.attrs "${ATTRS}" \ + --id.maxenrollments -1 \ + --url http://${DEFAULT_USER}:${DEFAULT_PASS}@${CA_URL}:7054 + + sleep 0.1 +} + +# EnrollDefaultUser CA_URL CERT_CN CERT_O HOME_PATH +# EnrollDefaultUser will store credentials to local HOME_PATH/ +EnrollDefaultUser() { + if [ "$#" -ne 4 ]; then + echo "Illegal number of parameters" + exit 1 + fi + + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local HOME_PATH=$4 + + EnrollUser ${CA_URL} ${CERT_CN} ${CERT_O} ${DEFAULT_USER} ${DEFAULT_PASS} ${HOME_PATH} +} + +# EnrollUser CA_URL CERT_CN CERT_O USER PASS HOME_PATH +# EnrollUser will store credentials to local HOME_PATH/ +EnrollUser() { + if [ "$#" -ne 6 ]; then + echo "Illegal number of parameters" + exit 1 + fi + local CA_URL=$1 + local CERT_CN=$2 + local CERT_O=$3 + local USER=$4 + local PASS=$5 + local HOME_PATH=$6 + + if [ -d "${HOME_PATH}" ]; then + echo "${HOME_PATH} already exists, ignore re-enrolling $@" + return + fi + fabric-ca-client enroll \ + --home ${HOME_PATH} \ + --csr.cn "${CERT_CN}" \ + --csr.hosts "${CERT_CN}" \ + --csr.names C=US,ST="California",L="San Francisco",O=${CERT_O} \ + --url http://${USER}:${PASS}@${CA_URL}:7054 + set +x +} + +EnrollCA() { + local URL=$1 + local USER_ID=$2 + local ORG=$3 + local USER=$4 + local PASS=$5 + local MSP_PATH=msp + + [ -d ${MSP_PATH} ] || mkdir -p ${MSP_PATH} + + fabric-ca-client enroll \ + --csr.cn ${USER_ID} \ + --csr.names C=US,ST="California",L="San Francisco",O=${ORG} \ + --home ${USER_ID} \ + --mspdir ${MSP_PATH} \ + --url http://${USER}:${PASS}@${URL} +} + +EnrollTLSCA() { + local URL=$1 + local USER_ID=$2 + local ORG=$3 + local USER=$4 + local PASS=$5 + local MSP_PATH=tls + + [ -d ${MSP_PATH} ] || mkdir -p ${MSP_PATH} + + fabric-ca-client enroll \ + --enrollment.profile tls \ + --csr.cn ${USER_ID} \ + --csr.hosts ${USER_ID} + --csr.names C=US,ST="California",L="San Francisco",O=${ORG} \ + --home ${USER_ID} \ + --mspdir ${MSP_PATH} \ + --url http://${USER}:${PASS}@${URL}:7054 + + mv $MSP_PATH/cacerts/*.pem $MSP_PATH/cacerts/${URL}-cert.pem + mv $MSP_PATH/signcerts/*.pem $MSP_PATH/signcerts/${USER_ID}-cert.pem + + if [ ${MSP_PATH} == "tls" ]; then + cp $MSP_PATH/signcerts/*.pem $MSP_PATH + cp $MSP_PATH/keystore/*_sk $MSP_PATH + fi +} + +ORDERER_ORGS=( example.com ) +ORDERERS=( orderer0 orderer1 ) + +PEER_ORGS=( org1.example.com org2.example.com ) +PEERS=( peer0 peer1 ) + +USERS=( Admin User1 ) + +# TODO: Fabric-ca's existing param support is bad, which reads user.name as csr.cn, and ignore the true csr.cn when do enroll. +# Generates peer orgs +for org in "${PEER_ORGS[@]}" +do + cd ${CONFIG_PATH}/peerOrganizations/${org}/ + + echo "Register all users at ca and tlsca" + for user in "${USERS[@]}" + do + if [ "${user}" == "Admin" ]; then + RegisterUser ca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=true:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=true:ecert,abac.init=true:ecert" + else + RegisterUser ca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} "${user}@${org}" ${org} ${user}@${org} ${user} "user" "hf.Registrar.Roles=client,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + fi + done + + echo "Enroll all users" + for user in "${USERS[@]}" + do + EnrollUser ca.${org} "${user}@${org}" ${org} "${user}@${org}" ${user} "${user}@ca.${org}" + EnrollUser tlsca.${org} "${user}@${org}" ${org} "${user}@${org}" ${user} "${user}@tlsca.${org}" + done + + echo "Register all peers at ca and tlsca" + for peer in "${PEERS[@]}" + do + RegisterUser ca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} "peer" "hf.Registrar.Roles=peer,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + RegisterUser tlsca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} "peer" "hf.Registrar.Roles=peer,hf.Registrar.Attributes=*,hf.Revoker=true,hf.GenCRL=true,admin=false:ecert,abac.init=true:ecert" + done + + + echo "Enroll all peers" + for peer in "${PEERS[@]}" + do + EnrollUser ca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} ${peer}@ca.${org} + EnrollUser tlsca.${org} ${peer}@${org} ${org} ${peer}@${org} ${peer} ${peer}@tlsca.${org} + done +done + +exit 0 +# Enroll all users +cp ../tlsca/*.pem Admin@${org}/tls/ca.crt + +EnrollCA ca.${org} Admin@${org} ${org} adminpw +EnrollTLSCA tlsca.${org} Admin@${org} ${org} admin adminpw + diff --git a/hyperledger_fabric/v1.4.3/ca-test/scripts/env.sh b/hyperledger_fabric/v1.4.3/ca-test/scripts/env.sh new file mode 100644 index 00000000..d9b3c0b3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/ca-test/scripts/env.sh @@ -0,0 +1,166 @@ +#!/usr/bin/env bash + + +DEFAULT_USER="boot-admin" +DEFAULT_PASS="boot-pass" + +# store the default template for fabric-ca-server-config.yaml +CA_SERVER_DEFAULT_CONFIG="" +read -r -d '' CA_SERVER_DEFAULT_CONFIG << EOF +version: 1.4.0 +port: 7054 +debug: false +crlsizelimit: 512000 + +tls: + enabled: false + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +ca: + name: + keyfile: + certfile: + chainfile: + +crl: + expiry: 24h + +registry: + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +ldap: + enabled: false + url: ldap://:@:/ + tls: + certfiles: + client: + certfile: + keyfile: + attribute: + names: ['uid','member'] + converters: + - name: + value: + maps: + groups: + - name: + value: + +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 43800h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 8760h + +csr: + cn: fabric-ca-server + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: Hyperledger + OU: Fabric + hosts: + - 4462096fc0ba + - localhost + ca: + expiry: 131400h + pathlength: 1 + +idemix: + rhpoolsize: 1000 + nonceexpiration: 15s + noncesweepinterval: 15m + +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + + +cacount: + +cafiles: + +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +cfg: + identities: + passwordattempts: 10 +EOF + +#echo "${CA_SERVER_DEFAULT_CONFIG}" diff --git a/hyperledger_fabric/v1.4.3/crypto-config.yaml b/hyperledger_fabric/v1.4.3/crypto-config.yaml new file mode 100644 index 00000000..e4da8b9a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config.yaml @@ -0,0 +1,99 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk new file mode 100644 index 00000000..c67e0bca --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/835c212d9a3bf900b8898b5a5ea10990c276478419a17aef025478292708a0a2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqMqZY8MRhTc0UNJx +WD0UrxFPBYBLaZsg0NIxHPtqAN6hRANCAAQE4NkiEOucWnRl4z64kRsAxgU554+0 +5gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk new file mode 100644 index 00000000..ce273a3b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqmO+JljFoPfIhim6 +eVmCHpkHFA+2M+vgwrRvkKCGTaihRANCAAQ5eah0RR8AQsvUjwBw26wrMzRSXNx+ +BOMdSraHfIV7y0kKJWxgYy3LAG/pCuEyQCkTINCAN5VxNjcOAFa3qW3Y +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..d210203f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..c82cc76d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..a3bb80d7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg44um53xAgcGf36I8 +hEosFEThX/q/xK6mdBJEGxiNnAChRANCAAQbS9GZ+ZvKy9zpyN2lNXTdmDfSbuH9 +TOZVL5ImNEB8+vRfhvgMsZqbCRDR5JmqSIGSwqT98MRG37+jKxwD5m4P +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk new file mode 100644 index 00000000..b630001f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/49f44e969020d56e48fdfe532d9bb0cf88b0ee3ae01885ada2a8a124e492adb8_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgo4etZOei/4j42mZx +qLjJuqVAMeqKFlSckbVmHJhgM8mhRANCAAT4rVPl+9zbVBkYKvtsD5AD3Wszgvl4 +yG2Ja6+QOZYAzKQ4PfiHcd9j7LcxQgcyN8Svvg2q2n9tKUxTy0O0USYm +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..51d0d27e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAJTRLQULXJSCDRqpc2DLoPgwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABPitU+X73NtUGRgq+2wPkAPdazOC+XjIbYlrr5A5lgDMpDg9 ++Idx32PstzFCBzI3xK++Daraf20pTFPLQ7RRJiajTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQDQXr7pmhJsM/f9Su1fYUko +LG+JXsyLKaEXYpQsNlqj8gIgV1WRnRauF8NgWjy6XhVwAVdp2XmQNyquzw3vhnwX +rkc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..84352fa9 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..48082f5b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeAn2qT0Xi2GNzoTr ++AJHiiiOW65+NWPrGQcOe508E6mhRANCAATQOJpkFZTU02G6ZzlqcNQ/efarFVPm +CDbX5YkJfhRlX6eOslMluLj94TtipmjCFcVl9HpepAbVmOJP7zR8QUNR +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk new file mode 100644 index 00000000..4d4dfc62 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/7b22d4c766036526a68d0103a4d8a03269922fc7169acb53b7eb458386e72ab3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQ83ryNMdclKveF5H +lo/ezTZLFzz1CdyUq9Hl67t6xI+hRANCAAS8ImiXidPbE3cNTAVRUuCERGVQB/MD +drjCpKyGvLpn6a/yJ0Xmzu9HeX/UV4zGpjL6VRC6teX/xSYIHSKL8co4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..64e2fcbb --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICDjCCAbSgAwIBAgIRAN+s1O7GI0UOMZvmoXtLQ1YwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABLwiaJeJ09sTdw1MBVFS4IREZVAH8wN2uMKkrIa8umfpr/In +RebO70d5f9RXjMamMvpVELq15f/FJggdIovxyjijTTBLMA4GA1UdDwEB/wQEAwIH +gDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQCaK9TwZhkZlKcM6m+SNiI0 +E0GWKJ8reffQGfFs/3HOTwIgagYUi0kZAQPl5hFBQns2vt2nCPA+hmOrUD0pfqND +93Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..9b2fded5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..aee43bd1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGsyJwJxyY3hS9b0F +wYdxVC7oWsmgcoLpkyLbyjaW53ehRANCAAQdyKySnGCtriQ3Z06H03GphhH72EL9 +07kLgy0oJgpoCdzTsKfQAwaoaUJPGW4sC+I7j31PDpYn3/O5O+J3b9mp +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk new file mode 100644 index 00000000..d7ef5bd4 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/5c2f599bc3821984fb52f066ff27022fdefdc3badae0b251d14ab6234ff4cb26_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgd4tdFjKsTCKKVnho +WwN2D2IS7WCwhZelVYerkGEWlFehRANCAARw7YgLYl/zQiN89EXJyZP/RyHBdBgb +5sZ9j5yHYX8xYb68MwLX9UjnmkOrE4WtXAVNkipPAm0RQ4jPcN4+wPjj +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/admincerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..303a2f20 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk new file mode 100644 index 00000000..2edcb1b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/12cfccdd860122001f6fd5d3f837bd2a9859141bd4da4c3b6d208eb36138f549_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPCGHUkO5hsN4qk3h +gyYXMLrdtJooiP8uWxUPs0QiEOWhRANCAATc6HK5MOc7/vumy14U1gmXWu/qsOkR +her+U4lPeT+2vX/yppesmRcuSe7JEDI4EvO+ecNbQavzdsrHInhjjR9B +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..8a7b037a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,13 @@ +-----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..89d4261d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQjCCAemgAwIBAgIQGYhMtbj3X2UELdVlkj1nYTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowbDELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5leGFt +cGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHDtiAtiX/NCI3z0RcnJ +k/9HIcF0GBvmxn2PnIdhfzFhvrwzAtf1SOeaQ6sTha1cBU2SKk8CbRFDiM9w3j7A ++OOjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNVHSUEFjAUBggrBgEFBQcDAgYIKwYB +BQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNVHQ4EIgQgXC9Zm8OCGYT7UvBm/ycC +L979w7ra4LJR0Uq2I0/0yyYwCgYIKoZIzj0EAwIDRwAwRAIgcm4RuPmSYe8V+Eyg +98hH37ZMLnC9Fc2aTyqqIkJ5msACIBrrwUG8qCowsqTdSZhuwfprXFc3oe4u7IIx +K3brtAW5 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..2a36dbd5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLDCCAdOgAwIBAgIRAJVGkdRzcqvkjXMT774PbBQwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEG +CCqGSM49AwEHA0IABHXzFhJjAcF2E7HHcCG9J8loMQxrzBsZjID3kDizlPVfxjmO +TRzog1Y/PB9aRAC3zBqUk6TvQ79/CiJaqESwqNSjbDBqMA4GA1UdDwEB/wQEAwIF +oDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAr +BgNVHSMEJDAigCBcL1mbw4IZhPtS8Gb/JwIv3v3DutrgslHRSrYjT/TLJjAKBggq +hkjOPQQDAgNHADBEAiATrDX4/soATOQs7BCZ8e3QnzI45ufbKguu2x4T98Br5AIg +IugHkF9jH9TkMFZQrfeZ/RCSCLydnP36ng3fsOEr95w= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..fd7a705b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgdrCdvPZgtf7ekzyW +YaunDxRki8O18sO1AWTsj+JDwu6hRANCAAR18xYSYwHBdhOxx3AhvSfJaDEMa8wb +GYyA95A4s5T1X8Y5jk0c6INWPzwfWkQAt8walJOk70O/fwoiWqhEsKjU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk new file mode 100644 index 00000000..032391e5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/bd5440d00b09329c9e0ed9821e39d53850847c0170753f7ddc0e5180bdcc981e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgRv+cZYfeX3RmplgX +22EtSL2AFMBTo4tXkK5dCPiWoHmhRANCAARTCgKBQ4dpPn3olMhlO8k6mpaWoagZ +rlvtJT2FzdYsZVKZl9a1sK5JOmvzqPbqFpAjcoAvnbTs2Ek+r7o2nyvv +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk new file mode 100644 index 00000000..2970c648 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeP2LQOw5AZkA13tp +ACTuYfk9KWIKKuwBeQbAw3fue0ShRANCAAQ/W7e8kQaphjbqD/ylNv3TMwbzxL8J +TIaMl/48ANHSmiiTck5TBu+ipGxYJSQ6ASql422oLE+ccxA9u8gantkA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..a63da555 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..fdf98be1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAO/LwmuxNPrIF8MN1GoxzTswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABPQC76QOrYVvKdeohtSkHQY3if0h +PzH78wUy/Jbr2AG/Ff3LW/zkEelEi03acjE6XfL9r4agwGKpUjrVMNYkfQSjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIGqRTRuJKCKrVqBWCJaVvoViiIIz +67DYtcHS/6oIMgrAMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQDQv4ysSqE0gW/wphHjFRJYfWjUcrPp +5UKIxsjA0QFcsQIgMFStVXjt5mF0wJq98AKPiBkaw9RY3cIwkuAK6xtiuVs= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..aa350747 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPJu78+r2RvtQbMvq +KsczX/xDqEYIK2UCID1pldzKyKWhRANCAAT0Au+kDq2FbynXqIbUpB0GN4n9IT8x ++/MFMvyW69gBvxX9y1v85BHpRItN2nIxOl3y/a+GoMBiqVI61TDWJH0E +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk new file mode 100644 index 00000000..88ee895c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/be666eee9c7865bb34ac319d09049c1cc386e6ec81844084542de2b75654b61b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQga2xfa/FhOd6YolFn +NBb7owCaUomyas0EeQMmuIEcnn+hRANCAAQM9+i754FA/Orc0VZIP57ArJ8x0o4o +ql9yHj+EsP/SrjRbnVtGUNMqgvDggKHKgs7cRm69n3t1unCKpxoF5kPs +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..dd8c8b9b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..c441af2b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAKZWFo8h/lrUtUMqmfjcaEswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB8iBq9A/OWW1zu3XfSRavsAEcLj +uCd/Lrb1W9x5/WIk/hVbM7s7mF0+dvkKzc9y8t9z1bVteLzBjEGZiAQE9PujgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIGqRTRuJKCKrVqBWCJaVvoViiIIz +67DYtcHS/6oIMgrAMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIE2VgPzWE4xzAX+gzEPXiaILUzUsGsoN +k14xyWCpxz79AiBoTX3KeC/Jz2mtQN+dnyoO5/wRNKwQg8e+3T9lcAce/g== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..499000b7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2LKnl+10oWXAfouB +tgpY7pOdn/9l8RVzIJxZcgi6HU2hRANCAAQfIgavQPzlltc7t130kWr7ABHC47gn +fy629Vvcef1iJP4VWzO7O5hdPnb5Cs3PcvLfc9W1bXi8wYxBmYgEBPT7 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk new file mode 100644 index 00000000..9148c4d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/6a914d1b892822ab56a056089695be8562888233ebb0d8b5c1d2ffaa08320ac0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgv4sTsBvXAL94E0gB +/DgO7Gc3COMElMQqxs0BdFFQrs6hRANCAASm6N/SexTQxQgzySEn0QWsZHA8h75C +S+Yuid+qJ1459NM70AcKH5Q1MtRHsfd7PKI2ZRQ5tqVCoR+CdLeXRT5x +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk new file mode 100644 index 00000000..a87ab544 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/df6c017c31e3c5be907f21f6247bb34b21a27ab9686fa91bc2953e33c46b3145_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg3QvNIz/tkmhWprd2 +QqL9a+wtu/B/NnzT0wDZ//X+5NyhRANCAARANlBmuACHQscjwwCwmmw5Y9wC2mUJ +oR1OKyo51uafQYVfwe91nAix07fE8bdoUKJ/XNrLaK1nj6PdD/JjTTBu +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..b18bda74 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt new file mode 100644 index 00000000..be29faaa --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAIKNTTUkyDgyleo2PxtZORgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABKP4JNNn6wMvSRUr0oJysoWaarSF ++rEMNLhz1WNl7byg5MkmE2nqG9vJ7F5AOINxVHobHpeSMSGs/Znr6FbzI2ijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBqkU0biSgiq1agVgiWlb6FYoiCM+uw +2LXB0v+qCDIKwDAKBggqhkjOPQQDAgNIADBFAiEA+ZowroCMeKrTRXqsc/u0syOk +wF+o8ArYNHZn2laeUBsCIDKlmGGMdKOWm8LtfnDNthX33ZIvgwLP+FPsZJbJkUjp +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key new file mode 100644 index 00000000..00b5a769 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1vXsIXg9IKA9rp2p +3IlP9mVyiHmCE5sFtHMPy9Oy5o+hRANCAASj+CTTZ+sDL0kVK9KCcrKFmmq0hfqx +DDS4c9VjZe28oOTJJhNp6hvbyexeQDiDcVR6Gx6XkjEhrP2Z6+hW8yNo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..ae270d75 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk new file mode 100644 index 00000000..9c066a4c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/c0829e59116970d331524fe41b1a6060e1ccc03a83cfe24b0ed87648881569a9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg4kK8TmTO78P/Oncv +g0pFYf7hs/cnCxCmupAc7FWqiQ2hRANCAATuEgRLDV+iBL/oScz538CyL2VeKVzY +7LXtWjksZKPcd1dvXL/sfzRvjaePkzq9NxWfJg4uVfn8CKgzqbIOVYGC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..55f0034b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIQFI6NU9CGdUn7SLc1/UOz8TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATuEgRLDV+i +BL/oScz538CyL2VeKVzY7LXtWjksZKPcd1dvXL/sfzRvjaePkzq9NxWfJg4uVfn8 +CKgzqbIOVYGCo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCC9VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjO +PQQDAgNIADBFAiEA/1pe9y7MMqa5JjAFkJWHHwSpM1+2GJnB0ve9gXpBnQcCIFmt +lYxnNqqtHmKzv+KfveAt2VzZeywo7CMA3iVRkifJ +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..55f3e8ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy +1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E +AwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7 +XVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..13210140 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAOR+2UD/6XIM68JHdlYu7PQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABG5UyI1BKWFpkcSqDxye3DgTrBVP +QDNSD1umwDrA54vixDbploIyid/4maleYJz2i139CltTs9GTf7CNCjnTPXSjbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBqkU0biSgiq1agVgiWlb6FYoiCM+uw +2LXB0v+qCDIKwDAKBggqhkjOPQQDAgNIADBFAiEAzhQRglHRHODEEjvHoJVs4UtY +lFV1vXoe8vWWNU5l6VYCIHDXEEAwB2GJoITAtv8mTtSNzcT97doalh6p5YFmcr4J +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..9a314d34 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwiQuDPM6Uz7jxAGM +NVFCWCefwG3cRRYkFeR9GrRRkb2hRANCAARuVMiNQSlhaZHEqg8cntw4E6wVT0Az +Ug9bpsA6wOeL4sQ26ZaCMonf+JmpXmCc9otd/QpbU7PRk3+wjQo50z10 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk new file mode 100644 index 00000000..66be4bf3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/8e6b95d07fdf634dca5f886fce79e141950837075de34d2274819d75c2ccb4d4_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggFCfyPb/M4ISAZPf +r/n34zdZlrWaknkbw+I1b8V4nnehRANCAASkCyEAG3158WaJBns8JCfWjC9kCfNU +z8SL8m14yOGVYfTq1s14EuaAkXiyW2TS38SnTyXo0Qzz0GyVS8cOPKDa +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk new file mode 100644 index 00000000..c1b13761 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/35c2b2201788c9207da58ea1868fa42f092d8501f6920cc447b4ff30acc3bfb6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgHCEZCrNMUyhkDhwj +ApJVk5R1YTXjJmhaDpnnIG3965KhRANCAAQOszMaI7KOFL5VZ75P/w5iJ8qcpO98 +h/eLApiMqGXWAJ5ZVmcdgo49tS4g+3tozrEv3fK6/Ggx3eIAmQ9Luh3b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..d7f1c8c8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..49b7c340 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAKfWe7hE3PhC/aN4gbWoqHkwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABL35BKkD4mxBH0KyfOWDaKHjd+XU +07FUS7T96AIZeOctXABaIIZhRDGlKRSBmZkWDjj3t5+eRyqjYb4Et4PF2eujgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIAJ2WQYlwhstNQciIkGpa5JR/KZo +At7cNRJ6nunLWHSVMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0cAMEQCICRrgV2erVFXl19u1TIkIMK48cT8FSSj +2ICdN6PSzU5BAiAtOxAAFHx7pAU/xCIFOcM6TzXtDuLdbFNDBg7/MAXvkg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..c9badc6b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgD0YZPUOSnMCUMu1M +Xk4mdtecjJNYDBzCYO1A8sLHYJGhRANCAAS9+QSpA+JsQR9Csnzlg2ih43fl1NOx +VEu0/egCGXjnLVwAWiCGYUQxpSkUgZmZFg4497efnkcqo2G+BLeDxdnr +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk new file mode 100644 index 00000000..10c6f218 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/3a2f4e9d5051541eaaaaa7bfe3056416cda61ae34b36fed34f35fdaa122a677c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY5GLRvGDEwVqiJYB +SS4+onxB4Eu0j+/tKa67+fnlKEehRANCAAQLdyPNh+Nga0v+JgxIKCBtbFVWiB0d +Lf3J+ao9rPbRxZV9V64Kech8O52ZCIAYha9lp1sNUkyI/Hb44uXs/3W/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..5dbf6bec --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..5b619d3b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAPC9IsalrUsd1tl/XDr6HfswCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABM1WYOWPZkWFIqvkYwsZL9HozWRL +9LAFtureEpbBfz/HGrOKqaUL+Yj+DTFoDCoIuJ7gNKNgc+6f8EoCXQs4aMejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIAJ2WQYlwhstNQciIkGpa5JR/KZo +At7cNRJ6nunLWHSVMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDwSh/JoMhgx4iG3dy/XQuvQ/VTNNCq +yXIL8x1Uir4mnwIgfvA6T66kwA2cJ5FgxGtmzzhdJj9s6y9274xbd4iDjBg= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..6a3ee312 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkQ/pcW2Quo3OTSRj +hmnBENhyu7rJOH1cvAImXwpKWMuhRANCAATNVmDlj2ZFhSKr5GMLGS/R6M1kS/Sw +Bbbq3hKWwX8/xxqziqmlC/mI/g0xaAwqCLie4DSjYHPun/BKAl0LOGjH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk new file mode 100644 index 00000000..cc31f3ce --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/0276590625c21b2d3507222241a96b9251fca66802dedc35127a9ee9cb587495_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPdxufDVxjaChZ/0t +d1Fp5gmmBsaSCumlM2hzZ6FIefWhRANCAAQAEMMfeqb0tHmKOtswVw2RRn6bKgVf +8NZWxCytT2eOBKpO547PolGtZ5P5FlM6QZgKreN8fXCZUrJ6g7jDYZsL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk new file mode 100644 index 00000000..9c307b77 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/3484dd771bbf204041394fa77ae071c5972b8af2e6db75f4f8b27c75de09a34b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgNlYCdWYeDVrozdZ7 +sCiiS06dJyNgJz6NH50Ycv4j8GOhRANCAAT/lmk7kbPo8XNf6tmMXceLWf7jCOzi +zDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJnvAi9JKDnng6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..d93ac564 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt new file mode 100644 index 00000000..f827ef07 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAIk5KQpi3Wa1x2NnQsW4oCYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABDqRI8I8NKjgv8K0rOO6+L5tXucy +Ux2xr9s1+nrH23SwrobWshCMnplbsQyBAxEiqCs0VwQpE3QYGytlp6SDvj2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCACdlkGJcIbLTUHIiJBqWuSUfymaALe +3DUSep7py1h0lTAKBggqhkjOPQQDAgNHADBEAiB5266eS6DqJE1HOMkEFZcx+rFW +dzhKZAtJUDENcWy5kAIgCYm6WizAPWYo5WnGG1ucBD3TOqVh3ZvygmJRGL54pTw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key new file mode 100644 index 00000000..2a01aee6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtdkgH3y/a69wQWbi +dp3nDo9JEqJUxchecrCKNKEs9XWhRANCAAQ6kSPCPDSo4L/CtKzjuvi+bV7nMlMd +sa/bNfp6x9t0sK6G1rIQjJ6ZW7EMgQMRIqgrNFcEKRN0GBsrZaekg749 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..f17cbe46 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk new file mode 100644 index 00000000..5c0f1594 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/b21871f83a4311030ddb4740f501988cc9745adcf540ffb162af91f3e339ac7c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgzSgiM8PbRtrIuxc/ +aoE6RvUPWB9ljCJ2aYq+C9gxspyhRANCAAQ4mv0wfBSFndzbdCjX36lzAn3ncVph +LOTpus8rKXuf9BwRL1aWOLGEVmQJiIOsJ5zpTyTDhpNfc0rmq3Z8vk9f +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..3edd36e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAPARhzH6q8F759zh1givme0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEOJr9MHwU +hZ3c23Qo19+pcwJ953FaYSzk6brPKyl7n/QcES9WljixhFZkCYiDrCec6U8kw4aT +X3NK5qt2fL5PX6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZI +zj0EAwIDSAAwRQIhAN8f3GuE0d0BviUDCclSjJRBYhNiETrUSwdmaxFlfxPbAiBE +guJyRqOTpjAIz+AZ9/GGo3VcyBgN8IWAG5foW1ra6w== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..b5d86780 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT ++RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD +AgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax +u0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..48223f00 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAL2mE1rLqqQi/r2uvHCmSm0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH2WhnUUbwBA3lGz2eFmWYMfIvEV +rNX+Bh5LBb8aPxZ1T3V+xfGygbFDEOFm0oZf8oCXsuV/wjWaB13/E3HrRnijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCACdlkGJcIbLTUHIiJBqWuSUfymaALe +3DUSep7py1h0lTAKBggqhkjOPQQDAgNHADBEAiA4oaOVCaPU9ct06P1nT6UvhxvB ++p3WrY0s1tjVuEFxtwIgIwCWnHDR+ZRu5FgIHnGFd1DcbyJvZCYx6rkYSJkAKuw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..78b8ae3c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZfDhev7WB/mNWakE +mnrzP/ZDGuVVneU5iprUzbiLUbKhRANCAAR9loZ1FG8AQN5Rs9nhZlmDHyLxFazV +/gYeSwW/Gj8WdU91fsXxsoGxQxDhZtKGX/KAl7Llf8I1mgdd/xNx60Z4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk new file mode 100644 index 00000000..45972fca --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgcmU5hHQfNnzjg4az +RKQSD9RgxiFWqIiDryomGy35lp+hRANCAASkfqYVKYDeEuhn5ymHW8oI5Wv716Xy +87zpe7qL/tH9duivwoEVqw8RIaAZHW6KeUp4PcWMySx2f97R8AHddCHJ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk new file mode 100644 index 00000000..ee3aab50 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgJCzb+ZKzQoFnfLFR +Q31npnJfrRd2Xe34RVLlMAQAFqmhRANCAARbgk5JAT6X2pJM0+UmiindL6DNVGtO +EAs/TALn5q+X4UHWuEZH0gOQNyHcnvwKcwXBqdliHWLrL4wOubno+W62 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..c9384c29 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrrtKXqYQD+q3TM2oC9TnwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFuCTkkBPpfa +kkzT5SaKKd0voM1Ua04QCz9MAufmr5fhQda4RkfSA5A3Idye/ApzBcGp2WIdYusv +jA65uej5brajTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0cAMEQCIDIH9kzDurmSCQVHkthwEBCZwk4p03DRiYpkf1oyBWN1AiAFfZpU +aEENnw5XUIPAoRyzOOSTY0I6GtydC1NpR8FHAw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..aec1664d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMA2l1rNUWWc9seezl856ZMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3Um9a+FQxYJ1DWxT8Jhrx9SRBC +JM/0+zR11n4mia05HLbDkTID0rCbg45kcXg2XRgLEZL4gqQx6AhfijPUFgejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQD5m/MiLVdgLPKgd6j4H+NHNa7GoCVx +w3howyS8C0ChtQIgeYwU8+cLcfQFvQODJHoiwoD5yy9pE6kEb/CXvIhi0zw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..f9bbe2c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgB667xyPSl1+zAEQX +tdh+e9XPGLfOhf2jQfnFetOZ79qhRANCAATd1JvWvhUMWCdQ1sU/CYa8fUkQQiTP +9Ps0ddZ+JomtORy2w5EyA9Kwm4OOZHF4Nl0YCxGS+IKkMegIX4oz1BYH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk new file mode 100644 index 00000000..f9f8044b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg+NTgE/U6uQ0FjLO +bIbAVtwudJiyZ2b/0SjDXDhF1+ShRANCAATDYUicHa7jK+lGZSBq66KDMDgynuAL +zvEz6H4MWzPeMJL5UQuAw221MUgOoGH4PM1vxxPTV4bhygOestXtafRb +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..6bc7edcd --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIRAIBMNPpMs7nwScnRzsPIEu0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMNhSJwdruMr +6UZlIGrrooMwODKe4AvO8TPofgxbM94wkvlRC4DDbbUxSA6gYfg8zW/HE9NXhuHK +A56y1e1p9FujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0gAMEUCIQCO1d9DWHQziVxi0MDw8XBjR8KPAfcxtupiJKgZSEzuiAIgIKBO +JKeHTZq1BeY0CXQyichphK/mtDPLYQ0BgPIURQk= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..31391b9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANQWZco+vteAJbiiCQhXEkYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLUPejsEpYbmMB2Wdj0PjPrj6i18 +E9iS/Q2wyNIdXP3lBVHkaeKGAvgsUwgYh3VcTc4iE/DcZ0L/bBzcoqog3W6jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCICHbbc0B4jiXVZ2QHYWDVZ/UPlP5TsFD +T1uGe3SQpqL1AiACJwPFESbS5oQ4tIGq5xgaX7jGO8tUtxa9ZwdPzg9+zg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..2599f46b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbFm24U3lwsMeoIsv +/f1xZyEOhEBDx7ts/EB46rl8mhuhRANCAAS1D3o7BKWG5jAdlnY9D4z64+otfBPY +kv0NsMjSHVz95QVR5GnihgL4LFMIGId1XE3OIhPw3GdC/2wc3KKqIN1u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk new file mode 100644 index 00000000..5c7686f6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgAmLaRgf/Xu30U/8Z +2mFBgBEWNPZdxauvQMtJrr6y/qmhRANCAARwv90la+t9fdIBzUJErJPaC6kRjSdU +nUqSMqnb0J3QAvrIIid6+1RWvHQzdeeGx9bUXoTyCROCIjYhh0Qi1AFN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk new file mode 100644 index 00000000..994dea45 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglcdFwvvVibyvpf0r +xhsGqeryE4FUBbcSPWKRTppvkqKhRANCAAQVQ0Pu9k39+7UR1ikZd88E5ZfnirQG +McPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rThD3s6RQjNf7C +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..174683ec --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAPqtprB/A3ATzGlHfGEnB5wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQVQ0Pu9k39 ++7UR1ikZd88E5ZfnirQGMcPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rT +hD3s6RQjNf7Co00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNIADBFAiEAnbhJdCCRNvwBj9V3NV2QaSVINJih4TFNYZa/SwN0M/YCIAyU +A47JPbiKphK2XHyxbB3tZnYsvq5bPuPxrlfP/Yp2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt new file mode 100644 index 00000000..f88de09f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAJBSKB/l1MpjIwbI31xmzdgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHVmoqoD8/CcTY/bPz26IbcwKtLp +ZeH6rs/BKoNZK26KiknyrLHB5KxG5YZeXbGTlceTgSrRNxyaTlwCC+GfbLijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDmkGRdvaBA3/S7sTjJ7IVOYtySP65e +81JH0kDz1+z2mDAKBggqhkjOPQQDAgNHADBEAiBVJZqFkPw4blUc6m9XMY7V51sc +jPXZjnnk5Xu++XKKFgIgJvtzvtQJpjht3QROQZGtHcBinRMti4U0CRf1zG1WCS4= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key new file mode 100644 index 00000000..3382b281 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmeFTv2ciA/kYRnh+ +kVWvfb4ktVUDkumCCXbih8OA//ehRANCAAR1ZqKqA/PwnE2P2z89uiG3MCrS6WXh ++q7PwSqDWStuiopJ8qyxweSsRuWGXl2xk5XHk4Eq0Tccmk5cAgvhn2y4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk new file mode 100644 index 00000000..73c8ef41 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg6LGxc+PqT81bLQuB +hkGmJcKaFwjsfutfkZBzHJlBZ12hRANCAATJ2cdr1D+/h4bT23rejW2hu7wo6qal +qujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2uZbCm9B6BW1r +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..45ed7641 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQRydBj+PweWWoL77xQKSpdTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ2cdr1D+/ +h4bT23rejW2hu7wo6qalqujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2 +uZbCm9B6BW1ro00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNHADBEAiBOjzu6Hc/xkY4rc7TcKBiWqsroVRT4C5kFMRWW/uLZBAIgR0J3 +B/hNgIBR3LgsLVfHBjFs/RiHdkYj2Ch6Nddmneo= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..542fb541 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQVTvJ6670W07z+fGIyCZWvjAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEpq6FkIq1GRnFROyFIU4fV/oaPWfL +S5Rj1fvNCeRB7fNqShdWBrJgm0C/RIuj/qeIPr9Ux/TZGh6MmS2Kppu3F6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/rl7z +UkfSQPPX7PaYMAoGCCqGSM49BAMCA0gAMEUCIQDpTO2+Ybk6EAFB+GP+y/gkNydc +ervKvJkljwWxqCFgXAIgMweY+oC827oZ/VhnYx2RrNzzs3ET9fN4eSoM/0yFlts= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..2a50e1f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsfvE1XUsEOWmUoe9 +OY2XrcfD0p5DVdrGeBwBUuRNUK6hRANCAASmroWQirUZGcVE7IUhTh9X+ho9Z8tL +lGPV+80J5EHt82pKF1YGsmCbQL9Ei6P+p4g+v1TH9NkaHoyZLYqmm7cX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/docker-compose-1orgs-1peers-dev.yaml b/hyperledger_fabric/v1.4.3/docker-compose-1orgs-1peers-dev.yaml new file mode 100644 index 00000000..cb76dc7a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-1orgs-1peers-dev.yaml @@ -0,0 +1,92 @@ +# https://github.com/yeasy/files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 1 peer +# * cli for testing + +version: '2.0' + +services: + orderer.example.com: # There can be multiple orderers + extends: + file: base-dev.yaml + service: orderer.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-dev.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-dev.yaml + service: cli + depends_on: + - peer0.org1.example.com + - orderer.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..2ff7f0ad --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,76 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
    This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== 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 +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== 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 +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== 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 +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.3/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.3/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.3/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.3/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.3/kafka/README.md b/hyperledger_fabric/v1.4.3/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.3/kafka/configtx.yaml b/hyperledger_fabric/v1.4.3/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.3/kafka/logs/dev_all.log b/hyperledger_fabric/v1.4.3/kafka/logs/dev_all.log new file mode 100644 index 00000000..e5d3ec95 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/kafka/logs/dev_all.log @@ -0,0 +1,2307 @@ +Attaching to peer0.org1.example.com, peer1.org2.example.com, peer1.org1.example.com, peer0.org2.example.com, orderer1.example.com, orderer0.example.com, kafka2, kafka3, kafka1, kafka0, fabric-cli, zookeeper0, zookeeper1, zookeeper2 +peer1.org2.example.com | "2019-04-22 06:25:23.818 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 2.0.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.11.5 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-04-22 06:25:23.818 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.14:7051" +peer1.org2.example.com | "2019-04-22 06:25:23.819 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-04-22 06:25:23.857 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-04-22 06:25:23.858 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org2.example.com | "2019-04-22 06:25:24.172 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org2.example.com | "2019-04-22 06:25:24.262 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org2.example.com | "2019-04-22 06:25:24.264 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-04-22 06:25:24.368 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-04-22 06:25:24.382 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-04-22 06:25:24.382 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-04-22 06:25:24.413 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.415 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.419 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.420 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-04-22 06:25:24.456 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:24.500 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-04-22 06:25:24.501 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-04-22 06:25:24.510 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.513 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:25:24.515 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.520 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org2.example.com | "2019-04-22 06:25:24.522 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.528 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:25:24.528 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org2.example.com | "2019-04-22 06:25:24.529 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:24.532 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:25:58.338 UTC [endorser] callChaincode -> INFO 01e [][8c945825] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:25:58.351 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:25:58.357 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org2.example.com | "2019-04-22 06:25:58.394 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=2ms block_commit=9ms state_commit=7ms)" +peer1.org2.example.com | "2019-04-22 06:25:58.399 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:25:58.411 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:25:58.412 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:25:58.412 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:25:58.458 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-04-22 06:25:58.464 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.467 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:25:58.468 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.469 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org2.example.com | "2019-04-22 06:25:58.470 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.471 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:25:58.472 UTC [endorser] callChaincode -> INFO 02d [][8c945825] Exit chaincode: name:"cscc" (132ms)" +peer1.org2.example.com | "2019-04-22 06:25:58.473 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46914 grpc.code=OK grpc.call_duration=138.8265ms +peer1.org2.example.com | "2019-04-22 06:25:59.598 UTC [endorser] callChaincode -> INFO 02f [][6d743538] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:25:59.600 UTC [endorser] callChaincode -> INFO 030 [][6d743538] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:25:59.600 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46922 grpc.code=OK grpc.call_duration=3.2871ms +peer1.org2.example.com | "2019-04-22 06:26:00.746 UTC [endorser] callChaincode -> INFO 032 [][b8bc8f2d] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:26:00.751 UTC [endorser] callChaincode -> INFO 033 [][b8bc8f2d] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:26:00.752 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46930 grpc.code=OK grpc.call_duration=6.1367ms +peer1.org2.example.com | "2019-04-22 06:26:04.464 UTC [gossip.election] beLeader -> INFO 035 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Becoming a leader" +peer1.org2.example.com | "2019-04-22 06:26:04.464 UTC [gossip.service] func1 -> INFO 036 Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:26:04.492 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.520 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:26:04.570 UTC [committer.txvalidator] Validate -> INFO 03b [businesschannel] Validated block [1] in 78ms" +peer1.org2.example.com | "2019-04-22 06:26:04.595 UTC [kvledger] CommitWithPvtData -> INFO 03c [businesschannel] Committed block [1] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=16ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:26:04.596 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.611 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:26:04.633 UTC [gossip.comm] func1 -> WARN 041 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:26:04.633 UTC [gossip.discovery] expireDeadMembers -> WARN 042 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-04-22 06:26:04.634 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-04-22 06:26:04.634 UTC [gossip.discovery] expireDeadMembers -> WARN 044 Exiting" +peer1.org2.example.com | "2019-04-22 06:26:04.644 UTC [committer.txvalidator] Validate -> INFO 045 [businesschannel] Validated block [2] in 47ms" +peer1.org2.example.com | "2019-04-22 06:26:04.683 UTC [kvledger] CommitWithPvtData -> INFO 046 [businesschannel] Committed block [2] with 1 transaction(s) in 37ms (state_validation=4ms block_commit=14ms state_commit=14ms)" +peer1.org2.example.com | "2019-04-22 06:26:04.774 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.773Z grpc.peer_address=192.168.224.15:49714 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.4µs +peer1.org2.example.com | "2019-04-22 06:26:05.860 UTC [gossip.gossip] validateMsg -> WARN 048 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914357825409200 seq_num:1555914363930993100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-04-22 06:26:05.860 UTC [gossip.gossip] handleMessage -> WARN 049 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914357825409200 seq_num:1555914363930993100 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-04-22 06:26:08.412 UTC [gossip.channel] reportMembershipChanges -> INFO 04a Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:26:09.129 UTC [gossip.election] stopBeingLeader -> INFO 04b 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd Stopped being a leader" +peer1.org2.example.com | "2019-04-22 06:26:09.130 UTC [gossip.service] func1 -> INFO 04c Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-04-22 06:26:09.131 UTC [deliveryClient] try -> WARN 04d Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-04-22 06:26:09.131 UTC [blocksProvider] DeliverBlocks -> WARN 04e [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-04-22 06:26:11.216 UTC [endorser] callChaincode -> INFO 04f [][f7b7acc5] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-04-22 06:26:11.217 UTC [endorser] callChaincode -> INFO 050 [][f7b7acc5] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-04-22 06:26:11.218 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:46994 grpc.code=OK grpc.call_duration=2.8337ms +peer1.org2.example.com | "2019-04-22 06:26:14.238 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:14.246 UTC [committer.txvalidator] Validate -> INFO 053 [businesschannel] Validated block [3] in 6ms" +peer1.org2.example.com | "2019-04-22 06:26:14.248 UTC [confighistory] HandleStateUpdates -> ERRO 054 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003215860)}" +peer1.org2.example.com | "2019-04-22 06:26:14.289 UTC [kvledger] CommitWithPvtData -> INFO 055 [businesschannel] Committed block [3] with 1 transaction(s) in 41ms (state_validation=7ms block_commit=16ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:26:17.013 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:17.016 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [4] in 3ms" +peer1.org2.example.com | "2019-04-22 06:26:17.027 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (9ms)" +peer1.org2.example.com | "2019-04-22 06:26:17.028 UTC [confighistory] HandleStateUpdates -> ERRO 059 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002ed8ba0)}" +peer1.org2.example.com | "2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 05a [businesschannel] Committed block [4] with 1 transaction(s) in 25ms (state_validation=0ms block_commit=17ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:26:18.415 UTC [gossip.channel] reportMembershipChanges -> INFO 05b Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:26:20.881 UTC [gossip.privdata] StoreBlock -> INFO 05c [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-04-22 06:26:20.884 UTC [committer.txvalidator] Validate -> INFO 05d [businesschannel] Validated block [5] in 2ms" +peer1.org2.example.com | "2019-04-22 06:26:20.885 UTC [lifecycle] update -> INFO 05e Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [lifecycle] update -> INFO 05f Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [cceventmgmt] HandleStateUpdates -> INFO 060 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 061 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-04-22 06:26:20.886 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 062 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-04-22 06:26:20.916 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [5] with 1 transaction(s) in 31ms (state_validation=6ms block_commit=18ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:07.590 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:07.596 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [6] in 5ms" +peer1.org2.example.com | "2019-04-22 06:27:07.615 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [6] with 1 transaction(s) in 17ms (state_validation=1ms block_commit=11ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:27:13.025 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:13.029 UTC [committer.txvalidator] Validate -> INFO 068 [businesschannel] Validated block [7] in 2ms" +peer1.org2.example.com | "2019-04-22 06:27:13.059 UTC [kvledger] CommitWithPvtData -> INFO 069 [businesschannel] Committed block [7] with 1 transaction(s) in 29ms (state_validation=0ms block_commit=22ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:15.735 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:15.738 UTC [committer.txvalidator] Validate -> INFO 06b [businesschannel] Validated block [8] in 1ms" +peer1.org2.example.com | "2019-04-22 06:27:15.753 UTC [kvledger] CommitWithPvtData -> INFO 06c [businesschannel] Committed block [8] with 1 transaction(s) in 14ms (state_validation=0ms block_commit=8ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:27:37.555 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-04-22 06:27:37.558 UTC [cauthdsl] deduplicate -> WARN 06e De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:27:37.560 UTC [cauthdsl] deduplicate -> WARN 06f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:27:37.638 UTC [gossip.gossip] JoinChan -> INFO 070 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-04-22 06:27:37.640 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:27:37.642 UTC [gossip.gossip] learnAnchorPeers -> INFO 072 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:27:37.659 UTC [gossip.gossip] learnAnchorPeers -> INFO 073 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:27:37.663 UTC [gossip.service] updateEndpoints -> WARN 074 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:27:37.706 UTC [committer.txvalidator] Validate -> INFO 075 [businesschannel] Validated block [9] in 149ms" +peer1.org2.example.com | "2019-04-22 06:27:37.738 UTC [kvledger] CommitWithPvtData -> INFO 076 [businesschannel] Committed block [9] with 1 transaction(s) in 29ms (state_validation=1ms block_commit=20ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:27:37.760 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:49714 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.0776155s +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.comm] func1 -> WARN 078 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-04-22 06:27:37.769 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-04-22 06:27:37.770 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Exiting" +peer1.org2.example.com | "2019-04-22 06:27:37.802 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.801Z grpc.peer_address=192.168.224.15:49894 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.7µs +peer1.org2.example.com | "2019-04-22 06:27:37.857 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.856Z grpc.peer_address=192.168.224.12:47518 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=153.8µs +peer1.org2.example.com | "2019-04-22 06:27:38.329 UTC [gossip.channel] reportMembershipChanges -> INFO 07e Membership view has changed. peers went offline: [[peer0.org2.example.com:7051]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:27:43.317 UTC [gossip.channel] reportMembershipChanges -> INFO 07f Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer1.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:28:08.917 UTC [endorser] callChaincode -> INFO 080 [][279715fd] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:28:08.919 UTC [endorser] callChaincode -> INFO 081 [][279715fd] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:28:08.920 UTC [comm.grpc.server] 1 -> INFO 082 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:47210 grpc.code=OK grpc.call_duration=4.7664ms +peer1.org2.example.com | "2019-04-22 06:28:10.868 UTC [endorser] callChaincode -> INFO 083 [][ac6bf428] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:28:10.872 UTC [endorser] callChaincode -> INFO 084 [][ac6bf428] Exit chaincode: name:"qscc" (3ms)" +peer1.org2.example.com | "2019-04-22 06:28:10.878 UTC [comm.grpc.server] 1 -> INFO 085 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:47218 grpc.code=OK grpc.call_duration=12.062ms +peer1.org1.example.com | "2019-04-22 06:25:23.526 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.11.5 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-04-22 06:25:23.527 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.13:7051" +peer1.org1.example.com | "2019-04-22 06:25:23.527 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-04-22 06:25:23.574 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-04-22 06:25:23.574 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org1.example.com | "2019-04-22 06:25:23.743 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org1.example.com | "2019-04-22 06:25:23.870 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org1.example.com | "2019-04-22 06:25:23.875 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-04-22 06:25:23.937 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-04-22 06:25:23.970 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-04-22 06:25:23.971 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-04-22 06:25:23.999 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.022 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.025 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.026 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-04-22 06:25:24.066 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:24.109 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-04-22 06:25:24.127 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-04-22 06:25:24.145 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.155 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:25:24.161 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.166 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org1.example.com | "2019-04-22 06:25:24.166 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.174 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:25:24.174 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org1.example.com | "2019-04-22 06:25:24.181 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-04-22 06:25:24.181 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org1.example.com | "2019-04-22 06:25:24.183 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:24.183 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:25:57.764 UTC [endorser] callChaincode -> INFO 01e [][a976acfd] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:25:57.778 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:25:57.783 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org1.example.com | "2019-04-22 06:25:57.811 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_commit=8ms state_commit=2ms)" +peer1.org1.example.com | "2019-04-22 06:25:57.814 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:25:57.826 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:25:57.861 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-04-22 06:25:57.871 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.872 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:25:57.872 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.873 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:25:57.873 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.874 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:25:57.875 UTC [endorser] callChaincode -> INFO 02d [][a976acfd] Exit chaincode: name:"cscc" (109ms)" +peer1.org1.example.com | "2019-04-22 06:25:57.876 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42156 grpc.code=OK grpc.call_duration=118.018ms +peer1.org1.example.com | "2019-04-22 06:25:59.236 UTC [endorser] callChaincode -> INFO 02f [][b2e9a16b] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:25:59.237 UTC [endorser] callChaincode -> INFO 030 [][b2e9a16b] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:25:59.237 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42164 grpc.code=OK grpc.call_duration=2.6881ms +peer1.org1.example.com | "2019-04-22 06:26:00.302 UTC [endorser] callChaincode -> INFO 032 [][669863dc] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:26:00.307 UTC [endorser] callChaincode -> INFO 033 [][669863dc] Exit chaincode: name:"qscc" (6ms)" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org1.example.com | Version: 2.0.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.11.5 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.15:7051" +peer0.org1.example.com | "2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:25:24.158 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:25:24.158 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org1.example.com | "2019-04-22 06:25:24.417 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org1.example.com | "2019-04-22 06:25:24.511 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org1.example.com | "2019-04-22 06:25:24.512 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-04-22 06:25:24.531 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:25:24.543 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-04-22 06:25:24.544 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:25:24.561 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.576 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-04-22 06:25:24.597 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-04-22 06:25:24.602 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-04-22 06:25:24.603 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-04-22 06:25:24.604 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.612 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org1.example.com | "2019-04-22 06:25:24.613 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.615 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:25:24.615 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.617 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:25:24.617 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org1.example.com | "2019-04-22 06:25:24.628 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:25:24.629 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:25:25.153 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.153Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.3µs +peer0.org1.example.com | "2019-04-22 06:25:25.175 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:25:35.155Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9729ms +peer0.org1.example.com | "2019-04-22 06:25:25.195 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.194Z grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.7µs +peer0.org1.example.com | "2019-04-22 06:25:57.209 UTC [endorser] callChaincode -> INFO 021 [][24f3659e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:25:57.222 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:25:57.229 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:25:57.250 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=2ms block_commit=7ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:25:57.256 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:25:57.312 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-04-22 06:25:57.315 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.321 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org1.example.com | "2019-04-22 06:25:57.322 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.322 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org1.example.com | "2019-04-22 06:25:57.323 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:25:57.324 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:26:00.308 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42172 grpc.code=OK grpc.call_duration=6.7198ms +peer1.org1.example.com | "2019-04-22 06:26:02.826 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:26:03.326 UTC [gossip.election] leaderElection -> INFO 036 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:26:03.368 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:03.385 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:26:03.386 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.387 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:26:03.395 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:26:03.410 UTC [committer.txvalidator] Validate -> INFO 03c [businesschannel] Validated block [1] in 42ms" +peer1.org1.example.com | "2019-04-22 06:26:03.454 UTC [kvledger] CommitWithPvtData -> INFO 03d [businesschannel] Committed block [1] with 1 transaction(s) in 38ms (state_validation=5ms block_commit=24ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:03.812 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.812Z grpc.peer_address=192.168.224.15:36486 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.1µs +peer1.org1.example.com | "2019-04-22 06:26:03.841 UTC [gossip.privdata] StoreBlock -> INFO 03f [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:03.876 UTC [gossip.gossip] JoinChan -> INFO 040 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:26:03.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 041 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.878 UTC [gossip.gossip] learnAnchorPeers -> INFO 042 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:26:03.878 UTC [gossip.service] updateEndpoints -> WARN 043 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:26:03.909 UTC [committer.txvalidator] Validate -> INFO 044 [businesschannel] Validated block [2] in 66ms" +peer1.org1.example.com | "2019-04-22 06:26:03.930 UTC [kvledger] CommitWithPvtData -> INFO 045 [businesschannel] Committed block [2] with 1 transaction(s) in 19ms (state_validation=4ms block_commit=9ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:36486 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=170.1142ms +peer1.org1.example.com | "2019-04-22 06:26:04.083 UTC [comm.grpc.server] 1 -> INFO 047 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.083Z grpc.peer_address=192.168.224.15:36500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.2µs +peer1.org1.example.com | "2019-04-22 06:26:04.090 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:36500 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=5.5683ms +peer1.org1.example.com | "2019-04-22 06:26:07.827 UTC [gossip.channel] reportMembershipChanges -> INFO 049 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:26:09.426 UTC [endorser] callChaincode -> INFO 04a [][5166f39c] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-04-22 06:26:09.427 UTC [endorser] callChaincode -> INFO 04b [][5166f39c] Exit chaincode: name:"_lifecycle" (2ms)" +peer1.org1.example.com | "2019-04-22 06:26:09.429 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42232 grpc.code=OK grpc.call_duration=3.803ms +peer1.org1.example.com | "2019-04-22 06:26:14.105 UTC [comm.grpc.server] 1 -> INFO 04d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:16.104Z grpc.peer_address=192.168.224.14:37012 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=147.4µs +peer1.org1.example.com | "2019-04-22 06:26:14.302 UTC [gossip.privdata] StoreBlock -> INFO 04e [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:14.307 UTC [committer.txvalidator] Validate -> INFO 04f [businesschannel] Validated block [3] in 4ms" +peer1.org1.example.com | "2019-04-22 06:26:14.329 UTC [gossip.privdata] StoreBlock -> INFO 050 [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (19ms)" +peer1.org1.example.com | "2019-04-22 06:26:14.330 UTC [confighistory] HandleStateUpdates -> ERRO 051 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0037f55c0)}" +peer1.org1.example.com | "2019-04-22 06:26:14.347 UTC [kvledger] CommitWithPvtData -> INFO 052 [businesschannel] Committed block [3] with 1 transaction(s) in 18ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:26:17.015 UTC [gossip.privdata] StoreBlock -> INFO 053 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:17.022 UTC [committer.txvalidator] Validate -> INFO 054 [businesschannel] Validated block [4] in 6ms" +peer1.org1.example.com | "2019-04-22 06:26:17.026 UTC [confighistory] HandleStateUpdates -> ERRO 055 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039df940)}" +peer1.org1.example.com | "2019-04-22 06:26:17.054 UTC [kvledger] CommitWithPvtData -> INFO 056 [businesschannel] Committed block [4] with 1 transaction(s) in 30ms (state_validation=4ms block_commit=19ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:26:17.828 UTC [gossip.channel] reportMembershipChanges -> INFO 057 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:26:20.943 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-04-22 06:26:20.962 UTC [committer.txvalidator] Validate -> INFO 059 [businesschannel] Validated block [5] in 18ms" +peer1.org1.example.com | "2019-04-22 06:26:20.969 UTC [lifecycle] update -> INFO 05a Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:25:23.340 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.11.5 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-04-22 06:25:23.361 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.12:7051" +peer0.org2.example.com | "2019-04-22 06:25:23.378 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-04-22 06:25:23.388 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org1.example.com | "2019-04-22 06:26:20.970 UTC [lifecycle] update -> INFO 05b Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-04-22 06:26:20.970 UTC [cceventmgmt] HandleStateUpdates -> INFO 05c Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-04-22 06:26:20.971 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05d Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-04-22 06:26:20.971 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05e Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-04-22 06:26:21.002 UTC [kvledger] CommitWithPvtData -> INFO 05f [businesschannel] Committed block [5] with 1 transaction(s) in 37ms (state_validation=11ms block_commit=9ms state_commit=11ms)" +peer1.org1.example.com | "2019-04-22 06:27:07.543 UTC [gossip.privdata] StoreBlock -> INFO 060 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:07.547 UTC [committer.txvalidator] Validate -> INFO 061 [businesschannel] Validated block [6] in 3ms" +peer1.org1.example.com | "2019-04-22 06:27:07.576 UTC [kvledger] CommitWithPvtData -> INFO 062 [businesschannel] Committed block [6] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=20ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:27:13.056 UTC [gossip.privdata] StoreBlock -> INFO 063 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:13.071 UTC [committer.txvalidator] Validate -> INFO 064 [businesschannel] Validated block [7] in 11ms" +peer1.org1.example.com | "2019-04-22 06:27:13.088 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [7] with 1 transaction(s) in 15ms (state_validation=0ms block_commit=10ms state_commit=2ms)" +peer1.org1.example.com | "2019-04-22 06:27:15.705 UTC [gossip.privdata] StoreBlock -> INFO 066 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:15.708 UTC [committer.txvalidator] Validate -> INFO 067 [businesschannel] Validated block [8] in 1ms" +peer1.org1.example.com | "2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [8] with 1 transaction(s) in 16ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:27:37.514 UTC [gossip.privdata] StoreBlock -> INFO 069 [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-04-22 06:27:37.524 UTC [cauthdsl] deduplicate -> WARN 06a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:27:37.531 UTC [cauthdsl] deduplicate -> WARN 06b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] JoinChan -> INFO 06c Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:27:37.639 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:27:37.641 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:27:37.641 UTC [gossip.service] updateEndpoints -> WARN 070 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:27:37.674 UTC [committer.txvalidator] Validate -> INFO 071 [businesschannel] Validated block [9] in 159ms" +peer1.org1.example.com | "2019-04-22 06:27:37.705 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [9] with 1 transaction(s) in 30ms (state_validation=5ms block_commit=16ms state_commit=5ms)" +peer1.org1.example.com | "2019-04-22 06:27:37.733 UTC [gossip.comm] func1 -> WARN 073 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 074 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 075 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:27:37.734 UTC [gossip.discovery] expireDeadMembers -> WARN 076 Exiting" +peer1.org1.example.com | "2019-04-22 06:27:37.736 UTC [gossip.channel] reportMembershipChanges -> INFO 077 Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:27:37.763 UTC [gossip.comm] func1 -> WARN 078 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:27:37.766 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-04-22 06:27:37.767 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-04-22 06:27:37.767 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Exiting" +peer1.org1.example.com | "2019-04-22 06:27:37.840 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.84Z grpc.peer_address=192.168.224.15:36704 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.3µs +peer1.org1.example.com | "2019-04-22 06:27:37.846 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.845Z grpc.peer_address=192.168.224.12:47032 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146.2µs +peer1.org1.example.com | "2019-04-22 06:27:42.732 UTC [gossip.channel] reportMembershipChanges -> INFO 07e Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:28:08.217 UTC [endorser] callChaincode -> INFO 07f [][dd86293c] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:28:08.226 UTC [endorser] callChaincode -> INFO 080 [][dd86293c] Exit chaincode: name:"cscc" (9ms)" +peer1.org1.example.com | "2019-04-22 06:28:08.227 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42452 grpc.code=OK grpc.call_duration=10.5961ms +peer1.org1.example.com | "2019-04-22 06:28:10.223 UTC [endorser] callChaincode -> INFO 082 [][4747cedb] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:28:10.226 UTC [endorser] callChaincode -> INFO 083 [][4747cedb] Exit chaincode: name:"qscc" (3ms)" +peer1.org1.example.com | "2019-04-22 06:28:10.228 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:42460 grpc.code=OK grpc.call_duration=7.4968ms +peer0.org1.example.com | "2019-04-22 06:25:57.326 UTC [endorser] callChaincode -> INFO 030 [][24f3659e] Exit chaincode: name:"cscc" (116ms)" +peer0.org1.example.com | "2019-04-22 06:25:57.326 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45222 grpc.code=OK grpc.call_duration=125.6186ms +peer0.org1.example.com | "2019-04-22 06:25:59.068 UTC [endorser] callChaincode -> INFO 032 [][1237c501] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:25:59.071 UTC [endorser] callChaincode -> INFO 033 [][1237c501] Exit chaincode: name:"cscc" (3ms)" +peer0.org1.example.com | "2019-04-22 06:25:59.071 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45230 grpc.code=OK grpc.call_duration=4.0206ms +peer0.org1.example.com | "2019-04-22 06:26:00.131 UTC [endorser] callChaincode -> INFO 035 [][3a9cff56] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:26:00.133 UTC [endorser] callChaincode -> INFO 036 [][3a9cff56] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:26:00.134 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45238 grpc.code=OK grpc.call_duration=3.7135ms +peer0.org1.example.com | "2019-04-22 06:26:02.277 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:26:03.317 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:26:03.317 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:26:03.350 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:26:03.397 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" +peer0.org1.example.com | "2019-04-22 06:26:03.403 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.402Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=322.4µs +peer0.org1.example.com | "2019-04-22 06:26:03.426 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=38.2627128s +peer0.org1.example.com | "2019-04-22 06:26:03.427 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.405Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.3911ms +peer0.org1.example.com | "2019-04-22 06:26:03.465 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 65ms (state_validation=2ms block_commit=30ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:26:03.784 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:03.831 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 049 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:26:03.935 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 150ms" +peer0.org1.example.com | "2019-04-22 06:26:03.949 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.948Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.411ms +peer0.org1.example.com | "2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.96Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4653ms +peer0.org1.example.com | "2019-04-22 06:26:03.993 UTC [kvledger] CommitWithPvtData -> INFO 04d [businesschannel] Committed block [2] with 1 transaction(s) in 48ms (state_validation=13ms block_commit=28ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:26:04.087 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.085Z grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=332.5µs +peer0.org1.example.com | "2019-04-22 06:26:04.256 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.255Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.7µs +peer0.org1.example.com | "2019-04-22 06:26:04.270 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.26Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.8223ms +peer0.org1.example.com | "2019-04-22 06:26:04.346 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.345Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=171.6µs +peer0.org1.example.com | "2019-04-22 06:26:04.362 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.349Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0755ms +peer0.org2.example.com | "2019-04-22 06:25:23.421 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org2.example.com | "2019-04-22 06:25:23.724 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org2.example.com | "2019-04-22 06:25:23.804 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org2.example.com | "2019-04-22 06:25:23.805 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-04-22 06:25:23.865 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-04-22 06:25:23.887 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-04-22 06:25:23.888 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-04-22 06:25:23.923 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.923 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.924 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.924 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-04-22 06:25:23.957 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:24.000 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-04-22 06:25:24.013 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-04-22 06:25:24.022 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.032 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:25:24.042 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.044 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org2.example.com | "2019-04-22 06:25:24.045 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:24.047 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:26:04.368 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.367Z grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.8µs +peer0.org1.example.com | "2019-04-22 06:26:04.533 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.532Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.1µs +peer0.org1.example.com | "2019-04-22 06:26:04.548 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.537Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2102ms +peer0.org1.example.com | "2019-04-22 06:26:04.580 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.579Z grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301µs +peer0.org1.example.com | "2019-04-22 06:26:04.625 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.622Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.2801ms +peer0.org1.example.com | "2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=48.3559ms +peer0.org1.example.com | "2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 059 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.628Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0459ms +peer0.org1.example.com | "2019-04-22 06:26:07.280 UTC [gossip.channel] reportMembershipChanges -> INFO 05a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-04-22 06:26:08.476 UTC [endorser] callChaincode -> INFO 05b [][63dcaca1] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:08.494 UTC [endorser] callChaincode -> INFO 05c [][63dcaca1] Exit chaincode: name:"_lifecycle" (17ms)" +peer0.org1.example.com | "2019-04-22 06:26:08.494 UTC [comm.grpc.server] 1 -> INFO 05d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45296 grpc.code=OK grpc.call_duration=18.9812ms +peer0.org1.example.com | "2019-04-22 06:26:11.772 UTC [endorser] callChaincode -> INFO 05e [][81961895] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:11.773 UTC [endorser] callChaincode -> INFO 05f [][81961895] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:26:11.774 UTC [comm.grpc.server] 1 -> INFO 060 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45312 grpc.code=OK grpc.call_duration=2.3561ms +peer0.org1.example.com | "2019-04-22 06:26:12.084 UTC [endorser] callChaincode -> INFO 061 [][56bfd17c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:26:12.086 UTC [endorser] callChaincode -> INFO 062 [][56bfd17c] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:26:12.086 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=3.3137ms +peer0.org1.example.com | "2019-04-22 06:26:12.139 UTC [endorser] callChaincode -> INFO 064 [businesschannel][b65b3fc8] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:12.150 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 065 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:12.151 UTC [endorser] callChaincode -> INFO 066 [businesschannel][b65b3fc8] Exit chaincode: name:"_lifecycle" (12ms)" +peer0.org1.example.com | "2019-04-22 06:26:12.158 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=20.4184ms +peer0.org1.example.com | "2019-04-22 06:26:14.289 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:14.296 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [3] in 6ms" +peer0.org1.example.com | "2019-04-22 06:26:14.299 UTC [confighistory] HandleStateUpdates -> ERRO 06a Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0031ecf80)}" +peer0.org1.example.com | "2019-04-22 06:26:14.318 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [3] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=12ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:26:14.327 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:42.164Z grpc.peer_address=192.168.224.5:45318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1567108s +peer0.org1.example.com | "2019-04-22 06:26:17.004 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:17.008 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [4] in 3ms" +peer0.org1.example.com | "2019-04-22 06:26:17.010 UTC [confighistory] HandleStateUpdates -> ERRO 06f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033a3680)}" +peer0.org1.example.com | "2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=1ms block_commit=35ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:26:17.662 UTC [endorser] callChaincode -> INFO 071 [businesschannel][595fbc5e] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:17.669 UTC [lifecycle] QueryApprovalStatus -> INFO 072 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:17.670 UTC [endorser] callChaincode -> INFO 073 [businesschannel][595fbc5e] Exit chaincode: name:"_lifecycle" (8ms)" +peer0.org1.example.com | "2019-04-22 06:26:17.671 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45334 grpc.code=OK grpc.call_duration=10.1874ms +peer0.org1.example.com | "2019-04-22 06:26:18.472 UTC [endorser] callChaincode -> INFO 075 [][e312980e] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:25:24.047 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org2.example.com | "2019-04-22 06:25:24.055 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-04-22 06:25:24.056 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org2.example.com | "2019-04-22 06:25:24.056 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:24.078 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:25:58.029 UTC [endorser] callChaincode -> INFO 01e [][29fe0e94] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:25:58.039 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:25:58.042 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer0.org2.example.com | "2019-04-22 06:25:58.067 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 20ms (state_validation=5ms block_commit=8ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:25:58.070 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:25:58.080 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:25:58.114 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-04-22 06:25:58.116 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.117 UTC [cscc] Init -> INFO 028 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:25:58.118 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.119 UTC [qscc] Init -> INFO 02a Init QSCC" +orderer1.example.com | 2019-04-22 06:25:20.152 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-04-22 06:25:20.396 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 1s +orderer1.example.com | Kafka.Retry.ShortTotal = 30s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = true +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +peer0.org1.example.com | "2019-04-22 06:26:18.473 UTC [endorser] callChaincode -> INFO 076 [][e312980e] Exit chaincode: name:"_lifecycle" (0ms)" +peer0.org1.example.com | "2019-04-22 06:26:18.473 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45342 grpc.code=OK grpc.call_duration=1.4673ms +peer0.org1.example.com | "2019-04-22 06:26:18.780 UTC [endorser] callChaincode -> INFO 078 [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:18.785 UTC [lifecycle] QueryApprovalStatus -> INFO 079 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:18.787 UTC [lifecycle] CommitChaincodeDefinition -> INFO 07a successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:18.787 UTC [endorser] callChaincode -> INFO 07b [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (7ms)" +peer0.org1.example.com | "2019-04-22 06:26:18.789 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45346 grpc.code=OK grpc.call_duration=9.7835ms +peer0.org1.example.com | "2019-04-22 06:26:20.935 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-04-22 06:26:20.938 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-04-22 06:26:20.940 UTC [lifecycle] update -> INFO 07f Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:26:20.946 UTC [lifecycle] update -> INFO 080 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleStateUpdates -> INFO 081 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 082 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 083 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-04-22 06:26:20.987 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [5] with 1 transaction(s) in 47ms (state_validation=14ms block_commit=27ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:26:21.016 UTC [comm.grpc.server] 1 -> INFO 085 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.805Z grpc.peer_address=192.168.224.5:45348 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.2097239s +peer0.org1.example.com | "2019-04-22 06:26:21.521 UTC [endorser] callChaincode -> INFO 086 [businesschannel][07ad19bd] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:26:21.526 UTC [lifecycle] QueryChaincodeDefinition -> INFO 087 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-04-22 06:26:21.526 UTC [endorser] callChaincode -> INFO 088 [businesschannel][07ad19bd] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org1.example.com | "2019-04-22 06:26:21.528 UTC [comm.grpc.server] 1 -> INFO 089 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45356 grpc.code=OK grpc.call_duration=7.688ms +peer0.org1.example.com | "2019-04-22 06:26:22.382 UTC [endorser] callChaincode -> INFO 08a [businesschannel][d9f76fa2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:26:22.419 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 08b building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-04-22 06:27:05.360 UTC [endorser] callChaincode -> INFO 08c [businesschannel][d9f76fa2] Exit chaincode: name:"exp02" (43046ms)" +peer0.org1.example.com | "2019-04-22 06:27:05.361 UTC [comm.grpc.server] 1 -> INFO 08d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45364 grpc.code=OK grpc.call_duration=43.0490753s +peer0.org1.example.com | "2019-04-22 06:27:07.533 UTC [gossip.privdata] StoreBlock -> INFO 08e [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:07.537 UTC [committer.txvalidator] Validate -> INFO 08f [businesschannel] Validated block [6] in 2ms" +peer0.org1.example.com | "2019-04-22 06:27:07.564 UTC [kvledger] CommitWithPvtData -> INFO 090 [businesschannel] Committed block [6] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=20ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.719 UTC [endorser] callChaincode -> INFO 091 [businesschannel][a260bae9] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:10.721 UTC [endorser] callChaincode -> INFO 092 [businesschannel][a260bae9] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.722 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45372 grpc.code=OK grpc.call_duration=4.8236ms +peer0.org1.example.com | "2019-04-22 06:27:10.957 UTC [endorser] callChaincode -> INFO 094 [businesschannel][afb6f91a] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:10.962 UTC [endorser] callChaincode -> INFO 095 [businesschannel][afb6f91a] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:27:10.963 UTC [comm.grpc.server] 1 -> INFO 096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45376 grpc.code=OK grpc.call_duration=8.1959ms +peer0.org1.example.com | "2019-04-22 06:27:11.170 UTC [endorser] callChaincode -> INFO 097 [businesschannel][9da077e1] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:11.175 UTC [endorser] callChaincode -> INFO 098 [businesschannel][9da077e1] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:27:11.176 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45382 grpc.code=OK grpc.call_duration=8.7397ms +peer0.org1.example.com | "2019-04-22 06:27:13.047 UTC [gossip.privdata] StoreBlock -> INFO 09a [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:13.053 UTC [committer.txvalidator] Validate -> INFO 09b [businesschannel] Validated block [7] in 4ms" +peer0.org1.example.com | "2019-04-22 06:27:13.078 UTC [kvledger] CommitWithPvtData -> INFO 09c [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=3ms block_commit=11ms state_commit=2ms)" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-04-22 06:25:20.817 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer1.example.com | "2019-04-22 06:25:20.835 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:25:20.931 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer1.example.com | "2019-04-22 06:25:20.981 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.common.server] Start -> INFO 007 Starting orderer: +orderer1.example.com | Version: 2.0.0 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.11.5 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.common.server] Start -> INFO 008 Beginning to serve requests" +orderer1.example.com | "2019-04-22 06:25:20.982 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 009 [channel: testchainid] Setting up the topic for this channel..." +orderer1.example.com | "2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +orderer1.example.com | "2019-04-22 06:25:50.402 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +orderer1.example.com | "2019-04-22 06:25:50.402 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +orderer1.example.com | "2019-04-22 06:25:52.934 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +orderer1.example.com | "2019-04-22 06:25:52.935 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +orderer1.example.com | "2019-04-22 06:25:53.079 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:53.079 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +orderer1.example.com | "2019-04-22 06:25:53.123 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:53.162 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +orderer1.example.com | "2019-04-22 06:25:55.142 UTC [fsblkstorage] newBlockfileMgr -> INFO 013 Getting block information from block storage" +orderer1.example.com | "2019-04-22 06:25:55.165 UTC [orderer.consensus.kafka] newChain -> INFO 014 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer1.example.com | "2019-04-22 06:25:55.165 UTC [orderer.commmon.multichannel] newChain -> INFO 015 Created and starting new chain businesschannel" +orderer1.example.com | "2019-04-22 06:25:55.177 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 016 [channel: businesschannel] Setting up the topic for this channel..." +orderer1.example.com | "2019-04-22 06:25:55.317 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 017 [channel: businesschannel] Setting up the producer for this channel..." +orderer1.example.com | "2019-04-22 06:25:55.326 UTC [orderer.consensus.kafka] startThread -> INFO 018 [channel: businesschannel] Producer set up successfully" +orderer1.example.com | "2019-04-22 06:25:55.326 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 019 [channel: businesschannel] About to post the CONNECT message..." +orderer1.example.com | "2019-04-22 06:25:56.059 UTC [orderer.consensus.kafka] startThread -> INFO 01a [channel: businesschannel] CONNECT message posted successfully" +orderer1.example.com | "2019-04-22 06:25:56.059 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 01b [channel: businesschannel] Setting up the parent consumer for this channel..." +orderer1.example.com | "2019-04-22 06:25:56.073 UTC [orderer.consensus.kafka] startThread -> INFO 01c [channel: businesschannel] Parent consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:56.073 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 01d [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +orderer1.example.com | "2019-04-22 06:25:56.101 UTC [orderer.consensus.kafka] startThread -> INFO 01e [channel: businesschannel] Channel consumer set up successfully" +orderer1.example.com | "2019-04-22 06:25:56.119 UTC [orderer.consensus.kafka] startThread -> INFO 01f [channel: businesschannel] Start phase completed successfully" +orderer1.example.com | "2019-04-22 06:26:09.145 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.14:43684 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.6718364s +orderer1.example.com | "2019-04-22 06:27:37.435 UTC [cauthdsl] deduplicate -> WARN 021 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer1.example.com | "2019-04-22 06:27:37.438 UTC [cauthdsl] deduplicate -> WARN 022 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:13.407 UTC [endorser] callChaincode -> INFO 09d [businesschannel][b83d2cc6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.410 UTC [endorser] callChaincode -> INFO 09e [businesschannel][b83d2cc6] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.411 UTC [comm.grpc.server] 1 -> INFO 09f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45386 grpc.code=OK grpc.call_duration=6.1882ms +peer0.org1.example.com | "2019-04-22 06:27:13.630 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][6929c7e0] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.638 UTC [endorser] callChaincode -> INFO 0a1 [businesschannel][6929c7e0] Exit chaincode: name:"exp02" (8ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.639 UTC [comm.grpc.server] 1 -> INFO 0a2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45390 grpc.code=OK grpc.call_duration=10.2984ms +peer0.org1.example.com | "2019-04-22 06:27:13.897 UTC [endorser] callChaincode -> INFO 0a3 [businesschannel][2f5fecb5] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:13.901 UTC [endorser] callChaincode -> INFO 0a4 [businesschannel][2f5fecb5] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-04-22 06:27:13.902 UTC [comm.grpc.server] 1 -> INFO 0a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45396 grpc.code=OK grpc.call_duration=6.7979ms +peer0.org1.example.com | "2019-04-22 06:27:15.699 UTC [gossip.privdata] StoreBlock -> INFO 0a6 [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:15.702 UTC [committer.txvalidator] Validate -> INFO 0a7 [businesschannel] Validated block [8] in 2ms" +peer0.org1.example.com | "2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 0a8 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=16ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.087 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][b014ef00] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:27:16.092 UTC [endorser] callChaincode -> INFO 0aa [businesschannel][b014ef00] Exit chaincode: name:"exp02" (5ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.093 UTC [comm.grpc.server] 1 -> INFO 0ab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45400 grpc.code=OK grpc.call_duration=10.5268ms +peer0.org1.example.com | "2019-04-22 06:27:16.696 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][6fc4f9e4] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:27:16.703 UTC [endorser] callChaincode -> INFO 0ad [businesschannel][6fc4f9e4] Exit chaincode: name:"qscc" (7ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.708 UTC [comm.grpc.server] 1 -> INFO 0ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45404 grpc.code=OK grpc.call_duration=12.6755ms +peer0.org1.example.com | "2019-04-22 06:27:16.926 UTC [endorser] callChaincode -> INFO 0af [businesschannel][35a24a5f] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:27:16.929 UTC [endorser] callChaincode -> INFO 0b0 [businesschannel][35a24a5f] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:16.930 UTC [comm.grpc.server] 1 -> INFO 0b1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45408 grpc.code=OK grpc.call_duration=4.6791ms +peer0.org1.example.com | "2019-04-22 06:27:17.500 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][3bc38859] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.502 UTC [endorser] callChaincode -> INFO 0b3 [businesschannel][3bc38859] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.504 UTC [comm.grpc.server] 1 -> INFO 0b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45412 grpc.code=OK grpc.call_duration=4.6602ms +peer0.org1.example.com | "2019-04-22 06:27:17.700 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][5f602553] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.705 UTC [endorser] callChaincode -> INFO 0b6 [businesschannel][5f602553] Exit chaincode: name:"cscc" (4ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.706 UTC [comm.grpc.server] 1 -> INFO 0b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45416 grpc.code=OK grpc.call_duration=6.5725ms +peer0.org1.example.com | "2019-04-22 06:27:17.974 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][a8300ed2] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:27:17.977 UTC [endorser] callChaincode -> INFO 0b9 [businesschannel][a8300ed2] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:27:17.978 UTC [comm.grpc.server] 1 -> INFO 0ba unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45420 grpc.code=OK grpc.call_duration=3.8956ms +peer0.org1.example.com | "2019-04-22 06:27:37.502 UTC [gossip.privdata] StoreBlock -> INFO 0bb [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-04-22 06:27:37.505 UTC [cauthdsl] deduplicate -> WARN 0bc De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:37.506 UTC [cauthdsl] deduplicate -> WARN 0bd De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:27:37.578 UTC [gossip.gossip] JoinChan -> INFO 0be Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-04-22 06:27:37.580 UTC [gossip.gossip] learnAnchorPeers -> INFO 0bf Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:27:37.605 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c0 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c1 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c2 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:27:37.623 UTC [committer.txvalidator] Validate -> INFO 0c3 [businesschannel] Validated block [9] in 120ms" +peer0.org1.example.com | "2019-04-22 06:27:37.632 UTC [comm.grpc.server] 1 -> INFO 0c4 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.63Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=296.4µs +peer0.org1.example.com | "2019-04-22 06:27:37.646 UTC [comm.grpc.server] 1 -> INFO 0c5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.3708033s +peer0.org1.example.com | "2019-04-22 06:27:37.703 UTC [kvledger] CommitWithPvtData -> INFO 0c6 [businesschannel] Committed block [9] with 1 transaction(s) in 79ms (state_validation=1ms block_commit=51ms state_commit=15ms)" +peer0.org1.example.com | "2019-04-22 06:27:37.707 UTC [comm.grpc.server] 1 -> INFO 0c7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.705Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +peer0.org2.example.com | "2019-04-22 06:25:58.120 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:27:37.708 UTC [comm.grpc.server] 1 -> INFO 0c8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.704Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.9µs +peer0.org1.example.com | "2019-04-22 06:27:37.720 UTC [comm.grpc.server] 1 -> INFO 0c9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.7270124s +peer0.org1.example.com | "2019-04-22 06:27:37.724 UTC [comm.grpc.server] 1 -> INFO 0ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.711Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2621ms +peer0.org1.example.com | "2019-04-22 06:27:37.729 UTC [comm.grpc.server] 1 -> INFO 0cb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.661Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=67.2458ms +peer0.org1.example.com | "2019-04-22 06:27:37.759 UTC [comm.grpc.server] 1 -> INFO 0cc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.72Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7322ms +peer0.org1.example.com | "2019-04-22 06:27:37.774 UTC [comm.grpc.server] 1 -> INFO 0cd unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.774Z grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.2µs +peer0.org1.example.com | "2019-04-22 06:27:37.806 UTC [comm.grpc.server] 1 -> INFO 0ce streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=22.1067ms +peer0.org1.example.com | "2019-04-22 06:28:07.906 UTC [endorser] callChaincode -> INFO 0cf [][93c2e1e6] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:28:07.907 UTC [endorser] callChaincode -> INFO 0d0 [][93c2e1e6] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:28:07.908 UTC [comm.grpc.server] 1 -> INFO 0d1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45518 grpc.code=OK grpc.call_duration=2.1597ms +peer0.org1.example.com | "2019-04-22 06:28:09.826 UTC [endorser] callChaincode -> INFO 0d2 [][97392766] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:28:09.832 UTC [endorser] callChaincode -> INFO 0d3 [][97392766] Exit chaincode: name:"qscc" (6ms)" +peer0.org1.example.com | "2019-04-22 06:28:09.834 UTC [comm.grpc.server] 1 -> INFO 0d4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45526 grpc.code=OK grpc.call_duration=9.3072ms +peer0.org2.example.com | "2019-04-22 06:25:58.121 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:25:58.122 UTC [endorser] callChaincode -> INFO 02d [][29fe0e94] Exit chaincode: name:"cscc" (92ms)" +peer0.org2.example.com | "2019-04-22 06:25:58.122 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52594 grpc.code=OK grpc.call_duration=95.3209ms +peer0.org2.example.com | "2019-04-22 06:25:59.420 UTC [endorser] callChaincode -> INFO 02f [][f9a8eaac] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:25:59.423 UTC [endorser] callChaincode -> INFO 030 [][f9a8eaac] Exit chaincode: name:"cscc" (3ms)" +peer0.org2.example.com | "2019-04-22 06:25:59.424 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52602 grpc.code=OK grpc.call_duration=4.0936ms +peer0.org2.example.com | "2019-04-22 06:26:00.503 UTC [endorser] callChaincode -> INFO 032 [][4d43b46a] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:26:00.506 UTC [endorser] callChaincode -> INFO 033 [][4d43b46a] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:26:00.506 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52610 grpc.code=OK grpc.call_duration=3.4932ms +peer0.org2.example.com | "2019-04-22 06:26:03.879 UTC [comm.grpc.server] 1 -> INFO 035 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.877Z grpc.peer_address=192.168.224.15:49362 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.338ms +peer0.org2.example.com | "2019-04-22 06:26:03.903 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.903Z grpc.peer_address=192.168.224.13:43628 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=172.2µs +peer0.org2.example.com | "2019-04-22 06:26:03.932 UTC [comm.grpc.server] 1 -> INFO 037 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.906Z grpc.peer_address=192.168.224.13:43628 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8826ms +peer0.org2.example.com | "2019-04-22 06:26:03.933 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.904Z grpc.peer_address=192.168.224.15:49362 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.7822ms +peer0.org2.example.com | "2019-04-22 06:26:03.935 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.934Z grpc.peer_address=192.168.224.15:49368 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=291.2µs +peer0.org2.example.com | "2019-04-22 06:26:03.970 UTC [comm.grpc.server] 1 -> INFO 03a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.97Z grpc.peer_address=192.168.224.13:43634 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=160.4µs +peer0.org2.example.com | "2019-04-22 06:26:04.120 UTC [gossip.election] beLeader -> INFO 03b 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-04-22 06:26:04.120 UTC [gossip.service] func1 -> INFO 03c Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-04-22 06:26:04.165 UTC [gossip.privdata] StoreBlock -> INFO 03d [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:04.196 UTC [gossip.gossip] JoinChan -> INFO 03e Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:26:04.196 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.197 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:26:04.266 UTC [gossip.comm] func1 -> WARN 041 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: rpc error: code = Unavailable desc = transport is closing" +peer0.org2.example.com | "2019-04-22 06:26:04.268 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.15:49368 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=331.0498ms +peer0.org2.example.com | "2019-04-22 06:26:04.269 UTC [gossip.discovery] expireDeadMembers -> WARN 043 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer0.org2.example.com | "2019-04-22 06:26:04.270 UTC [gossip.discovery] expireDeadMembers -> WARN 044 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org2.example.com | "2019-04-22 06:26:04.270 UTC [gossip.discovery] expireDeadMembers -> WARN 045 Exiting" +orderer0.example.com | 2019-04-22 06:25:19.571 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-04-22 06:25:19.950 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +peer0.org2.example.com | "2019-04-22 06:26:04.289 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [1] in 123ms" +peer0.org2.example.com | "2019-04-22 06:26:04.308 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [1] with 1 transaction(s) in 18ms (state_validation=1ms block_commit=11ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:26:04.309 UTC [gossip.privdata] StoreBlock -> INFO 048 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] JoinChan -> INFO 049 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04b Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:26:04.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 04c Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:26:04.344 UTC [committer.txvalidator] Validate -> INFO 04d [businesschannel] Validated block [2] in 35ms" +peer0.org2.example.com | "2019-04-22 06:26:04.361 UTC [kvledger] CommitWithPvtData -> INFO 04e [businesschannel] Committed block [2] with 1 transaction(s) in 15ms (state_validation=1ms block_commit=8ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:26:04.663 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.662Z grpc.peer_address=192.168.224.14:37322 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=255.6µs +peer0.org2.example.com | "2019-04-22 06:26:04.679 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.665Z grpc.peer_address=192.168.224.14:37322 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.0623ms +peer0.org2.example.com | "2019-04-22 06:26:04.706 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.706Z grpc.peer_address=192.168.224.14:37324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.6µs +peer0.org2.example.com | "2019-04-22 06:26:08.080 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:26:10.308 UTC [endorser] callChaincode -> INFO 053 [][d01a0500] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:10.310 UTC [endorser] callChaincode -> INFO 054 [][d01a0500] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:26:10.310 UTC [comm.grpc.server] 1 -> INFO 055 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52672 grpc.code=OK grpc.call_duration=3.0795ms +peer0.org2.example.com | "2019-04-22 06:26:14.222 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:14.231 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [3] in 8ms" +peer0.org2.example.com | "2019-04-22 06:26:14.249 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003203200)}" +peer0.org2.example.com | "2019-04-22 06:26:14.270 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [3] with 1 transaction(s) in 36ms (state_validation=17ms block_commit=10ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.598 UTC [endorser] callChaincode -> INFO 05a [][443c8bd0] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:14.600 UTC [endorser] callChaincode -> INFO 05b [][443c8bd0] Exit chaincode: name:"_lifecycle" (2ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.601 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52692 grpc.code=OK grpc.call_duration=4.1649ms +peer0.org2.example.com | "2019-04-22 06:26:14.846 UTC [endorser] callChaincode -> INFO 05d [][5dbb3781] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:26:14.849 UTC [endorser] callChaincode -> INFO 05e [][5dbb3781] Exit chaincode: name:"cscc" (3ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.850 UTC [comm.grpc.server] 1 -> INFO 05f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52696 grpc.code=OK grpc.call_duration=4.7196ms +peer0.org2.example.com | "2019-04-22 06:26:14.876 UTC [endorser] callChaincode -> INFO 060 [businesschannel][3a86efca] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:14.879 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 061 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:14.880 UTC [endorser] callChaincode -> INFO 062 [businesschannel][3a86efca] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:26:14.899 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52696 grpc.code=OK grpc.call_duration=24.7311ms +peer0.org2.example.com | "2019-04-22 06:26:17.005 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:17.012 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [4] in 7ms" +peer0.org2.example.com | "2019-04-22 06:26:17.032 UTC [confighistory] HandleStateUpdates -> ERRO 066 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003650520)}" +peer0.org2.example.com | "2019-04-22 06:26:17.066 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [4] with 1 transaction(s) in 37ms (state_validation=3ms block_commit=28ms state_commit=2ms)" +orderer0.example.com | Kafka.Retry.ShortInterval = 1s +orderer0.example.com | Kafka.Retry.ShortTotal = 30s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = true +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +peer0.org2.example.com | "2019-04-22 06:26:17.079 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:44.919Z grpc.peer_address=192.168.224.5:52698 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1601372s +peer0.org2.example.com | "2019-04-22 06:26:17.914 UTC [endorser] callChaincode -> INFO 069 [businesschannel][083ad894] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:17.919 UTC [lifecycle] QueryApprovalStatus -> INFO 06a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-04-22 06:25:20.432 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer0.example.com | "2019-04-22 06:25:20.438 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:25:20.706 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer0.example.com | "2019-04-22 06:25:20.750 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +orderer0.example.com | "2019-04-22 06:25:20.757 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 007 [channel: testchainid] Setting up the topic for this channel..." +orderer0.example.com | "2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 008 Starting orderer: +orderer0.example.com | Version: 2.0.0 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.11.5 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 009 Beginning to serve requests" +orderer0.example.com | "2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +orderer0.example.com | "2019-04-22 06:25:50.547 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +orderer0.example.com | "2019-04-22 06:25:50.548 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +orderer0.example.com | "2019-04-22 06:25:52.951 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +orderer0.example.com | "2019-04-22 06:25:52.952 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +orderer0.example.com | "2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +orderer0.example.com | "2019-04-22 06:25:53.072 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:53.175 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +orderer0.example.com | "2019-04-22 06:25:55.129 UTC [comm.grpc.server] 1 -> INFO 013 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55752 grpc.code=OK grpc.call_duration=131.3442ms +orderer0.example.com | "2019-04-22 06:25:55.143 UTC [fsblkstorage] newBlockfileMgr -> INFO 014 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] newChain -> INFO 015 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.commmon.multichannel] newChain -> INFO 016 Created and starting new chain businesschannel" +orderer0.example.com | "2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 017 [channel: businesschannel] Setting up the topic for this channel..." +orderer0.example.com | "2019-04-22 06:25:55.172 UTC [common.deliver] deliverBlocks -> WARN 018 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55750 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.174 UTC [comm.grpc.server] 1 -> INFO 019 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55750 grpc.code=OK grpc.call_duration=193.4332ms +orderer0.example.com | "2019-04-22 06:25:55.319 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 01a [channel: businesschannel] Setting up the producer for this channel..." +orderer0.example.com | "2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] startThread -> INFO 01b [channel: businesschannel] Producer set up successfully" +orderer0.example.com | "2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 01c [channel: businesschannel] About to post the CONNECT message..." +orderer0.example.com | "2019-04-22 06:25:55.400 UTC [common.deliver] deliverBlocks -> WARN 01d [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55758 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.403 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55758 grpc.code=OK grpc.call_duration=203.4762ms +orderer0.example.com | "2019-04-22 06:25:55.628 UTC [common.deliver] deliverBlocks -> WARN 01f [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55764 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.628 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55764 grpc.code=OK grpc.call_duration=202.677ms +orderer0.example.com | "2019-04-22 06:25:55.853 UTC [common.deliver] deliverBlocks -> WARN 021 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55766 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:55.853 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55766 grpc.code=OK grpc.call_duration=201.2625ms +orderer0.example.com | "2019-04-22 06:25:56.080 UTC [common.deliver] deliverBlocks -> WARN 023 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55770 because of consenter error" +orderer0.example.com | "2019-04-22 06:25:56.080 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55770 grpc.code=OK grpc.call_duration=200.733ms +orderer0.example.com | "2019-04-22 06:25:56.130 UTC [orderer.consensus.kafka] startThread -> INFO 025 [channel: businesschannel] CONNECT message posted successfully" +orderer0.example.com | "2019-04-22 06:25:56.131 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 026 [channel: businesschannel] Setting up the parent consumer for this channel..." +orderer0.example.com | "2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] startThread -> INFO 027 [channel: businesschannel] Parent consumer set up successfully" +orderer0.example.com | "2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 028 [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +orderer0.example.com | "2019-04-22 06:25:56.152 UTC [orderer.consensus.kafka] startThread -> INFO 029 [channel: businesschannel] Channel consumer set up successfully" +peer0.org2.example.com | "2019-04-22 06:26:17.919 UTC [endorser] callChaincode -> INFO 06b [businesschannel][083ad894] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org2.example.com | "2019-04-22 06:26:17.920 UTC [comm.grpc.server] 1 -> INFO 06c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52706 grpc.code=OK grpc.call_duration=7.2022ms +peer0.org2.example.com | "2019-04-22 06:26:18.795 UTC [endorser] callChaincode -> INFO 06d [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:18.799 UTC [lifecycle] QueryApprovalStatus -> INFO 06e successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:18.800 UTC [lifecycle] CommitChaincodeDefinition -> INFO 06f successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:18.801 UTC [endorser] callChaincode -> INFO 070 [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (6ms)" +peer0.org2.example.com | "2019-04-22 06:26:18.802 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52718 grpc.code=OK grpc.call_duration=8.6225ms +peer0.org2.example.com | "2019-04-22 06:26:20.873 UTC [gossip.privdata] StoreBlock -> INFO 072 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-04-22 06:26:20.876 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-04-22 06:26:20.878 UTC [lifecycle] update -> INFO 074 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:26:20.894 UTC [lifecycle] update -> INFO 075 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org2.example.com | "2019-04-22 06:26:20.895 UTC [cceventmgmt] HandleStateUpdates -> INFO 076 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-04-22 06:26:20.896 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 077 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org2.example.com | "2019-04-22 06:26:20.896 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 078 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org2.example.com | "2019-04-22 06:26:20.921 UTC [kvledger] CommitWithPvtData -> INFO 079 [businesschannel] Committed block [5] with 1 transaction(s) in 43ms (state_validation=24ms block_commit=14ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:26:20.998 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.806Z grpc.peer_address=192.168.224.5:52720 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1921533s +peer0.org2.example.com | "2019-04-22 06:26:21.781 UTC [endorser] callChaincode -> INFO 07b [businesschannel][812af1bf] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:26:21.785 UTC [lifecycle] QueryChaincodeDefinition -> INFO 07c successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-04-22 06:26:21.785 UTC [endorser] callChaincode -> INFO 07d [businesschannel][812af1bf] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:26:21.786 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52728 grpc.code=OK grpc.call_duration=6.2174ms +peer0.org2.example.com | "2019-04-22 06:27:07.579 UTC [gossip.privdata] StoreBlock -> INFO 07f [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:07.583 UTC [committer.txvalidator] Validate -> INFO 080 [businesschannel] Validated block [6] in 3ms" +peer0.org2.example.com | "2019-04-22 06:27:07.601 UTC [kvledger] CommitWithPvtData -> INFO 081 [businesschannel] Committed block [6] with 1 transaction(s) in 17ms (state_validation=0ms block_commit=11ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:27:13.017 UTC [gossip.privdata] StoreBlock -> INFO 082 [businesschannel] Received block [7] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:13.020 UTC [committer.txvalidator] Validate -> INFO 083 [businesschannel] Validated block [7] in 2ms" +peer0.org2.example.com | "2019-04-22 06:27:13.051 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [7] with 1 transaction(s) in 29ms (state_validation=0ms block_commit=22ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:27:15.693 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:15.697 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [8] in 3ms" +peer0.org2.example.com | "2019-04-22 06:27:15.731 UTC [kvledger] CommitWithPvtData -> INFO 087 [businesschannel] Committed block [8] with 1 transaction(s) in 32ms (state_validation=9ms block_commit=16ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:27:37.550 UTC [gossip.privdata] StoreBlock -> INFO 088 [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-04-22 06:27:37.554 UTC [cauthdsl] deduplicate -> WARN 089 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:27:37.555 UTC [cauthdsl] deduplicate -> WARN 08a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] JoinChan -> INFO 08b Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08c Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08d Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:27:37.586 UTC [gossip.gossip] learnAnchorPeers -> INFO 08f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:27:37.600 UTC [committer.txvalidator] Validate -> INFO 090 [businesschannel] Validated block [9] in 49ms" +peer0.org2.example.com | "2019-04-22 06:27:37.619 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.617Z grpc.peer_address=192.168.224.15:49562 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=312.5µs +peer0.org2.example.com | "2019-04-22 06:27:37.666 UTC [comm.grpc.server] 1 -> INFO 092 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.659Z grpc.peer_address=192.168.224.13:43828 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.5073ms +peer0.org2.example.com | "2019-04-22 06:27:37.717 UTC [kvledger] CommitWithPvtData -> INFO 093 [businesschannel] Committed block [9] with 1 transaction(s) in 103ms (state_validation=12ms block_commit=26ms state_commit=58ms)" +peer0.org2.example.com | "2019-04-22 06:27:37.719 UTC [comm.grpc.server] 1 -> INFO 094 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.636Z grpc.peer_address=192.168.224.15:49562 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=82.24ms +peer0.org2.example.com | "2019-04-22 06:27:37.743 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.742Z grpc.peer_address=192.168.224.14:37500 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.7µs +peer0.org2.example.com | "2019-04-22 06:27:37.746 UTC [comm.grpc.server] 1 -> INFO 096 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:43634 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.8661361s +peer0.org2.example.com | "2019-04-22 06:27:37.746 UTC [comm.grpc.server] 1 -> INFO 097 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.693Z grpc.peer_address=192.168.224.13:43828 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=45.4336ms +peer0.org2.example.com | "2019-04-22 06:27:37.749 UTC [comm.grpc.server] 1 -> INFO 098 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.746Z grpc.peer_address=192.168.224.15:49572 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=548.4µs +peer0.org2.example.com | "2019-04-22 06:27:37.754 UTC [comm.grpc.server] 1 -> INFO 099 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:37324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.1286711s +peer0.org2.example.com | "2019-04-22 06:27:37.754 UTC [comm.grpc.server] 1 -> INFO 09a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.751Z grpc.peer_address=192.168.224.14:37500 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5723ms +peer0.org2.example.com | "2019-04-22 06:28:08.504 UTC [endorser] callChaincode -> INFO 09b [][9a638f5d] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:28:08.505 UTC [endorser] callChaincode -> INFO 09c [][9a638f5d] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:28:08.506 UTC [comm.grpc.server] 1 -> INFO 09d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52890 grpc.code=OK grpc.call_duration=2.7635ms +peer0.org2.example.com | "2019-04-22 06:28:10.543 UTC [endorser] callChaincode -> INFO 09e [][f95485ae] Entry chaincode: name:"qscc" " +kafka3 | [2019-04-22 06:25:29,546] INFO KafkaConfig values: +kafka3 | advertised.host.name = null +kafka3 | advertised.listeners = null +kafka3 | advertised.port = null +kafka3 | alter.config.policy.class.name = null +kafka3 | authorizer.class.name = +kafka3 | auto.create.topics.enable = true +kafka3 | auto.leader.rebalance.enable = true +kafka3 | background.threads = 10 +kafka3 | broker.id = 3 +kafka3 | broker.id.generation.enable = true +kafka3 | broker.rack = null +kafka3 | compression.type = producer +kafka3 | connections.max.idle.ms = 600000 +peer0.org2.example.com | "2019-04-22 06:28:10.548 UTC [endorser] callChaincode -> INFO 09f [][f95485ae] Exit chaincode: name:"qscc" (5ms)" +orderer0.example.com | "2019-04-22 06:25:56.165 UTC [orderer.consensus.kafka] startThread -> INFO 02a [channel: businesschannel] Start phase completed successfully" +orderer0.example.com | "2019-04-22 06:25:56.324 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.5:55780: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:25:56.325 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=231.0232ms +orderer0.example.com | "2019-04-22 06:26:01.418 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.5:55814: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:01.420 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55814 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=128.1389ms +orderer0.example.com | "2019-04-22 06:26:01.420 UTC [orderer.common.broadcast] Handle -> WARN 02f Error reading from 192.168.224.5:55816: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:01.421 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55816 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2691ms +orderer0.example.com | "2019-04-22 06:26:03.724 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.5:55822: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:03.725 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55822 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5035ms +orderer0.example.com | "2019-04-22 06:26:03.726 UTC [orderer.common.broadcast] Handle -> WARN 033 Error reading from 192.168.224.5:55824: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:03.727 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55824 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.929ms +orderer0.example.com | "2019-04-22 06:26:14.324 UTC [orderer.common.broadcast] Handle -> WARN 035 Error reading from 192.168.224.5:55888: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:14.324 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1871471s +orderer0.example.com | "2019-04-22 06:26:17.075 UTC [orderer.common.broadcast] Handle -> WARN 037 Error reading from 192.168.224.5:55900: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:17.075 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1768334s +orderer0.example.com | "2019-04-22 06:26:20.996 UTC [orderer.common.broadcast] Handle -> WARN 039 Error reading from 192.168.224.5:55922: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:26:20.997 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55922 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2159801s +orderer0.example.com | "2019-04-22 06:27:05.498 UTC [orderer.common.broadcast] Handle -> WARN 03b Error reading from 192.168.224.5:55936: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:05.504 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55936 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.1933324s +peer0.org2.example.com | "2019-04-22 06:28:10.548 UTC [comm.grpc.server] 1 -> INFO 0a0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:52898 grpc.code=OK grpc.call_duration=6.4013ms +kafka1 | [2019-04-22 06:25:29,400] INFO KafkaConfig values: +kafka1 | advertised.host.name = null +kafka1 | advertised.listeners = null +kafka1 | advertised.port = null +kafka1 | alter.config.policy.class.name = null +kafka1 | authorizer.class.name = +kafka1 | auto.create.topics.enable = true +kafka1 | auto.leader.rebalance.enable = true +kafka1 | background.threads = 10 +kafka1 | broker.id = 1 +kafka1 | broker.id.generation.enable = true +kafka1 | broker.rack = null +kafka0 | [2019-04-22 06:25:29,368] INFO KafkaConfig values: +kafka0 | advertised.host.name = null +kafka0 | advertised.listeners = null +kafka0 | advertised.port = null +kafka0 | alter.config.policy.class.name = null +orderer0.example.com | "2019-04-22 06:27:10.989 UTC [orderer.common.broadcast] Handle -> WARN 03d Error reading from 192.168.224.5:55948: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:10.989 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9912ms +orderer0.example.com | "2019-04-22 06:27:13.668 UTC [orderer.common.broadcast] Handle -> WARN 03f Error reading from 192.168.224.5:55962: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:13.669 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.9001ms +orderer0.example.com | "2019-04-22 06:27:18.593 UTC [common.deliver] Handle -> WARN 041 Error reading from 192.168.224.5:55992: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:18.593 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8334ms +orderer0.example.com | "2019-04-22 06:27:18.990 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.5:55994: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:18.990 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.54ms +orderer0.example.com | "2019-04-22 06:27:19.199 UTC [common.deliver] Handle -> WARN 045 Error reading from 192.168.224.5:55996: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.199 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8085ms +orderer0.example.com | "2019-04-22 06:27:19.548 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.5:55998: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.548 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2487ms +orderer0.example.com | "2019-04-22 06:27:19.958 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.5:56000: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:19.960 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.0664ms +orderer0.example.com | "2019-04-22 06:27:20.201 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.5:56002: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.201 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3511ms +orderer0.example.com | "2019-04-22 06:27:20.417 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.5:56004: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.417 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9123ms +orderer0.example.com | "2019-04-22 06:27:20.707 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.5:56006: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:20.707 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.579ms +orderer0.example.com | "2019-04-22 06:27:21.216 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.5:56008: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.217 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1645ms +orderer0.example.com | "2019-04-22 06:27:21.496 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.5:56010: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.496 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6158ms +orderer0.example.com | "2019-04-22 06:27:21.722 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.5:56012: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:21.723 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3642ms +orderer0.example.com | "2019-04-22 06:27:22.187 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.5:56014: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6495ms +orderer0.example.com | "2019-04-22 06:27:22.663 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.5:56016: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.663 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8107ms +orderer0.example.com | "2019-04-22 06:27:22.994 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.5:56018: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:22.994 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2059ms +orderer0.example.com | "2019-04-22 06:27:23.368 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.5:56020: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:23.368 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7461ms +kafka3 | controlled.shutdown.enable = true +kafka3 | controlled.shutdown.max.retries = 3 +kafka3 | controlled.shutdown.retry.backoff.ms = 5000 +kafka3 | controller.socket.timeout.ms = 30000 +kafka3 | create.topic.policy.class.name = null +kafka3 | default.replication.factor = 3 +kafka3 | delete.records.purgatory.purge.interval.requests = 1 +kafka3 | delete.topic.enable = true +kafka3 | fetch.purgatory.purge.interval.requests = 1000 +kafka3 | group.initial.rebalance.delay.ms = 0 +kafka3 | group.max.session.timeout.ms = 300000 +orderer0.example.com | "2019-04-22 06:27:37.382 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.383 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.431 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.440 UTC [cauthdsl] deduplicate -> WARN 062 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:27:37.460 UTC [orderer.common.broadcast] Handle -> WARN 063 Error reading from 192.168.224.5:56024: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:37.461 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:56024 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.6848ms +orderer0.example.com | "2019-04-22 06:27:37.466 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.5:56022: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:37.467 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=110.595ms +orderer0.example.com | "2019-04-22 06:27:39.802 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.5:56050: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:39.802 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56050 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9753ms +orderer0.example.com | "2019-04-22 06:27:40.300 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.5:56052: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:40.300 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56052 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.017ms +orderer0.example.com | "2019-04-22 06:27:41.503 UTC [common.deliver] Handle -> WARN 06b Error reading from 192.168.224.5:56054: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:41.504 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56054 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8646ms +orderer0.example.com | "2019-04-22 06:27:41.881 UTC [common.deliver] Handle -> WARN 06d Error reading from 192.168.224.5:56056: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:41.882 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56056 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.3519ms +orderer0.example.com | "2019-04-22 06:27:42.195 UTC [common.deliver] Handle -> WARN 06f Error reading from 192.168.224.5:56058: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.195 UTC [comm.grpc.server] 1 -> INFO 070 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56058 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9844ms +orderer0.example.com | "2019-04-22 06:27:42.588 UTC [common.deliver] Handle -> WARN 071 Error reading from 192.168.224.5:56060: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.590 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56060 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8188ms +orderer0.example.com | "2019-04-22 06:27:42.986 UTC [common.deliver] Handle -> WARN 073 Error reading from 192.168.224.5:56062: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:42.993 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1588ms +orderer0.example.com | "2019-04-22 06:27:43.407 UTC [common.deliver] Handle -> WARN 075 Error reading from 192.168.224.5:56064: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:43.407 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6195ms +orderer0.example.com | "2019-04-22 06:27:43.909 UTC [common.deliver] Handle -> WARN 077 Error reading from 192.168.224.5:56066: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:43.911 UTC [comm.grpc.server] 1 -> INFO 078 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.3998ms +orderer0.example.com | "2019-04-22 06:27:45.369 UTC [common.deliver] Handle -> WARN 079 Error reading from 192.168.224.5:56068: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:45.369 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.3442ms +orderer0.example.com | "2019-04-22 06:27:45.764 UTC [common.deliver] Handle -> WARN 07b Error reading from 192.168.224.5:56070: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:45.766 UTC [comm.grpc.server] 1 -> INFO 07c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.2845ms +orderer0.example.com | "2019-04-22 06:27:46.147 UTC [common.deliver] Handle -> WARN 07d Error reading from 192.168.224.5:56072: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:46.147 UTC [comm.grpc.server] 1 -> INFO 07e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.7551ms +orderer0.example.com | "2019-04-22 06:27:46.449 UTC [common.deliver] Handle -> WARN 07f Error reading from 192.168.224.5:56074: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:46.450 UTC [comm.grpc.server] 1 -> INFO 080 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5173ms +orderer0.example.com | "2019-04-22 06:27:46.799 UTC [common.deliver] Handle -> WARN 081 Error reading from 192.168.224.5:56076: rpc error: code = Canceled desc = context canceled" +kafka2 | [2019-04-22 06:25:29,337] INFO KafkaConfig values: +kafka2 | advertised.host.name = null +kafka2 | advertised.listeners = null +kafka2 | advertised.port = null +kafka2 | alter.config.policy.class.name = null +kafka2 | authorizer.class.name = +kafka2 | auto.create.topics.enable = true +kafka2 | auto.leader.rebalance.enable = true +kafka2 | background.threads = 10 +kafka2 | broker.id = 2 +kafka2 | broker.id.generation.enable = true +kafka2 | broker.rack = null +kafka2 | compression.type = producer +kafka2 | connections.max.idle.ms = 600000 +kafka2 | controlled.shutdown.enable = true +kafka2 | controlled.shutdown.max.retries = 3 +kafka2 | controlled.shutdown.retry.backoff.ms = 5000 +kafka3 | group.min.session.timeout.ms = 6000 +kafka3 | host.name = +kafka3 | inter.broker.listener.name = null +kafka3 | inter.broker.protocol.version = 1.0-IV0 +kafka3 | leader.imbalance.check.interval.seconds = 300 +kafka3 | leader.imbalance.per.broker.percentage = 10 +kafka3 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka3 | listeners = null +kafka3 | log.cleaner.backoff.ms = 15000 +kafka3 | log.cleaner.dedupe.buffer.size = 134217728 +kafka3 | log.cleaner.delete.retention.ms = 86400000 +kafka3 | log.cleaner.enable = true +kafka1 | compression.type = producer +kafka1 | connections.max.idle.ms = 600000 +kafka1 | controlled.shutdown.enable = true +kafka1 | controlled.shutdown.max.retries = 3 +kafka1 | controlled.shutdown.retry.backoff.ms = 5000 +kafka1 | controller.socket.timeout.ms = 30000 +kafka1 | create.topic.policy.class.name = null +kafka1 | default.replication.factor = 3 +kafka1 | delete.records.purgatory.purge.interval.requests = 1 +kafka1 | delete.topic.enable = true +kafka1 | fetch.purgatory.purge.interval.requests = 1000 +kafka1 | group.initial.rebalance.delay.ms = 0 +kafka1 | group.max.session.timeout.ms = 300000 +kafka1 | group.min.session.timeout.ms = 6000 +kafka1 | host.name = +kafka1 | inter.broker.listener.name = null +kafka1 | inter.broker.protocol.version = 1.0-IV0 +kafka1 | leader.imbalance.check.interval.seconds = 300 +kafka1 | leader.imbalance.per.broker.percentage = 10 +kafka1 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka0 | authorizer.class.name = +kafka0 | auto.create.topics.enable = true +kafka0 | auto.leader.rebalance.enable = true +kafka0 | background.threads = 10 +kafka0 | broker.id = 0 +kafka0 | broker.id.generation.enable = true +kafka0 | broker.rack = null +kafka0 | compression.type = producer +kafka0 | connections.max.idle.ms = 600000 +kafka0 | controlled.shutdown.enable = true +kafka0 | controlled.shutdown.max.retries = 3 +kafka0 | controlled.shutdown.retry.backoff.ms = 5000 +kafka0 | controller.socket.timeout.ms = 30000 +kafka0 | create.topic.policy.class.name = null +kafka0 | default.replication.factor = 3 +kafka0 | delete.records.purgatory.purge.interval.requests = 1 +kafka0 | delete.topic.enable = true +kafka0 | fetch.purgatory.purge.interval.requests = 1000 +kafka0 | group.initial.rebalance.delay.ms = 0 +kafka0 | group.max.session.timeout.ms = 300000 +kafka0 | group.min.session.timeout.ms = 6000 +kafka0 | host.name = +kafka0 | inter.broker.listener.name = null +kafka0 | inter.broker.protocol.version = 1.0-IV0 +kafka2 | controller.socket.timeout.ms = 30000 +kafka2 | create.topic.policy.class.name = null +kafka2 | default.replication.factor = 3 +kafka2 | delete.records.purgatory.purge.interval.requests = 1 +kafka2 | delete.topic.enable = true +kafka2 | fetch.purgatory.purge.interval.requests = 1000 +kafka2 | group.initial.rebalance.delay.ms = 0 +kafka2 | group.max.session.timeout.ms = 300000 +kafka2 | group.min.session.timeout.ms = 6000 +kafka2 | host.name = +kafka2 | inter.broker.listener.name = null +kafka2 | inter.broker.protocol.version = 1.0-IV0 +kafka2 | leader.imbalance.check.interval.seconds = 300 +kafka2 | leader.imbalance.per.broker.percentage = 10 +kafka2 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka3 | log.cleaner.io.buffer.load.factor = 0.9 +kafka3 | log.cleaner.io.buffer.size = 524288 +kafka3 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka3 | log.cleaner.min.cleanable.ratio = 0.5 +kafka3 | log.cleaner.min.compaction.lag.ms = 0 +kafka3 | log.cleaner.threads = 1 +kafka3 | log.cleanup.policy = [delete] +kafka3 | log.dir = /tmp/kafka-logs +kafka3 | log.dirs = /tmp/kafka-logs +kafka3 | log.flush.interval.messages = 9223372036854775807 +orderer0.example.com | "2019-04-22 06:27:46.799 UTC [comm.grpc.server] 1 -> INFO 082 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8702ms +orderer0.example.com | "2019-04-22 06:27:47.370 UTC [common.deliver] Handle -> WARN 083 Error reading from 192.168.224.5:56078: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:47.371 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9332ms +orderer0.example.com | "2019-04-22 06:27:48.953 UTC [common.deliver] Handle -> WARN 085 Error reading from 192.168.224.5:56080: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:48.954 UTC [comm.grpc.server] 1 -> INFO 086 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1715ms +orderer0.example.com | "2019-04-22 06:27:49.454 UTC [common.deliver] Handle -> WARN 087 Error reading from 192.168.224.5:56082: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:49.455 UTC [comm.grpc.server] 1 -> INFO 088 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9958ms +orderer0.example.com | "2019-04-22 06:27:49.987 UTC [common.deliver] Handle -> WARN 089 Error reading from 192.168.224.5:56084: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:27:49.987 UTC [comm.grpc.server] 1 -> INFO 08a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.5545ms +kafka1 | listeners = null +kafka1 | log.cleaner.backoff.ms = 15000 +kafka1 | log.cleaner.dedupe.buffer.size = 134217728 +kafka1 | log.cleaner.delete.retention.ms = 86400000 +kafka1 | log.cleaner.enable = true +kafka1 | log.cleaner.io.buffer.load.factor = 0.9 +kafka1 | log.cleaner.io.buffer.size = 524288 +kafka1 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka1 | log.cleaner.min.cleanable.ratio = 0.5 +kafka1 | log.cleaner.min.compaction.lag.ms = 0 +kafka1 | log.cleaner.threads = 1 +kafka1 | log.cleanup.policy = [delete] +kafka1 | log.dir = /tmp/kafka-logs +kafka1 | log.dirs = /tmp/kafka-logs +kafka1 | log.flush.interval.messages = 9223372036854775807 +kafka1 | log.flush.interval.ms = null +kafka0 | leader.imbalance.check.interval.seconds = 300 +kafka0 | leader.imbalance.per.broker.percentage = 10 +kafka0 | listener.security.protocol.map = PLAINTEXT:PLAINTEXT,SSL:SSL,SASL_PLAINTEXT:SASL_PLAINTEXT,SASL_SSL:SASL_SSL +kafka0 | listeners = null +kafka0 | log.cleaner.backoff.ms = 15000 +kafka0 | log.cleaner.dedupe.buffer.size = 134217728 +kafka0 | log.cleaner.delete.retention.ms = 86400000 +kafka0 | log.cleaner.enable = true +kafka0 | log.cleaner.io.buffer.load.factor = 0.9 +kafka0 | log.cleaner.io.buffer.size = 524288 +kafka0 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka0 | log.cleaner.min.cleanable.ratio = 0.5 +kafka0 | log.cleaner.min.compaction.lag.ms = 0 +kafka0 | log.cleaner.threads = 1 +kafka0 | log.cleanup.policy = [delete] +kafka0 | log.dir = /tmp/kafka-logs +kafka0 | log.dirs = /tmp/kafka-logs +kafka0 | log.flush.interval.messages = 9223372036854775807 +kafka0 | log.flush.interval.ms = null +kafka0 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka3 | log.flush.interval.ms = null +kafka3 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka3 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka3 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka3 | log.index.interval.bytes = 4096 +kafka3 | log.index.size.max.bytes = 10485760 +kafka3 | log.message.format.version = 1.0-IV0 +kafka3 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka3 | log.message.timestamp.type = CreateTime +kafka3 | log.preallocate = false +kafka3 | log.retention.bytes = -1 +kafka3 | log.retention.check.interval.ms = 300000 +kafka3 | log.retention.hours = 168 +kafka3 | log.retention.minutes = null +kafka3 | log.retention.ms = -1 +kafka3 | log.roll.hours = 168 +kafka3 | log.roll.jitter.hours = 0 +kafka3 | log.roll.jitter.ms = null +kafka3 | log.roll.ms = null +kafka3 | log.segment.bytes = 1073741824 +kafka3 | log.segment.delete.delay.ms = 60000 +kafka3 | max.connections.per.ip = 2147483647 +kafka3 | max.connections.per.ip.overrides = +kafka3 | message.max.bytes = 1048576 +kafka3 | metric.reporters = [] +kafka3 | metrics.num.samples = 2 +kafka3 | metrics.recording.level = INFO +kafka3 | metrics.sample.window.ms = 30000 +kafka0 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka0 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka0 | log.index.interval.bytes = 4096 +kafka0 | log.index.size.max.bytes = 10485760 +kafka0 | log.message.format.version = 1.0-IV0 +kafka0 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka0 | log.message.timestamp.type = CreateTime +kafka0 | log.preallocate = false +kafka0 | log.retention.bytes = -1 +kafka0 | log.retention.check.interval.ms = 300000 +kafka0 | log.retention.hours = 168 +kafka0 | log.retention.minutes = null +kafka0 | log.retention.ms = -1 +kafka0 | log.roll.hours = 168 +kafka0 | log.roll.jitter.hours = 0 +kafka0 | log.roll.jitter.ms = null +kafka0 | log.roll.ms = null +kafka0 | log.segment.bytes = 1073741824 +kafka0 | log.segment.delete.delay.ms = 60000 +kafka0 | max.connections.per.ip = 2147483647 +kafka0 | max.connections.per.ip.overrides = +kafka0 | message.max.bytes = 1048576 +kafka0 | metric.reporters = [] +kafka0 | metrics.num.samples = 2 +kafka0 | metrics.recording.level = INFO +kafka0 | metrics.sample.window.ms = 30000 +kafka0 | min.insync.replicas = 2 +kafka0 | num.io.threads = 8 +kafka0 | num.network.threads = 3 +kafka0 | num.partitions = 1 +kafka1 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka1 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka1 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka1 | log.index.interval.bytes = 4096 +kafka1 | log.index.size.max.bytes = 10485760 +kafka1 | log.message.format.version = 1.0-IV0 +kafka1 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka1 | log.message.timestamp.type = CreateTime +kafka1 | log.preallocate = false +kafka1 | log.retention.bytes = -1 +kafka1 | log.retention.check.interval.ms = 300000 +kafka1 | log.retention.hours = 168 +kafka1 | log.retention.minutes = null +kafka1 | log.retention.ms = -1 +kafka1 | log.roll.hours = 168 +kafka1 | log.roll.jitter.hours = 0 +kafka1 | log.roll.jitter.ms = null +kafka1 | log.roll.ms = null +kafka1 | log.segment.bytes = 1073741824 +kafka1 | log.segment.delete.delay.ms = 60000 +kafka1 | max.connections.per.ip = 2147483647 +kafka1 | max.connections.per.ip.overrides = +kafka1 | message.max.bytes = 1048576 +kafka1 | metric.reporters = [] +kafka1 | metrics.num.samples = 2 +kafka1 | metrics.recording.level = INFO +kafka1 | metrics.sample.window.ms = 30000 +kafka1 | min.insync.replicas = 2 +kafka1 | num.io.threads = 8 +kafka1 | num.network.threads = 3 +kafka0 | num.recovery.threads.per.data.dir = 1 +kafka0 | num.replica.fetchers = 1 +kafka0 | offset.metadata.max.bytes = 4096 +kafka0 | offsets.commit.required.acks = -1 +kafka0 | offsets.commit.timeout.ms = 5000 +kafka0 | offsets.load.buffer.size = 5242880 +kafka0 | offsets.retention.check.interval.ms = 600000 +kafka0 | offsets.retention.minutes = 1440 +kafka0 | offsets.topic.compression.codec = 0 +kafka0 | offsets.topic.num.partitions = 50 +kafka0 | offsets.topic.replication.factor = 1 +kafka0 | offsets.topic.segment.bytes = 104857600 +kafka0 | port = 9092 +kafka0 | principal.builder.class = null +kafka0 | producer.purgatory.purge.interval.requests = 1000 +kafka0 | queued.max.request.bytes = -1 +kafka0 | queued.max.requests = 500 +kafka0 | quota.consumer.default = 9223372036854775807 +kafka0 | quota.producer.default = 9223372036854775807 +kafka0 | quota.window.num = 11 +kafka0 | quota.window.size.seconds = 1 +kafka0 | replica.fetch.backoff.ms = 1000 +kafka0 | replica.fetch.max.bytes = 1048576 +kafka0 | replica.fetch.min.bytes = 1 +kafka0 | replica.fetch.response.max.bytes = 10485760 +kafka0 | replica.fetch.wait.max.ms = 500 +kafka0 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka0 | replica.lag.time.max.ms = 10000 +kafka0 | replica.socket.receive.buffer.bytes = 65536 +kafka0 | replica.socket.timeout.ms = 30000 +kafka0 | replication.quota.window.num = 11 +kafka3 | min.insync.replicas = 2 +kafka3 | num.io.threads = 8 +kafka3 | num.network.threads = 3 +kafka3 | num.partitions = 1 +kafka3 | num.recovery.threads.per.data.dir = 1 +kafka3 | num.replica.fetchers = 1 +kafka3 | offset.metadata.max.bytes = 4096 +kafka3 | offsets.commit.required.acks = -1 +kafka3 | offsets.commit.timeout.ms = 5000 +kafka3 | offsets.load.buffer.size = 5242880 +kafka3 | offsets.retention.check.interval.ms = 600000 +kafka3 | offsets.retention.minutes = 1440 +kafka3 | offsets.topic.compression.codec = 0 +kafka3 | offsets.topic.num.partitions = 50 +kafka3 | offsets.topic.replication.factor = 1 +kafka3 | offsets.topic.segment.bytes = 104857600 +kafka3 | port = 9092 +kafka3 | principal.builder.class = null +kafka3 | producer.purgatory.purge.interval.requests = 1000 +kafka3 | queued.max.request.bytes = -1 +kafka3 | queued.max.requests = 500 +kafka3 | quota.consumer.default = 9223372036854775807 +kafka3 | quota.producer.default = 9223372036854775807 +kafka3 | quota.window.num = 11 +kafka3 | quota.window.size.seconds = 1 +kafka3 | replica.fetch.backoff.ms = 1000 +kafka3 | replica.fetch.max.bytes = 1048576 +kafka2 | listeners = null +kafka2 | log.cleaner.backoff.ms = 15000 +kafka2 | log.cleaner.dedupe.buffer.size = 134217728 +kafka2 | log.cleaner.delete.retention.ms = 86400000 +kafka2 | log.cleaner.enable = true +kafka2 | log.cleaner.io.buffer.load.factor = 0.9 +kafka2 | log.cleaner.io.buffer.size = 524288 +kafka2 | log.cleaner.io.max.bytes.per.second = 1.7976931348623157E308 +kafka2 | log.cleaner.min.cleanable.ratio = 0.5 +kafka2 | log.cleaner.min.compaction.lag.ms = 0 +kafka2 | log.cleaner.threads = 1 +kafka2 | log.cleanup.policy = [delete] +kafka2 | log.dir = /tmp/kafka-logs +kafka2 | log.dirs = /tmp/kafka-logs +kafka2 | log.flush.interval.messages = 9223372036854775807 +kafka2 | log.flush.interval.ms = null +kafka2 | log.flush.offset.checkpoint.interval.ms = 60000 +kafka2 | log.flush.scheduler.interval.ms = 9223372036854775807 +kafka2 | log.flush.start.offset.checkpoint.interval.ms = 60000 +kafka2 | log.index.interval.bytes = 4096 +kafka2 | log.index.size.max.bytes = 10485760 +kafka2 | log.message.format.version = 1.0-IV0 +kafka2 | log.message.timestamp.difference.max.ms = 9223372036854775807 +kafka2 | log.message.timestamp.type = CreateTime +kafka2 | log.preallocate = false +kafka2 | log.retention.bytes = -1 +kafka2 | log.retention.check.interval.ms = 300000 +kafka2 | log.retention.hours = 168 +kafka2 | log.retention.minutes = null +kafka2 | log.retention.ms = -1 +kafka2 | log.roll.hours = 168 +kafka2 | log.roll.jitter.hours = 0 +kafka2 | log.roll.jitter.ms = null +kafka0 | replication.quota.window.size.seconds = 1 +kafka0 | request.timeout.ms = 30000 +kafka0 | reserved.broker.max.id = 1000 +kafka0 | sasl.enabled.mechanisms = [GSSAPI] +kafka0 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka0 | sasl.kerberos.min.time.before.relogin = 60000 +kafka0 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka0 | sasl.kerberos.service.name = null +kafka0 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka0 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka0 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka0 | security.inter.broker.protocol = PLAINTEXT +kafka0 | socket.receive.buffer.bytes = 102400 +kafka0 | socket.request.max.bytes = 104857600 +kafka0 | socket.send.buffer.bytes = 102400 +kafka0 | ssl.cipher.suites = null +kafka2 | log.roll.ms = null +kafka2 | log.segment.bytes = 1073741824 +kafka2 | log.segment.delete.delay.ms = 60000 +kafka2 | max.connections.per.ip = 2147483647 +kafka2 | max.connections.per.ip.overrides = +kafka2 | message.max.bytes = 1048576 +kafka2 | metric.reporters = [] +kafka2 | metrics.num.samples = 2 +kafka2 | metrics.recording.level = INFO +kafka2 | metrics.sample.window.ms = 30000 +kafka2 | min.insync.replicas = 2 +kafka2 | num.io.threads = 8 +kafka2 | num.network.threads = 3 +kafka2 | num.partitions = 1 +kafka2 | num.recovery.threads.per.data.dir = 1 +kafka2 | num.replica.fetchers = 1 +kafka2 | offset.metadata.max.bytes = 4096 +kafka1 | num.partitions = 1 +kafka1 | num.recovery.threads.per.data.dir = 1 +kafka1 | num.replica.fetchers = 1 +kafka1 | offset.metadata.max.bytes = 4096 +kafka1 | offsets.commit.required.acks = -1 +kafka1 | offsets.commit.timeout.ms = 5000 +kafka1 | offsets.load.buffer.size = 5242880 +kafka1 | offsets.retention.check.interval.ms = 600000 +kafka1 | offsets.retention.minutes = 1440 +kafka1 | offsets.topic.compression.codec = 0 +kafka1 | offsets.topic.num.partitions = 50 +kafka1 | offsets.topic.replication.factor = 1 +kafka1 | offsets.topic.segment.bytes = 104857600 +kafka1 | port = 9092 +kafka1 | principal.builder.class = null +kafka1 | producer.purgatory.purge.interval.requests = 1000 +kafka1 | queued.max.request.bytes = -1 +kafka1 | queued.max.requests = 500 +kafka1 | quota.consumer.default = 9223372036854775807 +kafka1 | quota.producer.default = 9223372036854775807 +kafka0 | ssl.client.auth = none +kafka0 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka0 | ssl.endpoint.identification.algorithm = null +kafka0 | ssl.key.password = null +kafka0 | ssl.keymanager.algorithm = SunX509 +kafka0 | ssl.keystore.location = null +kafka0 | ssl.keystore.password = null +kafka0 | ssl.keystore.type = JKS +kafka0 | ssl.protocol = TLS +kafka0 | ssl.provider = null +kafka0 | ssl.secure.random.implementation = null +kafka0 | ssl.trustmanager.algorithm = PKIX +kafka0 | ssl.truststore.location = null +kafka0 | ssl.truststore.password = null +kafka0 | ssl.truststore.type = JKS +kafka0 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka0 | transaction.max.timeout.ms = 900000 +kafka0 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka0 | transaction.state.log.load.buffer.size = 5242880 +kafka0 | transaction.state.log.min.isr = 1 +kafka0 | transaction.state.log.num.partitions = 50 +kafka0 | transaction.state.log.replication.factor = 1 +kafka0 | transaction.state.log.segment.bytes = 104857600 +kafka0 | transactional.id.expiration.ms = 604800000 +kafka0 | unclean.leader.election.enable = false +kafka0 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka0 | zookeeper.connection.timeout.ms = 6000 +kafka0 | zookeeper.session.timeout.ms = 6000 +kafka0 | zookeeper.set.acl = false +kafka0 | zookeeper.sync.time.ms = 2000 +kafka0 | (kafka.server.KafkaConfig) +kafka0 | [2019-04-22 06:25:29,805] INFO starting (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:29,819] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:29,991] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka0 | [2019-04-22 06:25:30,061] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,062] INFO Client environment:host.name=kafka0 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,064] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,065] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,068] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +zookeeper1 | ZooKeeper JMX enabled by default +zookeeper1 | Using config: /conf/zoo.cfg +zookeeper1 | 2019-04-22 06:25:20,221 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper1 | 2019-04-22 06:25:20,702 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper1 | 2019-04-22 06:25:20,738 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper1 | 2019-04-22 06:25:20,821 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper1 | 2019-04-22 06:25:20,828 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper1 | 2019-04-22 06:25:20,901 [myid:2] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper1 | 2019-04-22 06:25:20,901 [myid:2] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper1 | 2019-04-22 06:25:20,955 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper1 | 2019-04-22 06:25:21,145 [myid:2] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper1 | 2019-04-22 06:25:21,327 [myid:2] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +kafka2 | offsets.commit.required.acks = -1 +kafka2 | offsets.commit.timeout.ms = 5000 +kafka2 | offsets.load.buffer.size = 5242880 +kafka2 | offsets.retention.check.interval.ms = 600000 +kafka2 | offsets.retention.minutes = 1440 +kafka2 | offsets.topic.compression.codec = 0 +kafka2 | offsets.topic.num.partitions = 50 +kafka2 | offsets.topic.replication.factor = 1 +kafka2 | offsets.topic.segment.bytes = 104857600 +kafka2 | port = 9092 +kafka2 | principal.builder.class = null +kafka2 | producer.purgatory.purge.interval.requests = 1000 +kafka2 | queued.max.request.bytes = -1 +kafka2 | queued.max.requests = 500 +kafka2 | quota.consumer.default = 9223372036854775807 +kafka2 | quota.producer.default = 9223372036854775807 +kafka2 | quota.window.num = 11 +kafka2 | quota.window.size.seconds = 1 +kafka2 | replica.fetch.backoff.ms = 1000 +kafka2 | replica.fetch.max.bytes = 1048576 +kafka2 | replica.fetch.min.bytes = 1 +kafka2 | replica.fetch.response.max.bytes = 10485760 +kafka1 | quota.window.num = 11 +kafka1 | quota.window.size.seconds = 1 +kafka1 | replica.fetch.backoff.ms = 1000 +kafka1 | replica.fetch.max.bytes = 1048576 +kafka1 | replica.fetch.min.bytes = 1 +kafka1 | replica.fetch.response.max.bytes = 10485760 +kafka1 | replica.fetch.wait.max.ms = 500 +kafka1 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka1 | replica.lag.time.max.ms = 10000 +kafka1 | replica.socket.receive.buffer.bytes = 65536 +kafka1 | replica.socket.timeout.ms = 30000 +kafka1 | replication.quota.window.num = 11 +zookeeper1 | 2019-04-22 06:25:21,573 [myid:2] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper1 | 2019-04-22 06:25:21,643 [myid:2] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper1 | 2019-04-22 06:25:21,670 [myid:2] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper0 | ZooKeeper JMX enabled by default +zookeeper0 | Using config: /conf/zoo.cfg +zookeeper0 | 2019-04-22 06:25:20,233 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper0 | 2019-04-22 06:25:20,819 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper0 | 2019-04-22 06:25:20,871 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper0 | 2019-04-22 06:25:20,941 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +kafka2 | replica.fetch.wait.max.ms = 500 +kafka2 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka2 | replica.lag.time.max.ms = 10000 +kafka2 | replica.socket.receive.buffer.bytes = 65536 +kafka2 | replica.socket.timeout.ms = 30000 +kafka2 | replication.quota.window.num = 11 +kafka2 | replication.quota.window.size.seconds = 1 +kafka2 | request.timeout.ms = 30000 +kafka2 | reserved.broker.max.id = 1000 +kafka2 | sasl.enabled.mechanisms = [GSSAPI] +kafka2 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka2 | sasl.kerberos.min.time.before.relogin = 60000 +kafka2 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka2 | sasl.kerberos.service.name = null +kafka2 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka2 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka2 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka2 | security.inter.broker.protocol = PLAINTEXT +kafka2 | socket.receive.buffer.bytes = 102400 +kafka2 | socket.request.max.bytes = 104857600 +kafka2 | socket.send.buffer.bytes = 102400 +kafka2 | ssl.cipher.suites = null +kafka2 | ssl.client.auth = none +kafka2 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka2 | ssl.endpoint.identification.algorithm = null +kafka2 | ssl.key.password = null +kafka2 | ssl.keymanager.algorithm = SunX509 +kafka2 | ssl.keystore.location = null +kafka2 | ssl.keystore.password = null +kafka1 | replication.quota.window.size.seconds = 1 +kafka1 | request.timeout.ms = 30000 +kafka1 | reserved.broker.max.id = 1000 +kafka1 | sasl.enabled.mechanisms = [GSSAPI] +kafka1 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka1 | sasl.kerberos.min.time.before.relogin = 60000 +kafka1 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka1 | sasl.kerberos.service.name = null +kafka1 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka1 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka1 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka1 | security.inter.broker.protocol = PLAINTEXT +kafka1 | socket.receive.buffer.bytes = 102400 +kafka1 | socket.request.max.bytes = 104857600 +kafka1 | socket.send.buffer.bytes = 102400 +kafka1 | ssl.cipher.suites = null +kafka1 | ssl.client.auth = none +kafka1 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka1 | ssl.endpoint.identification.algorithm = null +kafka1 | ssl.key.password = null +kafka1 | ssl.keymanager.algorithm = SunX509 +kafka1 | ssl.keystore.location = null +kafka1 | ssl.keystore.password = null +kafka1 | ssl.keystore.type = JKS +kafka1 | ssl.protocol = TLS +kafka1 | ssl.provider = null +kafka1 | ssl.secure.random.implementation = null +kafka1 | ssl.trustmanager.algorithm = PKIX +kafka1 | ssl.truststore.location = null +kafka3 | replica.fetch.min.bytes = 1 +kafka3 | replica.fetch.response.max.bytes = 10485760 +kafka3 | replica.fetch.wait.max.ms = 500 +kafka3 | replica.high.watermark.checkpoint.interval.ms = 5000 +kafka3 | replica.lag.time.max.ms = 10000 +kafka3 | replica.socket.receive.buffer.bytes = 65536 +kafka3 | replica.socket.timeout.ms = 30000 +kafka3 | replication.quota.window.num = 11 +kafka3 | replication.quota.window.size.seconds = 1 +kafka3 | request.timeout.ms = 30000 +kafka3 | reserved.broker.max.id = 1000 +kafka3 | sasl.enabled.mechanisms = [GSSAPI] +kafka3 | sasl.kerberos.kinit.cmd = /usr/bin/kinit +kafka3 | sasl.kerberos.min.time.before.relogin = 60000 +kafka3 | sasl.kerberos.principal.to.local.rules = [DEFAULT] +kafka3 | sasl.kerberos.service.name = null +kafka3 | sasl.kerberos.ticket.renew.jitter = 0.05 +kafka3 | sasl.kerberos.ticket.renew.window.factor = 0.8 +kafka3 | sasl.mechanism.inter.broker.protocol = GSSAPI +kafka3 | security.inter.broker.protocol = PLAINTEXT +kafka3 | socket.receive.buffer.bytes = 102400 +kafka3 | socket.request.max.bytes = 104857600 +kafka3 | socket.send.buffer.bytes = 102400 +kafka3 | ssl.cipher.suites = null +zookeeper0 | 2019-04-22 06:25:20,942 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper0 | 2019-04-22 06:25:20,989 [myid:1] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper0 | 2019-04-22 06:25:21,019 [myid:1] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper0 | 2019-04-22 06:25:21,041 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper0 | 2019-04-22 06:25:21,210 [myid:1] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper1 | 2019-04-22 06:25:21,815 [myid:2] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper1 | 2019-04-22 06:25:21,901 [myid:2] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper1 | 2019-04-22 06:25:22,011 [myid:2] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper1/192.168.224.3:3888 +zookeeper1 | 2019-04-22 06:25:22,085 [myid:2] - INFO [zookeeper1/192.168.224.3:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.2:50714 +zookeeper0 | 2019-04-22 06:25:21,486 [myid:1] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +zookeeper0 | 2019-04-22 06:25:21,756 [myid:1] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper0 | 2019-04-22 06:25:21,794 [myid:1] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper0 | 2019-04-22 06:25:21,823 [myid:1] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:21,824 [myid:1] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:21,824 [myid:1] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper1 | 2019-04-22 06:25:22,217 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,220 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,362 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper1 | 2019-04-22 06:25:22,433 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 2, proposed zxid=0x0 +kafka1 | ssl.truststore.password = null +kafka1 | ssl.truststore.type = JKS +kafka1 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka1 | transaction.max.timeout.ms = 900000 +kafka1 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka1 | transaction.state.log.load.buffer.size = 5242880 +kafka1 | transaction.state.log.min.isr = 1 +kafka1 | transaction.state.log.num.partitions = 50 +kafka1 | transaction.state.log.replication.factor = 1 +kafka1 | transaction.state.log.segment.bytes = 104857600 +kafka1 | transactional.id.expiration.ms = 604800000 +kafka1 | unclean.leader.election.enable = false +kafka1 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka1 | zookeeper.connection.timeout.ms = 6000 +kafka1 | zookeeper.session.timeout.ms = 6000 +kafka1 | zookeeper.set.acl = false +kafka1 | zookeeper.sync.time.ms = 2000 +kafka1 | (kafka.server.KafkaConfig) +kafka2 | ssl.keystore.type = JKS +kafka2 | ssl.protocol = TLS +kafka2 | ssl.provider = null +kafka2 | ssl.secure.random.implementation = null +kafka2 | ssl.trustmanager.algorithm = PKIX +kafka2 | ssl.truststore.location = null +kafka2 | ssl.truststore.password = null +kafka2 | ssl.truststore.type = JKS +kafka2 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka2 | transaction.max.timeout.ms = 900000 +kafka2 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka2 | transaction.state.log.load.buffer.size = 5242880 +kafka2 | transaction.state.log.min.isr = 1 +kafka2 | transaction.state.log.num.partitions = 50 +kafka2 | transaction.state.log.replication.factor = 1 +kafka2 | transaction.state.log.segment.bytes = 104857600 +kafka2 | transactional.id.expiration.ms = 604800000 +kafka2 | unclean.leader.election.enable = false +kafka2 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka2 | zookeeper.connection.timeout.ms = 6000 +kafka2 | zookeeper.session.timeout.ms = 6000 +kafka2 | zookeeper.set.acl = false +kafka2 | zookeeper.sync.time.ms = 2000 +kafka2 | (kafka.server.KafkaConfig) +kafka2 | [2019-04-22 06:25:29,913] INFO starting (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:29,920] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:30,049] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka2 | [2019-04-22 06:25:30,093] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:22,017 [myid:1] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper0 | 2019-04-22 06:25:22,043 [myid:1] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper0 | 2019-04-22 06:25:22,199 [myid:1] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper0/192.168.224.4:3888 +zookeeper0 | 2019-04-22 06:25:22,303 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper0 | 2019-04-22 06:25:22,366 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 1, proposed zxid=0x0 +zookeeper0 | 2019-04-22 06:25:22,444 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,510 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (2, 1) +zookeeper0 | 2019-04-22 06:25:22,569 [myid:1] - INFO [WorkerSender[myid=1]:QuorumCnxManager@199] - Have smaller server identifier, so dropping the connection: (3, 1) +zookeeper0 | 2019-04-22 06:25:22,569 [myid:1] - INFO [zookeeper0/192.168.224.4:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.2:54450 +kafka1 | [2019-04-22 06:25:29,921] INFO starting (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:29,940] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:30,039] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka1 | [2019-04-22 06:25:30,122] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,143] INFO Client environment:host.name=kafka1 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,146] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,147] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,148] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,071] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,074] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,075] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,075] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,076] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka3 | ssl.client.auth = none +kafka3 | ssl.enabled.protocols = [TLSv1.2, TLSv1.1, TLSv1] +kafka3 | ssl.endpoint.identification.algorithm = null +kafka3 | ssl.key.password = null +kafka3 | ssl.keymanager.algorithm = SunX509 +kafka3 | ssl.keystore.location = null +kafka3 | ssl.keystore.password = null +kafka3 | ssl.keystore.type = JKS +kafka3 | ssl.protocol = TLS +kafka3 | ssl.provider = null +kafka3 | ssl.secure.random.implementation = null +kafka3 | ssl.trustmanager.algorithm = PKIX +kafka3 | ssl.truststore.location = null +kafka3 | ssl.truststore.password = null +kafka3 | ssl.truststore.type = JKS +kafka3 | transaction.abort.timed.out.transaction.cleanup.interval.ms = 60000 +kafka3 | transaction.max.timeout.ms = 900000 +kafka3 | transaction.remove.expired.transaction.cleanup.interval.ms = 3600000 +kafka3 | transaction.state.log.load.buffer.size = 5242880 +kafka3 | transaction.state.log.min.isr = 1 +kafka3 | transaction.state.log.num.partitions = 50 +kafka3 | transaction.state.log.replication.factor = 1 +kafka3 | transaction.state.log.segment.bytes = 104857600 +kafka2 | [2019-04-22 06:25:30,094] INFO Client environment:host.name=kafka2 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,095] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,097] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,099] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +kafka3 | transactional.id.expiration.ms = 604800000 +kafka3 | unclean.leader.election.enable = false +kafka3 | zookeeper.connect = zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 +kafka3 | zookeeper.connection.timeout.ms = 6000 +kafka3 | zookeeper.session.timeout.ms = 6000 +kafka3 | zookeeper.set.acl = false +kafka3 | zookeeper.sync.time.ms = 2000 +kafka3 | (kafka.server.KafkaConfig) +kafka3 | [2019-04-22 06:25:29,900] INFO starting (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:29,904] INFO Connecting to zookeeper on zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:30,007] INFO Starting ZkClient event thread. (org.I0Itec.zkclient.ZkEventThread) +kafka3 | [2019-04-22 06:25:30,088] INFO Client environment:zookeeper.version=3.4.10-39d3a4f269333c922ed3db283be479f9deacaa0f, built on 03/23/2017 10:13 GMT (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,098] INFO Client environment:host.name=kafka3 (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:22,568 [myid:2] - INFO [zookeeper1/192.168.224.3:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.4:54956 +zookeeper1 | 2019-04-22 06:25:22,639 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,653 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,698 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,744 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,612 [myid:1] - INFO [zookeeper0/192.168.224.4:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.3:57336 +zookeeper0 | 2019-04-22 06:25:22,738 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,745 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,747 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,748 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,082] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,083] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,083] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,085] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka0 | [2019-04-22 06:25:30,225] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:30,269] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,333] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,511] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:30,525] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:31,957] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:32,049] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka0 | [2019-04-22 06:25:32,267] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,274] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,277] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka0 | [2019-04-22 06:25:32,535] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +zookeeper2 | ZooKeeper JMX enabled by default +zookeeper2 | Using config: /conf/zoo.cfg +zookeeper2 | 2019-04-22 06:25:20,031 [myid:] - INFO [main:QuorumPeerConfig@124] - Reading configuration from: /conf/zoo.cfg +zookeeper2 | 2019-04-22 06:25:20,383 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper2 | 2019-04-22 06:25:20,444 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper1 to address: zookeeper1/192.168.224.3 +zookeeper1 | 2019-04-22 06:25:22,747 [myid:2] - INFO [WorkerReceiver[myid=2]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper1 | 2019-04-22 06:25:22,925 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING +zookeeper1 | 2019-04-22 06:25:22,997 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true +zookeeper2 | 2019-04-22 06:25:20,480 [myid:] - INFO [main:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:20,481 [myid:] - INFO [main:QuorumPeerConfig@352] - Defaulting to majority quorums +zookeeper2 | 2019-04-22 06:25:20,552 [myid:3] - INFO [main:DatadirCleanupManager@78] - autopurge.snapRetainCount set to 3 +zookeeper2 | 2019-04-22 06:25:20,559 [myid:3] - INFO [main:DatadirCleanupManager@79] - autopurge.purgeInterval set to 1 +zookeeper2 | 2019-04-22 06:25:20,594 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@138] - Purge task started. +zookeeper2 | 2019-04-22 06:25:21,066 [myid:3] - INFO [main:QuorumPeerMain@127] - Starting quorum peer +zookeeper2 | 2019-04-22 06:25:21,114 [myid:3] - INFO [PurgeTask:DatadirCleanupManager$PurgeTask@144] - Purge task completed. +zookeeper2 | 2019-04-22 06:25:21,449 [myid:3] - INFO [main:NIOServerCnxnFactory@89] - binding to port 0.0.0.0/0.0.0.0:2181 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1019] - tickTime set to 2000 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1039] - minSessionTimeout set to -1 +zookeeper2 | 2019-04-22 06:25:21,453 [myid:3] - INFO [main:QuorumPeer@1050] - maxSessionTimeout set to -1 +zookeeper0 | 2019-04-22 06:25:22,784 [myid:1] - INFO [WorkerReceiver[myid=1]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper0 | 2019-04-22 06:25:22,972 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer@844] - FOLLOWING +zookeeper0 | 2019-04-22 06:25:23,025 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@86] - TCP NoDelay set to: true +kafka0 | [2019-04-22 06:25:32,627] INFO Loading logs. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:32,664] INFO Logs loading complete in 30 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:43,064] WARN Client session timed out, have not heard from server in 10636ms for sessionid 0x36a43b878a10001 (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,065] INFO Client session timed out, have not heard from server in 10636ms for sessionid 0x36a43b878a10001, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,215] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:43,226] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:21,496 [myid:3] - INFO [main:QuorumPeer@1065] - initLimit set to 5 +zookeeper2 | 2019-04-22 06:25:21,654 [myid:3] - INFO [main:QuorumPeer@533] - currentEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper2 | 2019-04-22 06:25:21,717 [myid:3] - INFO [main:QuorumPeer@548] - acceptedEpoch not found! Creating with a reasonable default of 0. This should only happen when you are upgrading your installation +zookeeper2 | 2019-04-22 06:25:21,767 [myid:3] - INFO [ListenerThread:QuorumCnxManager$Listener@534] - My election bind port: zookeeper2/192.168.224.2:3888 +zookeeper2 | 2019-04-22 06:25:21,898 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@774] - LOOKING +zookeeper1 | 2019-04-22 06:25:23,122 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper1 | 2019-04-22 06:25:23,124 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper1 +zookeeper1 | 2019-04-22 06:25:23,127 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper2 | 2019-04-22 06:25:21,916 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@818] - New election. My id = 3, proposed zxid=0x0 +zookeeper2 | 2019-04-22 06:25:22,021 [myid:3] - WARN [WorkerSender[myid=3]:QuorumCnxManager@400] - Cannot open channel to 1 at election address zookeeper0/192.168.224.4:3888 +zookeeper2 | java.net.ConnectException: Connection refused (Connection refused) +zookeeper2 | at java.net.PlainSocketImpl.socketConnect(Native Method) +zookeeper2 | at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350) +kafka3 | [2019-04-22 06:25:30,100] INFO Client environment:java.version=1.8.0_191 (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,101] INFO Client environment:java.vendor=Oracle Corporation (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,102] INFO Client environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre (org.apache.zookeeper.ZooKeeper) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188) +zookeeper2 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) +zookeeper2 | at java.net.Socket.connect(Socket.java:589) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.connectOne(QuorumCnxManager.java:381) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.toSend(QuorumCnxManager.java:354) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.process(FastLeaderElection.java:452) +zookeeper1 | 2019-04-22 06:25:23,131 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper1 | 2019-04-22 06:25:23,134 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka1 | [2019-04-22 06:25:30,149] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,154] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,155] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:23,155 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper0 | 2019-04-22 06:25:23,170 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper0 +zookeeper1 | 2019-04-22 06:25:23,191 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper1 | 2019-04-22 06:25:23,249 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper1 | 2019-04-22 06:25:23,263 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper1 | 2019-04-22 06:25:23,275 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper1 | 2019-04-22 06:25:23,276 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper1 | 2019-04-22 06:25:23,344 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.run(FastLeaderElection.java:433) +zookeeper2 | at java.lang.Thread.run(Thread.java:748) +zookeeper2 | 2019-04-22 06:25:22,077 [myid:3] - INFO [WorkerSender[myid=3]:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:22,170 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,179 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@852] - Notification time out: 400 +zookeeper2 | 2019-04-22 06:25:22,186 [myid:3] - WARN [WorkerSender[myid=3]:QuorumCnxManager@400] - Cannot open channel to 1 at election address zookeeper0/192.168.224.4:3888 +zookeeper2 | java.net.ConnectException: Connection refused (Connection refused) +zookeeper2 | at java.net.PlainSocketImpl.socketConnect(Native Method) +kafka2 | [2019-04-22 06:25:30,099] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,103] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,104] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:23,357 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper1 | 2019-04-22 06:25:23,369 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper1 | 2019-04-22 06:25:23,390 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper1 | 2019-04-22 06:25:23,392 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +zookeeper1 | 2019-04-22 06:25:23,433 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper1 | 2019-04-22 06:25:23,469 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 1035 +kafka0 | [2019-04-22 06:25:43,259] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:43,968] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:43,986] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,037] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10001 has expired (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,043] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10001 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,069] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:44,070] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +zookeeper1 | 2019-04-22 06:25:23,553 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper1 | 2019-04-22 06:25:23,973 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 +zookeeper1 | 2019-04-22 06:25:24,057 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 +zookeeper1 | 2019-04-22 06:25:30,406 [myid:2] - WARN [QuorumPeer[myid=2]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 +zookeeper1 | 2019-04-22 06:25:30,411 [myid:2] - INFO [SyncThread:2:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper1 | 2019-04-22 06:25:45,016 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:37938 +zookeeper1 | 2019-04-22 06:25:45,227 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10002 at /192.168.224.7:37938 +zookeeper2 | at java.net.AbstractPlainSocketImpl.doConnect(AbstractPlainSocketImpl.java:350) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connectToAddress(AbstractPlainSocketImpl.java:206) +zookeeper2 | at java.net.AbstractPlainSocketImpl.connect(AbstractPlainSocketImpl.java:188) +zookeeper2 | at java.net.SocksSocketImpl.connect(SocksSocketImpl.java:392) +zookeeper2 | at java.net.Socket.connect(Socket.java:589) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.connectOne(QuorumCnxManager.java:381) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,105] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,106] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,107] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,107] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,108] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,103] INFO Client environment:java.class.path=:/opt/kafka/bin/../libs/aopalliance-repackaged-2.5.0-b32.jar:/opt/kafka/bin/../libs/argparse4j-0.7.0.jar:/opt/kafka/bin/../libs/commons-lang3-3.5.jar:/opt/kafka/bin/../libs/connect-api-1.0.0.jar:/opt/kafka/bin/../libs/connect-file-1.0.0.jar:/opt/kafka/bin/../libs/connect-json-1.0.0.jar:/opt/kafka/bin/../libs/connect-runtime-1.0.0.jar:/opt/kafka/bin/../libs/connect-transforms-1.0.0.jar:/opt/kafka/bin/../libs/guava-20.0.jar:/opt/kafka/bin/../libs/hk2-api-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-locator-2.5.0-b32.jar:/opt/kafka/bin/../libs/hk2-utils-2.5.0-b32.jar:/opt/kafka/bin/../libs/jackson-annotations-2.9.1.jar:/opt/kafka/bin/../libs/jackson-core-2.9.1.jar:/opt/kafka/bin/../libs/jackson-databind-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-base-2.9.1.jar:/opt/kafka/bin/../libs/jackson-jaxrs-json-provider-2.9.1.jar:/opt/kafka/bin/../libs/jackson-module-jaxb-annotations-2.9.1.jar:/opt/kafka/bin/../libs/javassist-3.20.0-GA.jar:/opt/kafka/bin/../libs/javassist-3.21.0-GA.jar:/opt/kafka/bin/../libs/javax.annotation-api-1.2.jar:/opt/kafka/bin/../libs/javax.inject-1.jar:/opt/kafka/bin/../libs/javax.inject-2.5.0-b32.jar:/opt/kafka/bin/../libs/javax.servlet-api-3.1.0.jar:/opt/kafka/bin/../libs/javax.ws.rs-api-2.0.1.jar:/opt/kafka/bin/../libs/jersey-client-2.25.1.jar:/opt/kafka/bin/../libs/jersey-common-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-2.25.1.jar:/opt/kafka/bin/../libs/jersey-container-servlet-core-2.25.1.jar:/opt/kafka/bin/../libs/jersey-guava-2.25.1.jar:/opt/kafka/bin/../libs/jersey-media-jaxb-2.25.1.jar:/opt/kafka/bin/../libs/jersey-server-2.25.1.jar:/opt/kafka/bin/../libs/jetty-continuation-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-http-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-io-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-security-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-server-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlet-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-servlets-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jetty-util-9.2.22.v20170606.jar:/opt/kafka/bin/../libs/jopt-simple-5.0.4.jar:/opt/kafka/bin/../libs/kafka-clients-1.0.0.jar:/opt/kafka/bin/../libs/kafka-log4j-appender-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-1.0.0.jar:/opt/kafka/bin/../libs/kafka-streams-examples-1.0.0.jar:/opt/kafka/bin/../libs/kafka-tools-1.0.0.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0-test-sources.jar:/opt/kafka/bin/../libs/kafka_2.11-1.0.0.jar:/opt/kafka/bin/../libs/log4j-1.2.17.jar:/opt/kafka/bin/../libs/lz4-java-1.4.jar:/opt/kafka/bin/../libs/maven-artifact-3.5.0.jar:/opt/kafka/bin/../libs/metrics-core-2.2.0.jar:/opt/kafka/bin/../libs/osgi-resource-locator-1.0.1.jar:/opt/kafka/bin/../libs/plexus-utils-3.0.24.jar:/opt/kafka/bin/../libs/reflections-0.9.11.jar:/opt/kafka/bin/../libs/rocksdbjni-5.7.3.jar:/opt/kafka/bin/../libs/scala-library-2.11.11.jar:/opt/kafka/bin/../libs/slf4j-api-1.7.25.jar:/opt/kafka/bin/../libs/slf4j-log4j12-1.7.25.jar:/opt/kafka/bin/../libs/snappy-java-1.1.4.jar:/opt/kafka/bin/../libs/validation-api-1.1.0.Final.jar:/opt/kafka/bin/../libs/zkclient-0.10.jar:/opt/kafka/bin/../libs/zookeeper-3.4.10.jar (org.apache.zookeeper.ZooKeeper) +zookeeper2 | at org.apache.zookeeper.server.quorum.QuorumCnxManager.toSend(QuorumCnxManager.java:354) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.process(FastLeaderElection.java:452) +zookeeper2 | at org.apache.zookeeper.server.quorum.FastLeaderElection$Messenger$WorkerSender.run(FastLeaderElection.java:433) +zookeeper2 | at java.lang.Thread.run(Thread.java:748) +zookeeper2 | 2019-04-22 06:25:22,186 [myid:3] - INFO [WorkerSender[myid=3]:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper0 to address: zookeeper0/192.168.224.4 +zookeeper2 | 2019-04-22 06:25:22,198 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,559 [myid:3] - INFO [zookeeper2/192.168.224.2:3888:QuorumCnxManager$Listener@541] - Received connection request /192.168.224.4:32832 +kafka0 | [2019-04-22 06:25:44,158] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,201] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka0 | [2019-04-22 06:25:44,227] INFO EventThread shut down for session: 0x36a43b878a10001 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,155] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,156] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +zookeeper2 | 2019-04-22 06:25:22,599 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:FastLeaderElection@852] - Notification time out: 800 +zookeeper2 | 2019-04-22 06:25:22,601 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 3 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,671 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 2 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka0 | [2019-04-22 06:25:44,245] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10003, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:22,702 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 2 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,737 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 1 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +kafka2 | [2019-04-22 06:25:30,112] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:30,251] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:30,271] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:30,325] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:30,475] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +zookeeper1 | 2019-04-22 06:25:45,230 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10002 +zookeeper1 | 2019-04-22 06:25:45,277 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10002 for client /192.168.224.7:37938, probably expired +zookeeper1 | 2019-04-22 06:25:45,281 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:41332 +zookeeper1 | 2019-04-22 06:25:45,298 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.7:37938 which had sessionid 0x36a43b878a10002 +zookeeper1 | 2019-04-22 06:25:45,299 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10000 at /192.168.224.9:41332 +zookeeper0 | 2019-04-22 06:25:23,176 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper0 | 2019-04-22 06:25:23,179 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper0 | 2019-04-22 06:25:23,184 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka0 | [2019-04-22 06:25:44,363] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka0 | [2019-04-22 06:25:47,713] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka0 | [2019-04-22 06:25:47,794] INFO [SocketServer brokerId=0] Started 1 acceptor threads (kafka.network.SocketServer) +kafka0 | [2019-04-22 06:25:48,364] INFO [ExpirationReaper-0-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,384] INFO [ExpirationReaper-0-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,382] INFO [ExpirationReaper-0-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:48,550] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka0 | [2019-04-22 06:25:48,923] INFO [ExpirationReaper-0-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:30,492] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:32,304] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:32,375] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka2 | [2019-04-22 06:25:32,800] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:32,801] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:33,351] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka2 | [2019-04-22 06:25:34,468] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:22,746 [myid:3] - INFO [WorkerReceiver[myid=3]:FastLeaderElection@600] - Notification: 1 (message format version), 3 (n.leader), 0x0 (n.zxid), 0x1 (n.round), LOOKING (n.state), 1 (n.sid), 0x0 (n.peerEpoch) LOOKING (my state) +zookeeper2 | 2019-04-22 06:25:22,916 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:QuorumPeer@856] - LEADING +zookeeper2 | 2019-04-22 06:25:22,957 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@59] - TCP NoDelay set to: true +zookeeper2 | 2019-04-22 06:25:23,404 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:zookeeper.version=3.4.9-1757313, built on 08/23/2016 06:50 GMT +zookeeper2 | 2019-04-22 06:25:23,437 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:host.name=zookeeper2 +zookeeper1 | 2019-04-22 06:25:45,301 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10000 +zookeeper1 | 2019-04-22 06:25:45,328 [myid:2] - INFO [QuorumPeer[myid=2]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10000 for client /192.168.224.9:41332, probably expired +zookeeper1 | 2019-04-22 06:25:45,335 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.9:41332 which had sessionid 0x36a43b878a10000 +zookeeper1 | 2019-04-22 06:25:45,387 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:41334 +zookeeper1 | 2019-04-22 06:25:45,403 [myid:2] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.9:41334 +kafka3 | [2019-04-22 06:25:30,109] INFO Client environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,110] INFO Client environment:java.io.tmpdir=/tmp (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,111] INFO Client environment:java.compiler= (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,113] INFO Client environment:os.name=Linux (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:34,832] INFO Loading logs. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:35,440] INFO Logs loading complete in 559 ms. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:44,810] WARN Client session timed out, have not heard from server in 8587ms for sessionid 0x36a43b878a10000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:44,844] INFO Client session timed out, have not heard from server in 8587ms for sessionid 0x36a43b878a10000, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:44,961] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:44,989] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:48,959] INFO [ExpirationReaper-0-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +zookeeper1 | 2019-04-22 06:25:45,452 [myid:2] - INFO [CommitProcessor:2:ZooKeeperServer@673] - Established session 0x26a43b878560000 with negotiated timeout 6000 for client /192.168.224.9:41334 +zookeeper0 | 2019-04-22 06:25:23,233 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper0 | 2019-04-22 06:25:23,241 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper0 | 2019-04-22 06:25:23,251 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.version=1.8.0_191 +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.vendor=Oracle Corporation +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.home=/usr/lib/jvm/java-8-openjdk-amd64/jre +kafka3 | [2019-04-22 06:25:30,114] INFO Client environment:os.arch=amd64 (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,115] INFO Client environment:os.version=4.9.125-linuxkit (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,119] INFO Client environment:user.name=root (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,119] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,120] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka3 | [2019-04-22 06:25:30,122] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +zookeeper0 | 2019-04-22 06:25:23,252 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper0 | 2019-04-22 06:25:23,253 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper0 | 2019-04-22 06:25:23,299 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper0 | 2019-04-22 06:25:23,307 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper0 | 2019-04-22 06:25:23,307 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +kafka1 | [2019-04-22 06:25:30,157] INFO Client environment:user.home=/root (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,157] INFO Client environment:user.dir=/ (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,159] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:30,376] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:30,388] INFO Opening socket connection to server zookeeper2.hlf_net/192.168.224.2:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.class.path=/zookeeper-3.4.9/bin/../build/classes:/zookeeper-3.4.9/bin/../build/lib/*.jar:/zookeeper-3.4.9/bin/../lib/slf4j-log4j12-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/slf4j-api-1.6.1.jar:/zookeeper-3.4.9/bin/../lib/netty-3.10.5.Final.jar:/zookeeper-3.4.9/bin/../lib/log4j-1.2.16.jar:/zookeeper-3.4.9/bin/../lib/jline-0.9.94.jar:/zookeeper-3.4.9/bin/../zookeeper-3.4.9.jar:/zookeeper-3.4.9/bin/../src/java/lib/*.jar:/conf: +zookeeper2 | 2019-04-22 06:25:23,438 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.library.path=/usr/java/packages/lib/amd64:/usr/lib/x86_64-linux-gnu/jni:/lib/x86_64-linux-gnu:/usr/lib/x86_64-linux-gnu:/usr/lib/jni:/lib:/usr/lib +zookeeper2 | 2019-04-22 06:25:23,442 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.io.tmpdir=/tmp +zookeeper2 | 2019-04-22 06:25:23,443 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:java.compiler= +zookeeper2 | 2019-04-22 06:25:23,443 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.name=Linux +zookeeper2 | 2019-04-22 06:25:23,444 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.arch=amd64 +zookeeper0 | 2019-04-22 06:25:23,556 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper0 | 2019-04-22 06:25:23,568 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@61] - FOLLOWING - LEADER ELECTION TOOK - 1202 +zookeeper0 | 2019-04-22 06:25:23,618 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:QuorumPeer$QuorumServer@149] - Resolved hostname: zookeeper2 to address: zookeeper2/192.168.224.2 +zookeeper0 | 2019-04-22 06:25:24,004 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:Learner@326] - Getting a diff from the leader 0x0 +zookeeper0 | 2019-04-22 06:25:24,061 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:FileTxnSnapLog@240] - Snapshotting: 0x0 to /data/version-2/snapshot.0 +zookeeper0 | 2019-04-22 06:25:30,310 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.8:53854 +kafka2 | [2019-04-22 06:25:45,085] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:45,123] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,124] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,330] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:45,332] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka2 | [2019-04-22 06:25:45,336] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10000 has expired (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,437] INFO Socket connection established to zookeeper2.hlf_net/192.168.224.2:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,532] INFO Session establishment complete on server zookeeper2.hlf_net/192.168.224.2:2181, sessionid = 0x36a43b878a10002, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:30,536] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:32,182] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:32,235] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:32,586] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka1 | [2019-04-22 06:25:32,611] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +zookeeper0 | 2019-04-22 06:25:30,363 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.8:53854 +zookeeper0 | 2019-04-22 06:25:30,409 [myid:1] - WARN [QuorumPeer[myid=1]/0.0.0.0:2181:Follower@116] - Got zxid 0x100000001 expected 0x1 +zookeeper0 | 2019-04-22 06:25:30,413 [myid:1] - INFO [SyncThread:1:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper0 | 2019-04-22 06:25:30,463 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x16a43b878390000 with negotiated timeout 6000 for client /192.168.224.8:53854 +zookeeper0 | 2019-04-22 06:25:43,973 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:48858 +zookeeper0 | 2019-04-22 06:25:43,995 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@921] - Client attempting to renew session 0x36a43b878a10001 at /192.168.224.6:48858 +zookeeper0 | 2019-04-22 06:25:43,996 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:Learner@108] - Revalidating client: 0x36a43b878a10001 +kafka3 | [2019-04-22 06:25:30,220] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,224] INFO Waiting for keeper state SyncConnected (org.I0Itec.zkclient.ZkClient) +kafka3 | [2019-04-22 06:25:30,336] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,480] INFO Session establishment complete on server zookeeper0.hlf_net/192.168.224.4:2181, sessionid = 0x16a43b878390000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka3 | [2019-04-22 06:25:30,487] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka3 | [2019-04-22 06:25:32,149] INFO Cluster ID = ROQeeb_IS_CBtvUyEpBtcg (kafka.server.KafkaServer) +kafka3 | [2019-04-22 06:25:32,199] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:32,612] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka1 | [2019-04-22 06:25:34,160] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:34,721] INFO Loading logs. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:35,346] INFO Logs loading complete in 535 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,666] WARN Client session timed out, have not heard from server in 9369ms for sessionid 0x36a43b878a10002 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:44,717] INFO Client session timed out, have not heard from server in 9369ms for sessionid 0x36a43b878a10002, closing socket connection and attempting reconnect (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,339] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10000 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,377] INFO EventThread shut down for session: 0x36a43b878a10000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,385] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,395] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +zookeeper2 | 2019-04-22 06:25:23,444 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:os.version=4.9.125-linuxkit +zookeeper2 | 2019-04-22 06:25:23,448 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.name=zookeeper +zookeeper2 | 2019-04-22 06:25:23,449 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.home=/home/zookeeper +zookeeper2 | 2019-04-22 06:25:23,456 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Environment@100] - Server environment:user.dir=/zookeeper-3.4.9 +zookeeper2 | 2019-04-22 06:25:23,533 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:ZooKeeperServer@173] - Created server with tickTime 2000 minSessionTimeout 4000 maxSessionTimeout 40000 datadir /datalog/version-2 snapdir /data/version-2 +zookeeper2 | 2019-04-22 06:25:23,548 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@361] - LEADING - LEADER ELECTION TOOK - 1632 +zookeeper0 | 2019-04-22 06:25:44,017 [myid:1] - INFO [QuorumPeer[myid=1]/0.0.0.0:2181:ZooKeeperServer@666] - Invalid session 0x36a43b878a10001 for client /192.168.224.6:48858, probably expired +zookeeper0 | 2019-04-22 06:25:44,046 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.6:48858 which had sessionid 0x36a43b878a10001 +zookeeper0 | 2019-04-22 06:25:45,388 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:42678 +zookeeper0 | 2019-04-22 06:25:45,399 [myid:1] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.7:42678 +kafka3 | [2019-04-22 06:25:32,430] INFO [ThrottledRequestReaper-Fetch]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:32,461] INFO [ThrottledRequestReaper-Produce]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:32,465] INFO [ThrottledRequestReaper-Request]: Starting (kafka.server.ClientQuotaManager$ThrottledRequestReaper) +kafka3 | [2019-04-22 06:25:33,220] INFO Log directory '/tmp/kafka-logs' not found, creating it. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:33,757] INFO Loading logs. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:34,064] INFO Logs loading complete in 233 ms. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:44,412] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:23,904 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@329] - Follower sid: 1 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@130b774d +zookeeper2 | 2019-04-22 06:25:23,904 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@329] - Follower sid: 2 : info : org.apache.zookeeper.server.quorum.QuorumPeer$QuorumServer@2173154f +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@384] - Synchronizing with Follower sid: 2 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,950 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@458] - Sending DIFF +kafka1 | [2019-04-22 06:25:44,844] INFO zookeeper state changed (Disconnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:44,891] INFO Starting log cleanup with a period of 300000 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,920] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka1 | [2019-04-22 06:25:44,986] INFO Opening socket connection to server zookeeper1.hlf_net/192.168.224.3:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,003] INFO Socket connection established to zookeeper1.hlf_net/192.168.224.3:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,268] WARN Unable to reconnect to ZooKeeper service, session 0x36a43b878a10002 has expired (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,479] INFO Session establishment complete on server zookeeper1.hlf_net/192.168.224.3:2181, sessionid = 0x26a43b878560000, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka2 | [2019-04-22 06:25:45,491] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka2 | [2019-04-22 06:25:47,739] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka2 | [2019-04-22 06:25:47,987] INFO [SocketServer brokerId=2] Started 1 acceptor threads (kafka.network.SocketServer) +zookeeper0 | 2019-04-22 06:25:45,432 [myid:1] - INFO [CommitProcessor:1:ZooKeeperServer@673] - Established session 0x16a43b878390001 with negotiated timeout 6000 for client /192.168.224.7:42678 +zookeeper2 | 2019-04-22 06:25:23,981 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@384] - Synchronizing with Follower sid: 1 maxCommittedLog=0x0 minCommittedLog=0x0 peerLastZxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,981 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@393] - leader and follower are in sync, zxid=0x0 +zookeeper2 | 2019-04-22 06:25:23,988 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@458] - Sending DIFF +zookeeper2 | 2019-04-22 06:25:24,112 [myid:3] - INFO [LearnerHandler-/192.168.224.4:53930:LearnerHandler@518] - Received NEWLEADER-ACK message from 1 +kafka2 | [2019-04-22 06:25:48,116] INFO [ExpirationReaper-2-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,142] INFO [ExpirationReaper-2-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:44,458] INFO Starting log flusher with a default period of 9223372036854775807 ms. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:47,419] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka3 | [2019-04-22 06:25:47,499] INFO [SocketServer brokerId=3] Started 1 acceptor threads (kafka.network.SocketServer) +kafka3 | [2019-04-22 06:25:48,032] INFO [ExpirationReaper-3-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,041] INFO [ExpirationReaper-3-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,043] INFO [ExpirationReaper-3-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,123] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka3 | [2019-04-22 06:25:48,529] INFO [ExpirationReaper-3-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:45,274] INFO Unable to reconnect to ZooKeeper service, session 0x36a43b878a10002 has expired, closing socket connection (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,271] INFO zookeeper state changed (Expired) (org.I0Itec.zkclient.ZkClient) +zookeeper2 | 2019-04-22 06:25:24,114 [myid:3] - INFO [QuorumPeer[myid=3]/0.0.0.0:2181:Leader@952] - Have quorum of supporters, sids: [ 1,3 ]; starting up and setting last processed zxid: 0x100000000 +zookeeper2 | 2019-04-22 06:25:24,167 [myid:3] - INFO [LearnerHandler-/192.168.224.3:33254:LearnerHandler@518] - Received NEWLEADER-ACK message from 2 +zookeeper2 | 2019-04-22 06:25:30,317 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.9:51908 +zookeeper2 | 2019-04-22 06:25:30,348 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,372 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.9:51908 +kafka0 | [2019-04-22 06:25:48,968] INFO [ExpirationReaper-0-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka0 | [2019-04-22 06:25:49,070] INFO [GroupCoordinator 0]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,145] INFO [GroupCoordinator 0]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,170] INFO [GroupMetadataManager brokerId=0] Removed 0 expired offsets in 84 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka0 | [2019-04-22 06:25:49,375] INFO [ProducerId Manager 0]: Acquired new producerId block (brokerId:0,blockStartProducerId:3000,blockEndProducerId:3999) by writing to Zk with path version 4 (kafka.coordinator.transaction.ProducerIdManager) +kafka0 | [2019-04-22 06:25:49,465] INFO [TransactionCoordinator id=0] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka0 | [2019-04-22 06:25:49,510] INFO [TransactionCoordinator id=0] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:48,567] INFO [ExpirationReaper-3-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,583] INFO [ExpirationReaper-3-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka3 | [2019-04-22 06:25:48,623] INFO Creating /controller (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:48,732] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:48,815] INFO [GroupCoordinator 3]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka3 | [2019-04-22 06:25:48,822] INFO [GroupCoordinator 3]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka3 | [2019-04-22 06:25:48,923] INFO [GroupMetadataManager brokerId=3] Removed 0 expired offsets in 94 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka3 | [2019-04-22 06:25:49,108] INFO [ProducerId Manager 3]: Acquired new producerId block (brokerId:3,blockStartProducerId:2000,blockEndProducerId:2999) by writing to Zk with path version 3 (kafka.coordinator.transaction.ProducerIdManager) +kafka3 | [2019-04-22 06:25:49,297] INFO [TransactionCoordinator id=3] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:49,358] INFO [TransactionCoordinator id=3] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka3 | [2019-04-22 06:25:49,363] INFO [Transaction Marker Channel Manager 3]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka3 | [2019-04-22 06:25:49,896] INFO Creating /brokers/ids/3 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +zookeeper2 | 2019-04-22 06:25:30,386 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,399 [myid:3] - INFO [SyncThread:3:FileTxnLog@203] - Creating new log file: log.100000001 +zookeeper2 | 2019-04-22 06:25:30,465 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,484 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,469 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10000 with negotiated timeout 6000 for client /192.168.224.9:51908 +kafka2 | [2019-04-22 06:25:48,148] INFO [ExpirationReaper-2-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,267] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka2 | [2019-04-22 06:25:48,516] INFO [ExpirationReaper-2-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,573] INFO [ExpirationReaper-2-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,592] INFO [ExpirationReaper-2-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka2 | [2019-04-22 06:25:48,807] INFO Creating /controller (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:48,854] INFO [GroupCoordinator 2]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka2 | [2019-04-22 06:25:48,864] INFO Result of znode creation is: NODEEXISTS (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:48,866] INFO [GroupCoordinator 2]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +kafka0 | [2019-04-22 06:25:49,601] INFO [Transaction Marker Channel Manager 0]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka0 | [2019-04-22 06:25:50,110] INFO Creating /brokers/ids/0 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka0 | [2019-04-22 06:25:50,201] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka0 | [2019-04-22 06:25:50,211] INFO Registered broker 0 at path /brokers/ids/0 with addresses: EndPoint(kafka0,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka0 | [2019-04-22 06:25:50,220] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka0 | [2019-04-22 06:25:50,363] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:50,364] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:50,375] INFO [KafkaServer id=0] started (kafka.server.KafkaServer) +kafka0 | [2019-04-22 06:25:55,266] INFO Topic creation {"version":1,"partitions":{"0":[2,0,1]}} (kafka.admin.AdminUtils$) +kafka0 | [2019-04-22 06:25:55,285] INFO Topic creation {"version":1,"partitions":{"0":[3,1,2]}} (kafka.admin.AdminUtils$) +zookeeper2 | 2019-04-22 06:25:30,514 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10001 with negotiated timeout 6000 for client /192.168.224.6:41242 +zookeeper2 | 2019-04-22 06:25:30,536 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10002 with negotiated timeout 6000 for client /192.168.224.7:49656 +zookeeper2 | 2019-04-22 06:25:30,706 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x3 zxid:0x100000006 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +zookeeper2 | 2019-04-22 06:25:30,721 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x3 zxid:0x100000007 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +kafka1 | [2019-04-22 06:25:45,276] INFO Initiating client connection, connectString=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 sessionTimeout=6000 watcher=org.I0Itec.zkclient.ZkClient@4466af20 (org.apache.zookeeper.ZooKeeper) +kafka1 | [2019-04-22 06:25:45,309] INFO EventThread shut down for session: 0x36a43b878a10002 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,385] INFO Opening socket connection to server zookeeper0.hlf_net/192.168.224.4:2181. Will not attempt to authenticate using SASL (unknown error) (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,396] INFO Socket connection established to zookeeper0.hlf_net/192.168.224.4:2181, initiating session (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,441] INFO Session establishment complete on server zookeeper0.hlf_net/192.168.224.4:2181, sessionid = 0x16a43b878390001, negotiated timeout = 6000 (org.apache.zookeeper.ClientCnxn) +kafka1 | [2019-04-22 06:25:45,468] INFO zookeeper state changed (SyncConnected) (org.I0Itec.zkclient.ZkClient) +kafka1 | [2019-04-22 06:25:47,963] INFO Awaiting socket connections on 0.0.0.0:9092. (kafka.network.Acceptor) +kafka1 | [2019-04-22 06:25:48,064] INFO [SocketServer brokerId=1] Started 1 acceptor threads (kafka.network.SocketServer) +zookeeper2 | 2019-04-22 06:25:30,727 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x3 zxid:0x100000008 txntype:-1 reqpath:n/a Error Path:/consumers Error:KeeperErrorCode = NodeExists for /consumers +zookeeper2 | 2019-04-22 06:25:30,755 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x5 zxid:0x100000009 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers +zookeeper2 | 2019-04-22 06:25:30,787 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x5 zxid:0x10000000a txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NoNode for /brokers +kafka2 | [2019-04-22 06:25:48,933] INFO [GroupMetadataManager brokerId=2] Removed 0 expired offsets in 60 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka2 | [2019-04-22 06:25:49,042] INFO [ProducerId Manager 2]: Acquired new producerId block (brokerId:2,blockStartProducerId:1000,blockEndProducerId:1999) by writing to Zk with path version 2 (kafka.coordinator.transaction.ProducerIdManager) +kafka2 | [2019-04-22 06:25:49,165] INFO [TransactionCoordinator id=2] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka2 | [2019-04-22 06:25:49,188] INFO [TransactionCoordinator id=2] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka2 | [2019-04-22 06:25:49,195] INFO [Transaction Marker Channel Manager 2]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka2 | [2019-04-22 06:25:49,469] INFO Creating /brokers/ids/2 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka2 | [2019-04-22 06:25:49,538] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:48,201] INFO [ExpirationReaper-1-Produce]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,212] INFO [ExpirationReaper-1-Fetch]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,221] INFO [ExpirationReaper-1-DeleteRecords]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,278] INFO [LogDirFailureHandler]: Starting (kafka.server.ReplicaManager$LogDirFailureHandler) +kafka1 | [2019-04-22 06:25:48,499] INFO [ExpirationReaper-1-topic]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,553] INFO [ExpirationReaper-1-Heartbeat]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,657] INFO [ExpirationReaper-1-Rebalance]: Starting (kafka.server.DelayedOperationPurgatory$ExpiredOperationReaper) +kafka1 | [2019-04-22 06:25:48,766] INFO [GroupCoordinator 1]: Starting up. (kafka.coordinator.group.GroupCoordinator) +kafka1 | [2019-04-22 06:25:48,783] INFO [GroupCoordinator 1]: Startup complete. (kafka.coordinator.group.GroupCoordinator) +zookeeper2 | 2019-04-22 06:25:30,843 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x5 zxid:0x10000000e txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +kafka0 | [2019-04-22 06:25:55,304] INFO [KafkaApi-0] Auto creation of topic businesschannel with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) +kafka0 | [2019-04-22 06:25:55,548] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka0 | [2019-04-22 06:25:55,693] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka0 | [2019-04-22 06:25:55,736] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 131 ms (kafka.log.Log) +kafka0 | [2019-04-22 06:25:55,744] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka0 | [2019-04-22 06:25:55,749] INFO [Partition businesschannel-0 broker=0] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka0 | [2019-04-22 06:25:55,750] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka0 | [2019-04-22 06:25:55,751] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,863 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x8 zxid:0x10000000f txntype:-1 reqpath:n/a Error Path:/config Error:KeeperErrorCode = NoNode for /config +zookeeper2 | 2019-04-22 06:25:30,872 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x6 zxid:0x100000010 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:30,883 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x8 zxid:0x100000013 txntype:-1 reqpath:n/a Error Path:/config/changes Error:KeeperErrorCode = NodeExists for /config/changes +zookeeper2 | 2019-04-22 06:25:30,887 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x7 zxid:0x100000014 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +kafka2 | [2019-04-22 06:25:49,555] INFO Registered broker 2 at path /brokers/ids/2 with addresses: EndPoint(kafka2,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka2 | [2019-04-22 06:25:49,568] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka2 | [2019-04-22 06:25:49,631] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka2 | [2019-04-22 06:25:49,632] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka2 | [2019-04-22 06:25:49,653] INFO [KafkaServer id=2] started (kafka.server.KafkaServer) +kafka2 | [2019-04-22 06:25:50,782] INFO Topic creation {"version":1,"partitions":{"0":[2,1,3]}} (kafka.admin.AdminUtils$) +kafka2 | [2019-04-22 06:25:50,797] INFO [KafkaApi-2] Auto creation of topic testchainid with 1 partitions and replication factor 3 is successful (kafka.server.KafkaApis) +kafka2 | [2019-04-22 06:25:50,994] INFO [ReplicaFetcherManager on broker 2] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +kafka1 | [2019-04-22 06:25:48,837] INFO [GroupMetadataManager brokerId=1] Removed 0 expired offsets in 42 milliseconds. (kafka.coordinator.group.GroupMetadataManager) +kafka1 | [2019-04-22 06:25:48,944] INFO [ProducerId Manager 1]: Acquired new producerId block (brokerId:1,blockStartProducerId:0,blockEndProducerId:999) by writing to Zk with path version 1 (kafka.coordinator.transaction.ProducerIdManager) +kafka1 | [2019-04-22 06:25:49,085] INFO [TransactionCoordinator id=1] Starting up. (kafka.coordinator.transaction.TransactionCoordinator) +kafka1 | [2019-04-22 06:25:49,106] INFO [TransactionCoordinator id=1] Startup complete. (kafka.coordinator.transaction.TransactionCoordinator) +kafka1 | [2019-04-22 06:25:49,133] INFO [Transaction Marker Channel Manager 1]: Starting (kafka.coordinator.transaction.TransactionMarkerChannelManager) +kafka1 | [2019-04-22 06:25:49,707] INFO Creating /brokers/ids/1 (is it secure? false) (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:49,760] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka1 | [2019-04-22 06:25:49,770] INFO Registered broker 1 at path /brokers/ids/1 with addresses: EndPoint(kafka1,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka1 | [2019-04-22 06:25:49,781] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka1 | [2019-04-22 06:25:49,846] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:49,849] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:49,864] INFO [KafkaServer id=1] started (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:51,041] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka1 | [2019-04-22 06:25:51,204] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,895 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xa zxid:0x100000015 txntype:-1 reqpath:n/a Error Path:/config/changes Error:KeeperErrorCode = NodeExists for /config/changes +zookeeper2 | 2019-04-22 06:25:30,911 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xa zxid:0x100000017 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:30,914 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xc zxid:0x100000018 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +kafka0 | [2019-04-22 06:25:55,760] INFO [ReplicaFetcherManager on broker 0] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +kafka0 | [2019-04-22 06:25:55,823] INFO [ReplicaFetcher replicaId=0, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +kafka0 | [2019-04-22 06:25:55,836] INFO [ReplicaFetcherManager on broker 0] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +kafka0 | [2019-04-22 06:25:55,925] WARN [ReplicaFetcher replicaId=0, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in businesschannel-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) +kafka0 | [2019-04-22 06:25:55,932] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka2 | [2019-04-22 06:25:51,199] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +kafka2 | [2019-04-22 06:25:51,228] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 75 ms (kafka.log.Log) +kafka3 | [2019-04-22 06:25:49,950] INFO Result of znode creation is: OK (kafka.utils.ZKCheckedEphemeral) +kafka3 | [2019-04-22 06:25:49,967] INFO Registered broker 3 at path /brokers/ids/3 with addresses: EndPoint(kafka3,9092,ListenerName(PLAINTEXT),PLAINTEXT) (kafka.utils.ZkUtils) +kafka3 | [2019-04-22 06:25:50,006] WARN No meta.properties file under dir /tmp/kafka-logs/meta.properties (kafka.server.BrokerMetadataCheckpoint) +kafka3 | [2019-04-22 06:25:50,064] INFO Kafka version : 1.0.0 (org.apache.kafka.common.utils.AppInfoParser) +kafka0 | [2019-04-22 06:25:56,002] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka2 | [2019-04-22 06:25:51,248] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:50,074] INFO Kafka commitId : aaa7af6d4a11b29d (org.apache.kafka.common.utils.AppInfoParser) +kafka1 | [2019-04-22 06:25:51,265] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 139 ms (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,930 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xc zxid:0x10000001a txntype:-1 reqpath:n/a Error Path:/config/clients Error:KeeperErrorCode = NodeExists for /config/clients +kafka2 | [2019-04-22 06:25:51,260] INFO [Partition testchainid-0 broker=2] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:50,097] INFO [KafkaServer id=3] started (kafka.server.KafkaServer) +kafka1 | [2019-04-22 06:25:51,285] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:30,936 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0xe zxid:0x10000001b txntype:-1 reqpath:n/a Error Path:/config/clients Error:KeeperErrorCode = NodeExists for /config/clients +kafka1 | [2019-04-22 06:25:51,292] INFO [Partition testchainid-0 broker=1] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +zookeeper2 | 2019-04-22 06:25:30,946 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0xd zxid:0x10000001c txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,294] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:51,273] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:50,825] INFO Topic creation {"version":1,"partitions":{"0":[1,2,3]}} (kafka.admin.AdminUtils$) +zookeeper2 | 2019-04-22 06:25:30,953 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x10 zxid:0x10000001d txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,299] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:51,281] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,037] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,957 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xe zxid:0x10000001e txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NoNode for /admin +kafka1 | [2019-04-22 06:25:51,322] INFO [ReplicaFetcherManager on broker 1] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +kafka2 | [2019-04-22 06:25:51,282] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,053] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:30,966 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x11 zxid:0x100000020 txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NodeExists for /admin +kafka1 | [2019-04-22 06:25:51,489] INFO [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +kafka2 | [2019-04-22 06:25:51,287] INFO [Partition testchainid-0 broker=2] testchainid-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:51,275] INFO Loading producer state from offset 0 for partition testchainid-0 with message format version 2 (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,977 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0xf zxid:0x100000022 txntype:-1 reqpath:n/a Error Path:/admin Error:KeeperErrorCode = NodeExists for /admin +kafka1 | [2019-04-22 06:25:51,528] INFO [ReplicaFetcherManager on broker 1] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +kafka2 | [2019-04-22 06:25:51,936] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka3 | [2019-04-22 06:25:51,309] INFO Completed load of log testchainid-0 with 1 log segments, log start offset 0 and log end offset 0 in 165 ms (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:30,983 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x12 zxid:0x100000023 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:52,674] WARN [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an unknown offset in testchainid-0. High watermark 0 will be used for truncation. (kafka.server.ReplicaFetcherThread) +kafka2 | [2019-04-22 06:25:55,437] INFO [ReplicaFetcherManager on broker 2] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +kafka3 | [2019-04-22 06:25:51,321] INFO Created log for partition [testchainid,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +zookeeper2 | 2019-04-22 06:25:30,984 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0xf zxid:0x100000024 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:52,696] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,464] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka3 | [2019-04-22 06:25:51,363] INFO [Partition testchainid-0 broker=3] No checkpointed highwatermark is found for partition testchainid-0 (kafka.cluster.Partition) +zookeeper2 | 2019-04-22 06:25:31,000 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10001 type:create cxid:0x14 zxid:0x100000026 txntype:-1 reqpath:n/a Error Path:/brokers/seqid Error:KeeperErrorCode = NodeExists for /brokers/seqid +kafka1 | [2019-04-22 06:25:52,830] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka2 | [2019-04-22 06:25:55,483] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 28 ms (kafka.log.Log) +kafka3 | [2019-04-22 06:25:51,364] INFO Replica loaded for partition testchainid-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:31,020 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x10 zxid:0x100000027 txntype:-1 reqpath:n/a Error Path:/admin/delete_topics Error:KeeperErrorCode = NodeExists for /admin/delete_topics +kafka1 | [2019-04-22 06:25:55,437] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:55,506] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka3 | [2019-04-22 06:25:51,379] INFO [ReplicaFetcherManager on broker 3] Removed fetcher for partitions testchainid-0 (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:31,038 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x12 zxid:0x100000029 txntype:-1 reqpath:n/a Error Path:/isr_change_notification Error:KeeperErrorCode = NodeExists for /isr_change_notification +kafka1 | [2019-04-22 06:25:55,446] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka2 | [2019-04-22 06:25:55,507] INFO [Partition businesschannel-0 broker=2] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:51,572] INFO [ReplicaFetcher replicaId=3, leaderId=2, fetcherId=0] Starting (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:31,064 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x15 zxid:0x10000002c txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification +kafka1 | [2019-04-22 06:25:55,456] INFO Loading producer state from offset 0 for partition businesschannel-0 with message format version 2 (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,508] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,595] INFO [ReplicaFetcherManager on broker 3] Added fetcher for partitions List([testchainid-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:31,089 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x18 zxid:0x10000002d txntype:-1 reqpath:n/a Error Path:/log_dir_event_notification Error:KeeperErrorCode = NodeExists for /log_dir_event_notification +kafka1 | [2019-04-22 06:25:55,473] INFO Completed load of log businesschannel-0 with 1 log segments, log start offset 0 and log end offset 0 in 18 ms (kafka.log.Log) +kafka2 | [2019-04-22 06:25:55,510] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,673] INFO [ReplicaFetcher replicaId=3, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an offset 0 >= the follower's log end offset 0 in testchainid-0. No truncation needed. (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:31,899 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x1a zxid:0x10000002e txntype:-1 reqpath:n/a Error Path:/cluster Error:KeeperErrorCode = NoNode for /cluster +kafka1 | [2019-04-22 06:25:55,475] INFO Created log for partition [businesschannel,0] in /tmp/kafka-logs with properties {compression.type -> producer, message.format.version -> 1.0-IV0, file.delete.delay.ms -> 60000, max.message.bytes -> 1048576, min.compaction.lag.ms -> 0, message.timestamp.type -> CreateTime, min.insync.replicas -> 2, segment.jitter.ms -> 0, preallocate -> false, min.cleanable.dirty.ratio -> 0.5, index.interval.bytes -> 4096, unclean.leader.election.enable -> false, retention.bytes -> -1, delete.retention.ms -> 86400000, cleanup.policy -> [delete], flush.ms -> 9223372036854775807, segment.ms -> 604800000, segment.bytes -> 1073741824, retention.ms -> -1, message.timestamp.difference.max.ms -> 9223372036854775807, segment.index.bytes -> 10485760, flush.messages -> 9223372036854775807}. (kafka.log.LogManager) +kafka2 | [2019-04-22 06:25:55,518] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +kafka3 | [2019-04-22 06:25:51,681] INFO Truncating testchainid-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +zookeeper2 | 2019-04-22 06:25:31,948 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x1c zxid:0x100000031 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka2 | [2019-04-22 06:25:55,519] INFO [Partition businesschannel-0 broker=2] businesschannel-0 starts at Leader Epoch 0 from offset 0. Previous Leader Epoch was: -1 (kafka.cluster.Partition) +kafka1 | [2019-04-22 06:25:55,480] INFO [Partition businesschannel-0 broker=1] No checkpointed highwatermark is found for partition businesschannel-0 (kafka.cluster.Partition) +kafka3 | [2019-04-22 06:25:52,459] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: testchainid-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +zookeeper2 | 2019-04-22 06:25:32,016 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10002 type:create cxid:0x16 zxid:0x100000032 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka2 | [2019-04-22 06:25:55,692] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +kafka1 | [2019-04-22 06:25:55,480] INFO Replica loaded for partition businesschannel-0 with initial high watermark 0 (kafka.cluster.Replica) +zookeeper2 | 2019-04-22 06:25:32,103 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10000 type:create cxid:0x17 zxid:0x100000033 txntype:-1 reqpath:n/a Error Path:/cluster/id Error:KeeperErrorCode = NodeExists for /cluster/id +kafka1 | [2019-04-22 06:25:55,482] INFO [ReplicaFetcherManager on broker 1] Removed fetcher for partitions businesschannel-0 (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:40,002 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10001, timeout of 6000ms exceeded +kafka1 | [2019-04-22 06:25:55,483] INFO [ReplicaFetcherManager on broker 1] Added fetcher for partitions List([businesschannel-0, initOffset 0 to broker BrokerEndPoint(2,kafka2,9092)] ) (kafka.server.ReplicaFetcherManager) +zookeeper2 | 2019-04-22 06:25:40,003 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10001 +kafka1 | [2019-04-22 06:25:55,654] INFO [ReplicaFetcher replicaId=1, leaderId=2, fetcherId=0] Based on follower's leader epoch, leader replied with an offset 0 >= the follower's log end offset 0 in businesschannel-0. No truncation needed. (kafka.server.ReplicaFetcherThread) +zookeeper2 | 2019-04-22 06:25:40,255 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.6:41242 which had sessionid 0x36a43b878a10001 +kafka1 | [2019-04-22 06:25:55,656] INFO Truncating businesschannel-0 to 0 has no effect as the largest offset in the log is -1. (kafka.log.Log) +kafka1 | [2019-04-22 06:25:55,723] INFO Updated PartitionLeaderEpoch. New: {epoch:0, offset:0}, Current: {epoch:-1, offset-1} for Partition: businesschannel-0. Cache now contains 0 entries. (kafka.server.epoch.LeaderEpochFileCache) +zookeeper2 | 2019-04-22 06:25:42,003 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10002, timeout of 6000ms exceeded +zookeeper2 | 2019-04-22 06:25:42,004 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10002 +zookeeper2 | 2019-04-22 06:25:42,032 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.7:49656 which had sessionid 0x36a43b878a10002 +zookeeper2 | 2019-04-22 06:25:44,000 [myid:3] - INFO [SessionTracker:ZooKeeperServer@358] - Expiring session 0x36a43b878a10000, timeout of 6000ms exceeded +zookeeper2 | 2019-04-22 06:25:44,001 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@487] - Processed session termination for sessionid: 0x36a43b878a10000 +zookeeper2 | 2019-04-22 06:25:44,016 [myid:3] - INFO [CommitProcessor:3:NIOServerCnxn@1008] - Closed socket connection for client /192.168.224.9:51908 which had sessionid 0x36a43b878a10000 +zookeeper2 | 2019-04-22 06:25:44,190 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:NIOServerCnxnFactory@192] - Accepted socket connection from /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:44,207 [myid:3] - INFO [NIOServerCxn.Factory:0.0.0.0/0.0.0.0:2181:ZooKeeperServer@928] - Client attempting to establish new session at /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:44,236 [myid:3] - INFO [CommitProcessor:3:ZooKeeperServer@673] - Established session 0x36a43b878a10003 with negotiated timeout 6000 for client /192.168.224.6:41472 +zookeeper2 | 2019-04-22 06:25:48,786 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:setData cxid:0x26 zxid:0x10000003b txntype:-1 reqpath:n/a Error Path:/controller_epoch Error:KeeperErrorCode = NoNode for /controller_epoch +zookeeper2 | 2019-04-22 06:25:48,832 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x6 zxid:0x10000003d txntype:-1 reqpath:n/a Error Path:/controller Error:KeeperErrorCode = NodeExists for /controller +zookeeper2 | 2019-04-22 06:25:48,954 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:setData cxid:0xa zxid:0x10000003f txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = BadVersion for /latest_producer_id_block +zookeeper2 | 2019-04-22 06:25:49,044 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:setData cxid:0x2f zxid:0x100000041 txntype:-1 reqpath:n/a Error Path:/latest_producer_id_block Error:KeeperErrorCode = BadVersion for /latest_producer_id_block +zookeeper2 | 2019-04-22 06:25:49,476 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x18 zxid:0x100000044 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,498 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x19 zxid:0x100000045 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:49,717 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390001 type:create cxid:0x12 zxid:0x100000047 txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,725 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390001 type:create cxid:0x13 zxid:0x100000048 txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:49,897 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:delete cxid:0x4d zxid:0x10000004a txntype:-1 reqpath:n/a Error Path:/admin/preferred_replica_election Error:KeeperErrorCode = NoNode for /admin/preferred_replica_election +zookeeper2 | 2019-04-22 06:25:49,921 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x4f zxid:0x10000004b txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:49,928 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x50 zxid:0x10000004c txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:50,150 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x16 zxid:0x10000004e txntype:-1 reqpath:n/a Error Path:/brokers Error:KeeperErrorCode = NodeExists for /brokers +zookeeper2 | 2019-04-22 06:25:50,161 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x17 zxid:0x10000004f txntype:-1 reqpath:n/a Error Path:/brokers/ids Error:KeeperErrorCode = NodeExists for /brokers/ids +zookeeper2 | 2019-04-22 06:25:50,750 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:setData cxid:0x21 zxid:0x100000051 txntype:-1 reqpath:n/a Error Path:/config/topics/testchainid Error:KeeperErrorCode = NoNode for /config/topics/testchainid +zookeeper2 | 2019-04-22 06:25:50,764 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x26a43b878560000 type:create cxid:0x22 zxid:0x100000052 txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:50,829 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x71 zxid:0x100000056 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid Error:KeeperErrorCode = NodeExists for /brokers/topics/testchainid +zookeeper2 | 2019-04-22 06:25:50,883 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x76 zxid:0x100000057 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions/0 +zookeeper2 | 2019-04-22 06:25:50,891 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x77 zxid:0x100000058 txntype:-1 reqpath:n/a Error Path:/brokers/topics/testchainid/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/testchainid/partitions +zookeeper2 | 2019-04-22 06:25:55,230 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:setData cxid:0x25 zxid:0x10000005c txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,231 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:setData cxid:0x26 zxid:0x10000005d txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NoNode for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,245 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x27 zxid:0x10000005e txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:55,251 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x28 zxid:0x10000005f txntype:-1 reqpath:n/a Error Path:/config/topics Error:KeeperErrorCode = NodeExists for /config/topics +zookeeper2 | 2019-04-22 06:25:55,261 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x2a zxid:0x100000061 txntype:-1 reqpath:n/a Error Path:/config/topics/businesschannel Error:KeeperErrorCode = NodeExists for /config/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,290 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x36a43b878a10003 type:create cxid:0x2d zxid:0x100000064 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel Error:KeeperErrorCode = NodeExists for /brokers/topics/businesschannel +zookeeper2 | 2019-04-22 06:25:55,350 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x8f zxid:0x100000065 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions/0 Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions/0 +zookeeper2 | 2019-04-22 06:25:55,374 [myid:3] - INFO [ProcessThread(sid:3 cport:-1)::PrepRequestProcessor@649] - Got user-level KeeperException when processing sessionid:0x16a43b878390000 type:create cxid:0x90 zxid:0x100000066 txntype:-1 reqpath:n/a Error Path:/brokers/topics/businesschannel/partitions Error:KeeperErrorCode = NoNode for /brokers/topics/businesschannel/partitions diff --git a/hyperledger_fabric/v1.4.3/kafka/logs/dev_orderer.log b/hyperledger_fabric/v1.4.3/kafka/logs/dev_orderer.log new file mode 100644 index 00000000..25be3682 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/kafka/logs/dev_orderer.log @@ -0,0 +1,229 @@ +2019-04-22 06:25:19.571 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +"2019-04-22 06:25:19.950 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 1s + Kafka.Retry.ShortTotal = 30s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = true + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-04-22 06:25:20.432 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +"2019-04-22 06:25:20.438 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +"2019-04-22 06:25:20.706 UTC [orderer.consensus.kafka] newChain -> INFO 005 [channel: testchainid] Starting chain with last persisted offset -3 and last recorded block [0]" +"2019-04-22 06:25:20.750 UTC [orderer.commmon.multichannel] Initialize -> INFO 006 Starting system channel 'testchainid' with genesis block hash dd5aa6427ca850b434f6282d0e77c79064ae4338f53100204d4710281eb72b16 and orderer type kafka" +"2019-04-22 06:25:20.757 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 007 [channel: testchainid] Setting up the topic for this channel..." +"2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 008 Starting orderer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64" +"2019-04-22 06:25:20.761 UTC [orderer.common.server] Start -> INFO 009 Beginning to serve requests" +"2019-04-22 06:25:50.242 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 00a [channel: testchainid] Setting up the producer for this channel..." +"2019-04-22 06:25:50.547 UTC [orderer.consensus.kafka] startThread -> INFO 00b [channel: testchainid] Producer set up successfully" +"2019-04-22 06:25:50.548 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 00c [channel: testchainid] About to post the CONNECT message..." +"2019-04-22 06:25:52.951 UTC [orderer.consensus.kafka] startThread -> INFO 00d [channel: testchainid] CONNECT message posted successfully" +"2019-04-22 06:25:52.952 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 00e [channel: testchainid] Setting up the parent consumer for this channel..." +"2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] startThread -> INFO 00f [channel: testchainid] Parent consumer set up successfully" +"2019-04-22 06:25:52.966 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 010 [channel: testchainid] Setting up the channel consumer for this channel (start offset: -2)..." +"2019-04-22 06:25:53.072 UTC [orderer.consensus.kafka] startThread -> INFO 011 [channel: testchainid] Channel consumer set up successfully" +"2019-04-22 06:25:53.175 UTC [orderer.consensus.kafka] startThread -> INFO 012 [channel: testchainid] Start phase completed successfully" +"2019-04-22 06:25:55.129 UTC [comm.grpc.server] 1 -> INFO 013 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55752 grpc.code=OK grpc.call_duration=131.3442ms +"2019-04-22 06:25:55.143 UTC [fsblkstorage] newBlockfileMgr -> INFO 014 Getting block information from block storage" +"2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] newChain -> INFO 015 [channel: businesschannel] Starting chain with last persisted offset -3 and last recorded block [0]" +"2019-04-22 06:25:55.166 UTC [orderer.commmon.multichannel] newChain -> INFO 016 Created and starting new chain businesschannel" +"2019-04-22 06:25:55.166 UTC [orderer.consensus.kafka] setupTopicForChannel -> INFO 017 [channel: businesschannel] Setting up the topic for this channel..." +"2019-04-22 06:25:55.172 UTC [common.deliver] deliverBlocks -> WARN 018 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55750 because of consenter error" +"2019-04-22 06:25:55.174 UTC [comm.grpc.server] 1 -> INFO 019 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55750 grpc.code=OK grpc.call_duration=193.4332ms +"2019-04-22 06:25:55.319 UTC [orderer.consensus.kafka] setupProducerForChannel -> INFO 01a [channel: businesschannel] Setting up the producer for this channel..." +"2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] startThread -> INFO 01b [channel: businesschannel] Producer set up successfully" +"2019-04-22 06:25:55.368 UTC [orderer.consensus.kafka] sendConnectMessage -> INFO 01c [channel: businesschannel] About to post the CONNECT message..." +"2019-04-22 06:25:55.400 UTC [common.deliver] deliverBlocks -> WARN 01d [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55758 because of consenter error" +"2019-04-22 06:25:55.403 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55758 grpc.code=OK grpc.call_duration=203.4762ms +"2019-04-22 06:25:55.628 UTC [common.deliver] deliverBlocks -> WARN 01f [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55764 because of consenter error" +"2019-04-22 06:25:55.628 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55764 grpc.code=OK grpc.call_duration=202.677ms +"2019-04-22 06:25:55.853 UTC [common.deliver] deliverBlocks -> WARN 021 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55766 because of consenter error" +"2019-04-22 06:25:55.853 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55766 grpc.code=OK grpc.call_duration=201.2625ms +"2019-04-22 06:25:56.080 UTC [common.deliver] deliverBlocks -> WARN 023 [channel: businesschannel] Rejecting deliver request for 192.168.224.5:55770 because of consenter error" +"2019-04-22 06:25:56.080 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55770 grpc.code=OK grpc.call_duration=200.733ms +"2019-04-22 06:25:56.130 UTC [orderer.consensus.kafka] startThread -> INFO 025 [channel: businesschannel] CONNECT message posted successfully" +"2019-04-22 06:25:56.131 UTC [orderer.consensus.kafka] setupParentConsumerForChannel -> INFO 026 [channel: businesschannel] Setting up the parent consumer for this channel..." +"2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] startThread -> INFO 027 [channel: businesschannel] Parent consumer set up successfully" +"2019-04-22 06:25:56.140 UTC [orderer.consensus.kafka] setupChannelConsumerForChannel -> INFO 028 [channel: businesschannel] Setting up the channel consumer for this channel (start offset: -2)..." +"2019-04-22 06:25:56.152 UTC [orderer.consensus.kafka] startThread -> INFO 029 [channel: businesschannel] Channel consumer set up successfully" +"2019-04-22 06:25:56.165 UTC [orderer.consensus.kafka] startThread -> INFO 02a [channel: businesschannel] Start phase completed successfully" +"2019-04-22 06:25:56.324 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.5:55780: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:25:56.325 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55780 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=231.0232ms +"2019-04-22 06:26:01.418 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.5:55814: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:01.420 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55814 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=128.1389ms +"2019-04-22 06:26:01.420 UTC [orderer.common.broadcast] Handle -> WARN 02f Error reading from 192.168.224.5:55816: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:01.421 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55816 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=103.2691ms +"2019-04-22 06:26:03.724 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.5:55822: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:03.725 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55822 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=96.5035ms +"2019-04-22 06:26:03.726 UTC [orderer.common.broadcast] Handle -> WARN 033 Error reading from 192.168.224.5:55824: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:03.727 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55824 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=83.929ms +"2019-04-22 06:26:14.324 UTC [orderer.common.broadcast] Handle -> WARN 035 Error reading from 192.168.224.5:55888: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:14.324 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1871471s +"2019-04-22 06:26:17.075 UTC [orderer.common.broadcast] Handle -> WARN 037 Error reading from 192.168.224.5:55900: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:17.075 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1768334s +"2019-04-22 06:26:20.996 UTC [orderer.common.broadcast] Handle -> WARN 039 Error reading from 192.168.224.5:55922: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:26:20.997 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55922 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.2159801s +"2019-04-22 06:27:05.498 UTC [orderer.common.broadcast] Handle -> WARN 03b Error reading from 192.168.224.5:55936: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:05.504 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55936 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.1933324s +"2019-04-22 06:27:10.989 UTC [orderer.common.broadcast] Handle -> WARN 03d Error reading from 192.168.224.5:55948: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:10.989 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9912ms +"2019-04-22 06:27:13.668 UTC [orderer.common.broadcast] Handle -> WARN 03f Error reading from 192.168.224.5:55962: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:13.669 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:55962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.9001ms +"2019-04-22 06:27:18.593 UTC [common.deliver] Handle -> WARN 041 Error reading from 192.168.224.5:55992: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:18.593 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8334ms +"2019-04-22 06:27:18.990 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.5:55994: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:18.990 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.54ms +"2019-04-22 06:27:19.199 UTC [common.deliver] Handle -> WARN 045 Error reading from 192.168.224.5:55996: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.199 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8085ms +"2019-04-22 06:27:19.548 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.5:55998: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.548 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:55998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.2487ms +"2019-04-22 06:27:19.958 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.5:56000: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:19.960 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.0664ms +"2019-04-22 06:27:20.201 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.5:56002: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.201 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3511ms +"2019-04-22 06:27:20.417 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.5:56004: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.417 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9123ms +"2019-04-22 06:27:20.707 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.5:56006: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:20.707 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.579ms +"2019-04-22 06:27:21.216 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.5:56008: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.217 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1645ms +"2019-04-22 06:27:21.496 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.5:56010: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.496 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.6158ms +"2019-04-22 06:27:21.722 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.5:56012: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:21.723 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.3642ms +"2019-04-22 06:27:22.187 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.5:56014: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6495ms +"2019-04-22 06:27:22.663 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.5:56016: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.663 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8107ms +"2019-04-22 06:27:22.994 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.5:56018: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:22.994 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.2059ms +"2019-04-22 06:27:23.368 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.5:56020: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:23.368 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7461ms +"2019-04-22 06:27:37.382 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.383 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.431 UTC [cauthdsl] deduplicate -> WARN 061 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.440 UTC [cauthdsl] deduplicate -> WARN 062 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.460 UTC [orderer.common.broadcast] Handle -> WARN 063 Error reading from 192.168.224.5:56024: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:37.461 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.5:56024 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.6848ms +"2019-04-22 06:27:37.466 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.5:56022: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:37.467 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=110.595ms +"2019-04-22 06:27:39.802 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.5:56050: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:39.802 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56050 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9753ms +"2019-04-22 06:27:40.300 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.5:56052: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:40.300 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56052 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.017ms +"2019-04-22 06:27:41.503 UTC [common.deliver] Handle -> WARN 06b Error reading from 192.168.224.5:56054: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:41.504 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56054 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8646ms +"2019-04-22 06:27:41.881 UTC [common.deliver] Handle -> WARN 06d Error reading from 192.168.224.5:56056: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:41.882 UTC [comm.grpc.server] 1 -> INFO 06e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56056 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=100.3519ms +"2019-04-22 06:27:42.195 UTC [common.deliver] Handle -> WARN 06f Error reading from 192.168.224.5:56058: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.195 UTC [comm.grpc.server] 1 -> INFO 070 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56058 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.9844ms +"2019-04-22 06:27:42.588 UTC [common.deliver] Handle -> WARN 071 Error reading from 192.168.224.5:56060: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.590 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56060 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8188ms +"2019-04-22 06:27:42.986 UTC [common.deliver] Handle -> WARN 073 Error reading from 192.168.224.5:56062: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:42.993 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56062 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1588ms +"2019-04-22 06:27:43.407 UTC [common.deliver] Handle -> WARN 075 Error reading from 192.168.224.5:56064: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:43.407 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56064 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6195ms +"2019-04-22 06:27:43.909 UTC [common.deliver] Handle -> WARN 077 Error reading from 192.168.224.5:56066: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:43.911 UTC [comm.grpc.server] 1 -> INFO 078 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56066 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.3998ms +"2019-04-22 06:27:45.369 UTC [common.deliver] Handle -> WARN 079 Error reading from 192.168.224.5:56068: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:45.369 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56068 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.3442ms +"2019-04-22 06:27:45.764 UTC [common.deliver] Handle -> WARN 07b Error reading from 192.168.224.5:56070: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:45.766 UTC [comm.grpc.server] 1 -> INFO 07c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56070 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.2845ms +"2019-04-22 06:27:46.147 UTC [common.deliver] Handle -> WARN 07d Error reading from 192.168.224.5:56072: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.147 UTC [comm.grpc.server] 1 -> INFO 07e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56072 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.7551ms +"2019-04-22 06:27:46.449 UTC [common.deliver] Handle -> WARN 07f Error reading from 192.168.224.5:56074: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.450 UTC [comm.grpc.server] 1 -> INFO 080 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56074 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5173ms +"2019-04-22 06:27:46.799 UTC [common.deliver] Handle -> WARN 081 Error reading from 192.168.224.5:56076: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:46.799 UTC [comm.grpc.server] 1 -> INFO 082 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56076 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.8702ms +"2019-04-22 06:27:47.370 UTC [common.deliver] Handle -> WARN 083 Error reading from 192.168.224.5:56078: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:47.371 UTC [comm.grpc.server] 1 -> INFO 084 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56078 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.9332ms +"2019-04-22 06:27:48.953 UTC [common.deliver] Handle -> WARN 085 Error reading from 192.168.224.5:56080: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:48.954 UTC [comm.grpc.server] 1 -> INFO 086 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56080 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.1715ms +"2019-04-22 06:27:49.454 UTC [common.deliver] Handle -> WARN 087 Error reading from 192.168.224.5:56082: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:49.455 UTC [comm.grpc.server] 1 -> INFO 088 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56082 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.9958ms +"2019-04-22 06:27:49.987 UTC [common.deliver] Handle -> WARN 089 Error reading from 192.168.224.5:56084: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:27:49.987 UTC [comm.grpc.server] 1 -> INFO 08a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.5:56084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.5545ms diff --git a/hyperledger_fabric/v1.4.3/kafka/logs/dev_peer0.log b/hyperledger_fabric/v1.4.3/kafka/logs/dev_peer0.log new file mode 100644 index 00000000..d50544f3 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/kafka/logs/dev_peer0.log @@ -0,0 +1,220 @@ +"2019-04-22 06:25:24.138 UTC [nodeCmd] serve -> INFO 001 Starting peer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64 + Chaincode: + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.15:7051" +"2019-04-22 06:25:24.138 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +"2019-04-22 06:25:24.158 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +"2019-04-22 06:25:24.158 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +"2019-04-22 06:25:24.417 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +"2019-04-22 06:25:24.511 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +"2019-04-22 06:25:24.512 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +"2019-04-22 06:25:24.531 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +"2019-04-22 06:25:24.543 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-04-22 06:25:24.544 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-04-22 06:25:24.561 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-04-22 06:25:24.576 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-04-22 06:25:24.580 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-04-22 06:25:24.597 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-04-22 06:25:24.602 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-04-22 06:25:24.603 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +"2019-04-22 06:25:24.604 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:25:24.612 UTC [cscc] Init -> INFO 014 Init CSCC" +"2019-04-22 06:25:24.613 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:25:24.615 UTC [qscc] Init -> INFO 016 Init QSCC" +"2019-04-22 06:25:24.615 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:25:24.617 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:25:24.617 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +"2019-04-22 06:25:24.628 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-04-22 06:25:24.628 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +"2019-04-22 06:25:24.628 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:25:24.629 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:25:25.153 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.153Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.3µs +"2019-04-22 06:25:25.175 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:25:35.155Z grpc.peer_address=192.168.224.13:59544 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9729ms +"2019-04-22 06:25:25.195 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:25:27.194Z grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=148.7µs +"2019-04-22 06:25:57.209 UTC [endorser] callChaincode -> INFO 021 [][24f3659e] Entry chaincode: name:"cscc" " +"2019-04-22 06:25:57.222 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +"2019-04-22 06:25:57.229 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +"2019-04-22 06:25:57.250 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=2ms block_commit=7ms state_commit=4ms)" +"2019-04-22 06:25:57.256 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:25:57.273 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-04-22 06:25:57.312 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-04-22 06:25:57.315 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:25:57.321 UTC [cscc] Init -> INFO 02b Init CSCC" +"2019-04-22 06:25:57.322 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:25:57.322 UTC [qscc] Init -> INFO 02d Init QSCC" +"2019-04-22 06:25:57.323 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:25:57.324 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:25:57.326 UTC [endorser] callChaincode -> INFO 030 [][24f3659e] Exit chaincode: name:"cscc" (116ms)" +"2019-04-22 06:25:57.326 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45222 grpc.code=OK grpc.call_duration=125.6186ms +"2019-04-22 06:25:59.068 UTC [endorser] callChaincode -> INFO 032 [][1237c501] Entry chaincode: name:"cscc" " +"2019-04-22 06:25:59.071 UTC [endorser] callChaincode -> INFO 033 [][1237c501] Exit chaincode: name:"cscc" (3ms)" +"2019-04-22 06:25:59.071 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45230 grpc.code=OK grpc.call_duration=4.0206ms +"2019-04-22 06:26:00.131 UTC [endorser] callChaincode -> INFO 035 [][3a9cff56] Entry chaincode: name:"qscc" " +"2019-04-22 06:26:00.133 UTC [endorser] callChaincode -> INFO 036 [][3a9cff56] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:26:00.134 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45238 grpc.code=OK grpc.call_duration=3.7135ms +"2019-04-22 06:26:02.277 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-04-22 06:26:03.317 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-04-22 06:26:03.317 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +"2019-04-22 06:26:03.350 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:26:03.381 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:26:03.397 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 45ms" +"2019-04-22 06:26:03.403 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.402Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=322.4µs +"2019-04-22 06:26:03.426 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:59546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=38.2627128s +"2019-04-22 06:26:03.427 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.405Z grpc.peer_address=192.168.224.13:60026 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.3911ms +"2019-04-22 06:26:03.465 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 65ms (state_validation=2ms block_commit=30ms state_commit=3ms)" +"2019-04-22 06:26:03.784 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +"2019-04-22 06:26:03.831 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:26:03.832 UTC [gossip.gossip] learnAnchorPeers -> INFO 049 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:26:03.935 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 150ms" +"2019-04-22 06:26:03.949 UTC [comm.grpc.server] 1 -> INFO 04b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:05.948Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=4.411ms +"2019-04-22 06:26:03.989 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:13.96Z grpc.peer_address=192.168.224.13:60038 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.4653ms +"2019-04-22 06:26:03.993 UTC [kvledger] CommitWithPvtData -> INFO 04d [businesschannel] Committed block [2] with 1 transaction(s) in 48ms (state_validation=13ms block_commit=28ms state_commit=4ms)" +"2019-04-22 06:26:04.087 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.085Z grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=332.5µs +"2019-04-22 06:26:04.256 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.255Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.7µs +"2019-04-22 06:26:04.270 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.26Z grpc.peer_address=192.168.224.12:52708 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.8223ms +"2019-04-22 06:26:04.346 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.345Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=171.6µs +"2019-04-22 06:26:04.362 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.349Z grpc.peer_address=192.168.224.12:52710 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.0755ms +"2019-04-22 06:26:04.368 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.367Z grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.8µs +"2019-04-22 06:26:04.533 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.532Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.1µs +"2019-04-22 06:26:04.548 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.537Z grpc.peer_address=192.168.224.14:57184 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2102ms +"2019-04-22 06:26:04.580 UTC [comm.grpc.server] 1 -> INFO 056 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.579Z grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=301µs +"2019-04-22 06:26:04.625 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:26:06.622Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.2801ms +"2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57186 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=48.3559ms +"2019-04-22 06:26:04.630 UTC [comm.grpc.server] 1 -> INFO 059 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:26:14.628Z grpc.peer_address=192.168.224.14:57188 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0459ms +"2019-04-22 06:26:07.280 UTC [gossip.channel] reportMembershipChanges -> INFO 05a Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051]]" +"2019-04-22 06:26:08.476 UTC [endorser] callChaincode -> INFO 05b [][63dcaca1] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:08.494 UTC [endorser] callChaincode -> INFO 05c [][63dcaca1] Exit chaincode: name:"_lifecycle" (17ms)" +"2019-04-22 06:26:08.494 UTC [comm.grpc.server] 1 -> INFO 05d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45296 grpc.code=OK grpc.call_duration=18.9812ms +"2019-04-22 06:26:11.772 UTC [endorser] callChaincode -> INFO 05e [][81961895] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:11.773 UTC [endorser] callChaincode -> INFO 05f [][81961895] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:26:11.774 UTC [comm.grpc.server] 1 -> INFO 060 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45312 grpc.code=OK grpc.call_duration=2.3561ms +"2019-04-22 06:26:12.084 UTC [endorser] callChaincode -> INFO 061 [][56bfd17c] Entry chaincode: name:"cscc" " +"2019-04-22 06:26:12.086 UTC [endorser] callChaincode -> INFO 062 [][56bfd17c] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:26:12.086 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=3.3137ms +"2019-04-22 06:26:12.139 UTC [endorser] callChaincode -> INFO 064 [businesschannel][b65b3fc8] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:12.150 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 065 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:12.151 UTC [endorser] callChaincode -> INFO 066 [businesschannel][b65b3fc8] Exit chaincode: name:"_lifecycle" (12ms)" +"2019-04-22 06:26:12.158 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45316 grpc.code=OK grpc.call_duration=20.4184ms +"2019-04-22 06:26:14.289 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [3] from buffer" +"2019-04-22 06:26:14.296 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [3] in 6ms" +"2019-04-22 06:26:14.299 UTC [confighistory] HandleStateUpdates -> ERRO 06a Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0031ecf80)}" +"2019-04-22 06:26:14.318 UTC [kvledger] CommitWithPvtData -> INFO 06b [businesschannel] Committed block [3] with 1 transaction(s) in 20ms (state_validation=1ms block_commit=12ms state_commit=4ms)" +"2019-04-22 06:26:14.327 UTC [comm.grpc.server] 1 -> INFO 06c streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:42.164Z grpc.peer_address=192.168.224.5:45318 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1567108s +"2019-04-22 06:26:17.004 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [4] from buffer" +"2019-04-22 06:26:17.008 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [4] in 3ms" +"2019-04-22 06:26:17.010 UTC [confighistory] HandleStateUpdates -> ERRO 06f Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0033a3680)}" +"2019-04-22 06:26:17.053 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [4] with 1 transaction(s) in 43ms (state_validation=1ms block_commit=35ms state_commit=3ms)" +"2019-04-22 06:26:17.662 UTC [endorser] callChaincode -> INFO 071 [businesschannel][595fbc5e] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:17.669 UTC [lifecycle] QueryApprovalStatus -> INFO 072 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:17.670 UTC [endorser] callChaincode -> INFO 073 [businesschannel][595fbc5e] Exit chaincode: name:"_lifecycle" (8ms)" +"2019-04-22 06:26:17.671 UTC [comm.grpc.server] 1 -> INFO 074 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45334 grpc.code=OK grpc.call_duration=10.1874ms +"2019-04-22 06:26:18.472 UTC [endorser] callChaincode -> INFO 075 [][e312980e] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:18.473 UTC [endorser] callChaincode -> INFO 076 [][e312980e] Exit chaincode: name:"_lifecycle" (0ms)" +"2019-04-22 06:26:18.473 UTC [comm.grpc.server] 1 -> INFO 077 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45342 grpc.code=OK grpc.call_duration=1.4673ms +"2019-04-22 06:26:18.780 UTC [endorser] callChaincode -> INFO 078 [businesschannel][bc0b62ed] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:18.785 UTC [lifecycle] QueryApprovalStatus -> INFO 079 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:18.787 UTC [lifecycle] CommitChaincodeDefinition -> INFO 07a successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:18.787 UTC [endorser] callChaincode -> INFO 07b [businesschannel][bc0b62ed] Exit chaincode: name:"_lifecycle" (7ms)" +"2019-04-22 06:26:18.789 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45346 grpc.code=OK grpc.call_duration=9.7835ms +"2019-04-22 06:26:20.935 UTC [gossip.privdata] StoreBlock -> INFO 07d [businesschannel] Received block [5] from buffer" +"2019-04-22 06:26:20.938 UTC [committer.txvalidator] Validate -> INFO 07e [businesschannel] Validated block [5] in 2ms" +"2019-04-22 06:26:20.940 UTC [lifecycle] update -> INFO 07f Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-04-22 06:26:20.946 UTC [lifecycle] update -> INFO 080 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleStateUpdates -> INFO 081 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-04-22 06:26:20.948 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 082 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-04-22 06:26:20.948 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 083 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-04-22 06:26:20.987 UTC [kvledger] CommitWithPvtData -> INFO 084 [businesschannel] Committed block [5] with 1 transaction(s) in 47ms (state_validation=14ms block_commit=27ms state_commit=2ms)" +"2019-04-22 06:26:21.016 UTC [comm.grpc.server] 1 -> INFO 085 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:26:48.805Z grpc.peer_address=192.168.224.5:45348 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.2097239s +"2019-04-22 06:26:21.521 UTC [endorser] callChaincode -> INFO 086 [businesschannel][07ad19bd] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:26:21.526 UTC [lifecycle] QueryChaincodeDefinition -> INFO 087 successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-04-22 06:26:21.526 UTC [endorser] callChaincode -> INFO 088 [businesschannel][07ad19bd] Exit chaincode: name:"_lifecycle" (5ms)" +"2019-04-22 06:26:21.528 UTC [comm.grpc.server] 1 -> INFO 089 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45356 grpc.code=OK grpc.call_duration=7.688ms +"2019-04-22 06:26:22.382 UTC [endorser] callChaincode -> INFO 08a [businesschannel][d9f76fa2] Entry chaincode: name:"exp02" " +"2019-04-22 06:26:22.419 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 08b building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-04-22 06:27:05.360 UTC [endorser] callChaincode -> INFO 08c [businesschannel][d9f76fa2] Exit chaincode: name:"exp02" (43046ms)" +"2019-04-22 06:27:05.361 UTC [comm.grpc.server] 1 -> INFO 08d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45364 grpc.code=OK grpc.call_duration=43.0490753s +"2019-04-22 06:27:07.533 UTC [gossip.privdata] StoreBlock -> INFO 08e [businesschannel] Received block [6] from buffer" +"2019-04-22 06:27:07.537 UTC [committer.txvalidator] Validate -> INFO 08f [businesschannel] Validated block [6] in 2ms" +"2019-04-22 06:27:07.564 UTC [kvledger] CommitWithPvtData -> INFO 090 [businesschannel] Committed block [6] with 1 transaction(s) in 26ms (state_validation=0ms block_commit=20ms state_commit=2ms)" +"2019-04-22 06:27:10.719 UTC [endorser] callChaincode -> INFO 091 [businesschannel][a260bae9] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:10.721 UTC [endorser] callChaincode -> INFO 092 [businesschannel][a260bae9] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:27:10.722 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45372 grpc.code=OK grpc.call_duration=4.8236ms +"2019-04-22 06:27:10.957 UTC [endorser] callChaincode -> INFO 094 [businesschannel][afb6f91a] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:10.962 UTC [endorser] callChaincode -> INFO 095 [businesschannel][afb6f91a] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:27:10.963 UTC [comm.grpc.server] 1 -> INFO 096 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45376 grpc.code=OK grpc.call_duration=8.1959ms +"2019-04-22 06:27:11.170 UTC [endorser] callChaincode -> INFO 097 [businesschannel][9da077e1] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:11.175 UTC [endorser] callChaincode -> INFO 098 [businesschannel][9da077e1] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:27:11.176 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45382 grpc.code=OK grpc.call_duration=8.7397ms +"2019-04-22 06:27:13.047 UTC [gossip.privdata] StoreBlock -> INFO 09a [businesschannel] Received block [7] from buffer" +"2019-04-22 06:27:13.053 UTC [committer.txvalidator] Validate -> INFO 09b [businesschannel] Validated block [7] in 4ms" +"2019-04-22 06:27:13.078 UTC [kvledger] CommitWithPvtData -> INFO 09c [businesschannel] Committed block [7] with 1 transaction(s) in 19ms (state_validation=3ms block_commit=11ms state_commit=2ms)" +"2019-04-22 06:27:13.407 UTC [endorser] callChaincode -> INFO 09d [businesschannel][b83d2cc6] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.410 UTC [endorser] callChaincode -> INFO 09e [businesschannel][b83d2cc6] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:27:13.411 UTC [comm.grpc.server] 1 -> INFO 09f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45386 grpc.code=OK grpc.call_duration=6.1882ms +"2019-04-22 06:27:13.630 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][6929c7e0] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.638 UTC [endorser] callChaincode -> INFO 0a1 [businesschannel][6929c7e0] Exit chaincode: name:"exp02" (8ms)" +"2019-04-22 06:27:13.639 UTC [comm.grpc.server] 1 -> INFO 0a2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45390 grpc.code=OK grpc.call_duration=10.2984ms +"2019-04-22 06:27:13.897 UTC [endorser] callChaincode -> INFO 0a3 [businesschannel][2f5fecb5] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:13.901 UTC [endorser] callChaincode -> INFO 0a4 [businesschannel][2f5fecb5] Exit chaincode: name:"exp02" (4ms)" +"2019-04-22 06:27:13.902 UTC [comm.grpc.server] 1 -> INFO 0a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45396 grpc.code=OK grpc.call_duration=6.7979ms +"2019-04-22 06:27:15.699 UTC [gossip.privdata] StoreBlock -> INFO 0a6 [businesschannel] Received block [8] from buffer" +"2019-04-22 06:27:15.702 UTC [committer.txvalidator] Validate -> INFO 0a7 [businesschannel] Validated block [8] in 2ms" +"2019-04-22 06:27:15.725 UTC [kvledger] CommitWithPvtData -> INFO 0a8 [businesschannel] Committed block [8] with 1 transaction(s) in 22ms (state_validation=0ms block_commit=16ms state_commit=2ms)" +"2019-04-22 06:27:16.087 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][b014ef00] Entry chaincode: name:"exp02" " +"2019-04-22 06:27:16.092 UTC [endorser] callChaincode -> INFO 0aa [businesschannel][b014ef00] Exit chaincode: name:"exp02" (5ms)" +"2019-04-22 06:27:16.093 UTC [comm.grpc.server] 1 -> INFO 0ab unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45400 grpc.code=OK grpc.call_duration=10.5268ms +"2019-04-22 06:27:16.696 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][6fc4f9e4] Entry chaincode: name:"qscc" " +"2019-04-22 06:27:16.703 UTC [endorser] callChaincode -> INFO 0ad [businesschannel][6fc4f9e4] Exit chaincode: name:"qscc" (7ms)" +"2019-04-22 06:27:16.708 UTC [comm.grpc.server] 1 -> INFO 0ae unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45404 grpc.code=OK grpc.call_duration=12.6755ms +"2019-04-22 06:27:16.926 UTC [endorser] callChaincode -> INFO 0af [businesschannel][35a24a5f] Entry chaincode: name:"qscc" " +"2019-04-22 06:27:16.929 UTC [endorser] callChaincode -> INFO 0b0 [businesschannel][35a24a5f] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:27:16.930 UTC [comm.grpc.server] 1 -> INFO 0b1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45408 grpc.code=OK grpc.call_duration=4.6791ms +"2019-04-22 06:27:17.500 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][3bc38859] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.502 UTC [endorser] callChaincode -> INFO 0b3 [businesschannel][3bc38859] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:27:17.504 UTC [comm.grpc.server] 1 -> INFO 0b4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45412 grpc.code=OK grpc.call_duration=4.6602ms +"2019-04-22 06:27:17.700 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][5f602553] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.705 UTC [endorser] callChaincode -> INFO 0b6 [businesschannel][5f602553] Exit chaincode: name:"cscc" (4ms)" +"2019-04-22 06:27:17.706 UTC [comm.grpc.server] 1 -> INFO 0b7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45416 grpc.code=OK grpc.call_duration=6.5725ms +"2019-04-22 06:27:17.974 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][a8300ed2] Entry chaincode: name:"cscc" " +"2019-04-22 06:27:17.977 UTC [endorser] callChaincode -> INFO 0b9 [businesschannel][a8300ed2] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:27:17.978 UTC [comm.grpc.server] 1 -> INFO 0ba unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45420 grpc.code=OK grpc.call_duration=3.8956ms +"2019-04-22 06:27:37.502 UTC [gossip.privdata] StoreBlock -> INFO 0bb [businesschannel] Received block [9] from buffer" +"2019-04-22 06:27:37.505 UTC [cauthdsl] deduplicate -> WARN 0bc De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.506 UTC [cauthdsl] deduplicate -> WARN 0bd De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:27:37.578 UTC [gossip.gossip] JoinChan -> INFO 0be Joining gossip network of channel businesschannel with 3 organizations" +"2019-04-22 06:27:37.580 UTC [gossip.gossip] learnAnchorPeers -> INFO 0bf Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:27:37.605 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c0 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c1 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:27:37.606 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c2 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:27:37.623 UTC [committer.txvalidator] Validate -> INFO 0c3 [businesschannel] Validated block [9] in 120ms" +"2019-04-22 06:27:37.632 UTC [comm.grpc.server] 1 -> INFO 0c4 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.63Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=296.4µs +"2019-04-22 06:27:37.646 UTC [comm.grpc.server] 1 -> INFO 0c5 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.12:52712 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m33.3708033s +"2019-04-22 06:27:37.703 UTC [kvledger] CommitWithPvtData -> INFO 0c6 [businesschannel] Committed block [9] with 1 transaction(s) in 79ms (state_validation=1ms block_commit=51ms state_commit=15ms)" +"2019-04-22 06:27:37.707 UTC [comm.grpc.server] 1 -> INFO 0c7 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.705Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +"2019-04-22 06:27:37.708 UTC [comm.grpc.server] 1 -> INFO 0c8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.704Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=183.9µs +"2019-04-22 06:27:37.720 UTC [comm.grpc.server] 1 -> INFO 0c9 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.13:60044 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m33.7270124s +"2019-04-22 06:27:37.724 UTC [comm.grpc.server] 1 -> INFO 0ca streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.711Z grpc.peer_address=192.168.224.13:60238 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2621ms +"2019-04-22 06:27:37.729 UTC [comm.grpc.server] 1 -> INFO 0cb streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.661Z grpc.peer_address=192.168.224.12:52890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=67.2458ms +"2019-04-22 06:27:37.759 UTC [comm.grpc.server] 1 -> INFO 0cc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:27:47.72Z grpc.peer_address=192.168.224.14:57366 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.7322ms +"2019-04-22 06:27:37.774 UTC [comm.grpc.server] 1 -> INFO 0cd unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:27:39.774Z grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=132.2µs +"2019-04-22 06:27:37.806 UTC [comm.grpc.server] 1 -> INFO 0ce streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.14:57372 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=22.1067ms +"2019-04-22 06:28:07.906 UTC [endorser] callChaincode -> INFO 0cf [][93c2e1e6] Entry chaincode: name:"cscc" " +"2019-04-22 06:28:07.907 UTC [endorser] callChaincode -> INFO 0d0 [][93c2e1e6] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:28:07.908 UTC [comm.grpc.server] 1 -> INFO 0d1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45518 grpc.code=OK grpc.call_duration=2.1597ms +"2019-04-22 06:28:09.826 UTC [endorser] callChaincode -> INFO 0d2 [][97392766] Entry chaincode: name:"qscc" " +"2019-04-22 06:28:09.832 UTC [endorser] callChaincode -> INFO 0d3 [][97392766] Exit chaincode: name:"qscc" (6ms)" +"2019-04-22 06:28:09.834 UTC [comm.grpc.server] 1 -> INFO 0d4 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.5:45526 grpc.code=OK grpc.call_duration=9.3072ms diff --git a/hyperledger_fabric/v1.4.3/network_config.json b/hyperledger_fabric/v1.4.3/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/network_generator/__init__.py b/hyperledger_fabric/v1.4.3/network_generator/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/hyperledger_fabric/v1.4.3/network_generator/config_manager.py b/hyperledger_fabric/v1.4.3/network_generator/config_manager.py new file mode 100644 index 00000000..5bf3fef2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/config_manager.py @@ -0,0 +1,6 @@ + + +class ConfigManager(object): + + def __init__(self, peer_base, orderer_base): + return \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/network_generator/network.py b/hyperledger_fabric/v1.4.3/network_generator/network.py new file mode 100644 index 00000000..2bff61c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/network.py @@ -0,0 +1,13 @@ + + +class Network(object): + """ + Network consists of several nodes: + * orderer nodes in a orderer org + * peer nodes in app orgs + * ca nodes + * client nodes + """ + + def __init__(self): + pass \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/network_generator/network_generator.py b/hyperledger_fabric/v1.4.3/network_generator/network_generator.py new file mode 100644 index 00000000..f2416b2a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/network_generator.py @@ -0,0 +1,242 @@ +#!/usr/bin/env python +# Generate Hyperledger Fabric Network docker-compose.yaml files +# base on input parameters +# github.com/yeasy/docker-compose + +# tested with version 0.15.3 +from ruamel.yaml import YAML +import argparse +import copy +import collections + +DOCKER_COMPOSER_VERSION='2.0' +DEFAULT_CONFIG_FILE = 'network_config.json' +PEER_TEMPLATE_FILE = 'peer.yaml' +ORDERER_TEMPLATE_FILE = 'orderer.yaml' +RESULT_FILE = '{}orgs-{}peers-{}.yaml' + +# Orderer +# consensus_mode, org_name, node_name +ORDERER_GB_VOLUME = './{}/channel-artifacts/orderer.genesis.block' +ORDERER_GB_PATH = '/var/hyperledger/orderer/orderer.genesis.block' +ORDERER_MSP_VOLUME = './{}/crypto-config/ordererOrganizations/{}/orderers/{}/msp' +ORDERER_TLS_VOLUME = './{}/crypto-config/ordererOrganizations/{}/orderers/{}/tls' +ORDERER_MSP_PATH = '/var/hyperledger/orderer/msp' +ORDERER_TLS_PATH = '/var/hyperledger/orderer/tls' + +# PEER +# consensus_mode, org_name, node_name +PEER_MSP_VOLUME = './{}/crypto-config/peerOrganizations/{}/peers/{}/msp' +PEER_TLS_VOLUME = './{}/crypto-config/peerOrganizations/{}/peers/{}/tls' +PEER_MSP_PATH = '/etc/hyperledger/fabric/msp' +PEER_TLS_PATH = '/etc/hyperledger/fabric/tls' + + +yaml = YAML() +yaml.explicit_start = True + + +def list_to_dict(l, sep=':'): + """ + Convert list to dict with order + :param l: list + :param sep: separator + :return: dicted result + + >>> list_to_dict(['a=1','b=2'], '=') + OrderedDict([('a', '1'), ('b', '2')]) + >>> list_to_dict(['a:1','b:2']) + OrderedDict([('a', '1'), ('b', '2')]) + """ + result = collections.OrderedDict() + for x in l: + k, v = x.split(sep, 2) + result[k] = v + return result + + +def dict_to_list(d, sep=':'): + """ + Convert the given dict to list + :param d: dict + :param sep: separator + :return: + + + >>> dict_to_list({'a': '1', 'b': '2'}) + ['a:1', 'b:2'] + """ + result = list() + for k,v in d.items(): + result.append('{}{}{}'.format(k, sep, v)) + return result + +def parse_args(): + """ + Parse the args + :return: + """ + parser = argparse.ArgumentParser() + parser.add_argument('-f', "--config_file", help="Path to the config file", + type=str, default=DEFAULT_CONFIG_FILE) + args = parser.parse_args() + print(args.config_file) + + +def gen_peer(template, org_name, org_msp, node_name, consensus_mode): + """ + Generate peer for given org and name + :param template: Template to use + :param org_name: Name of org, + :param org_msp: MSP ID of the org, + :param node_name: Name of the peer + :param consensus_mode: Mode of consensus + :return: + """ + node = copy.deepcopy(template) + addr = node_name # e.g., peer0.org1.example.com + node['container_name'] = addr + node['hostname'] = addr + + # update environments part + environment = list_to_dict(node['environment'], '=') + environment['CORE_PEER_ID'] = addr # peer id + environment['CORE_PEER_ADDRESS'] = addr+':7051' # peer grpc port + environment['CORE_PEER_CHAINCODELISTENADDRESS'] = addr+':7052' # chaincode + environment['CORE_PEER_GOSSIP_EXTERNALENDPOINT'] = addr+':7051' # gossip + environment['CORE_PEER_LOCALMSPID'] = org_msp # org msp name + node['environment'] = dict_to_list(environment, '=') + + # replace volumes part + volumes = { + PEER_MSP_VOLUME.format(consensus_mode, org_name, node_name): + PEER_MSP_PATH, + PEER_TLS_VOLUME.format(consensus_mode, org_name, node_name): + PEER_TLS_PATH, + } + node['volumes'] = dict_to_list(volumes, ':') + + return node + + +def gen_peers(org_name='org1.example.com', org_msp='Org1MSP', num=2, + consensus_mode='solo'): + """ + Generate given num peers for Organization org_msp + :param org_name: Name of the org, + :param org_msp: MSP of the organization that peer belongs to + :param num: Number of peer nodes to generate + :param consensus_mode: Mode of consensus + :return: + """ + c = yaml.load(open(PEER_TEMPLATE_FILE, 'r')) + peer = c['services']['peer'] + result_peers = dict() + for i in range(num): + name = 'peer{}.{}'.format(i, org_name) # peer0.org1.example.com + result_peers[name] = gen_peer(peer, org_name, org_msp, name, + consensus_mode) + return result_peers + + +def gen_app_orgs(orgs=2, peers=2, consensus_mode='solo'): + """ + Generate peer orgs with given number + :param orgs: Number of app orgs to generate + :param peers: Peers number for each org + :param consensus_mode: Mode of consensus + :return: + """ + services = dict() + for i in range(orgs): + org_name = 'org{}.example.com'.format(i+1) # match crypto-config.yaml + org_msp = 'Org{}MSP'.format(i+1) + services.update(gen_peers(org_name, org_msp, peers, consensus_mode)) + return services + + +def gen_orderer(template, org_name, node_name, consensus_mode): + """ + Generate peer for given org and name + :param template: Template to use + :param org_name: Name of org, + :param org_msp: MSP ID of the org, + :param node_name: Name of the node + :param consensus_mode: Mode of consensus + :return: + """ + node = copy.deepcopy(template) + addr = node_name # e.g., orderer0.orderer.example.com + node['container_name'] = addr + node['hostname'] = addr + + # replace volumes part + volumes = { + ORDERER_GB_VOLUME.format(consensus_mode): ORDERER_GB_PATH, + ORDERER_MSP_VOLUME.format(consensus_mode, org_name, node_name): + ORDERER_MSP_PATH, + ORDERER_TLS_VOLUME.format(consensus_mode, org_name, node_name): + ORDERER_TLS_PATH, + } + node['volumes'] = dict_to_list(volumes, ':') + + return node + + +def gen_orderers(org_name='orderer.example.com', num=2, consensus_mode='solo'): + """ + Generate given num peers for Organization org_msp + :param org_name: Name of the org, + :param num: Number of peer nodes to generate + :param consensus_mode: Mode of consensus + :return: + """ + try: + c = yaml.load(open(ORDERER_TEMPLATE_FILE, 'r')) + orderer = c['services']['orderer-{}'.format(consensus_mode)] + result_nodes = dict() + for i in range(num): + name = 'orderer.example.com' + #name = 'orderer{}.{}'.format(i, org_name) + result_nodes[name] = gen_orderer(orderer, org_name, name, + consensus_mode) + return result_nodes + except Exception as e: + print("Failed to gen_orderers with {}:{}".format(PEER_TEMPLATE_FILE, e)) + return dict() + + +def gen_orderer_orgs(orderers=1, consensus_mode='solo'): + """ + Generate peer orgs with given number + :param orderers: Orderers number for each org + :param consensus_mode: Mode of consensus + :return: + """ + services = dict() + org_name = 'example.com' # match crypto-config.yaml + services.update(gen_orderers(org_name, orderers, consensus_mode)) + return services + + +if __name__ == '__main__': + import doctest + doctest.testmod() + + parse_args() + + # network topology config + app_org_num = 2 + app_org_size = 2 + orderer_org_size = 1 + consensus_mode = 'solo' + + network = dict([('version','2.0'), ('services', dict())]) + network['services'].update(gen_orderer_orgs(orderer_org_size, + consensus_mode)) + network['services'].update(gen_app_orgs(app_org_num, app_org_size, + consensus_mode)) + + with open(RESULT_FILE.format(app_org_num, app_org_num*app_org_size, + 'solo'), 'w') as f: + yaml.dump(network, f) diff --git a/hyperledger_fabric/v1.4.3/network_generator/node.py b/hyperledger_fabric/v1.4.3/network_generator/node.py new file mode 100644 index 00000000..e4898448 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/node.py @@ -0,0 +1,15 @@ + + +class Node(object): + """ + Node is a base class, representing a peer/orderer/ca in the network + """ + + def __init__(self, org, name): + """ + + :param org: which org it belongs to + :param name: name of the node + """ + self.org = org + self.name = name diff --git a/hyperledger_fabric/v1.4.3/network_generator/orderer.py b/hyperledger_fabric/v1.4.3/network_generator/orderer.py new file mode 100644 index 00000000..f3637fc2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/orderer.py @@ -0,0 +1,9 @@ + + +class Orderer(object): + """ + An orderer node + """ + + def __init__(self, org_name, node_name): + pass \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/network_generator/requirements.txt b/hyperledger_fabric/v1.4.3/network_generator/requirements.txt new file mode 100644 index 00000000..9d42d870 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/network_generator/requirements.txt @@ -0,0 +1,6 @@ +# Copyright, All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +ruamel.yaml>=0.15.0,<=0.16.0 diff --git a/hyperledger_fabric/v1.4.3/orderer.yaml b/hyperledger_fabric/v1.4.3/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.3/org3/configtx.yaml b/hyperledger_fabric/v1.4.3/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk new file mode 100644 index 00000000..45972fca --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/62aa54ce7756dfb251e858aa527bffbceb93e3a04d8f363cbdd7c2ea21308511_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgcmU5hHQfNnzjg4az +RKQSD9RgxiFWqIiDryomGy35lp+hRANCAASkfqYVKYDeEuhn5ymHW8oI5Wv716Xy +87zpe7qL/tH9duivwoEVqw8RIaAZHW6KeUp4PcWMySx2f97R8AHddCHJ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk new file mode 100644 index 00000000..ee3aab50 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/33c7b2b6aa02a571783992f6bdc11153b9d8f8a55b1c16c6071e738e3d3ebc0b_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgJCzb+ZKzQoFnfLFR +Q31npnJfrRd2Xe34RVLlMAQAFqmhRANCAARbgk5JAT6X2pJM0+UmiindL6DNVGtO +EAs/TALn5q+X4UHWuEZH0gOQNyHcnvwKcwXBqdliHWLrL4wOubno+W62 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..c9384c29 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrrtKXqYQD+q3TM2oC9TnwwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFuCTkkBPpfa +kkzT5SaKKd0voM1Ua04QCz9MAufmr5fhQda4RkfSA5A3Idye/ApzBcGp2WIdYusv +jA65uej5brajTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0cAMEQCIDIH9kzDurmSCQVHkthwEBCZwk4p03DRiYpkf1oyBWN1AiAFfZpU +aEENnw5XUIPAoRyzOOSTY0I6GtydC1NpR8FHAw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..aec1664d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMA2l1rNUWWc9seezl856ZMwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN3Um9a+FQxYJ1DWxT8Jhrx9SRBC +JM/0+zR11n4mia05HLbDkTID0rCbg45kcXg2XRgLEZL4gqQx6AhfijPUFgejgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQD5m/MiLVdgLPKgd6j4H+NHNa7GoCVx +w3howyS8C0ChtQIgeYwU8+cLcfQFvQODJHoiwoD5yy9pE6kEb/CXvIhi0zw= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..f9bbe2c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgB667xyPSl1+zAEQX +tdh+e9XPGLfOhf2jQfnFetOZ79qhRANCAATd1JvWvhUMWCdQ1sU/CYa8fUkQQiTP +9Ps0ddZ+JomtORy2w5EyA9Kwm4OOZHF4Nl0YCxGS+IKkMegIX4oz1BYH +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk new file mode 100644 index 00000000..f9f8044b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/5984f77816a0b8d61f7cff9c53b1b9b5966572baab8230648d91cc64de786c60_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg+NTgE/U6uQ0FjLO +bIbAVtwudJiyZ2b/0SjDXDhF1+ShRANCAATDYUicHa7jK+lGZSBq66KDMDgynuAL +zvEz6H4MWzPeMJL5UQuAw221MUgOoGH4PM1vxxPTV4bhygOestXtafRb +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..6bc7edcd --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIRAIBMNPpMs7nwScnRzsPIEu0wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABMNhSJwdruMr +6UZlIGrrooMwODKe4AvO8TPofgxbM94wkvlRC4DDbbUxSA6gYfg8zW/HE9NXhuHK +A56y1e1p9FujTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGKqVM53Vt+yUehYqlJ7/7zrk+OgTY82PL3XwuohMIURMAoGCCqGSM49 +BAMCA0gAMEUCIQCO1d9DWHQziVxi0MDw8XBjR8KPAfcxtupiJKgZSEzuiAIgIKBO +JKeHTZq1BeY0CXQyichphK/mtDPLYQ0BgPIURQk= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..31391b9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRANQWZco+vteAJbiiCQhXEkYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLUPejsEpYbmMB2Wdj0PjPrj6i18 +E9iS/Q2wyNIdXP3lBVHkaeKGAvgsUwgYh3VcTc4iE/DcZ0L/bBzcoqog3W6jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/ +rl7zUkfSQPPX7PaYMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCICHbbc0B4jiXVZ2QHYWDVZ/UPlP5TsFD +T1uGe3SQpqL1AiACJwPFESbS5oQ4tIGq5xgaX7jGO8tUtxa9ZwdPzg9+zg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..2599f46b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbFm24U3lwsMeoIsv +/f1xZyEOhEBDx7ts/EB46rl8mhuhRANCAAS1D3o7BKWG5jAdlnY9D4z64+otfBPY +kv0NsMjSHVz95QVR5GnihgL4LFMIGId1XE3OIhPw3GdC/2wc3KKqIN1u +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk new file mode 100644 index 00000000..5c7686f6 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/e690645dbda040dff4bbb138c9ec854e62dc923fae5ef35247d240f3d7ecf698_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgAmLaRgf/Xu30U/8Z +2mFBgBEWNPZdxauvQMtJrr6y/qmhRANCAARwv90la+t9fdIBzUJErJPaC6kRjSdU +nUqSMqnb0J3QAvrIIid6+1RWvHQzdeeGx9bUXoTyCROCIjYhh0Qi1AFN +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk new file mode 100644 index 00000000..994dea45 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/a294329d6629d8e230d110d216e200267221ffe74cb73c548de4da80b461d8ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQglcdFwvvVibyvpf0r +xhsGqeryE4FUBbcSPWKRTppvkqKhRANCAAQVQ0Pu9k39+7UR1ikZd88E5ZfnirQG +McPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rThD3s6RQjNf7C +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..174683ec --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAPqtprB/A3ATzGlHfGEnB5wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQVQ0Pu9k39 ++7UR1ikZd88E5ZfnirQGMcPBvqzCqpoCXhN98Q/tgcof+G/6aDk/TWhP1mkI/8rT +hD3s6RQjNf7Co00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNIADBFAiEAnbhJdCCRNvwBj9V3NV2QaSVINJih4TFNYZa/SwN0M/YCIAyU +A47JPbiKphK2XHyxbB3tZnYsvq5bPuPxrlfP/Yp2 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt new file mode 100644 index 00000000..f88de09f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAJBSKB/l1MpjIwbI31xmzdgwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABHVmoqoD8/CcTY/bPz26IbcwKtLp +ZeH6rs/BKoNZK26KiknyrLHB5KxG5YZeXbGTlceTgSrRNxyaTlwCC+GfbLijbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCDmkGRdvaBA3/S7sTjJ7IVOYtySP65e +81JH0kDz1+z2mDAKBggqhkjOPQQDAgNHADBEAiBVJZqFkPw4blUc6m9XMY7V51sc +jPXZjnnk5Xu++XKKFgIgJvtzvtQJpjht3QROQZGtHcBinRMti4U0CRf1zG1WCS4= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key new file mode 100644 index 00000000..3382b281 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmeFTv2ciA/kYRnh+ +kVWvfb4ktVUDkumCCXbih8OA//ehRANCAAR1ZqKqA/PwnE2P2z89uiG3MCrS6WXh ++q7PwSqDWStuiopJ8qyxweSsRuWGXl2xk5XHk4Eq0Tccmk5cAgvhn2y4 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1ce97206 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk new file mode 100644 index 00000000..73c8ef41 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/984b3f8d48aa66afa1fbceb74f568f9849322eb6c5cea704eb5199cd1506c5a6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg6LGxc+PqT81bLQuB +hkGmJcKaFwjsfutfkZBzHJlBZ12hRANCAATJ2cdr1D+/h4bT23rejW2hu7wo6qal +qujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2uZbCm9B6BW1r +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..45ed7641 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIQRydBj+PweWWoL77xQKSpdTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzMuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATJ2cdr1D+/ +h4bT23rejW2hu7wo6qalqujynRRNn9fe4bn1IZi9C02jhIQY0EaHzD+/nQuH4/N2 +uZbCm9B6BW1ro00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCBiqlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjO +PQQDAgNHADBEAiBOjzu6Hc/xkY4rc7TcKBiWqsroVRT4C5kFMRWW/uLZBAIgR0J3 +B/hNgIBR3LgsLVfHBjFs/RiHdkYj2Ch6Nddmneo= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..47f6847e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAKMqXYSDfqKM/Yyx0n20Np8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1 +OTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMy5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABHC/3SVr63190gHNQkSsk9oLqRGNJ1SdSpIyqdvQndAC+sgiJ3r7VFa8 +dDN154bH1tRehPIJE4IiNiGHRCLUAU2jbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQg5pBkXb2gQN/0u7E4yeyFTmLckj+uXvNSR9JA89fs9pgwCgYIKoZIzj0E +AwIDRwAwRAIgVrJ7q/VG3TFv+UxAO2NMlVDMIj51LWTSO1cpyhwLU/gCIFSLXGCc +9hJeMRMVGubqwnFLqWIWA0eEAOd5HRlxT33l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..542fb541 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQVTvJ6670W07z+fGIyCZWvjAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEpq6FkIq1GRnFROyFIU4fV/oaPWfL +S5Rj1fvNCeRB7fNqShdWBrJgm0C/RIuj/qeIPr9Ux/TZGh6MmS2Kppu3F6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIOaQZF29oEDf9LuxOMnshU5i3JI/rl7z +UkfSQPPX7PaYMAoGCCqGSM49BAMCA0gAMEUCIQDpTO2+Ybk6EAFB+GP+y/gkNydc +ervKvJkljwWxqCFgXAIgMweY+oC827oZ/VhnYx2RrNzzs3ET9fN4eSoM/0yFlts= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..2a50e1f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsfvE1XUsEOWmUoe9 +OY2XrcfD0p5DVdrGeBwBUuRNUK6hRANCAASmroWQirUZGcVE7IUhTh9X+ho9Z8tL +lGPV+80J5EHt82pKF1YGsmCbQL9Ei6P+p4g+v1TH9NkaHoyZLYqmm7cX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.3/peer.yaml b/hyperledger_fabric/v1.4.3/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.3/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.3/prometheus.yml b/hyperledger_fabric/v1.4.3/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.3/raft/README.md b/hyperledger_fabric/v1.4.3/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..4a3a955a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 0000000000000000000000000000000000000000..9947cbbf79facafc43c8f154147fa9c045bffa64 GIT binary patch literal 296 zcmd;D%ETqgCCtI3#Gh1JoSBzeT%4Sdn3tEDBh<~r)xpGtAsj9g%Ej$iP>_?EoLG{X zpC{zT!6;=1sS9+B+DhuB~}3B80h5# h9ix|8k(gVMld6}TpDWO9E(Ns*w@Z-S3v(5W1^_?>PHF%E literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSP.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSP.json new file mode 100644 index 00000000..3c690199 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWYyZ0F3SUJBZ0lRWEJLVjBEQzlmYUhLNENvcFE3M2F6VEFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTUKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN5TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN5TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVBQkRESDNxbTlMUjVpanJiTUZjTmtVWitteW9GWC9EV1ZzUXNyVTluamdTcVR1ZU96NkpScldlVAorUlpUT2tHWUNxM2pmSDF3bVZLeWVvTzR3MkdiQzZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQUNkbGtHSmNJYkxUVUhJaUpCcVd1U1VmeW1hQUxlM0RVU2VwN3B5MWgwbFRBS0JnZ3Foa2pPUFFRRApBZ05JQURCRkFpRUE2aXRjNHRYMy94RGV6NUxEZWdBeWlFR0NZSWRPSm8xNnRhcVcwK3FEMzlFQ0lISTE0aGF4CnUwK2o4VUZQUlBPbTJSU0Izc3pLS1FXY0c1dFhWUWEzdnJUdQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org2MSPanchors.tx new file mode 100644 index 0000000000000000000000000000000000000000..6e5a13ae91e8e2d83b7e620784f37a98bfc553e1 GIT binary patch literal 296 zcmd;D%ETqgCCtI3#Gh1JoSBzeT%4Sdn3tEDBh<~r)xpGtAsj9g%Ej$iP>_?EoLG{X zpC{zT!6;IPHg}H literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org3MSP.json new file mode 100644 index 00000000..12090b0f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/Org3MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRUnd2RkRzR0Z3L0h5Sm1XRUF3VXBpVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEg2bUZTbUEzaExvWitjcGgxdktDT1ZyKzllbDh2Tzg2WHU2aS83Ui9YYm9yOEtCRmFzUEVTR2dHUjF1aW5sSwplRDNGak1rc2RuL2UwZkFCM1hRaHlhTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQmkKcWxUT2QxYmZzbEhvV0twU2UvKzg2NVBqb0UyUE5qeTkxOExxSVRDRkVUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBMHpMQ1JhNDVIMmVnbGZnaDRNREtxYnVOa2ZKQUE5Nlhja09pemR0VVhCQUNJR1hmVTJ6RUdvR21hWW5JCmRZd1MzaGhuZ0hpd2daMDRWeWNHdTVnVVBDK2oKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUtNcVhZU0RmcUtNL1l5eDBuMjBOcDh3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpNdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpNdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTXk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCSEMvM1NWcjYzMTkwZ0hOUWtTc2s5b0xxUkdOSjFTZFNwSXlxZHZRbmRBQytzZ2lKM3I3VkZhOApkRE4xNTRiSDF0UmVoUElKRTRJaU5pR0hSQ0xVQVUyamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWc1cEJrWGIyZ1FOLzB1N0U0eWV5RlRtTGNrait1WHZOU1I5SkE4OWZzOXBnd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdWcko3cS9WRzNURnYrVXhBTzJOTWxWRE1JajUxTFdUU08xY3B5aHdMVS9nQ0lGU0xYR0NjCjloSmVNUk1WR3VicXduRkxxV0lXQTBlRUFPZDVIUmx4VDMzbAotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx new file mode 100644 index 0000000000000000000000000000000000000000..99a325b2a2be7867184b0dd64c8a801b7113521f GIT binary patch literal 1600 zcma)6%Wl&^6fLjRT${E`Lkos<5fBmxuv%Ik>H_jAL~2VR0hZCkzG+9;W8-m9^8>6| zBC%n^XRziI*sy2Af=^)V*iO=_Om?2pJ&$|l`oebuN^n&>Z5FhTKfnDsSDx?o1>-1$ zeLy)!mwYkcvjNAhH_0u~D?#8gn?}s%#3VY*z6keMcUpU7COxbr2XhXf=5yhP5$k(o z#{8j^ulgkXldhfm55r##&Q@yMg8bIVFAcWfM#p76v@m(_ zPlBw#HLEsk#2Pbey+Z0>DBvC#0b*$Fg?``*JhA?5$fCIZ0Tf+f+c78Ow(nr$kcmjG zvk6xcogCNp^Uo7SGm{VD()(ES8Aestx8GFVp%S@%Pw%0$0KsaQ$ew zx!F;;N*bwt#P)M44wSH`u#!Y9yKQn2Q64cGp_4mMhy4haGKM+^u0QaQN38&DrS{}l z)qKxmQ7$}1>)Dvd7t0)s;54F215cooyjY8QeOI0DQpzwEzGB literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..cbf8f5ce --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:06Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 0000000000000000000000000000000000000000..512d69379c83776b9e6086d5ce6df7f0dbd126fb GIT binary patch literal 25815 zcmeHPd$8kHdCxA%vYfoO+CY*^2-_t*cHP9b{N|aXr)68RWlMgw9gt;NmTXzJC0n+q z6d0yJ!=wBGEmJ7a1{h#~0;P~CfewWsP&y0++Ds`ekY)-bJkpj4LxG`3_O47?3}fBAFh`viFM$zvNQPQK~xcYg1(vsX7pj?vQ`M{O&; zp4P=ad;+}j1OWMAQyXeSzEr?oapGqGi=bIfI78A!iDNhtO7#3F;5m+@B$9-Uybe8% zfI25OT#@ONi!RO(~ZiuG#}UEv9FevX*%f{ZgGj;>EZtr9bps$e!|w9FISqH~+i z)vN7xqe?jSQp{}Np$RjCWkMIq1mq>k652Vd9IaKt9%!)gsD`Ipo`_Z{iH`A9XDU$8 z6QqvEGd4QL&5!ZY>X=uN=o}9_^T7bo=E-uIpU^W{T#TSgWJhQ>*sj%xWJXGbo-ihq z7w1%oDx-4-!KxO62JX&44Np$e5^OAQk6}~OI$NIBtDLvI&DC8p9gp^E>8xGnW@d&+XQ1Sxu)4Rt;2wR3el5fI6!QFE2*fX;OI3|@?ibzoPAW7sW5 zvn7?Yvz$ljHE#1`(P&{&C3L}}$hBdDjp__x!SOx`~nc_iVQh z+e|&LBphgtRpMp;OaR59%Kh(oMqFxu+_~<$CIRDoVoWpKEhrRvW*2!-i3OAWT zaBFERxRvevG-1Tuaylc13mKM!ji_$!f!pk&!>!H}>Jn}uTIfB#6zgg%ygqLbKJp%hTgc{?8CV2_QcvJLvN=A?)6m)F5I7Y9I0Y1%7$QjHm&{C6N zw=D5R-lG>g2}gTsD&ou)1x&So0V--(}LY7nabD5!H*mOuJzTeH9nRe6iy( z{#q5qEIlF6cB4-Az^>?dtiSNl-UaB1VAe{p{TuFs&)x6@vS*XJoKGuKEEUg4TwNMx z^8G=jJ78^Ai8T@>In`Dpl^k0xS@l-MZIGjq)E_3}CLV7qBH$ufn2X_|gwW0u27$QH zPYx4t!R6Wg@X1;{5t_p@BZ~7~6p*CDLQ!T2k0;T-JS23QA<*stC0Ot$HeKWi*hcs0%e*KNv|{QWuke!#%cMc9F@6Z5>|&!$=B|E$*cVodal*5&%+rksIs6AF@qk1U9iGfU4N$1ecxG)nJY9+wZO!!uUmC*dojhHRb zzLl8KququsJ%i1aCFvC%fYvy&cKbH=(rs1Xk)g{=T!^P&7@^Ip_{Yrov59{S%nzCb z?(ZNMVz0q=gT2jOA7uk+`AZl09s$}xDou7W^LLT`HxU9|kY|bMfGzRS6x3;!Bp1H} z=+S8y;vkW2*pXBw!3Y#XQiTjxY844((ov~tdfdt6Vn#d@iQB!Z*$ahcW0COeR+o~e zAWUnMRK!WzX1&W$7T%Y$?Q}E~a$`-V&|}SpL=1TtouiCe7(w4|5q)#r+&S2kvoFFYmX-*e)rOya#v}1Dvw_-CjuG_B! z+LbJ)n}wkx7-6rO3l4OBN;+`IibQj;&5UNnuBgP|w3mko77zE*$~4>RX$>%fP9V}C(Sw%>lYSByrRLgvownhcnYvDX;+g_Ls5hJ27(_C1fEyAX{sS-TUiq=1Z z+)wPj6JTxU)^=`f=N?5nhn-NnhSqa8zOx3~+NoSSm5-`ZiCx;)wBgzBuA#Pu+8Sz) zF4QhlnwHT!fBzb5YpkuY_UK~m@%ADRuyF$VpmWZK!RBw+GqIvuW!gjK&)uMl{AQBzP9!g&}y zDnr9PdXMwVkMf5Lau)X)+1mmeAKoNq-+K;w+d1ql3vzaT^5MU<%6x=~4U?TQjmxDR zn#1}GZ|7$K zhrL;u57I_3<7&Lw?pD&FxZ4mkB4_CtChBzEPRI??pdU(h;{wemQ-sq+!3xTp>iFQX zBWLqKiB-i`DrHJ)zh$t&yrwZkSJWd!IAThrOh~VX!=5t@g{fU(f-Q2En4}2LYJ_mA zR59?F))#_oE~ii9$pOskNje*C3|J2jM08W<^tz?Eq@1p+VxMbX6|WxG}HkK(Q|6J8X>{M9fw?>{;dPRI~F@4`&H>%2A`CQW7&lxs>Q*Dc z38l?qISR%4rUoLjYg{v*vBPm!8B{`n0ToHnB$wvG(Y7)Hqfo$1%1ohH$Xj@^L`0lf zHY-+CHs)5#q7oSorO^T5%|}4Yu5H}K4?yk(&_e_u_clBLX-lAiwT<%wkiQ%o_sEFZ zHQ3f*TRW6Tb|@bSF}sG^8ft5(9UW?qgqU4pZH=`x){c&~J;W^HOAlv1eG+rUupWiV z^*dY$mAhl0BT>2Adn}3Bjc0%>NTshdjIQAtnu9$Fy8-}kq8xr<^o2Nf$?~IYJa7_R z3dx*$KPaoYMAue3#8enr4Q+U6#~3)RZgwQ?Udzzu-4E?XgQxAD+||u) zP41zWL8I@w?X=>w5AAjQ! z_0X|*E-TWuEW=$5e1wm_Tqfv=E$?8fyW%Q`-oOjMQ|3>sWLTpv`q+!dCJi-B?l;lj zhhAXsq)QWyI<#99U^`ceKjfjk&|uma&25k|x+p56HIKHwBH-7S3u8VzT(4yxI@ZnL z^2Jz38zTj-U5+6Qm7b%h{)RwI51)(WmUH&(DiC%ZcGbzpVQ5=g#Jf%%U$u#WYjVqN zXnP3kDcEV$0fslRy`^hyMUp&3gE`0Vh_VLr$9j904{qWgchw}9WUoE7S zmVA8?<~lIafq`JqR`e3p7>NQ#x=V}>2s_Lc}?q z;6Rzdyg&14F}Y9~K%Rt3Z5~cQ(xNUw%q1J!a-%tv%Dqx75NI7F=b6@iPC3Zb|{iaKl0UJw~$nD+`g4_ zr{SRN4Fgp-HxkOx&i^SSFTI~*=n%UQwZF0e%w+~kWq~lW z)nUhr&BlR1ypgN6r3zVZDv7|rix*iYK8{I-oQf3^N~#siTHW}x4wz{ylW;mBk3w3> zL@efoU1AUv@TsF38k-l=A=Z>60%;BRC=1d$1$i(>(WX`hnh>pAgc78~<2;_A8RC=V(Tb6VDO87)#HVq7?(Ku#|Q zh@9<31*NK|%I%mr3?*_I*vZrUWZEh)F}s+7Y%yb1X#HVDgTHVnCPdS>F4htgB3o9n?cC#H%>;e*sqk>hcX~}Ycp6Vc#Y^NiMI-l#2DMrN=X*w8iolMMfAjuKK zp(nG+0cm^AKx&ri?UC2&537tCv9;(Z!EqCijWmWXti%q8_%1!avym6m zTXNP_{ww#E9DLO&y7YIk^Vk{G=Z0;4PGMJV@3W0SKtnCFx{f^5(lb3W8}P~V;7asr zafHQhK$n;PPq_zlTEhcg1q~Idp=GdODA@JoPwPq-G|}GG7Cp` zZgw7tBMY{)w;_*RXm3#tNfAkEi(Sb;ni9OfeV z9v4yMa8tl*LMk(gw!(Z2Wn*=WT1ZUK;vmHY*Z`bPtiF?>g>=VK`Y4YnNA?R5Z$dX( z<2XM|!-Cb&1EyZrJ-sgPkiH}L!`Hr7^xfLp?T+dWX|0Kz)NRsQu&=#lyfLbHKkKzT6K^n7cjwTwx^_X-G&hu zl0!2-Ner81-K{lrPZoOKj1G6=ju=97dXS+%yGGnYsNMNB;#S2b)`+`!h}&-e!WU}) zvMVv%X&$&l5kTrUTDz#L|zOv8uQnFS;ay za;J0Ys^vOOURTR_l=mV=qLnSj>Ub`i;nhT{S}Y6WiH6dif$Yj0kz*#Alq+USf;x*7 z8bO)V4GO1o9Y#&^G#T~EwP{|xDE4oSxC$5d-yS){k>39z+%S_>Ygv4hp_)C( zZb_VR*TyIV!Z|WF93Cw33NV zBHC+?amD%-eE-{%7QW;CZ__i|{{FWTAK(_w6vLgio#E)58_bOxBWV_vr-7jsWfBwB z3+thNHbu$|BmqZu0_3bRwI(gtGZRwQo+ay*oKQ$oRn_f4FP=q3*!rPfUqmS&G!>?-V1a2$75S9vNpjS@Kg zs-i{Bafik{$HKu*E*l&vh2lK8dY;lzR=NgCaq;UZK2!z+y55RhUbT4ynGhQ1n$oAvNk*Si^9 zKc9LEr6z55D7nLt>W+pQb_%J!e}TTPUN-k<|F9gBBR%mWJjG>10DIY!!C!8G|MF|v zqO6;ff3$y1+pnAeA3d>Bm}Bofl-FlfeX$W5u8BrvE4z$ z$3n#Y*i_hLomIZdh1i_E6*k4FM=gTvIod0?=RtOJn;O>hDq^MRDwP=YOZ$Pnl|*;C zfBUlkG{j|Ai9)VPg2}W%!5pbHsID1-Ii)UI?X(;nX3btD)=v@ba*#+wDk_;vOKwt{ zxOiK%dnpxnTpLMB3&2i=3P}r9yk+ADM&P$I`rFM5SViD-VObQ=y+~QLrzemgIvNX0 zZLyv92sJGSTTL%7*T~c?qiaiI!jF;8`IS`~3LSL_TsIOay%0#pXJoX)kV-xhW@{5Q zSd+z3kB&IyjvTcoh{R8uJ+c5IG~XXfB|&QAP1Vua4yP9Z>n}&a#jUy$yRWd${9R}ME^@8cnZKLf*1oCi>&)MI zEgA60Gk*{Cv$ly6&i+!;c#q^_U07c7((BqdyJOeBWdKXvD=uYL7LUh}gjJeYs(2Mfo~9J}tRFQ@K#(WSS(~-ZYyIHwA8c4}xNU;5A^P~QU-FOYbAEjH$F%=`Qb>OJJ>~a*_iz9C zx#j7x-uJ~kcKfSuI)3Js ypFicJH}?MS8TX#beWrfd+rEC^?YZCk*>`Tb?WzYq{j}$Q=d~Z&0N|44zyAT!J;0p+ literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..fde49042 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1105 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXRENDQWY2Z0F3SUJBZ0lSQUlvendvVlFYYWR5anNWcnF6VzdDSU13Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCS2JvMzlKN0ZOREZDRFBKSVNmUkJheGtjRHlIdmtKTDVpNkozNm9uWGpuMDB6dlFCd29mbERVeQoxRWV4OTNzOG9qWmxGRG0ycFVLaEg0SjB0NWRGUG5HamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdhcEZORzRrb0lxdFdvRllJbHBXK2hXS0lnalByc05pMXdkTC9xZ2d5Q3NBd0NnWUlLb1pJemowRQpBd0lEU0FBd1JRSWhBS1FsUWE1QXluT0E3RzIxbkhheUtmbmViakh2ZmRDREF2Q1loaC9WRGpqWEFpQXllNEo3ClhWTVhFbXVQVXdmMk1Db293MUUwQnVCUHpldEFQRW1Cb0RsOVNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQVBYclNNcXJGc2QveUkwYXNoOGg2TlV3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkJ0TDBabjVtOHJMM09uSTNhVTFkTjJZTjlKdTRmMU01bFV2a2lZMFFIejYKOUYrRytBeXhtcHNKRU5Ia21hcElnWkxDcFAzd3hFYmZ2Nk1ySEFQbWJnK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNREFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBYlBpejFUNDZDTlJiNGZzODhoeFR0VTZsTkZuNTN0NmZOU0JXS0RiY1hzUUlnCkYveUtuYUhMbGJpK3JDcmo2eDdyZFZndFliZ3dVTm53ekUxazZzUTBQM3c9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIDnQP+q7Ob3kHxypiGmLsXeQ98G8QI2LtIz8CfZPPLBQAiABGB+DROJgBECk7RC42il9y1ZFx7zTimbu0fZibZSKeA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "eC8grKJ8pL6U4fubqFfSi7jsCn1c7n9W" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:23Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "a2OKP1lzN2pCDzZzdmE0QX9v3zo24iVL" + } + } + }, + "signature": "MEUCIQDWYzv317dl+hYwVYPiVq3pyts8VvJfDSTeWu+/OMfwmwIgFcQuZKjmu/C8HOAywuAuiPA5NC5jb30pAXr/lR+whqU=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:24Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "I2S4qtrOeOF5Pgmv12rkXQHpeGYnxkue" + } + } + }, + "signature": "MEUCIQCjLWkF1fls1+2sdK3Qt36doDpgV4n21DaH6s5PEqOLJAIgLv0dth5uzCbkEEzEWgWf3OqjTIX86CSKDvbDIz7ojbE=" + } + ] + }, + "header": { + "data_hash": "4uT0NshrUMmO1NmPQL2M3TRbtLOuqTjDR7pKAuucseM=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..cc2f44d2 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,399 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG\nSM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ\nFy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM\nBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6\n7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO\nW3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n\njrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw\nKQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG\nSM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIDnQP+q7Ob3kHxypiGmLsXeQ98G8QI2LtIz8CfZPPLBQAiABGB+DROJgBECk7RC42il9y1ZFx7zTimbu0fZibZSKeA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=eC8grKJ8pL6U4fubqFfSi7jsCn1c7n9W +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-09-24T01:04:23Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=a2OKP1lzN2pCDzZzdmE0QX9v3zo24iVL +.data.data[0].payload.data.last_update.signature=MEUCIQDWYzv317dl+hYwVYPiVq3pyts8VvJfDSTeWu+/OMfwmwIgFcQuZKjmu/C8HOAywuAuiPA5NC5jb30pAXr/lR+whqU= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:24Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w\nbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE\nBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz\nY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI\nKoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs\nYGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA\nMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ\noXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU\nPoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=I2S4qtrOeOF5Pgmv12rkXQHpeGYnxkue +.data.data[0].signature=MEUCIQCjLWkF1fls1+2sdK3Qt36doDpgV4n21DaH6s5PEqOLJAIgLv0dth5uzCbkEEzEWgWf3OqjTIX86CSKDvbDIz7ojbE= +.header.data_hash=4uT0NshrUMmO1NmPQL2M3TRbtLOuqTjDR7pKAuucseM= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 0000000000000000000000000000000000000000..6b0d9b4fa4331593d008982148c30a82910ee774 GIT binary patch literal 25491 zcmeHv540m!dEdUZy}Q1)*PF4y_9HmU)_}drTBFf_AcQ-AHIinek!JL-r-zJ2qtT2s z8c8$KNP?y$CjmleXdQ=>oCM+|kQN`}LpcE&9B{zFX-(4v2#1`Lq&aO9(uO34CY+W7 zA-y9#>HXV%?|HqrrPZFZ`}WP;J9l(-f8TfS@B4lqV9#w~7sJ1K-!u1@KJ)f3i|@Pd ziO`#W@NE3CKYQ^0PiY@`<2yh8!T<6vKC^xCf$r0H{HL>DntmR8=JF%Nzxf^J3qSs2 zuYX!^|HNZo`lHqzk6ppu{nQqC1pR&HlUv~PXTZzOZEc@9_uenP|F3SjbZ2wyntk1M zwT{~F>pkqlXTZ;#0iZBy=_7q4l#AF~&s+)qkPOF*7b&JB^DIw6nOR%~0?$*lOi{2| zFrd$q(BP$}C$Zg%((QJ0M53T%xKYKo<}gPZ#<0`13Pnkxp+yb^$@Kvx)#-{Pag3j> zD04;@&_FPvFcc}|B!YF-YGb0=@j+c?ssbr3?vYbLR0wv=GmROjSL2pi6RqZ)Q3R4- zcJ2uIMy=Cn)=0Nej$2IvpR#jUAq}xYLP4f&v6Htev3fP)gC?hp>qOcU$XJb*nYciA zXCe)KQSSNz>!54=;+i0@ulZG($qTT%7z~gdfvQx5DKm$q)Fj{cC1#J zDQiJxc~6t+3c6>KoMy9V;NBe6iPSVB!{+MsSS~$laFto3#`~++T)!pT^%=jO$vF*v zZs8P^>O9!_g@%$wO9o^LHQQ-1N*glye1uOyO&q(qxqvIZxz;vhE29jFPISiVDKATz z6&KVw!JGNyBq5DDLKhC08F~(_S2VdEr46#`C3+r_6Gee>ecC|ZSP3seDHA3k`YH__ z0s;ELWV9HcA;Z2z2@v`@f6>q)Daq#@Xc!T{lW#c5kVM7Ix~JBLOtvdziBe2z0H-#Z zz+NeqD{H)y<9*7g^E)4lK?{p6qX(8Gz5@$QWsi7BjFley-}wW>I7^O87dw!Khy1lrOM`~X<2 zYDT0FuXOC*Cx7Kf|MJmK7jf*__g#3|H^%+XeeT)vV{iN8cVU11u`TfRU)?%)8hh?n zx3J$*!EJCb=$V@8nNA=3kcx2p-Viuj7#WcOQICWW0zdi?xGDJMiHERXc?f&#q21em zdMw}+8Ue1YuK`za3bUk{@G6t;7bF8Ov z(_Y>dCrz2r1kzcwfm1=Q6U-P~y&=?DADyVILn&lbIi5~r zWxgR#vW3C0+8c5Xr^cJfvXbs-(Q2NnlNTlxSssj135!T{R0;6W9L&cFJSldv z#bGER4pO6JLi7agY6#_Qfy5U8%}Ub3jsl8uIVdSC=?fIH%p=lZSQ6O}D8phfv6+%U z!gh)wWr*xbCM-}3bJwB`$s{Q%4Jr&RQGR#U&&CQwo!1L3C8qGD6s(bvVl=AJJq}K^ zSv_-bB^qJ|(j)^AI{VXX&YerTMs)>A>BYkps6?tUuT3QDF=wLA#|=EnOQCE};thVx z`g+MvrpK*HyW*9>TpvTB#gsU_P)m3NR|yrh5!I*+N#-adljp(B+-k0!Pk>vp}}wz zwfsMTK9hks56N89iKeqjR-{>qE@t_1yF{wfu13!?lWsO2Hxt=t!s*wnK90{P66rhb z9<9tkgwdzzsGD-EMvtX!VxZ(YnOGM0;w`q==d7kojszH6pp0I+!N7Bo18ezhfJ|9o zmivG`Xbaq&UnfaP$)Gp%>7~zU56ifRfnzf zy+Jk9spfdYDvn&yjQFj5cxV_i%7yz@B$|Ugjx;CrBsC6a{Q^vKM5LclXSsG?Z(5m2 zyG7A(Le)E+aD}$48baz!k7bjfRuO89JuWJKn-D0+@godQj>+O&_h6B+Nr&#G%kW4) z+W2*}0mc6E4A}U&ji1~2x$mH#!_H_uQ}27*|7`=d&8Bj*sr-&^DzTdfx<0z}-#1X( zKy3rH?<~}AQCqgzzxr6U(74;oxjZS5YLw#a@X8r^b8s^tlbYb=_xgkLt+uPTu44>ZRVjBxs3%lYK{M z`@=i*?Bfq%zxWXL3rl)-ar5~fTNNQn#z(2{gdvo29?fE7PP7h^Vix&g(6i=A>DfaK z|1YCwXD6j+4>vpsJv)GI2a;Y|Z?m>3HIhY2>PH-Z(t!PWMF=xyIP2+x)#+6;c*1Ln zI+?ePEE{usUKjVm3>e_4UP5GqRGM^qC}2TbGlLkuc=T)msPUTAPNywd8?;R>T+nrv z>`6wHj6^NDoW+esB;va>JVGA`6ztNox(fJ+oDq z*Q2yj)(6SKEYiVy2UaA2hRCDH2n$UHCQMI@d9`SGO6&7@o<`BWnThD^I^QZ}ok+q{ zhgCc@q@!tu;xl|C)={TmjEAh0!WK)#f=!glWYnGKa#B^};$E#HsnN+u9v>0nd;!$# z#>d_G5aeM1T_Xf}xZx2^ZVx!?aB<`e99O?)`<)2|32=AM)wJN5W?yq! zIx{t0@Az?E3+`Ktv+gH5>;GPJ(A7&O!Apk0pq%cJJxA-3GjVJ;_0h2%YTs40z#x#b!6}MjnZl~0N+BAE} znCLF{QtWmBz?n+qjj=Zp*r`>!OP6-zQ}T%~jqr9iv_wT!b9o>3mbFsIPL1=9u0m8ls zvA4futq4LI2J9PmZ~w=;mgq{`-h0!hy zg~N_&l<6KnoMj3*lxn@|mR|A;Agu~zMuda-#T)-AbkYAA6KkA?8K;pxqG z&$Uvan3WV$W>3R$DQ;Pz@WAdj+cxj%Sy8STmLKV5E1jY^WTbM{anRsEox?&f^BF0% z)EPj5f@*ycPC)Xa9!V}l8+)>&d6dk()+~@{9i$ey);p3TR)7n^f}ab%vJze(DW2hZ zQRB;mS_pUHn78xQUZO)aXsXrK8NjJ*BI#!po$B_f9Ayg7S*MF5l^6wa4GN5e==FJY z+^RPF?LnhFV0wefG*uf`v!En$;jR#EL`L(Wl#Gb2Y=lRt(m7p8r3X18()PwWQBw-3 ziN$y`yH;{KTE)X9aa^{_w4s2Aab&9Wr5`yKNmLN|YI3_sD!Sgl&U>>+Sn)@pnwKAo zm00)xDI~GGfvy{cBnPS2meL*+ejyuNWYFxA2M~32Z2?#a4OZF$aqeiNt{dzVFf0-? zS2K04AZBpRl4TO<4G(DxG6oF=ut3p{S_fJXtz3i>q{ZWXsVh)9coYZ%41l9SU?31E z6fe<{9_Lab({c!LmTHQl>cHk3`PjGss!?lJG4feGS|{UtB&kB)sD#M8FZ{oNie zAiCb~Vh>{Xqi)-Kx}6Vp&AUSK^-!qOYDawHPOF{i_Wj^?QuVZsY}&dr_OSEV&EPcQ zt{%SqecvIwN?CEfK#=3?{jV&~QkPPn(<{^VtF2Rehfdfy$p@@$}EAH0nH(q(W? z_q5hXZF|_Gm%-oP0q)+(kHh!ny}cv3{oJv3suqX}jkRvR1dFv%Ss0F3w-ui8I65+? zItfuZxMKVO=r86j`079h`*pt0V<*fmcft$5^+I;SU{}72``l8#i;_@ENR?aaX?A5M zPzTf9_M0P=aIq^8TY8<2%FGiW z&4#!ToK5Y4n`OjI*H#B85h_m&icx>cG~1JeFv`H9-84d$(J*|Yq3qMoqy0-DpsyMS z<+*!zy8G0*7TV?RQRjlII(*ijpt1?H(Xp9OB=0vSsXjErdRQwYh%q%&T5QfU#bR1; zZLreyGLmEp6h$3Xe84a|yOX<}NEtbh@j&5o-7s+}78=mF*Y9`-nnxPRjvJ%tes8un%deiU~vG32BNH^h1IGWR= zb_$m^h`WYhUf3XRU9n<=xEqJKz5Z{1-uLtHf4TKO9coY{BV?Fn9beZgr5M|y@WXl1 z-|hSKRqdD?w@<%D?U=(QEDofFp`^=ok(G7r7@RiM23b`iqSzVRT3qeZN-^3ehSQ21 zHw+>Ys%EKLOled?ePE5Ua<*y4!a9?z4;zl(sj-cADN!3rT%=){awvtj8J1Sm0%_9} ziBcZ-kv<5GsQQEok6?WQ54~o6P+gh*b!N~$=y0K#tL?|HwH*gLbWsV>MLy5-3Mwqn zZPcEb_?@NS8UOO09evRtCKRtqU7s*re=F?OE9zw5fl8VnQZ4O@dlBP zWd$vnu9Yg{WU8aQX`pxtPv+TaHtk8dvZ&3Y#b#Kc43j39e3#Wy0z<|8N_|$)ZixTe zAntmrHLXv^8^kR*)^%y8|34A8*Z&dMasCUUAbZb$xvm^?vWiV|gX&!N>ZYBlh7Og& z+MNG(sy7{f{yU_nIMMkp%8#-+t)3&sS-RDiowls0HpjFlb!ifn$I_V2mkpajf*%kS z3;rODa`uOvfz(Yknx>zRS>s|`Nfl6*LOYf0CS(29gi!78!t>vuyz+hLznz`g-t*sD zy+GImTZ(i$PL^l#UN}E#j^%konT1Arj7?58KVsm6T$)l?NCBSehNyXUW>4F&ZzbiN zGfy?Dd9j$HYns=EejI#M#$eDhnjz=a(S8@5^_R4EnZgY+;7 z+;=tJ_ccj8j<0X+I}-1|wQskuxV3%HI$dpNyzq|T`Z53k5$%jTb8I7G9s?K33x)OW z)%Bzw#coG;GgnZC%Y`5%%j_GlXE;bP-LWwYI|p_u;;o-|1>CoodK#rL?Q|%6qp{|V zM>=)^>9_v@{ke11{KZU&S$#v;*DiqfUjTm_)U`#~GS{kW`-L;$qi5E7aqRJ9$@yGB z&TFAHIiaQGWCkabw$$*7e0biB5+sU`9SkDA7$WW$r^Y7duJcu{$7LL@u_?uTdKqNT zGk&GB2(nvy)Udu^m8vCAt;S(c+z%YCCAxq2c2)A8frP@TG03+lFr5`?n5Wbx-Ls-F zuQnvRlTl)$oYk+!2WhfX36sfaRipA5*-Ob&kLXBFKdlk2=O9UG5jbhQn6gpTTP|^A z1b#0ezt=l}bp$>iQ6v$)i=5N?MiL34WATXGkvbWl)G|uA-SP`col4KMhQ8tzf*9$7 z9$BZMFfo@T3^SQFilIzmPQ|(`r52(Qu0GYmbwwKYnW$UoDlun@IQWd!r-~rT2!n}S z7Ud4n(p-b<@qlpyVE2CFRd0Im)-QhTGoSw9fBoL`&%FPM z$G`Q8r;@+)Cm+K;cq@4OX>h2BbQM$fm%t4wS-)l%ec|o1%k;5Rm)5Cn*r`jX2E>l3 zUjDL*5}sONef#IPu%F%9|LC`Gp=ZB&_t`^KTX*&J>#kLC%{STmzN@!d{lwmT7HrH+ zQ1kcXu|R;z)o#qp#>`x~0L>rnKff9OKxq4SPhWib>~$ac_m4z={XhS~>puI+Q*V0exl2De`}642 zuYI~9{O-4^jjt|W=rtdDU;UkTeD0^U)(2O`@=uB{hP1ee&Q^6^ep%u za2naL+rX{hrmfRAUAXz)Td;4R0h>zvn@aqfO8i%^#J|;fzwwX1{Tsh`w*Vdoj`ufq6S3djupZVBdJ^sZ9|N6?i65H0t&)3dB_U139 ze&**+Uwp&QM!Em>%$x4K#JuBCHyj*rfF{&T+n|9-%1Z(`@~jcvaF(JxBZ{n)qsq4{^OyYt2eim!Tj z_E6)=cRl@m&pcOsXJqF*_v=sn^_zd~mvH*8}+j6`e%>*<8>EqX^w5ZuiCcKk^6nMhrMqL{Kysn zg;7f#sUxmj#9qI3um3~PX_h}v(j}2)SQ3i#{3_sBmZU_Igw28mU6z0vD>NN}=~kp} zx0?&c3sNRMs<_4s<_Jw2cDhEPC|j21c65DZB)NpLwK z%-C|ZF;UFepf1u?ju7Veh$+WQVP?$I4G+|-F+;BLMsr3>9KkLsces3`*6B2Bgxx5| zjAj_0GBa2qG`>PWPNYn}lQ%2TdNt&NW?CB8!zqU&qBTmSV;t4>cnZ3_*mXI^Lf6>& zHBMYzbE_hq=U{i<7$7D{=$=lb z6_Y^?_hz6TPEIo-Y%aUUq*GoaUGW+<)?IdU)k~)9(r!JIvl{Hoz)2|7S+M(of`UQ` z8l(#~(`wOD8`AlFh)qI;AKSSZhfBSg($+*HBMrlyh{vc&Crj!T8`RUB^&idc_O8c}uPJtv&wd5*SSN<(j~gcqTZ2@(*!N==1;gRVaqE!w4tpev9Z zgl^8A7c>Y`a9Im#TFC9>8&)D9kWszv$h9Gz?Q+?0DJnF8RU1uUuN2Ld71qkJE~(Yo z-LFNXiA9ys14{zifrX|t$ryRkY<8rntdB=d9*PqQ6fMRJ2l;6c>Mm_Dje?x8p^gUC z#WPa8PYIOMZUwmb6jqJNOmW0ol^?fRfgd#6PM|viZQ(n<1I%YN%~MBbI(EnRU-RIf zG8f;L%f9xvt}Q?Pu{$2KKJ@9}zy56kd+t{@z?UB1*uDn)!s8p*Z^_^WI2iPFMRs(n zkG)^s-oSn`0L~UhTF6J#4+jteKX4DY#{cm1_h9e72Ycr|d$<4UM8HWD0$f{N0j^>d zyo4TiDw(VhDrVCxY(_QX2;gQ{9dHefP?mrb&{Xep{Udr#JTih zEn#VQK-H_$LBmXWO|#eGN_Cfk^K~XeyCD&+8Bwj&&vu$7KTyK_ge!Gj#-FW%kfWyr zT5y!<5#W_vH|Y;hQf^Mm9l5$7E) zeJO;dO^(3l0L==*d>sWOX{VteF@(#JXk{J|8qE-B{eU7Y`U9IOaRh89X+nf(UC9JF za=zTPC{54_l1zaLO$nsi_4?UpAzWwGLQ9HDY$*wAM5q{vC{!;ECyH0k9G;09pMexX z1BA~0G@G+$f~t^RPLO)BUFLa0MJ~OF5a@win(&6{G8aujjZTx~;%@+5Iseq}uj?X3n;acq;C3zr3tJ74( zPFhBz$53W?AmuulXcl*3EvDE{8%>cIaWFbZ8MQEjzU3kY#^P;&Oj)8A`+$9D^Ua)F zCkR2xpdPx^!e)vK<0`r68WEhqf&V%|Mu^g^CTQ}2;nUHs#SWdS#njo}pc?2@bF5|* zM>emA+*Up~)HIK@;ei>6#$cZz%?Uk0jzOP zp$wyjkm{+?Yy#9OT#YuzMagZ4InuJ+5RDUKqBv6>SfowDqI#(^Jl2jj-j6n**ypyu z+Rm-*+}h547400hrSx>Q@9g~j8f@!L<$6>3Rozr#*A7&5bm1S?P+LQ74YjW>)UK0T zrry8!%o=NJtgW&3)y3LbYvBsm*@8ak?43AbH~UJ*8WoYfv$1c%?gHNkUg{e^{5}gY zocF0y*&OuL`xMJO_d|(gy$d)vTOH|+U*~SjKLXy4ZDU*L|IO_)J2zn0uL#gpjS$#v z({BV7ymMcLo3I;J70w}l#-ek6BPCTvzKhc~a&g(jk1q(?u+Pc9*(Ye^;~c z_h3JFnAgu?pj>;LGUNwWqohGjmc~i?WQM>1K zaVJQF0iNu|d74Y62)l<|7L?&>;o;Ygpe+D7RukH(lp!jEww?|aRFxrmf)*h{5ko9z zajg*wxweOgs6(!TJ%W~)rU=(;;$f;>)x$A$zz5U$yynG|Ls-y~bS~N)rrmHLq8S>i zHB8wdrA$K+25bu_;y`H;QY@dJG_;Q81!8StGDsyUu9<7&mqpNi_C$iVGV@&`;Uz&U z)QDUKr^r-W&g7z`H4qXJc_tqEp1XwRRrNt0Wi*cfiJmi>`w30t0o-LYj}$%~>VWSn z;WG6rc8dVtFLDaE$Wbtrl5Ph1U4ZWwp{EVJnOV6;jut)!d0^?hgak!pB11EkFU53Y z)Z`e2?@En;=~+xINL4GgV2`9!-_XiKajX_*@oZ^SRYedeHN-+UT_=YTqn!!4W+msT zRw3$!(@pXet`V^Gja;c~1T1_bkZkq3>8!#w^P-et^(-;0j>}TpGi8`pBa~ED2Z@0f z>fpUYGZH|JXOVA&fjSN2x}!v$S|m87)LAS~A%CBzBSO2*whCD*6nErd6%P!lNQx%e z3>%7e@T+g177(+ zPj9P=r}WgIFjhw%FPo}8kQJ3u+j?L318;5Y<=|yOauL`b+!v7>+@*-Yec(o)w+b7%oJKqNGoVT;8Ct9mNU$D_-CllZshJK@I z)ggM8(j`28Y&O-=i4|kuR%N#$Y4zK>Hm`nSH5z>L;lW*Xc5iS`d<<&+P`5L(-8r$^ zYrxCrLyW#H+qWIL@946lwpKkjd9ahY!(NCJKQm4^-vEwhvA#(lSlmSv7o$ zufCin=#4FVuvcAn;*w)`@N13vO7nb-FfE;Pz!3;z;h> zvf?iYgm>~-EZ4W4SAiQzc_26S9$HLP8+$2sBLHBl5_%x|Ko~o-EO+6;%1Lzxb~91{ zpfU?z)Va-7nHab&zg({9e#;u!sy`{QyRchPja$GC`!4RQ_N@nQoK*V4p6ly&>?ZVF zVa{ zR_w#KVo%<>y6?Nto;s1SFZ!w>wY+5POEBMskuD4bgO;q7sUAD@GKCxpH$Er?ab+aE zxw;|M34hjEN4w5p?M00vq^0(v;QJW%M~VZaib6srC=!~otIJ}EJ&hJe5H3$b zD9};9tJ8(CQtg*|(OEp&E!l9YNih(M2Jo2XsLgiIHj;s;k>HbhPr-2^W*C9s!0b2M zChMqKUaV<`8|q~%ogzP^g>u!hP~$+J!Gb^X86mmQ8bFSOa((VlKoX-KLCl34`y!-S z6wtlWEf8oPBoAX~;2`>;NOS3Gmu;s8^2zKF^HS^V8yhAo9vei{- zkd~Qv!p%x5+3k}#QsUAF%sem+IETmvt$a|0j zhG?WigJzdFgs4mF3&31#u+$guGfNqD-Pmjr2*jKDT1Tvsjh37U4BdDs&BP}$QI}G& zVnR-}gE_Mo_ZoolV%db<6*%P7N+x14H{=k*ARqQ@MOV`WK7*$XQ6!M&@QA)3qfw9p za}@0=cAx>#%ta_cdOX$@x*VB<$AQ4d05~258UletvH}(ArEQX@TUMC&l1+Y89hht* z9~~D!HDY)bEuU2*bt1-w5;A19N`S~)Zj_g6TB_2C86!NA&%$nj=B8e|$i%Et7N$#C zvr221Rc{!rFtV@ZiGD2J*2ZqPLDT^dze8I*QM+C zuz|cZXbxZ|LpeHh^jeT7*~knpDg7+y22&YUVem9DF{k}-vCpnXsIZI7WjZ8JnWPwcA#e_5= z%%G=`AfHO4+{8$Z=CdUnX>M6Oh8a-R$pw_hjL#O3~$h7rTg^M|EDdug*E_=KXc{ zQ30r_Wt`Tjn_BKnPrEhW`N&0Z6FNfKYTq8)qBl^n_gusty$H5dM`?}Zwu8O(BKXQp z;I`cmH~auQ@`H(;&!4!=)O=l_wvxV=V6iqTbHfp1w}KvvqZ4nk6X&JFFWmKU`nBA| zUK*$1pj7uVHnPlOBRe-cFJ>bP_7u3dn_ehzQ4~oD32RF|#jJQ7c{pC};A(;*CiXOb zD~TWB?XK6mu zHRS<{WXh9+V#J-&&GsbDjWV!kHno7EH8fXiNCzbFX#3%7;H%nUh3)>0>H&eRfi|i8 z1h(Lk_L^}gDDwfObxb-C%Dat8vJds38dM7L@R;@mlNs`Cq z574yE-r(*Aet}h1hTX_7UpHUWXCW~fC;3t{+P0I)&Qx@yc#miLv4|6I^JSu%qnb+1 zM#@~k1if5e&g6SdJuo6iMtqtWwJMrZZ)&c@_uUyC>c(vWM`L=Np}(+3+zV*lxi#We zNhj8byLyP*Z~qR4ZeND|%dNKAP=P!VB7ziSxvE+zMVS_f9}RT=df#R*)4yE3ZT1VK ze>s|k;!s={ike*INm-?T!6{vC5LGF}^PRD&#N<9D6(jxda9R;#nidWPs#&rYl^T^m z9~h&om~HCOph_p|!-nN{YD}YDir0ohI@B<9F_6UDG($;pfiNkOKrxF4I2(jUlt4m; z$B;I@g*qU6MWX^ZSDBSsrvr21QTjGd0t(Tb!m;!coqR=!tf&5^IF>(JZGVQngZrpG;L0 z_zWaRVu?I6&88e7SLT&jq}U8fq^470I^SiKBuA4`w^H{C%2ly{Ys6h?!ll*0c8$0> zMY_t)^#2oa`|aOB@A&ELpYO!jfBwsL#ekKSOd>s~&P1oKo5^b6NH(kW`ENG?)5+(* zBZ7!io&O^2D4SF2x$rnkwfdsf78Th{)9p!Jm_)>}FsAZl%_Nax2SoUSJ4m6R`(bAw zbd!yy?&hP$xY(AG1r%h^PA0mEXumZH%jVbN`R_m5Tyo#yJk4lB>kHe0?Df!@zYh95?NA z;Es*+*S-3|2Ok7WZg=OE;Ce!KlulWnsYtGS)AkpyIfn{dcL(~l(%kO69NaiBCF-VX zjUDV}>{_rHwpUO2CU7eX^zgHbmQ>pr>GN0&8{1wMxNs5NG7syh$UPl}x%fE~Unn{O zgEwHy|0y>(O7ZDBNaP`G|c~ner{QQot+0a zz`0$b9JX2`lw1{skMuAB+<7UU`ThhR!&kQs9KjFXIZ-fP1-eA`0$mX6es1^6!=7d#C3nZfFl-y_Ced3y?|s`#Il<*dmwg2J+C9%T$$}SxK+Z zOUzg!?g+J%dxYIrW>=ftKbrNAJrK*`C%DZ}P+mC`QNlm4$oO}p;HfhH`3e6()j%2T zt}x@DpYRVXll1P(_*d9H{?p`?W9rqCBUhu-eF+N@(aCh1)!tY@2X)Yx9qs&qg~rHrHvH@nj=l=gg|dvf^OE zbt-PJ>PVR^=ue=Y%I2tkUyEBf?v^hRvO+|mOZl+_C44t=AM2u|nJA^EpR}*c(OC-W z8c7zeM3D{V>5}*9LT3}UASAjKximG#O218|iiEC*Z7|20PZWiIj89#tge7{?oslIj24U8m{t| zPZGcV`ak~n#~kt7scXX6d#?v?*aSxsNmnuHU>aNoIS23GLtk*`>>_;Z%mtLmVd)H< ze^`d7ow=|Iro+yxR^zvCU_ZKX@X>GBK+k^N-m`}&eZ%tUC*`X+u&nOSS8-XrTJ{cm zt$xW%v}C5bN4%Mf9@Ucxb2_syJq&9mx1#SzwKAc-}+1ZvuCk1PH(>A z%$FYh;J=Ta+yd{LeEHefx1W9O!yo;RpL>1y5&SRS`|5wY_q(^%&GXYI-uT?-ANfy) z{PL6BPkr?JcGOQAzk5CZkB(n&mVmLwnx2q>@llgo`_`4tfvyZ*Z z{on&{+(r09_dn+TO(nDS#h?C{pSt@qZ~oM0pZv-nYp?s#KfUU^9^U$$k8>a1Jb(SW zHg0<4_uu{eH^1u-x1V_HonLr=YBqb~*$-|!Eo`v%Q$O%}fX=boo8S!Ck4kXnzX8sp BWS0N{ literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..37904530 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,968 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQVBYclNNcXJGc2QveUkwYXNoOGg2TlV3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkJ0TDBabjVtOHJMM09uSTNhVTFkTjJZTjlKdTRmMU01bFV2a2lZMFFIejYKOUYrRytBeXhtcHNKRU5Ia21hcElnWkxDcFAzd3hFYmZ2Nk1ySEFQbWJnK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNREFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBYlBpejFUNDZDTlJiNGZzODhoeFR0VTZsTkZuNTN0NmZOU0JXS0RiY1hzUUlnCkYveUtuYUhMbGJpK3JDcmo2eDdyZFZndFliZ3dVTm53ekUxazZzUTBQM3c9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEUCIQD5obn4crgGCrJ2+/A1PAddj8j8q4YynzDZrSj3LXsIZQIgeLCJ8u+f/kZD+7hNp8iCGmXaasoJTr7k+tWmViF6poA=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "JaAX8p2dFO4uA3pAHAogj5e8UyyzTvAH" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:33Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "Nqi1SBBn+kBNVpDaQsWG1PildFQ8RAMy" + } + } + }, + "signature": "MEUCIQDr0sfIzaxGKfolVlm3Nzkfd+qm5A2t7l3eIRG6Vbl1aAIgUeiaKvBVZcyUS/17rcmpiyXTdS4hWgA4sEwg6sewh0s=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:33Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNEVENDQWJPZ0F3SUJBZ0lRYnRRRmtWVWtra0syNk9VSEdyVndqekFLQmdncWhrak9QUVFEQWpCcE1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4RnpBVkJnTlZCQU1URG1OaExtVjRZVzF3CmJHVXVZMjl0TUI0WERURTVNRGt5TkRBd05Ua3dNRm9YRFRJNU1Ea3lNVEF3TlRrd01Gb3dXVEVMTUFrR0ExVUUKQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkdjbUZ1WTJsegpZMjh4SFRBYkJnTlZCQU1URkc5eVpHVnlaWEl3TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJCktvWkl6ajBEQVFjRFFnQUVPWG1vZEVVZkFFTEwxSThBY051c0t6TTBVbHpjZmdUakhVcTJoM3lGZTh0SkNpVnMKWUdNdHl3QnY2UXJoTWtBcEV5RFFnRGVWY1RZM0RnQld0Nmx0MktOTk1Fc3dEZ1lEVlIwUEFRSC9CQVFEQWdlQQpNQXdHQTFVZEV3RUIvd1FDTUFBd0t3WURWUjBqQkNRd0lvQWdnMXdoTFpvNytRQzRpWXRhWHFFSmtNSjJSNFFaCm9YcnZBbFI0S1NjSW9LSXdDZ1lJS29aSXpqMEVBd0lEU0FBd1JRSWhBT2JVdkhqTENtYmhVeGFpdXJ0TEFUdlUKUG9GeTIvTnhQQWl3RW9GWk9hN3NBaUFiQncwSFU2bkRRRHRmZCtNNnhBV2p2emN0VFhXTnVmSVFOcGJmdCtrcgpmUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "hAOA1kYql0tKXcQEU8nLGKVvuuMv9uI3" + } + } + }, + "signature": "MEQCIAZX0ub6+xTrrLsBMkiMujqdf8/vFKF5NjWlbWjhwNpiAiAXSs8CoBIqaR1WdTqf3rDsHQiVVMhtOzeZSSCH44xxOQ==" + } + ] + }, + "header": { + "data_hash": "Tb/H4I69szBF32GP6yuiEAE3zPLewa/2DELr2EFNZ0o=", + "number": "2", + "previous_hash": "LTUCtKH0VQWZJ9Ft5nwZDF9QJo96h1q4osmC6/JXoDM=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..46824290 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,359 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5\n54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE\nGaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ\nRNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEUCIQD5obn4crgGCrJ2+/A1PAddj8j8q4YynzDZrSj3LXsIZQIgeLCJ8u+f/kZD+7hNp8iCGmXaasoJTr7k+tWmViF6poA= +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=JaAX8p2dFO4uA3pAHAogj5e8UyyzTvAH +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2019-09-24T01:04:33Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=Nqi1SBBn+kBNVpDaQsWG1PildFQ8RAMy +.data.data[0].payload.data.last_update.signature=MEUCIQDr0sfIzaxGKfolVlm3Nzkfd+qm5A2t7l3eIRG6Vbl1aAIgUeiaKvBVZcyUS/17rcmpiyXTdS4hWgA4sEwg6sewh0s= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:33Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=hAOA1kYql0tKXcQEU8nLGKVvuuMv9uI3 +.data.data[0].signature=MEQCIAZX0ub6+xTrrLsBMkiMujqdf8/vFKF5NjWlbWjhwNpiAiAXSs8CoBIqaR1WdTqf3rDsHQiVVMhtOzeZSSCH44xxOQ== +.header.data_hash=Tb/H4I69szBF32GP6yuiEAE3zPLewa/2DELr2EFNZ0o= +.header.number=2 +.header.previous_hash=LTUCtKH0VQWZJ9Ft5nwZDF9QJo96h1q4osmC6/JXoDM= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 0000000000000000000000000000000000000000..127ff6ed11c73d1897603a13a036d758518f85af GIT binary patch literal 4537 zcmeH~YpmPk8OKk~owr3TVRR@!Ij0&M;{eBToLe_oU)ygSCwY@N$4-tj*od9P&OIl| ziJj10xE3*xHel*nHZB{N!U|HS6+s0E1{5|#fvxSz*tm4S2cSa;1Y+YdC+Rt2fM6f^ zgoqUR_2Vb;|9Rz~pZ@~_lOy)2UH3iuru^@nFJE|ZDD~KFJ0E@`y|MU{%$mn*zYJXW z&l%%6#}rCm=iIk;!-ei=c5^Qtx%F!KYYy`|FLbj;;RbzAZa!>sBd?%|bQTY^r*uTFsSD+2AJ$#g*~pREo&EJY&z+{Pmc6tT)m^>@p(ON#ZR~tPsW*bQGUup5$h-IVQ&sJM83%Wa zgNax}bK<$U{nqi*dLJ5bd~}LI36T%*3=~m63NX(zVU}T_I-@~@r=i9Rs!#L=3EEo` z(ycf@+f`g79bjRY*0cq^RE)(1frUl7i-o2E7(r%}g1{jol$5$i#MX_VQ$h@l!vYy- zW>V?4T5;E95v4FK^smt-j!I-;kw@tckW=nrWy3yLdL#dGd*jtjI@ z&MZeN(Y7KY71OnT4m7bSlV}lqaw5zH48n|w(2a|Nfmz9oSvq6II)fNmjseUyO{NP& zv=&X$P!?f1DdGe+(4aIP8Ff}pne}wV-%%=M9VcWX0Q+SJk>M1r5-2TE4e3fHT35+v z8w-@d4iX~BNa|_MSyzfEk7;5c-7r!@D$&ZM+_0w}e7sKD+6&Clods?VQ+}u+j$sb3 z4HSd~4`~ERiOW!s&oaR5#90_&G74KRx?m)e7AksBq8j01HRZ1RX+1ehdtE7&i3G)# zPc&PkF4U@im29?ZjZ`iUYJMW_t3;!i^Atsqj$lajq-I$I(X)nttY;&ru@Lw6D44)B z%=-{5LWr4WKM(MRP{K?Y@)4&bL@h01SgmT_w5C&Tr>F~h(4f_zG@H*FF-d0p-H?{U zu(n(lpsoLcgbFbd7#>kgn$!wjzZRbfdb$i%3NV?N%gM>6Ix9=UVimcX$&y6XOjv-y zVwH&l7sB&I(ccOBENUUuj7s*Q*Cb~eYxCSE$nW4~+^Y#Fwn00v6zUvW%Y0xUrU(OW5wo&@{b zHZW+-|FVIJ!>Nvgwx!j9rIo#3NMFXfzKm1;Z}B7xrmo-DIK-FF-2TX8s~eD=1pc=O=hf4lV`Ui;Mc8@_68d)jf&E9dPw+qiklc^8c5hun9DH@&&Oxy3hr z>e}^FlYi3A@^9O9P(7Brar)gWp8sayef!MbTb>2=jjxYgvx%Tj{m6D6Xh`>sXW4s&+>%_I zFFVs_tVkk{CzN7JPVtNEy=tGg_aY3&=$kXkdnJr?D%rsapAj6GITo4eL5y)*zEm|q zq>`lMl+#c+X;CKqEgUEr$dH5KTAJ?`2?h!>e|XJ8L1hIEqPTO>)ea$UL6%A2(Pn*h z(K6&+%=vtCvy9Z?ilO{W9I^?bUaOT{p_pVS?b<@3nPQ|;OhXIxT(q^onDJ^53m~qv zd9LnF!?5MQP}5*FOMZfgLm@azL(6MxIf$Xr_gQG*#~2Ku5$=_lAc}xy1cR?Zt({Cj z0yaaq-pR483S;@AWGuj-JPa6F(eHObcS4J}aD}D}Mq4fm0n6R72?H7l$ZJX+W~${} zx8~{?&V_{tL3ZBsFWC<_Vb)1#Xz>kc{)Osp3iqOOe-Ii zv-MoTg(5R8G80{xDYAMs_G!M0Bhc{l(2no7H@?2>(Wh4ZOnJ6-ukD@7u1uYI<-VcU zc258OmUBxAdE?txUmd;hLEmKjsRP}IcE7jM9w6A^ zDf=bsub*~rbrxQJ|H-3<&e`+Uj%%O0|M>dtuYPZ>HnaV9$M6)j|Lj+{?hxb&=ky6T zAKG-u4F@0m^%G~T*HZf*e{$_hJN7$np8!`)fTO_hqlMTI2HKo=$lQxF!}N>pEB11!TqQ}e8dtXZnmiL%g$iX{UFYF3Qz z$FR5@Gg2b5#)wk?W`Nc)lT2b0bzx#~2Tf#3QC;E66>9`q%%qSRC_-s)O%>Usb*(^i zY9(M%S?&Uv^qD~sDogSLoWGOilAZKCZ!F1NR{04CgO4&Co3GTeNXkPLi8y&5RHKW{ za2FF&xvSzSAh$B}3n)~=Au>S;X;7PQv|%|xh38bh7Uutl;U2?4|W*im_R12hI8E?~?pA_04f|94o z3T!K%oxvUxri$&Z+7jne(ZxJ3MC(evHB)MUyzm+G)7({i;2RgbaOjTvZ+qa{XD+?& zx7YZ;e!qUvckKhh_pjKt@6kVAyz6Vt`_%2fzvx#ZiSuuIegB!4+?!Z;!MOdn2ZyIl xI`EL|tz8>}2kvF>lE=9W{O7dy*0kT{Mjr>GJtn~r_%M}V=)WZqr<4Ey literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..dc9e90b7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,156 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLRENDQWMrZ0F3SUJBZ0lRYzhUN0gwQjdtUVp0UEkvemIzMkJGREFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCRUEyVUdhNEFJZEMKeHlQREFMQ2FiRGxqM0FMYVpRbWhIVTRyS2puVzVwOUJoVi9CNzNXY0NMSFR0OFR4dDJoUW9uOWMyc3RvcldlUApvOTBQOG1OTk1HNmpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUwxVVFOQUxDVEtjbmc3WmdoNDUxVGhRaEh3QmNIVS9mZHdPVVlDOXpKZ2VNQW9HQ0NxR1NNNDkKQkFNQ0EwY0FNRVFDSUU0c0IyZ2k3OWdQK0g2ekM0a0ZDYU8zMUdZeGMvWVVRdW5FM3NWa1U0b3hBaUFIam5DUAozRU1wdlRTTlRoMmRjc2dHa0lnUnhFMnZSZWtTemZRNXA3ODVZZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "234gB5KHCh8F5IFtef96IgsdvcZ5QGt/" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQCxX3Z88brL2Q+RYt90vgH5jJNXPpPVAO+1IdypeyXGBgIgAtjklws/StTOiv+NO0RM8zybm06ExDgIUNnYesXG/Qw=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.3" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "Gm/AdRyq1Cj3dIAWM7kVdm6MuCEPfO3UeZdPBQfmYDY=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2019-09-24T01:04:40.371616400Z", + "tls_cert_hash": null, + "tx_id": "920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "234gB5KHCh8F5IFtef96IgsdvcZ5QGt/" + } + } + }, + "signature": "MEQCIBKIOqEhNZoxaer+0REAYM72sZ/gwRxwruxeHmcrrK4aAiA01l3smrFRWQcxIR2n7YeIpOLEotA9OmdX1s/RHuax1g==" + } + ] + }, + "header": { + "data_hash": "RVqgMdUeQIQ13sZH5Q2avEWXNgeYmSftMiJ95cJt6/k=", + "number": "3", + "previous_hash": "usDL9Fn6teqEhkpXza21x9BafGqLYRbPb5xGoOMrd+A=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..07b1b702 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=234gB5KHCh8F5IFtef96IgsdvcZ5QGt/ +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQCxX3Z88brL2Q+RYt90vgH5jJNXPpPVAO+1IdypeyXGBgIgAtjklws/StTOiv+NO0RM8zybm06ExDgIUNnYesXG/Qw= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=Gm/AdRyq1Cj3dIAWM7kVdm6MuCEPfO3UeZdPBQfmYDY= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:40.371616400Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=234gB5KHCh8F5IFtef96IgsdvcZ5QGt/ +.data.data[0].signature=MEQCIBKIOqEhNZoxaer+0REAYM72sZ/gwRxwruxeHmcrrK4aAiA01l3smrFRWQcxIR2n7YeIpOLEotA9OmdX1s/RHuax1g== +.header.data_hash=RVqgMdUeQIQ13sZH5Q2avEWXNgeYmSftMiJ95cJt6/k= +.header.number=3 +.header.previous_hash=usDL9Fn6teqEhkpXza21x9BafGqLYRbPb5xGoOMrd+A= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 0000000000000000000000000000000000000000..0f52a9294840ce896644ba2c365bb00802ee283f GIT binary patch literal 3997 zcmeH}ZLAzs9md|9>*Sc^(k=uJg_9ehB^U%lo{;yz`w?dp_mg{kAvw?!)`v=N7be z_idivaog-1eDH~D#>IMj%f4pnt-lwKym@>4`pB;iEcH%b*o6+wvA*wL3+}rXJpV~> zYz8#FQ?nbrzxl%hZ(OzcnO{D7aBABoWzefNwO&s(%FU)$zxhiMe^}GBD5*sWGNhEt z5v@{cN5Yb{$g;a};$wMKQ=O_pB5*Z(Gs5Am{A!L?|ys3;)2~+CI%LW#dK(dJ!Lv@Xf z_f^)ZryKlG5s`|i*76$YU{NN~0DSmDsKsr<$%rt7O~J;D6v7NucD2!phE_Fz*`7m> zVUp7MJOyPD*7G9HVH>Tq#v!}S$OWfeYQ#oLqi*1wY{%hp+X-a*MYn~Zo@*uzrNOsV zk{@CrXfrDd(#XymCDz|oOjN}bu~NEi7lcBtUoM2;q>>`vppICY zzBsl~0umgg5F{nG9E4nj2F@tUz%*S}n7SE&>2gVE7zruZO_|L?s2!t>`~npT6jVB$ z5c^Tl>63=gYQ|Ku*Kc(TS{AfoL^j&sdCZ1QQKZrs1}CLf7#mRwwt(DkBcU@8Pwps@ z!xXGW5i}vhbZ>bb;B3LdbP955za;Q(En-S->XDLe1Vet&5R8OPsR?PJTCp>dOvlDa zUBj@o+7_VPy&$1Nj0BoP!5&5GwMb0Q&L_fSI%vh|awgzsWk+3*C1KD+fnMH{f-MKu zV8U$DSr9+-H-Rf`O(49&))lrcCtE-Cf*ZjN;4|K} zt1dR{1JkwUuw`jrZ5gapfX7ex?(l-!)`Gd4Joi5F{%vp0{QOmE)6G9#Dm+GR*f;m^ z!TwU@l{;oUM;`Fq0$AU6aM2Dw2WH$Yd>-%AWS~q2vlC_36C-B5t};7Cx_f^DtgH7_ z)ps@6aOus-$|>(NYqxE@XsxqT{_TYCpVQ#+|M1rbKh|H9rR?6Dx+zAg8pV(IGc`s18Us@{KcV+IN;Bj^xi{e!?TiP(-TlOU`wMBAbgBgUAG zMi&=oX~dez>UljSAZubpaI|g|2S+s}p;$CW#W+@yGN968!y}0j(j^Dp1} z+~?Pq&WlIhi^WrL|L50sZdC`` z>&MSbpZnrpkI(*S1{|0HTY$&w@ofO>!PHvM)aG?ty%!0;dm4aDx1x2m?j%Rw`LUcc zqRY9GS>;^m3vnwiS(cR|!x<^TcJsD5{s8Cg%buepOmWLWlQwX=R5T2wNcBpKAyXj< zCq9Pxm86SBrokJR*Z`|=P{AT2A~!EvBc6daFIqN^w_J@|*08v$*#!}~QPEmH3{VE9 z^Lgx`G0d%;po_G{8wy)*xG{H7E+8jvLTP1A6`8y{SEE?95qGJqkAX}^orDOLOXbDc z*r>$jN2MZXUn+C8$`3&p{4c|qVxv_-QWc_f+RsIy$`5*}F(#z?Sgq=!nUFf95g5g_ zXg^8U@;xB4xIeO~VOZ!I*n({|a{mR4mRChN!01$=AFlVwk3blF6vLMg*8R4TF0~@_ z0v)W${c^E`k`_*qxu8%2tzvfw>$zZRQRP}G?!OqGAiU`Q6mkM*z>Fdd6K0xjD2C*e zYlCh-4aK1ZvaR@tT;QE7tl6j)FJ;P+o|};s$|e$0xXB1izgn5cVFwn>;aKg9#R5O5 zasuC0s{MJZ3#!7$WaMvbGant@ViJ|5%x+%>4K|*roIUiy(mTFo!nZtCIx_S4;XTLI z?RUO%;49Z%bK?)*e)jP3>*Q}QJxyoNH#~D&{Kp>{PyO`ht*;%pa4vf4t4B9TFP^@M cyb1qAdF!3^cl`sbn;;3+xK8|UD8ZV40fVgsSO5S3 literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..ccf8c0c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "VFbo0aNMOuPFZlj7gumSlRu4mKCHEiSY" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIHFG3wsayQPDh5ZkZU7asPY83EKUV5vUZdRwnJLL1FJmAiAeOg3m4tvG4aiWUje9bMYYRNFrAOazpHIY6oH0S21qqg==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "KQKbs/6A7QfA4lUPKq/eV7AyC40gqZh03jfggwcCsaU=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2019-09-24T01:05:14.856400200Z", + "tls_cert_hash": null, + "tx_id": "716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "VFbo0aNMOuPFZlj7gumSlRu4mKCHEiSY" + } + } + }, + "signature": "MEUCIQDwdREdwTxMTt9/zSYJWulUsfs4WuTrNezNM+Qrtk++iwIgMWaP+Nxo6daXPGk52X2jd6Dv5zwYY3Vl6sfkBug/98c=" + } + ] + }, + "header": { + "data_hash": "QaazDnpYbHARjW5L8flYse2CRh43xJPec+P2PUWjIEc=", + "number": "4", + "previous_hash": "e6hFzl2NCHZWeJHbfRwxe/IINPSpkv5JL2UEnxArOoA=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..4a688755 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=VFbo0aNMOuPFZlj7gumSlRu4mKCHEiSY +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCIHFG3wsayQPDh5ZkZU7asPY83EKUV5vUZdRwnJLL1FJmAiAeOg3m4tvG4aiWUje9bMYYRNFrAOazpHIY6oH0S21qqg== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=KQKbs/6A7QfA4lUPKq/eV7AyC40gqZh03jfggwcCsaU= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:05:14.856400200Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=VFbo0aNMOuPFZlj7gumSlRu4mKCHEiSY +.data.data[0].signature=MEUCIQDwdREdwTxMTt9/zSYJWulUsfs4WuTrNezNM+Qrtk++iwIgMWaP+Nxo6daXPGk52X2jd6Dv5zwYY3Vl6sfkBug/98c= +.header.data_hash=QaazDnpYbHARjW5L8flYse2CRh43xJPec+P2PUWjIEc= +.header.number=4 +.header.previous_hash=e6hFzl2NCHZWeJHbfRwxe/IINPSpkv5JL2UEnxArOoA= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 0000000000000000000000000000000000000000..f64531738e894f9479d194f5016abd90d403e486 GIT binary patch literal 3999 zcmeH~d#oH)9mnsZy}do4Z8xpOE0GHoNw~3hcJ@tz;mm7ycK6KO*`3+hoixOq+1;6) zecpYY-BAGvqJcmpQq-gppo$R@Vksm@rJC9z#@1R|v6X6y3TlZ&9?CyOXYby75osVH z{K@_``OR-m&Y9WI`Fs!Hrq_CAPpEf)+%Qi(ck_kEl)tpNH@m5Ar!M)|)Um<6KR&yq z{fFmgW^ez^aqe$V@BZU0j~>{4c|&@2)274uoBX$Ywz2>7yVksXB)m;P}VD zp>?1>JvnpX^x=+}#-U|!GrgI+yY3i*Q(f5aCd3S=k}G6Gkv_pI}*E%uuP z>3L=fJT?W^i7k^v=>^XNQ=b|BC^pIqvoxEMd5)){%q~>{;(0n@(=;s5Cd51iO+E$r zbed6lrx6~A)sVy6!H$%TU`(4iKGD#4$0k^}7aInvITBAW^|~2s5Cl#;P#jJ*CWR?j3bPbMH06hw zf$lp>5i*ow^AzMUWMFI92V!Z&#u->PXktb&x4km4wfx77HkqXZ32fbj)rjqjTAP^1Hv{`suH zypsmcMZbUT`oxQmXpets?;~IM>%q-|qx(<(?DoTZzvlVs2Jqz#;6t{SApDT6583(v z*?MpqYy+2qOQy$HEjHr;Q{{TEQ7MA)JQ&x(gqQH#G!1ST2eV@z1siwW@*w}`_9w4D zbN3c4eejB_j=y}(q~|`X_{P?q2Ru7K)UzEd>+o{0&K<%tF}-GZp${)+hLxF#FflXj zR%RwilJIN+YpQL-@O%VZu=3=DEAGkZUyNUN;j&t1CcWDU&zn|)nrZR=`w2|szp@$>_(|D;N$>J2&)XV^-!ZkYW4Us741|VH2*7DZ&O6En&U^&0Z!23D}OK=Ag)QYIMx5XGD%>OOV3_ zITG=~K*~(|P>u4xEwBMMu`wwOu^aD9y$SR6YSC%<2H3l}m?TK2RBlz&>U^#!7o>i% z6-NF+S&!)znx`UsR8d4wXheepsZM1}gFM|S3AsYESoX2Wxel2Z7Uyins*CUD)+oVF zTsroXu~X|W-gM8L^p)J9dFvmK9oZFJyy9B$!2FeO9N2#2joT(>uPf|0xZ%Y24t)I% z=LY%FUvKu;r5C6}cimMz`|XR(8(+V}GaBgJy#Q|X_xA+;e$VIbJUIT)i+c_v6XjwbRppC>0~um8kp;nh=5PwMGu{@lq|_N!+?KhQq4ckGp)KJnza=b!xH%tPzI zo$J6RFfl#hxd5yOlj9SU8`oU4ei`wdQvisqLa|kB4MD&8Jwaz=7j#`*1zqn*TqUDa zDwPBo6qQ)CmBF_24$zw)IOqzZ_!ZET{~w?^2WFO2sLa#^YXuIlN(bf7GBWD|T^R@r z#DW{55!Y~Q{8A0ML3+97rc^e$as&YH_YAOd1OUS`Kum`E%JjJ586cV&XjvYwOmlUX z=V2Hu1HB5dn5{JmtWtt(GU?^R&=9)qgo6mB>KG+cwqwd7Y54|RG2DsM# zR4*vCEL4F_cHnLXOfh4~IUi$EYA0Cjknh5vg<;c+t)$in%}KPsoa^MX zi)_4t;$+G%X`qp9^KA3@sQ!PyDOw5-h!g8^kR0BuIZN2&zHNcP7=yJ z1uQhU0XZ-97hoB)4NepDp*AeLFBKCpC0J)9rc)}+p%9^Q8!E&l50w{Ep=ICJm#k%`%{Gyi$%nHS*M?>r~(c;Zi+*Yv3d}gc@7K08J$l))E!naqze)(QEX$HD%eG|8 z^4CJ>*HT_7-^W5>S)L8BU$Z6KWqEb!vW4>4EDJ4RAuR3kS_+i3B|LTuOMyMIuRZrQ z_j-oO6t~e-~a#r9Y7!7z)l@YyrK5J_x^o7{@W)vZpr@TLqC4PjjwY`UlK)G>Vt@0NW8kmR-`AkO4{v~Wyx)+*HgOKJ2t?p zHUP*Eo61lbvZVs{!i_tzcB6`0 z^-@%CgaQ+K3d^|4m2t=lq`|dwMmbWe1Rc;wiKAL5X|s5wN(xkzB|9!hLWdJN4ojQp z7&AM@3d>_oMWAvl?93Vic$+24Wp+YMVR7DqDi9s6-AHwfMmRH)D%6D5p*TM$3uGCc z)9{pR(5T_=6x2eANm_u7Mfd1b(ygb;ZoSGli*7D^Np~E|sim`Kotf$Z0`fHmZ2dw) zUM6`JQu(T3HYu?Msa!6|B%sWVtn8Exh~25&QUyIN4npm)ODhRGLuh3S)KaYNI`}xo z58G@9_9+)#hg8b4Pz#ePUa@0cJCx-(ma-gDMQ^MaC_p~#$02%^ssaHE9q(Z@DTl)S z4o|QUI$38{P{#@0VN9s1L8qOon{gjcM6{YMRR>h2!)8Lo2ww+gbvTCIVkBFV88gc` zgj!>^Zi_+#i!7lF7I~%(^9^yF)^mi>Xp0j`8x8Fo6viSbn6w-6bCUwp9Ll8Yc`0r| z4LwvRkQQS-k|*s})5pdpu%eHrvMp3A+^EIyT))w>eVrj_@y~h|n2l?C{t zi@!elJpbJna<~0{ZSvMfZqNQf^yP2+)|;{a{Q6_yl@A|1ekJz14E;Y>+z=?4 z#m!k6IAMiah#G7%wLFjIPf_^$?&?N(g+c~rDll$%9I7{Tq zLtj$qCdT+}ZJ5JE7N;evK$TKzsu&z;y>1pLWSG|3j@9h>l|T#P;VR#D zCC+A3`yn)Cuy|kw&w!qwl~bdrDi#QzegKm38^D#NGz?)I-oMdU=4*!{t~~V+ z7h52%2(#>QoNRjdMeBv33G1425SWQUa{b$Gs^~ zo}HMoqur)1J%!DsE$J04fW|nocl#E0(ruYzk*UiIOn@a}5TVVfc*peFv59vK%ns^! z$eTef#$to*CVQL3US$Glc|#X?YXUTbRGO*D)SE^2pG0tUK{kcEgH(x)B%w;B2x9&- zfDV<00S4k}!XGY`hp})l8Bo(4-ziz0q?sEOQ(PukYL@zpJ7|viUK0{NOVu*rVZ2OB z3D6|DU^LQ52koNLE-)D?!f2e9N*9To2*r@z5bz-jBQundb2I2!F1)YL-v&sRL~6bc z*oHRG%sDk2=fyPYp+nAXrZ6|IqJxg%{weHxuM?#C2*s$p8tvnqY9plboIfy%QxR8j zX~D?J9o;voj=54XnSqI9%S!gu9U~Gw1BNW3YZf7+mWP@6z+X;<1$yigComu4*lw9* z89f@zRfJMLDEHmAlN0?a!O*2#HAToE+0H0vrY)yNje*mnbAt*~fdPer`DQd->`sJm zxO)Kd>hDC0PwX2TU~S{pHg0X>9!DF8ZOC0s>DilKUxRJEpj~zjG_>B?N7q(=EQ8!V`E?8L(Y+RZ&9-kp26-vgS}}^&CX7*@Yzc4 zq-M)z-i>Q9yPVGO!9pg*z(z#X|4FFX(yG+#o`OGR)a+zcYIbkIRj66fF$q=7rzIhp zjAaC-E{rqz{-DwwAmUMqHsU2Q*_OkVT&i3$>aB|1AVwvjKTO2*P^>NSfC*<|E*c8N zxpt;7@Wl`@IE=?G8#PNLL75_X!s)oZOe7zwF-pEEMntBVK-6Kd5Dv>^HwDMCTTAaA zi7J;y)GURlS=gIoveuMWWTM0JVmIn9Lory1*sV~!7BR=tbW{(78Qz!a@{G!iXh$hJ z@#LskZk6p4m?|U4HmPDNkgvwh&&78lk?J zZKordfE{hpgMr6_cJc^FTHg1xllW?Ma_p{K{KCPBh6QERvTWm4Cx2&t|T$;3gm%vLF5 zR1lq3h$T$Z2~q)kgcqiY4GWZkn`Adxf(N=dFNB_5+quWx1-aLJoyP^ax8T~&{dC*8 z3#4b)U|WN2y{Np{Mdbz2vumiWp|*zFMMLd^=-D;a)>vC(?V_=^o1Wc_p}5nY+%|^= zl5t&yr1kjEZ6xhVbgNfq*~m)V z@%9=^g7&p@f;Qw4w7=^Sw1?bh=sfqif6VRdvKLP5ifkB<4ilX*6%tE1M32{}q2_Kn zO~)@s%&oR6vAd_>PZ_c6u1f6gEx5`DZy#E1h}%h}MH?Dlj~58O7c`x59rmVW)=z2v zjIFSGyIV;IVs?X5@SLG$=!n&|I|18Ifqo#-jd2v4Na9u(MWK_rtA+-bkJ!xvDO%-Q z$)qmG{g#&U=M{yim1)jfq*LmlwK-`RBSqL&E33w2*1(tR(OiU}u;Lg|4Q>P}7Sfkt{6?Y_70 z0muW3d=!Y2WI8-BlDT43(}xX~mbs2t_ZhB9SN&wAZ1L7mO!joOG!RBgej3XZhZRKt zzG7X-cTzQC5Y}7ipktJ?u43jRPAJtNR&c3+MY#LLM!SP~xH}}8-A*baGmV@erWq}R z4=SUQ*m4aC=9DlgmXvIZgo-6RY)!LSz9OfhcD2k);qg!y zU80!VT?_KHjl1-DC3^vM9#VI2!2^)C02)}^IL~?cPh;bLGE#R9wl&z+3(A!jls^fn zyN22tYHO&i4z-_z)Lmn3jkPt_R>#_IQg^kOTaUzCGOer7xn6|}rE|A8vLI(SA3F}N zghbB5zIGh@tK)zMx8Kv%T8iw-UB%Cjl%dN>hGO+4Ss|5{*3&#m1PgmIc%q+}YmWH0 zX(jl#VtBzb!F3*Q?Jo??zG*4vEx#3x3}WEst|iOfHMO2>HWg~3S@z-W{1Uir*3Pn? zU@m_=Z=;J&#=#Q?UZW|+#=EB6!Ch`-G?d|?6{FxLd8;B}_F9@ctA1!T3jD(Ehr8_T zxrck`Wl-z8x}BD+_Mz2&6+C(Nh|%3LJH#A9e!VvbX}N^t-0(1$dYG zihO9>JBJlv8ir;s8(!ho7sCX-u|*HgRhMk(&<@-Mo-})7CCwOh(QVIPn=n)qvEM|$ zA9{hk4_%lraF)(INhv~J`e%`d-$_h%x{}d1J@B!UutMwG?^$Cb_;eL0AQmWyeD!` z2s^SUclz|XY=v8~>yKaIUq&e{nD-*gbzryyeSW_wsU@<@4BT`+ zi%rl4z{i7JGZSP`xO7$#6Ulxy6l~ceB~%sjiLp-Eu2C(T zZMkd*cy3hEOQb4-pn71q^ywEIiX_6*jcKILA*o>5eIsYPLBHq>eN{U*;>wZE|5r$& z&$+BF6_QLOE;d(QLb^eCJr(RXI`}R`?Vn!&W;!qn=@)Kl%EOKmosNCJSR+?$3l*Z? zl;XaD6Dy|Z*f=U^VlrBYOUaf$Yjk679nfwx6Sq1%i=0!5cr@w+ZG7P8LarriN-EE# z11Vh)a3lw}NBSkLl8^;66m5wqK^>xzi%^23(in&DutXLf1Og8O;9wA_2m~U*@MN%? zvIvf9njy|jG`L}6T56_uSgp;ajvfPg9!$3Tj zft@_XPTW?3j+(^`OcgyfG4+D{x*t0f6TI$O7h{15K2>Y8c0&(WLn4)Hmb)E2*hBO0 zZn;3~lB<^;C>NO0VQp@CSb?e*t+|9!IfAsqg3i(eU4Ud@gPcnS&XkNURtm~ffOb#}V=P-lR2Ny2f-3D@h(ColWnzS`&YgIo-FyU#SDEBg;<4>j;nGU4zu`%g| z3O%OTZcXX-c<4-_-3pfSip0k(p)CbvTnv@6odnS+(xk>FovpToPDC zFKHo{R3(yiBatUkH6bpJal`M*1jr@hNhdy(BDqX4faDOFfIr~6wcRuEQZ7k0BE?a` zDAkli*+;o5NG96paJujR}P*aPA=*mqkR;HWpKMSr$pGKC_vqqNS_7&_8&th*r3yv$c z+#E_R8++wh@WboD&0CqpfgPb*FNtq{^U&#|>N%;^rP^o_7OKM%I~dYd)9*3?^d*~U z$2f8Ki*!8vUCzbn{`dns)e$dXflAL8s55i&lPpldInl#_lbVYjq9~6d(lRV|Wuxq} z#O`>qowEdrXgDXUwp3Na?OdSViyDbxE}ZW%VMz=&xloNuW=4@#kd2~vsg70)@abs` zBxzsD2i=L$w=xu$?if-ZMH=OZej)5ks77lXV~1&2FdC{)SL-U$_7iugj-q9SCp%hE zcZ(WsUx4n=G}O`JbDO3i*w+rz&KQZ!l4{$ae8HSkA18WH^DBNi9}A5LS8UQ*TjL5z z)-u3C4Uyt`jU@=;Ajwu$ZJ&F%TY*_%DTKQfndM297PM(lh{Oo4*od^OM4~+rY%$j5 z=w38z$68zouVl%FT(wZfEuj5wwkM@?-G=5H5<@*Ui4U7))vh&EN920WlnQoY79T** z^dJL%dX2dA$c(aU#4UAx*ND4xh}&-ec7|kMfc?uZm(Ng!93I5|ByBp1QZ7d5CK1>h zi2Sp@d|oJSU%KVXBk0+zSmRWg)7n zp`fplA*vCvUiS5XKFkQ2h8FQFRJ=B*n@+n**IUI{b-<^BbzKvDi9m~@Nm0t<21(#3 zrf>%rgV2aHdnI@P8RJ>#B^iU%xOb{^qjk_;dG7s|$>&=ogDn=Ph*%tlVHgp~v3Ba! zOjp)-GFgpKh#=0%nNJoZ&g{E<&f+XSU<)vrtiyQUe5if_*b z0_*R;EzSGGzyJ0mEUfhX7iNZ;tX#{6Mj5i%6U>$%OGb)njcfckER6UOnJcLVfih}9 zn9Do;BoZ1LwEKJ~QEzBYE~1YLEisWt!2_*Cyc3V~n&XgU{0x5o?Fro8@%^{8GTZ+B zH&es+(gQ+9h%N>@Z8O7AIoqEbH%7uVD7wC(5~1T0*$JwFel|&nG$a5+bbQ3L;u@0{ z?CEhKYfcmON{%Ze$f|62pcBiY{V)1~e!Y5-B=;)ce`~~{U1KiZCAdah0tMyo=lQrq zjLXj!;xG(c6%7Oo>jXG?^wd?)xcA;~*ga4cjkuksXd6AIw)HgqZ~mOa#FF%}kfd|6=C5Q?+l z##vZLS?X#i%*ETyW*MEZHc#!mer} z3Cp&DVc2o7wFAiVx!ehEo82#oVuH3Rly4{qC!-~JczKs2yCwd2!&=cyg5qS>j8+_d^F#c&H9Kw-*Y_}8fa-?JLQNBCh7D#&vuI>#0 zXq%s9yvoJcroCGr@ezldJK1xTQ*O_k?E1F6R>!IEm7*eiv=|v?^wIp&}L@Qnh$eE%?&0DG}+=gp>~lQ?-fguZjGq zM}@6&M~s*gME0lk9#H^citUeu5+}4nP1#aY9Y!rqsL;5mbV}0}AMM8z(b~aLDA>u{ zm0O&Tf90hw0k3%A7oPa0Z~pRYu|IpxW54;m=V4zU!1wM1d-nKy(^2g8yS6C1?5p=JWoK}k<&>2cQGH$e%Z1p zXx{$79oYL(*xk0sVC=y=&?agJc5%JM+Iow%z><+&Z?U%CVhw$^t+o~CdW*I77Hi%z zVZFuLdK=O8HlpioL|55H^aAA`)_e9|;t$sKp1uE!_UyeNxra5>)=*n-kA1P*V`CR2 z_prv=8f$B;T{PDA$UUqg-Voj?-f)>VOj}Kf!t2|@;k0zqT~6+J(J1zYtHIi>#El!m z+O4#9D_w+J={+C%_CI{^@BZky&wks7kNxlW{ppuKcjBHOwUqFOF*-mVJ9Ye1cZXhf z3=v=|pMLs3e(Ccke(5RQS3g|3?bxZ|Q=^Hme%JTyU-5_j;?3Z} z_r5H6_761kO{YHciJ)`pzU!X56QDCc(+YlHFL|^{Ed0Jj$dpQCg_)WOH{Xp<89iq6 z)ugj0`%9i)>g=zSfOgYElpzjHf$}1pr_7EVew4yLNs~~TmqAISA+8N_#=Zqt+UYGX zKnGNGeCQ>@5_92$6y;>f;*=6toSLZ#5ICFVL$oEKOeWcg_GWHo-pkxq?)I;O`op zc&AY?L88jFVz$9nWhGZ>#dRV-)uv)+DEDYkHEP*yBH84pZ4RBaUcoN7qdt5mRKr7LQN%z z{KY70g8~vp-mdFA9W!}8-YHAPi9V8hEizfaH7#VhsW#I`?;=W;#j!gjg;)*A6<9q` zZg$0NSjPuVwkT1NAr+{PS{=I>&O?_BM~ON!QZwb4|P6;1>__<%M|N4LW!Bf7O_+MK7KJ))p(;xBO`8!X1{zH%Y{_U544}0UI)CN{7d(K{~5&wTLFM_&Ks zKg8;P|7ZD+-E->SeM!5Y{oK}t-qZf}eJ9@e8SGELDgDdO-uy{cY~Yf8yN!q38eR2evNs z!4LiQlO8IZAvS*8_-u|DXK(kDdI$d)m+WZea7ltHCR;20sUm9p6CPJ6{8?IC|`g6IY%D z*pD{AJ2t?pHnyjoV=p{3(2Mj4hQ>18n{U`W-6@NmPA40R<;8SrSa$U3o*Yv3d}gc@7K08J$l))E!naqze)(QEX$HD%eG|8 z^4CJ>*HT_7-^W5>S)L8BU$Z6KWqEb!vW4>4EDJ4RAuR3kS_+i3B|LTuOMyMIuRZrQ z_j-oO6t~e-~a#r9Y7!7z)l@YyrK5J_x^o7{@W)vZpr@TLqC4PjjwY`UlK)G>Vt@0NW8kmR-`AkO4{v~Wyx)+*HgOKJ2t?p zHUP*Eo61lbvZVs{!i_tzcB6`0 z^-@%CgaQ+K3d^|4m2t=lq`|dwMmbWe1Rc;wiKAL5X|s5wN(xkzB|9!hLWdJN4ojQp z7&AM@3d>_oMWAvl?93Vic$+24Wp+YMVR7DqDi9s6-AHwfMmRH)D%6D5p*TM$3uGCc z)9{pR(5T_=6x2eANm_u7Mfd1b(ygb;ZoSGli*7D^Np~E|sim`Kotf$Z0`fHmZ2dw) zUM6`JQu(T3HYu?Msa!6|B%sWVtn8Exh~25&QUyIN4npm)ODhRGLuh3S)KaYNI`}xo z58G@9_9+)#hg8b4Pz#ePUa@0cJCx-(ma-gDMQ^MaC_p~#$02%^ssaHE9q(Z@DTl)S z4o|QUI$38{P{#@0VN9s1L8qOon{gjcM6{YMRR>h2!)8Lo2ww+gbvTCIVkBFV88gc` zgj!>^Zi_+#i!7lF7I~%(^9^yF)^mi>Xp0j`8x8Fo6viSbn6w-6bCUwp9Ll8Yc`0r| z4LwvRkQQS-k|*s})5pdpu%eHrvMp3A+^EIyT))w>eVrj_@y~h|n2l?C{t zi@!elJpbJna<~0{ZSvMfZqNQf^yP2+)|;{a{Q6_yl@A|1ekJz14E;Y>+z=?4 z#m!k6IAMiah#G7%wLFjIPf_^$?&?N(g+c~rDll$%9I7{Tq zLtj$qCdT+}ZJ5JE7N;evK$TKzsu&z;y>1pLWSG|3j@9h>l|T#P;VR#D zCC+A3`yn)Cuy|kw&w!qwl~bdrDi#QzegKm38^D#NGz?)I-oMdU=4*!{t~~V+ z7h52%2(#>QoNRjdMeBv33G1425SWQUa{b$Gs^~ zo}HMoqur)1J%!DsE$J04fW|nocl#E0(ruYzk*UiIOn@a}5TVVfc*peFv59vK%ns^! z$eTef#$to*CVQL3US$Glc|#X?YXUTbRGO*D)SE^2pG0tUK{kcEgH(x)B%w;B2x9&- zfDV<00S4k}!XGY`hp})l8Bo(4-ziz0q?sEOQ(PukYL@zpJ7|viUK0{NOVu*rVZ2OB z3D6|DU^LQ52koNLE-)D?!f2e9N*9To2*r@z5bz-jBQundb2I2!F1)YL-v&sRL~6bc z*oHRG%sDk2=fyPYp+nAXrZ6|IqJxg%{weHxuM?#C2*s$p8tvnqY9plboIfy%QxR8j zX~D?J9o;voj=54XnSqI9%S!gu9U~Gw1BNW3YZf7+mWP@6z+X;<1$yigComu4*lw9* z89f@zRfJMLDEHmAlN0?a!O*2#HAToE+0H0vrY)yNje*mnbAt*~fdPer`DQd->`sJm zxO)Kd>hDC0PwX2TU~S{pHg0X>9!DF8ZOC0s>DilKUxRJEpj~zjG_>B?N7q(=EQ8!V`E?8L(Y+RZ&9-kp26-vgS}}^&CX7*@Yzc4 zq-M)z-i>Q9yPVGO!9pg*z(z#X|4FFX(yG+#o`OGR)a+zcYIbkIRj66fF$q=7rzIhp zjAaC-E{rqz{-DwwAmUMqHsU2Q*_OkVT&i3$>aB|1AVwvjKTO2*P^>NSfC*<|E*c8N zxpt;7@Wl`@IE=?G8#PNLL75_X!s)oZOe7zwF-pEEMntBVK-6Kd5Dv>^HwDMCTTAaA zi7J;y)GURlS=gIoveuMWWTM0JVmIn9Lory1*sV~!7BR=tbW{(78Qz!a@{G!iXh$hJ z@#LskZk6p4m?|U4HmPDNkgvwh&&78lk?J zZKordfE{hpgMr6_cJc^FTHg1xllW?Ma_p{K{KCPBh6QERvTWm4Cx2&t|T$;3gm%vLF5 zR1lq3h$T$Z2~q)kgcqiY4GWZkn`Adxf(N=dFNB_5+quWx1-aLJoyP^ax8T~&{dC*8 z3#4b)U|WN2y{Np{Mdbz2vumiWp|*zFMMLd^=-D;a)>vC(?V_=^o1Wc_p}5nY+%|^= zl5t&yr1kjEZ6xhVbgNfq*~m)V z@%9=^g7&p@f;Qw4w7=^Sw1?bh=sfqif6VRdvKLP5ifkB<4ilX*6%tE1M32{}q2_Kn zO~)@s%&oR6vAd_>PZ_c6u1f6gEx5`DZy#E1h}%h}MH?Dlj~58O7c`x59rmVW)=z2v zjIFSGyIV;IVs?X5@SLG$=!n&|I|18Ifqo#-jd2v4Na9u(MWK_rtA+-bkJ!xvDO%-Q z$)qmG{g#&U=M{yim1)jfq*LmlwK-`RBSqL&E33w2*1(tR(OiU}u;Lg|4Q>P}7Sfkt{6?Y_70 z0muW3d=!Y2WI8-BlDT43(}xX~mbs2t_ZhB9SN&wAZ1L7mO!joOG!RBgej3XZhZRKt zzG7X-cTzQC5Y}7ipktJ?u43jRPAJtNR&c3+MY#LLM!SP~xH}}8-A*baGmV@erWq}R z4=SUQ*m4aC=9DlgmXvIZgo-6RY)!LSz9OfhcD2k);qg!y zU80!VT?_KHjl1-DC3^vM9#VI2!2^)C02)}^IL~?cPh;bLGE#R9wl&z+3(A!jls^fn zyN22tYHO&i4z-_z)Lmn3jkPt_R>#_IQg^kOTaUzCGOer7xn6|}rE|A8vLI(SA3F}N zghbB5zIGh@tK)zMx8Kv%T8iw-UB%Cjl%dN>hGO+4Ss|5{*3&#m1PgmIc%q+}YmWH0 zX(jl#VtBzb!F3*Q?Jo??zG*4vEx#3x3}WEst|iOfHMO2>HWg~3S@z-W{1Uir*3Pn? zU@m_=Z=;J&#=#Q?UZW|+#=EB6!Ch`-G?d|?6{FxLd8;B}_F9@ctA1!T3jD(Ehr8_T zxrck`Wl-z8x}BD+_Mz2&6+C(Nh|%3LJH#A9e!VvbX}N^t-0(1$dYG zihO9>JBJlv8ir;s8(!ho7sCX-u|*HgRhMk(&<@-Mo-})7CCwOh(QVIPn=n)qvEM|$ zA9{hk4_%lraF)(INhv~J`e%`d-$_h%x{}d1J@B!UutMwG?^$Cb_;eL0AQmWyeD!` z2s^SUclz|XY=v8~>yKaIUq&e{nD-*gbzryyeSW_wsU@<@4BT`+ zi%rl4z{i7JGZSP`xO7$#6Ulxy6l~ceB~%sjiLp-Eu2C(T zZMkd*cy3hEOQb4-pn71q^ywEIiX_6*jcKILA*o>5eIsYPLBHq>eN{U*;>wZE|5r$& z&$+BF6_QLOE;d(QLb^eCJr(RXI`}R`?Vn!&W;!qn=@)Kl%EOKmosNCJSR+?$3l*Z? zl;XaD6Dy|Z*f=U^VlrBYOUaf$Yjk679nfwx6Sq1%i=0!5cr@w+ZG7P8LarriN-EE# z11Vh)a3lw}NBSkLl8^;66m5wqK^>xzi%^23(in&DutXLf1Og8O;9wA_2m~U*@MN%? zvIvf9njy|jG`L}6T56_uSgp;ajvfPg9!$3Tj zft@_XPTW?3j+(^`OcgyfG4+D{x*t0f6TI$O7h{15K2>Y8c0&(WLn4)Hmb)E2*hBO0 zZn;3~lB<^;C>NO0VQp@CSb?e*t+|9!IfAsqg3i(eU4Ud@gPcnS&XkNURtm~ffOb#}V=P-lR2Ny2f-3D@h(ColWnzS`&YgIo-FyU#SDEBg;<4>j;nGU4zu`%g| z3O%OTZcXX-c<4-_-3pfSip0k(p)CbvTnv@6odnS+(xk>FovpToPDC zFKHo{R3(yiBatUkH6bpJal`M*1jr@hNhdy(BDqX4faDOFfIr~6wcRuEQZ7k0BE?a` zDAkli*+;o5NG96paJujR}P*aPA=*mqkR;HWpKMSr$pGKC_vqqNS_7&_8&th*r3yv$c z+#E_R8++wh@WboD&0CqpfgPb*FNtq{^U&#|>N%;^rP^o_7OKM%I~dYd)9*3?^d*~U z$2f8Ki*!8vUCzbn{`dns)e$dXflAL8s55i&lPpldInl#_lbVYjq9~6d(lRV|Wuxq} z#O`>qowEdrXgDXUwp3Na?OdSViyDbxE}ZW%VMz=&xloNuW=4@#kd2~vsg70)@abs` zBxzsD2i=L$w=xu$?if-ZMH=OZej)5ks77lXV~1&2FdC{)SL-U$_7iugj-q9SCp%hE zcZ(WsUx4n=G}O`JbDO3i*w+rz&KQZ!l4{$ae8HSkA18WH^DBNi9}A5LS8UQ*TjL5z z)-u3C4Uyt`jU@=;Ajwu$ZJ&F%TY*_%DTKQfndM297PM(lh{Oo4*od^OM4~+rY%$j5 z=w38z$68zouVl%FT(wZfEuj5wwkM@?-G=5H5<@*Ui4U7))vh&EN920WlnQoY79T** z^dJL%dX2dA$c(aU#4UAx*ND4xh}&-ec7|kMfc?uZm(Ng!93I5|ByBp1QZ7d5CK1>h zi2Sp@d|oJSU%KVXBk0+zSmRWg)7n zp`fplA*vCvUiS5XKFkQ2h8FQFRJ=B*n@+n**IUI{b-<^BbzKvDi9m~@Nm0t<21(#3 zrf>%rgV2aHdnI@P8RJ>#B^iU%xOb{^qjk_;dG7s|$>&=ogDn=Ph*%tlVHgp~v3Ba! zOjp)-GFgpKh#=0%nNJoZ&g{E<&f+XSU<)vrtiyQUe5if_*b z0_*R;EzSGGzyJ0mEUfhX7iNZ;tX#{6Mj5i%6U>$%OGb)njcfckER6UOnJcLVfih}9 zn9Do;BoZ1LwEKJ~QEzBYE~1YLEisWt!2_*Cyc3V~n&XgU{0x5o?Fro8@%^{8GTZ+B zH&es+(gQ+9h%N>@Z8O7AIoqEbH%7uVD7wC(5~1T0*$JwFel|&nG$a5+bbQ3L;u@0{ z?CEhKYfcmON{%Ze$f|62pcBiY{V)1~e!Y5-B=;)ce`~~{U1KiZCAdah0tMyo=lQrq zjLXj!;xG(c6%7Oo>jXG?^wd?)xcA;~*ga4cjkuksXd6AIw)HgqZ~mOa#FF%}kfd|6=C5Q?+l z##vZLS?X#i%*ETyW*MEZHc#!mer} z3Cp&DVc2o7wFAiVx!ehEo82#oVuH3Rly4{qC!-~JczKs2yCwd2!&=cyg5qS>j8+_d^F#c&H9Kw-*Y_}8fa-?JLQNBCh7D#&vuI>#0 zXq%s9yvoJcroCGr@ezldJK1xTQ*O_k?E1F6R>!IEm7*eiv=|v?^wIp&}L@Qnh$eE%?&0DG}+=gp>~lQ?-fguZjGq zM}@6&M~s*gME0lk9#H^citUeu5+}4nP1#aY9Y!rqsL;5mbV}0}AMM8z(b~aLDA>u{ zm0O&Tf90hw0k3%A7oPa0Z~pRYu|IpxW54;m=V4zU!1wM1d-nKy(^2g8yS6C1?5p=JWoK}k<&>2cQGH$e%Z1p zXx{$79oYL(*xk0sVC=y=&?agJc5%JM+Iow%z><+&Z?U%CVhw$^t+o~CdW*I77Hi%z zVZFuLdK=O8HlpioL|55H^aAA`)_e9|;t$sKp1uE!_UyeNxra5>)=*n-kA1P*V`CR2 z_prv=8f$B;T{PDA$UUqg-Voj?-f)>VOj}Kf!t2|@;k0zqT~6+J(J1zYtHIi>#El!m z+O4#9D_w+J={+C%_CI{^@BZky&wks7kNxlW{ppuKcjBHOwUqFOF*-mVJ9Ye1cZXhf z3=v=|pMLs3e(Ccke(5RQS3g|3?bxZ|Q=^Hme%JTyU-5_j;?3Z} z_r5H6_761kO{YHciJ)`pzU!X56QDCc(+YlHFL|^{Ed0Jj$dpQCg_)WOH{Xp<89iq6 z)ugj0`%9i)>g=zSfOgYElpzjHf$}1pr_7EVew4yLNs~~TmqAISA+8N_#=Zqt+UYGX zKnGNGeCQ>@5_92$6y;>f;*=6toSLZ#5ICFVL$oEKOeWcg_GWHo-pkxq?)I;O`op zc&AY?L88jFVz$9nWhGZ>#dRV-)uv)+DEDYkHEP*yBH84pZ4RBaUcoN7qdt5mRKr7LQN%z z{KY70g8~vp-mdFA9W!}8-YHAPi9V8hEizfaH7#VhsW#I`?;=W;#j!gjg;)*A6<9q` zZg$0NSjPuVwkT1NAr+{PS{=I>&O?_BM~ON!QZwb4|P6;1>__<%M|N4LW!Bf7O_+MK7KJ))p(;xBO`8!X1{zH%Y{_U544}0UI)CN{7d(K{~5&wTLFM_&Ks zKg8;P|7ZD+-E->SeM!5Y{oK}t-qZf}eJ9@e8SGELDgDdO-uy{cY~Yf8yN!q38eR2evNs z!4LiQlO8IZAvS*8_-u|DXK(kDdI$d)m+WZea7ltHCR;20sUm9p6CPJ6{8?IC|`g6IY%D z*pD{AJ2t?pHnyjoV=p{3(2Mj4hQ>18n{U`W-6@NmPA40R<;8SrSa$U3o4?bc8W*8<7%0O} z7-_ayCCaR`$Re8cNb^f(Ig{j1#D=~%-7~G3Nu-vtfCW^YhkdHf`A!ud_`uy|(bCT{ zFPtowe!_fu#r*jSJcVhRMBZc@t(MFuS2tJ8``}4`6V!+?U>-e8xmVNM8}JzNy^MM9 z_CxSfev(eyD2cX_Ur3%k1y6K;GW9pFCc{m%Jx>6*hSNo~EEOMsr+7JCZ8Cr1FSmu@ zm*D5UXy$tdFY({d+f%_HWIl~auMGN_L$w|{>QepC+s`keX8bLLOa z|D*i!`VZv?VM$Sc%VXVCM1_YYK1l&l6y7p<9?tv#QU$?4(R8{Og-jA@RX%hULky{v zMkef{AXtatLR zm=n|C@D9A)5c(oz^S%k2B-SVqtR@lAq>vrXGW;L|L?$_ZgdG&9HiC``6Wb&@q4>Ns z1=Cb;hIu+(v=8ng35o7d5uTPUV_GwdB{Twk*$Lf+ntGhNC;FU<^kmS*IV#rg9eWGA z;S6ikm8_k^wYNm4R0>Wu0>HT%J4W;EhT@!J>d4*ISUJWl4>d=5H5Q=e30eR#NaeeQ zXe?ko?5)NXFAZz^F5kB|mA0R>_Wjn~Xm=M?U+UG7yV|t6NStH?Y)FBm*LKk|=>lJ< zi!qsJ(`D6XXAsp#T6mbKTOwstD8tm*0o3Fwf<^8FX+aQMW?|aVv{PCE&u0?UED=${ z7lpDx0Txja9yH;g+*nyB2+mpcaOXW+3RLyoyFzngcRuf7*?_OV3V-96%T*d^<3yls;lAEACO-N5AMYUoPIqQJy%GQ_zUL+h;bOu;U65t4wn5Q`E_ zjtR$1}hUw?Zfy;cH>bPx+9d0jb`j}Y%U++^lU>+aj9pZsPV8@fZ;91R1Q6r zm~+}U6_yCFR-lazOIdu9<)sXqgfZgE4)VV=5b$~j`7ayDtSntnwy2_m45w0F>;vAt zy@{ZrBM}K5){;RQZ5UvQ=g(sRDV8CtKqT|kx?ykb>a{i-$f`CsvUz*eTkDeAsTorv zRSxUvURzEfU&(@~Q{TL_#YqcH1+~^}xN>c)`{6+8;D!>ZktFMU&w>^gyC&KY*f@iP zVpOGCSpz7I&)ER7Vc~OrUqf42Fw{Xvv*aQ|DwJJFXU#KoEn3J>^$624oj}$aSP8VC znWFi~dL+G+4cMHYLY2zv2M9V&sn>AYN5 zZK-aG`-+vrKBtnz7KjozYrUaq^lM&v2x-r%2D~B~y^+LwpdEJnqSM;a&Rx@`*jo>k zA!L0F`_rbZC%IX#C*Og*@n^p-PUnAKgUcCrIpZ#8+&etum}@VIimU4F*B7u|E|ixG z9h^#w$tf+w4L_$ zYueGEkwlDv@IwPJqAoFN&_ECkk{J9TKtv)age6%bMu;e)5dl9j>a^W^ch|cv3vv0? z{%B{;oVPt^`aaJ&^Biz530_?W7p^X?EwBFK>979&?7ipJhJDM?`+d!Fl*)UZ zBDl^!!TROZ(-nJW6%EP@4En;DkzmRH7;V^)TxxkE>$+0>-s@xw~VG;1ZI zUn#`w8jg)Q3RdSnNTzYY1ljgU9bL}U1SB`zoXlg0g5jJDU3F@+XSVUC4X8HJLt@`0 z#WGbCMV5BcMa83KQ6NF(L zJw^oK3M7PbsMT&JnzeifBuhdgK4_zorf1bg!X|T`n;d!|`LT1rzsRM;e17`%SR60XBjuG!*m|O5*ZW<~lCJER`(gZ{#5rr-V{d*)~ zG8DNG0eKfvus8JsTmjK(3R(t9=Blxh*hr;pS?e||Hk8wKhG>aKga}7$xsb+;N;vHH zCs>$*na#97UKA;42t1?+23j=qMtn|8G>cVfY!5Z3L8bD9W#Rn^Yw}(Hzlc#qWi;_9 zIbJ4tuJ3?iy`^L#HnCAhQk9POXsj}9GzU^72Pae{MppQtkxrxrV7BvVf!dCSz@E?j z;PrhMJ-Pq96ux%r^Uj|49eVVsPk#RJWj6%wzY6^AO0W%Vhjs?OxD)Jx-EPa$sspRz z1a8{7x-)R@41nP&0GGB-XL$5a*H*zMVx>e8u04BQf&We}NW@R{J+JqN%$W^8gG@Z|%6+YTJN_{%rs7e)5@rJ--~izvAx zhU&A78{#JEw(4_<(zWDcTVb{nY{Hvj61-JVZekJ~2g(W}v^gkEB>JS}ph>Kyv&=wa z$E|Ez7}aE2Lquoh1II`%#;uBe|-7=9>c9|*8M3JN2u!-Wx& znl9tc95VEn@JUJYvh8BDtcKkhtN3)98X(DaS!3oy0eURhw=gDw|uGle#cnAuJxsCCWoC`0CoyCg<}hX-YtpAnUW=0qj?l;o2WB4>4}P8p&_kc0&`T5_%) zt~L5CuA^qU1w9l@#$$QAL*seDo}|Lb>;^BB4E^6b@hB&ODJfxImXxZ|7>Dadt6`W? zL}fN=L!sG7Lzs$}v}Vro>I0=jK$2%m4F&gTw!^loWrqj#vRjClrekoHYgDjkaiX!q zn4#p!pnVEbBHjhgDsT`FEKlEK@$_%r5OGCsin#bD;v|?s8>MoAYHVass5}{C4vq=k zWGGT7_TrIn3NtuC zY!>>>R42P3u|hgrs295YWTQS3ojN3geZxvedWj-aO@cZlgk#Yf7amBundj4Vl(z(n zqzKn1sJvfuT<=nQ3)OA{eioOX3Y*Pb^iennU4dB=7f+NLd_TP6rm;rs|)YRW=e z?SSI?HX`J~?z|-sqcm@bMyyLTOEugOg%CDO(9wxLVdQpJYudqKX(SY+R2n8zjee?Y zoUkMPd%#nY|DAqEY7~3v#73ydMr39bRK_re3#e735O2rASye9N!diD?x>+S;kUUe! zmRM2)DKoA6Oj~4!wGG!{vKuO|LQJP&t{&s0)>w{2TBkr>^JE$8x=7Fb(g zZGp8ji?x+b&(}Zo-r7+Cb#Hh}O5GoLum2=>L0~no?0+t;?pQlF;ESaGjASZs?%uhz zBzmIax-T$&0({SL>vjd+xwUR<6?RN~J^dA%3hn8wxcq2RZ>x5^`J;g^t$<@=rJ1UI z8e=8O7ooJ^rU)f!Njbq`M4~NL26;Z@)gm~-95(@Y8)e_Z>B_#_9N&!W%l7}zvacAO z&tF6_OS?t0!iKvwo1O_yGrh@mRdF_IiovPg1kkqd|F__@r8m(KSJ-M4@^uo7CwU5H z$!d*i*%6qnR>Zc+DbZfWcGOrmMVQ49k%*`ondRg`QXUU*Q|ve?4et*+Jyp+xP72E> z+k$}DxGl>>_9TK6XHXCwui!!(`okt)?e*nfz`J4-kr~Km!-^>QvB(+CF%lJDdX0r; zQ#3i3&^RU3sJl6(Os2fFp(EHirlU;jQtd``|TSduZv;-}~WnM|OYYUkyF-P=LXxrS;V(uf=a%3dm1< z`kDJ4xaVmp56U{i(9uoQMh1fy?040`NC_#S3VfRe|9^#>%JSqm)~J^ z4y`}@SlC^^>70Wn0(3F=UCezKbKf^L_xwfXMhr&fOclS^-A@zzQ@9$3Hjx*hyo#q(dd?W#xq^q0RMt{nbxR1Yq#%RhbM;B%Fa-T(T< ze@s4aB%Q9Zp?y$C2x0*FO8*>NmdN2%rA@zxKBd<>lgpw+yDB)-IpUPjLeblPTk@C z&l+~As1s&cw{tn&whE+STe@zQ^Mq}c3gvvIK$19FsuXqI9$I$E7!tW+p-kEpQm^C< z96Q3^_=PuL`(FH2>^Hvm0u0FM9LSUA{!efa3RuYnIr?I!kDuVLSL4g1sAPWscvzrOi)`bDw4 zAiqVkEmhzI8mjEJ6-a_WH&vR3R@;HGKtV@n!TK2H#xRr32D;N`Cc-?aHfmu^JAI)R z41|q`vuJFrt85)eaLhwOW2uoucRJFV-M|**$Q^Vhl^)9@gP-_DPF(6;cFlQE+x3|$ z(?NYM#RJplmVI)v>67I($H4Y(K%mlOC*SW9vB7JozY<9;Gv<^&(@_+LjSF7CU6@!r z7Xg!BPwKwBGE``BF}`l7upoI#EHPR^VkjN8CA&8Eq)p<-YkC94^kRU5eHBhRs??HV zc6SAVjb}{1yPggFN@Dnvk<{wP9Nb>L%EpA+@8+G>R2&(;JOd^vucVd|v(9!vjg6!2 zt)1Q(+mk45`<~!hYV=8VIp~c>Mvn>y?Scmk5|6toR4K=tkH%i3sR$J1ILH5%C@Pj| z2o*Ljk6pI0G`rK*B)=)<$E^^q9jyQg`3zogBFnHRp;yl2y^>sZCnk<71<%W5Xa3Z% zeIc?$S?xJqOiaYis434`rQHnzba9|>U?Y7QRi#WpyUbEhqM_c8tLgh_;S-A5KEF_l z`xK>URrL4gX*%SgqH$C#QD`2N)8`wqF-v7*g_EF^o+z&EPSBueffWSV6xyWT$d2Js z@ax@4aYPRodN{UN!0TMG6pNZgkEe8vb|n~~E6n+}l&@^>1~;L^Dzs4D_oUCFWX+5aWp_UpZ+x1!h)5Vi%_}y`9~s&-XJ6y{3()}VKnpWQ9@+3c#-Kv^`+d& zkAJ9;#Py#!l7g7uL5*Q3jvDa9%otM-Ac`7Dl*CiXZh}CE-A)#e&K4N6Rfr3ak~e|5 z7{`UpDw8Q1_1;MB(u1L1%FN?pi|2}~g6e9OLbIe->}<`S6q5nql7d(Y$BN`R?Q*G5 zh>3`rXJs-8P1oWZauw%2Ri)|@%x~vAvzza!L999ql)x56t?lGzp$8F;5K0g*gjg9% zbPZkwf)oSbY7jUG1R5?T(TS|a3IqTgkmt1v*_2G6&vki>4LKMO_i zZy$*X#Y?@5zsH2a_eWA>c)1>_vGrkRGWLimvcI)cd#5naqe4juV?giBG0(+dgV7$r{Nm1$K~tez)N1J=rrhtR_*y?%kr^1v>Nu9T0JRC*Hc35c ziw%ZFb7ahe^md=rIi|i5T+cb4Vg~tH+^EWzImpXFa}G0ACURlq_Odc9MW+|w}2S{8d3uCe1hmaPi#Uj@D@|+IhaIOy9 zgV8d!XNw+Z<^n6fED6FI)N;lmg5AOu9_HvK9Qy7wyqg0rwk#b*d?EHp?Blm?piuD^ zb`$-6?$!s6Zey>U4e-t$)LppI;~kU-$JfN}V{f4g{OFkr-NA03y-*qm@9yvZ@$aLb z054HGiiq3p#=>65UcL1nAH4IV7K*PIt{J((G{kP54EO|ih1O@f;ZEGhwL$_)HF zUn(8_+as-6k3rVVY3!|83pRU;wlrUG;V_#BxE_wmqoS-mIIp(m;Ju8MFE56nOuMIkxDexAeDjIG+Yq6#Nd=SK=9yhRC z#ok=uiGk;;nKEv(9HZ$C%4cY5qMoOQkpGitN{3f)LuoR8!VS?9MEU$FHAJI02*xO^ zPx0+hv=R#eyfkWmSkMlRNu?Gdm102{_QVAnSQiGE0?St0S-0mV^AC7HI-i=hk8+Qfh74 z+~k@@R-+x4A=&zvGs_Z7=i^R4X_(K%{~ZwbB;@kB{P}>m1LEEWXZ;`f1pY6rm7LB0 zYGXAMh?-CFv+hQX`mSH@W`slj_mFzYqw_!aiSoakun=ozzeX-aW;j&?TQzl`XYEyA zS>@EFvSjLQ$ESTq1Ub18&nhVEnU7}5xI8f2xSscxO=uNI*ysne~9T10#sZU;^ zJRq*jzN?JO`wMXx23{!OxF6mDZ`^q6g-;@;7VHVsyLZ8hdkQ&ab3cf^bkcBU%$_lR z1G|leAR>0h3g3C|WXyf=A!-ts^C#1Xu=^<3B<2tj{fA{P9pIK_poo>!+z`D zY3DyZlJnJ4&eyh1a^6nRNJ?%o>QqIAXo|c5jl6R)=iNN>3KlAPn)?ctf^wdzbgY3m zB}-XTqJr%hBs5S{p#ivj;Pts*AXTN467Q2(B2+^=6-(^6-*L?CxZfJPrVu@8Ud(%2 zam?@Z6bxY3+j7?B10P6`FUyaC76-JWHLAK=s1!w27^o|;F`IWMb3Wkpf>CN~m64h2 z*7;7`AK2ZUSmy<#*AwM^4o(1XsLVz0_^FVu{G@JPgUw}>n5 z5r+zL!6ptmN>3jqUf5a8H{B8~NEf2)q4%s6NxX{Q?^ezfsBFq4Y#wA7@O5>wt6(BR zLFJ~cFx3O0;_;<}PgL>T839$*+ZIvE4n`#Wjl=L^$=1MD=(Hn zuOszXf7#Sxo0RAvhzS;_mQ-_NMX<^GRKQFsZFr?>Y4FD%MP=RZ-vkFg_Xthk!OtE1 z+|&3u?4~(!t!Z@h&j+wQQh<8^+W~A(1-9pBmbJM1F9)a{pmxaL-qrjKdqGcCiT8hS zz}f+82durjSbOnUn!2Yx@8-eF>~t6`Ld!?7CH9k8n$Ep`My305O41%PohL`(rvl>Z zAF-!?uXzNqCw{S?!ajy>>diAZ^(yxA$xU6<4P(E)BWKB!oc&Vf=#P%c+26Z|ee)jn zwH-OT?R@;CRg-d5VNo8hSW;`(k>MI_$l-&Om`A-A);GsvGr;#PX{xll+!mC7xZk&%xAiw=OUYV0Z8nY%}kfz?8!{DoaUI#yfFBB zr~~PmQmJ~n>g{n$BH+RGqYo*GTm)0Ayw%)+oo0TpU*(gQMJ^7$0(nS7xYG?nieaj` zxnHTb3a+;>B+it_+92a60oThi-A<^43#~FmYvJbV(rRpqVr$X0RFG*6)W(?a)AO8X zSBco~)DkObv#L(z@QeALTj*Nn9()EQLkOI##k>mUzZ1Yh1I{Z1`lWP36K(t)_HMz7X{~ik@37)a4b@ho>NB4?gbk z7HeOp0C^EW2Oqap?H(5(-^V`g>4@0_*bZPj1eDhfD6yv?W)Dz1KqG5nh}i?y z4p=*2?fO`|K+GbF_0fcBN@AXnvezL@(*sTk)9bUp=Pq0d z)>gRN3?{CbAd2@Dr1ibEr+klI&mND<9&bgKJ>DAPVI6nh-XDwoICcxs#m{5Up{*Mp zHvIm>I*zW|3?g@CGl)-sJ5{tDgFAKL#0k*G7$YCU(kIyMT(keH9K8+R+-j8>J<^X4 zXh(~s87&tUb_eac@xSQnLnp)ExdHARKQbH+7giXe4Jjs=0^YoAQ;DB0;RXDp>)d+V j^IhkbB5k`K`f5^@_I`Jehbg9?m6H2pVgT@g{rCR?xmc{( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json new file mode 100644 index 00000000..fd6c3d3f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWYyZ0F3SUJBZ0lRWEJLVjBEQzlmYUhLNENvcFE3M2F6VEFLQmdncWhrak9QUVFEQWpCMk1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHQTFVRUF4TVdkR3h6ClkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTUKTURCYU1IWXhDekFKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSApFdzFUWVc0Z1JuSmhibU5wYzJOdk1Sa3dGd1lEVlFRS0V4QnZjbWN5TG1WNFlXMXdiR1V1WTI5dE1SOHdIUVlEClZRUURFeFowYkhOallTNXZjbWN5TG1WNFlXMXdiR1V1WTI5dE1Ga3dFd1lIS29aSXpqMENBUVlJS29aSXpqMEQKQVFjRFFnQUVBQkRESDNxbTlMUjVpanJiTUZjTmtVWitteW9GWC9EV1ZzUXNyVTluamdTcVR1ZU96NkpScldlVAorUlpUT2tHWUNxM2pmSDF3bVZLeWVvTzR3MkdiQzZOdE1Hc3dEZ1lEVlIwUEFRSC9CQVFEQWdHbU1CMEdBMVVkCkpRUVdNQlFHQ0NzR0FRVUZCd01DQmdnckJnRUZCUWNEQVRBUEJnTlZIUk1CQWY4RUJUQURBUUgvTUNrR0ExVWQKRGdRaUJDQUNkbGtHSmNJYkxUVUhJaUpCcVd1U1VmeW1hQUxlM0RVU2VwN3B5MWgwbFRBS0JnZ3Foa2pPUFFRRApBZ05JQURCRkFpRUE2aXRjNHRYMy94RGV6NUxEZWdBeWlFR0NZSWRPSm8xNnRhcVcwK3FEMzlFQ0lISTE0aGF4CnUwK2o4VUZQUlBPbTJSU0Izc3pLS1FXY0c1dFhWUWEzdnJUdQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQUxrQTNrQSsvL29hZ1NEbElxeUhPS3N3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBUUU0TmtpRU91Y1duUmw0ejY0a1JzQXhnVTUKNTQrMDVndGViZmxzajgrNGo3TjhpbGMwMFE1amorL3BtbmJmbUl0ZUpOVFhnancxbEpWaFBOcUVRU1dvbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUUKR2FGNjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lIejN1ZFdibmZwWlNwRWxwVng4WHFXSgpSTkcva00zWjFyenFRNzFOZEoxSUFpQUtlVTg5cEsyMWZ0dWUyWFVPOHZqRXR5bVhSb2hjVnQwUU51U2pTRGdVCjFnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:05Z", + "tls_cert_hash": null, + "tx_id": "bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json-flat.json new file mode 100644 index 00000000..4b03a850 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9 +.data.data[0].signature=None +.header.data_hash=nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block_updated.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer0.genesis.block_updated.block new file mode 100644 index 0000000000000000000000000000000000000000..ad9c2f0f5348cc92b823c4206a8fd81045b7e377 GIT binary patch literal 20294 zcmeHPYpmngUGHpnXJ^koI`X!3_m-B`RFuv{+t`ks2dHX~pRp4=aboAihst&w$4(q4 zu@lFU5L+k@wNfikg#_vYR23nF5JCtcD)9jc5JDB%e*fPu;NHm_U;FHL%is8dD}DO!{^F;y+Ry&OSN_)e!e{;+ zeDsBHy&^pS=b6u7zxs_^;LGUsMf6I+Pv5z9_twenJHPPv-~N~9?!6d0QEU%QZ{qbI zeAXHi@+M&y%|R|_4jh`a299YuMT!_W1-eL;Xp+RqLMd;WgT6B;SbZXwr;FsEM4Bba z!m$(VwV!+a)wh$cV!!_Om%bhSb^OiW`N((vfV};^Km8f(OJBbQe(CGCu%Ab-&v(F! zY&eO+dF(BM2>Z7-_SKiQI&?P})q0Vnhfg(w)!LckHI4(>i2D*~g3TtV>%g3#< ztPyotl%PeqKCCdVI~$JtT3ypP=re0YixR+UU9P2RBA>`DW6kRd`XERcJj*B*jT9oY z-CNoLJ?-jzTVb?q9kWtYgA^7L-%CNaP5Wj?^{qAEQy6>Kd8lYsPM#=DdhCcoY>TUL zHBgt9&f5wTZri|>qIXGt0Uq8EIzoc4YC5D9UrQ9upcRfWQCYex;}2y(DJv^>4Q0kv zTMX>#aNN?BhLZ5ROOyCy%5~eTX)h?HRxlnajcy{q?PZtwgwW9?P;O%)53N9*+N8Qv z8lyx=whb!$ib2b8l*5{*TdEX7JANkn(sh6DUc^}9{_;SGgR!YAEwCG1IS zA7`P~l}_JtP_sGBg*-5lkadk(+0^M$Ue=|azLaazS$jMaL(!zILenS>?OeMmwwgh2 z(2gy3(bT8&V%{h7LsJ7%t^%txi5JwNT%Tp~>a;j7W&^K7t(;{bdiJgu zC=9-N3Vm7AwvQFCY$QU>5ST<^(Lk9qE-x_X^q>ywn;TnhC=47Fc}9omw98qA9c>T5 zxthnYYzee@PGgf%I+3Xw*_E7H-=GYsQG^|asONGvHx}X2PP^sHBhgjMkYjiNJvdp( zm1wOwHak)@V@zjT&>-4WJRl2QDqNcDMGwzOT1Fmgk}EBQ#Azgj(xTrQwBjaMI}51v z`G$zsI{A1S8JW60XM3#~!+#oV;liujRR}S!fM=U!NMg4)zv;aE{YN6My+vGpkGKYu z!gUh1w2s+N{irpct=k1wQWDlZJZm1IGwJ($6)13f=XhqQu&tJ|;@7aT8@jH}j?|$g zjst{=h1up;f)9;dovm{%ROc}wumb@N!ST9F7FVK^{L>M$9DI$~3#HK=(pv#LayL%5{ z!j~Z~L8fAbxsqHER8C;Ix-2yZ4aQuJY%VP?M{jmof0$#_inh5AJFEuEPwklKMH;hAirZN>mI^>>d%ow; zwiz%&=y*KoRdoS>{xyyR-GITciq8impZiNOTV*t_fk%(4--(Xk*Q!VLGY7f=CjRvYA!}6UXw) z%R!&z;F9eQhuIeA`yGVT)S=`8=(Lm$A1vxdG9VQ;3=@LKnFUi{J29;D0TXiLQWJjq zI`sAa=p%P-Vc)wAj_cfUoja~`@8LR!-L}V`Gl@_B=?J!CPzF{G=bwBPT%NDE8ynW(WA;bNyb#UO4nS^uodO z4aYE2&HLEbcI51~^6@vVhLU6G zd2zJlNuyas_prAn`;oW0ucCgkiCMnlNNC1)T6p4KbW zS#3gu$+8D0>z0z`y{sHNia#8;%XmJvREMbst}IZ|I3D3~mIqV3IL@oQQYmf1ZU(dvnnx3 zVBsX!Y{cU zzjU3aWafLE4!Hs(e#>T_Co{o;&Aih1W~c+3Jc&~7K5I8;M`tEwAi$&;B`d(kuoX<)*tljDr0Gc8P0Vu+6~jYt4pRYG|Y0eU>ld$CQ$om_Us zIcvJgpod%4G> ziP`f#_QdSTXTgWqp*fj2V|MPCu@_G2;n=fNL_WWC=l$57JsExS;p}OTR~yHw&3rl5dDYeo5<|QKIVwvoy$7f^k0W z0U@R3LNwA8!~hoyG@TGJGs~)E8rhyB*3>dC`nt|kA0ospyBt)&7DcDhcIZPiauG_9 zE?!Esk-}Esbs*Sa09+3O7lFWFC5#Li0DP zOR&d;CU%EPZ27qkY4Fv4YdrFa336Cm_L4+T-AiI9jI^DC*`ZQBKmBeL?V=C6yOl@L z`A#F+3EEo}a&nw=XfRZV(|P0@8Ko)*6BVi26(K}r(zZ-N%J$Q;#Nv1~Mn*eb`I8Fs zH@bY3zS#-$uU{O`FoQJy`#j0z1@hsbxqz867ke=FI$4#Ka%;R{Ph>F4mdcVX;3BgO zRui&5k@~~IS{N?p$r{E3qFHlHEg$JaWQk%7vRN4wS*sy%o>EG3egT3^t@cRu`gP)U za1-_VUcBC6OTD02W5upsFqTY^O>GubONCNWn445pZs5j@l<+K`rrpakG1owXcx1kC z?SN`5>Or&X6k8cSbwQ~(EawV6r8;3tf=!xwI-5x&nGPbzO3Zwo7-Dh8hDkKj`_0~P zkqoBuj$r3PhguXQX$2}dYaYWkeNBSo5CBt$$ngR828tYi^qiF8F80d#`0iY=ojcPr zd=mQ@>UMIj+bh^h=er#~3U%5?&NuFK2%bL0aQ3ix_(adlo!HM*A~3`2={0HK(TKjlI}&qRnvt0JmGj=cvz-C}2L7 zP@Mc2c=a>_Zy+n)+_N{qdW79MH2AXz;N^`a&Y47uNKdB@_InSo-+BPI3j!FM|)BDo*fEIjgOY?o)Oc-2GzV7T0l4U#dyH^d*oDj6#qHgM%izoqhbQ9B5Qh@G4diocjP0P6 zD(qzm$;CMfB{9z|HwVWJ6Ib!xgbs@HYOXesa;8D_RkEv=~ zd#4<)X`aHetgx|ZiLJEPk&?^871te}-P}_x1~_;&PsJE0Ot$LYn$W2{t2QiZ5EYBV zl^z@Uu_{dHT$~@MO{QJpEV~mSqZ|;jX=P%Tt7FT{%-Ol0Ulr#4mK%31H!;*nvgV0V zKGJY>Pp=Cn?i~^L4i;49h`58p^oY2phq&|WAMvE?UuD1kY0!o$LoiuR2ouL?H7KFa z;#akYKkUJL8!=r^H<&N$(Aw`e&Q0G}P2rcM7D&i+FaRIS-ZHg zqn?|PvsFu{U6&*>ZJF&*Mz58b0Dms)vgJ`(hc9$zy)YSegx;W$@60rj==q+WDdGcO z;0&|I1RTpC8PNr12%!=AxlMQtHMCiw57ZE=K(w7l8{kuBh(&P_OpqmYgKwW>$>onm%y$|*Gvr<6#NWFV{VsMnFlwttaVvq+L<&(_A(o>JPf1UpV?znx|UBxtOb zJ3$=v71wT&l#=AU!l2Tkdt{Z86}wRCG+OF%MKR4IQ^9~i~j*c%Lrg;9Z;^p~U={1EQ{ zu4pwc?Eg+9v-A7EgCdv=NTETDhM_F+)i_&SS_^$m7-?qiP(op4CxnYnD<#$tAPXdR zlwsHHG*}Jb#4qTTa9!-Rt7^T-b?kTqlYAwD-V~qqI^$~yubb@uj);4ruOK=i?(7?e z-c!cqhYN8S2A-pFJc#as*KWP>+$RxJ3-$!+y?Y1R`8DhnBz{0F>`vow_nAYR2jBzD zIJ8GCbL{oEdI@B-dl@xG2D?)t`Ox;>86kaWbLzM|-)7H0AKF|x&Vg=z6TH6tY|f0$ zGU8gjiQA0l3p-xS9qcYL3H~?w`N00r*AmOQbHwr|z}?fM!Lb`6f8Q{`u#NI#_w7xG z0*FO8*>NmdN2%rA@zxKBd<>lgpw+yDB)-IpUPjLeblPTk@C z&l+~As1s&cw{tn&whE+STe@zQ^Mq}c3gvvIK$19FsuXqI9$I$E7!tW+p-kEpQm^C< z96Q3^_=PuL`(FH2>^Hvm0u0FM9LSUA{!efa3RuYnIr?I!kDuVLSL4g1sAPWscvzrOi)`bDw4 zAiqVkEmhzI8mjEJ6-a_WH&vR3R@;HGKtV@n!TK2H#xRr32D;N`Cc-?aHfmu^JAI)R z41|q`vuJFrt85)eaLhwOW2uoucRJFV-M|**$Q^Vhl^)9@gP-_DPF(6;cFlQE+x3|$ z(?NYM#RJplmVI)v>67I($H4Y(K%mlOC*SW9vB7JozY<9;Gv<^&(@_+LjSF7CU6@!r z7Xg!BPwKwBGE``BF}`l7upoI#EHPR^VkjN8CA&8Eq)p<-YkC94^kRU5eHBhRs??HV zc6SAVjb}{1yPggFN@Dnvk<{wP9Nb>L%EpA+@8+G>R2&(;JOd^vucVd|v(9!vjg6!2 zt)1Q(+mk45`<~!hYV=8VIp~c>Mvn>y?Scmk5|6toR4K=tkH%i3sR$J1ILH5%C@Pj| z2o*Ljk6pI0G`rK*B)=)<$E^^q9jyQg`3zogBFnHRp;yl2y^>sZCnk<71<%W5Xa3Z% zeIc?$S?xJqOiaYis434`rQHnzba9|>U?Y7QRi#WpyUbEhqM_c8tLgh_;S-A5KEF_l z`xK>URrL4gX*%SgqH$C#QD`2N)8`wqF-v7*g_EF^o+z&EPSBueffWSV6xyWT$d2Js z@ax@4aYPRodN{UN!0TMG6pNZgkEe8vb|n~~E6n+}l&@^>1~;L^Dzs4D_oUCFWX+5aWp_UpZ+x1!h)5Vi%_}y`9~s&-XJ6y{3()}VKnpWQ9@+3c#-Kv^`+d& zkAJ9;#Py#!l7g7uL5*Q3jvDa9%otM-Ac`7Dl*CiXZh}CE-A)#e&K4N6Rfr3ak~e|5 z7{`UpDw8Q1_1;MB(u1L1%FN?pi|2}~g6e9OLbIe->}<`S6q5nql7d(Y$BN`R?Q*G5 zh>3`rXJs-8P1oWZauw%2Ri)|@%x~vAvzza!L999ql)x56t?lGzp$8F;5K0g*gjg9% zbPZkwf)oSbY7jUG1R5?T(TS|a3IqTgkmt1v*_2G6&vki>4LKMO_i zZy$*X#Y?@5zsH2a_eWA>c)1>_vGrkRGWLimvcI)cd#5naqe4juV?giBG0(+dgV7$r{Nm1$K~tez)N1J=rrhtR_*y?%kr^1v>Nu9T0JRC*Hc35c ziw%ZFb7ahe^md=rIi|i5T+cb4Vg~tH+^EWzImpXFa}G0ACURlq_Odc9MW+|w}2S{8d3uCe1hmaPi#Uj@D@|+IhaIOy9 zgV8d!XNw+Z<^n6fED6FI)N;lmg5AOu9_HvK9Qy7wyqg0rwk#b*d?EHp?Blm?piuD^ zb`$-6?$!s6Zey>U4e-t$)LppI;~kU-$JfN}V{f4g{OFkr-NA03y-*qm@9yvZ@$aLb z054HGiiq3p#=>65UcL1nAH4IV7K*PIt{J((G{kP54EO|ih1O@f;ZEGhwL$_)HF zUn(8_+as-6k3rVVY3!|83pRU;wlrUG;V_#BxE_wmqoS-mIIp(m;Ju8MFE56nOuMIkxDexAeDjIG+Yq6#Nd=SK=9yhRC z#ok=uiGk;;nKEv(9HZ$C%4cY5qMoOQkpGitN{3f)LuoR8!VS?9MEU$FHAJI02*xO^ zPx0+hv=R#eyfkWmSkMlRNu?Gdm102{_QVAnSQiGE0?St0S-0mV^AC7HI-i=hk8+Qfh74 z+~k@@R-+x4A=&zvGs_Z7=i^R4X_(K%{~ZwbB;@kB{P}>m1LEEWXZ;`f1pY6rm7LB0 zYGXAMh?-CFv+hQX`mSH@W`slj_mFzYqw_!aiSoakun=ozzeX-aW;j&?TQzl`XYEyA zS>@EFvSjLQ$ESTq1Ub18&nhVEnU7}5xI8f2xSscxO=uNI*ysne~9T10#sZU;^ zJRq*jzN?JO`wMXx23{!OxF6mDZ`^q6g-;@;7VHVsyLZ8hdkQ&ab3cf^bkcBU%$_lR z1G|leAR>0h3g3C|WXyf=A!-ts^C#1Xu=^<3B<2tj{fA{P9pIK_poo>!+z`D zY3DyZlJnJ4&eyh1a^6nRNJ?%o>QqIAXo|c5jl6R)=iNN>3KlAPn)?ctf^wdzbgY3m zB}-XTqJr%hBs5S{p#ivj;Pts*AXTN467Q2(B2+^=6-(^6-*L?CxZfJPrVu@8Ud(%2 zam?@Z6bxY3+j7?B10P6`FUyaC76-JWHLAK=s1!w27^o|;F`IWMb3Wkpf>CN~m64h2 z*7;7`AK2ZUSmy<#*AwM^4o(1XsLVz0_^FVu{G@JPgUw}>n5 z5r+zL!6ptmN>3jqUf5a8H{B8~NEf2)q4%s6NxX{Q?^ezfsBFq4Y#wA7@O5>wt6(BR zLFJ~cFx3O0;_;<}PgL>T839$*+ZIvE4n`#Wjl=L^$=1MD=(Hn zuOszXf7#Sxo0RAvhzS;_mQ-_NMX<^GRKQFsZFr?>Y4FD%MP=RZ-vkFg_Xthk!OtE1 z+|&3u?4~(!t!Z@h&j+wQQh<8^+W~A(1-9pBmbJM1F9)a{pmxaL-qrjKdqGcCiT8hS zz}f+82durjSbOnUn!2Yx@8-eF>~t6`Ld!?7CH9k8n$Ep`My305O41%PohL`(rvl>Z zAF-!?uXzNqCw{S?!ajy>>diAZ^(yxA$xU6<4P(E)BWKB!oc&Vf=#P%c+26Z|ee)jn zwH-OT?R@;CRg-d5VNo8hSW;`(k>MI_$l-&Om`A-A);GsvGr;#PX{xll+!mC7xZk&%xAiw=OUYV0Z8nY%}kfz?8!{DoaUI#yfFBB zr~~PmQmJ~n>g{n$BH+RGqYo*GTm)0Ayw%)+oo0TpU*(gQMJ^7$0(nS7xYG?nieaj` zxnHTb3a+;>B+it_+92a60oThi-A<^43#~FmYvJbV(rRpqVr$X0RFG*6)W(?a)AO8X zSBco~)DkObv#L(z@QeALTj*Nn9()EQLkOI##k>mUzZ1Yh1I{Z1`lWP36K(t)_HMz7X{~ik@37)a4b@ho>NB4?gbk z7HeOp0C^EW2Oqap?H(5(-^V`g>4@0_*bZPj1eDhfD6yv?W)Dz1KqG5nh}i?y z4p=*2?fO`|K+GbF_0fcBN@AXnvezL@(*sTk)9bUp=Pq0d z)>gRN3?{CbAd2@Dr1ibEr+klI&mND<9&bgKJ>DAPVI6nh-XDwoICcxs#m{5Up{*Mp zHvIm>I*zW|3?g@CGl)-sJ5{tDgFAKL#0k*G7$YCU(kIyMT(keH9K8+R+-j8>J<^X4 zXh(~s87&tUb_eac@xSQnLnp)ExdHARKQbH+7giXe4Jjs=0^YoAQ;DB0;RXDp>)d+V j^IhkbB5k`K`f5^@_I`Jehbg9?m6H2pVgT@g{rCR?xmc{( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..fd6c3d3f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRQWNBTkIxQi9ERm93ZWVWUjRGZEMwakFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFMERpYVpCV1UxTk5odW1jNWFuRFVQM24ycXhWVDVnZzIxK1dKQ1g0VVpWK24KanJKVEpiaTQvZUU3WXFab3doWEZaZlI2WHFRRzFaamlUKzgwZkVGRFVhT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnWEM5Wm04T0NHWVQ3VXZCbS95Y0NMOTc5dzdyYTRMSlIwVXEySTAvMHl5WXcKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pFdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXhNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDRmE1WExIWG10c2RNZ2NWMjRNdzNpN2ZLVjVaMkw0Sk1jNzlYUlZOdnhlZ0lnClV0VUlCTEZ4Sjl0UUtTTmN6M1BiL1VDZ2lEMkVMa0ZjOE1FQzR3Vll5T2M9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:05Z", + "tls_cert_hash": null, + "tx_id": "bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json-flat.json new file mode 100644 index 00000000..4b03a850 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer1.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf2gAwIBAgIQXBKV0DC9faHK4CopQ73azTAKBggqhkjOPQQDAjB2MQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz\nY2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5\nMDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH\nEw1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMR8wHQYD\nVQQDExZ0bHNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D\nAQcDQgAEABDDH3qm9LR5ijrbMFcNkUZ+myoFX/DWVsQsrU9njgSqTueOz6JRrWeT\n+RZTOkGYCq3jfH1wmVKyeoO4w2GbC6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud\nJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud\nDgQiBCACdlkGJcIbLTUHIiJBqWuSUfymaALe3DUSep7py1h0lTAKBggqhkjOPQQD\nAgNIADBFAiEA6itc4tX3/xDez5LDegAyiEGCYIdOJo16taqW0+qD39ECIHI14hax\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6\n9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq\nhkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9 +.data.data[0].signature=None +.header.data_hash=nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 0000000000000000000000000000000000000000..0f873e5b1ad0694b52c63c3ab73c21b271b17b66 GIT binary patch literal 20295 zcmeHPYpmngUGHpnXJ^muPDkFB-Myt{H9+Z1w2ke&K~;PFjGfqt6FV0*FO8*>NmdN2%rA@zxKBd<>lgpw+yDB)-IpUPjLeblPTk@C z&l+~As1s&cw{tn&whE+STe@zQ^Mq}c3gvvIK$19FsuXqI9$I$E7!tW+p-kEpQm^C< z96Q3^_=PuL`(FH2>^Hvm0u0FM9LSUA{!efa3RuYnIr?I!kDuVLSL4g1sAPWscvzrOi)`bDw4 zAiqVkEmhzI8mjEJ6-a_WH&vR3R@;HGKtV@n!TK2H#xRr32D;N`Cc-?aHfmu^JAI)R z41|q`vuJFrt85)eaLhwOW2uoucRJFV-M|**$Q^Vhl^)9@gP-_DPF(6;cFlQE+x3|$ z(?NYM#RJplmVI)v>67I($H4Y(K%mlOC*SW9vB7JozY<9;Gv<^&(@_+LjSF7CU6@!r z7Xg!BPwKwBGE``BF}`l7upoI#EHPR^VkjN8CA&8Eq)p<-YkC94^kRU5eHBhRs??HV zc6SAVjb}{1yPggFN@Dnvk<{wP9Nb>L%EpA+@8+G>R2&(;JOd^vucVd|v(9!vjg6!2 zt)1Q(+mk45`<~!hYV=8VIp~c>Mvn>y?Scmk5|6toR4K=tkH%i3sR$J1ILH5%C@Pj| z2o*Ljk6pI0G`rK*B)=)<$E^^q9jyQg`3zogBFnHRp;yl2y^>sZCnk<71<%W5Xa3Z% zeIc?$S?xJqOiaYis434`rQHnzba9|>U?Y7QRi#WpyUbEhqM_c8tLgh_;S-A5KEF_l z`xK>URrL4gX*%SgqH$C#QD`2N)8`wqF-v7*g_EF^o+z&EPSBueffWSV6xyWT$d2Js z@ax@4aYPRodN{UN!0TMG6pNZgkEe8vb|n~~E6n+}l&@^>1~;L^Dzs4D_oUCFWX+5aWp_UpZ+x1!h)5Vi%_}y`9~s&-XJ6y{3()}VKnpWQ9@+3c#-Kv^`+d& zkAJ9;#Py#!l7g7uL5*Q3jvDa9%otM-Ac`7Dl*CiXZh}CE-A)#e&K4N6Rfr3ak~e|5 z7{`UpDw8Q1_1;MB(u1L1%FN?pi|2}~g6e9OLbIe->}<`S6q5nql7d(Y$BN`R?Q*G5 zh>3`rXJs-8P1oWZauw%2Ri)|@%x~vAvzza!L999ql)x56t?lGzp$8F;5K0g*gjg9% zbPZkwf)oSbY7jUG1R5?T(TS|a3IqTgkmt1v*_2G6&vki>4LKMO_i zZy$*X#Y?@5zsH2a_eWA>c)1>_vGrkRGWLimvcI)cd#5naqe4juV?giBG0(+dgV7$r{Nm1$K~tez)N1J=rrhtR_*y?%kr^1v>Nu9T0JRC*Hc35c ziw%ZFb7ahe^md=rIi|i5T+cb4Vg~tH+^EWzImpXFa}G0ACURlq_Odc9MW+|w}2S{8d3uCe1hmaPi#Uj@D@|+IhaIOy9 zgV8d!XNw+Z<^n6fED6FI)N;lmg5AOu9_HvK9Qy7wyqg0rwk#b*d?EHp?Blm?piuD^ zb`$-6?$!s6Zey>U4e-t$)LppI;~kU-$JfN}V{f4g{OFkr-NA03y-*qm@9yvZ@$aLb z054HGiiq3p#=>65UcL1nAH4IV7K*PIt{J((G{kP54EO|ih1O@f;ZEGhwL$_)HF zUn(8_+as-6k3rVVY3!|83pRU;wlrUG;V_#BxE_wmqoS-mIIp(m;Ju8MFE56nOuMIkxDexAeDjIG+Yq6#Nd=SK=9yhRC z#ok=uiGk;;nKEv(9HZ$C%4cY5qMoOQkpGitN{3f)LuoR8!VS?9MEU$FHAJI02*xO^ zPx0+hv=R#eyfkWmSkMlRNu?Gdm102{_QVAnSQiGE0?St0S-0mV^AC7HI-i=hk8+Qfh74 z+~k@@R-+x4A=&zvGs_Z7=i^R4X_(K%{~ZwbB;@kB{P}>m1LEEWXZ;`f1pY6rm7LB0 zYGXAMh?-CFv+hQX`mSH@W`slj_mFzYqw_!aiSoakun=ozzeX-aW;j&?TQzl`XYEyA zS>@EFvSjLQ$ESTq1Ub18&nhVEnU7}5xI8f2xSscxO=uNI*ysne~9T10#sZU;^ zJRq*jzN?JO`wMXx23{!OxF6mDZ`^q6g-;@;7VHVsyLZ8hdkQ&ab3cf^bkcBU%$_lR z1G|leAR>0h3g3C|WXyf=A!-ts^C#1Xu=^<3B<2tj{fA{P9pIK_poo>!+z`D zY3DyZlJnJ4&eyh1a^6nRNJ?%o>QqIAXo|c5jl6R)=iNN>3KlAPn)?ctf^wdzbgY3m zB}-XTqJr%hBs5S{p#ivj;Pts*AXTN467Q2(B2+^=6-(^6-*L?CxZfJPrVu@8Ud(%2 zam?@Z6bxY3+j7?B10P6`FUyaC76-JWHLAK=s1!w27^o|;F`IWMb3Wkpf>CN~m64h2 z*7;7`AK2ZUSmy<#*AwM^4o(1XsLVz0_^FVu{G@JPgUw}>n5 z5r+zL!6ptmN>3jqUf5a8H{B8~NEf2)q4%s6NxX{Q?^ezfsBFq4Y#wA7@O5>wt6(BR zLFJ~cFx3O0;_;<}PgL>T839$*+ZIvE4n`#Wjl=L^$=1MD=(Hn zuOszXf7#Sxo0RAvhzS;_mQ-_NMX<^GRKQFsZFr?>Y4FD%MP=RZ-vkFg_Xthk!OtE1 z+|&3u?4~(!t!Z@h&j+wQQh<8^+W~A(1-9pBmbJM1F9)a{pmxaL-qrjKdqGcCiT8hS zz}f+82durjSbOnUn!2Yx@8-eF>~t6`Ld!?7CH9k8n$Ep`My305O41%PohL`(rvl>Z zAF-!?uXzNqCw{S?!ajy>>diAZ^(yxA$xU6<4P(E)BWKB!oc&Vf=#P%c+26Z|ee)jn zwH-OT?R@;CRg-d5VNo8hSW;`(k>MI_$l-&Om`A-A);GsvGr;#PX{xll+!mC7xZk&%xAiw=OUYV0Z8nY%}kfz?8!{DoaUI#yfFBB zr~~PmQmJ~n>g{n$BH+RGqYo*GTm)0Ayw%)+oo0TpU*(gQMJ^7$0(nS7xYG?nieaj` zxnHTb3a+;>B+it_+92a60oThi-A<^43#~FmYvJbV(rRpqVr$X0RFG*6)W(?a)AO8X zSBco~)DkObv#L(z@QeALTj*Nn9()EQLkOI##k>mUzZ1Yh1I{Z1`lWP36K(t)_HMz7X{~ik@37)a4b@ho>NB4?gbk z7HeOp0C^EW2Oqap?H(5(-^V`g>4@0_*bZPj1eDhfD6yv?W)Dz1KqG5nh}i?y z4p=*2?fO`|K+GbF_0fcBN@AXnvezL@(*sTk)9bUp=Pq0d z)>gRN3?{CbAd2@Dr1ibEr+klI&mND<9&bgKJ>DAPVI6nh-XDwoICcxs#m{5Up{*Mp zHvIm>I*zW|3?g@CGl)-sJ5{tDgFAKL#0k*G7$YCU(kIyMT(keH9K8+R+-j8>J<^X4 zXh(~s87&tUb_eac@xSQnLnp)ExdHARKQbH+7giXe4Jjs=0^YoAQ;DB0;RXDp>)d+V j^IhkbB5k`K`f5^@_I`Jehbg9?m6H2pVgT@g{rCR?xmc{( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..fd6c3d3f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXRENDQWY2Z0F3SUJBZ0lSQUlvendvVlFYYWR5anNWcnF6VzdDSU13Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTVRrd09USTBNREExT1RBd1doY05Namt3T1RJeE1EQTEKT1RBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCS2JvMzlKN0ZOREZDRFBKSVNmUkJheGtjRHlIdmtKTDVpNkozNm9uWGpuMDB6dlFCd29mbERVeQoxRWV4OTNzOG9qWmxGRG0ycFVLaEg0SjB0NWRGUG5HamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdhcEZORzRrb0lxdFdvRllJbHBXK2hXS0lnalByc05pMXdkTC9xZ2d5Q3NBd0NnWUlLb1pJemowRQpBd0lEU0FBd1JRSWhBS1FsUWE1QXluT0E3RzIxbkhheUtmbmViakh2ZmRDREF2Q1loaC9WRGpqWEFpQXllNEo3ClhWTVhFbXVQVXdmMk1Db293MUUwQnVCUHpldEFQRW1Cb0RsOVNBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRakNDQWVtZ0F3SUJBZ0lRR1loTXRiajNYMlVFTGRWbGtqMW5ZVEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEU1TURreU5EQXdOVGt3TUZvWERUSTVNRGt5TVRBd05Ua3dNRm93YkRFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEZEQVNCZ05WQkFvVEMyVjRZVzF3YkdVdVkyOXRNUm93R0FZRFZRUURFeEYwYkhOallTNWxlR0Z0CmNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkhEdGlBdGlYL05DSTN6MFJjbkoKay85SEljRjBHQnZteG4yUG5JZGhmekZodnJ3ekF0ZjFTT2VhUTZzVGhhMWNCVTJTS2s4Q2JSRkRpTTl3M2o3QQorT09qYlRCck1BNEdBMVVkRHdFQi93UUVBd0lCcGpBZEJnTlZIU1VFRmpBVUJnZ3JCZ0VGQlFjREFnWUlLd1lCCkJRVUhBd0V3RHdZRFZSMFRBUUgvQkFVd0F3RUIvekFwQmdOVkhRNEVJZ1FnWEM5Wm04T0NHWVQ3VXZCbS95Y0MKTDk3OXc3cmE0TEpSMFVxMkkwLzB5eVl3Q2dZSUtvWkl6ajBFQXdJRFJ3QXdSQUlnY200UnVQbVNZZThWK0V5Zwo5OGhIMzdaTUxuQzlGYzJhVHlxcUlrSjVtc0FDSUJycndVRzhxQ293c3FUZFNaaHV3ZnByWEZjM29lNHU3SUl4CkszYnJ0QVc1Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:05Z", + "tls_cert_hash": null, + "tx_id": "bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json-flat.json new file mode 100644 index 00000000..4b03a850 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/orderer2.genesis.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ\n3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm\nMCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq\nhkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9 +.data.data[0].signature=None +.header.data_hash=nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..220491b7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.json @@ -0,0 +1,778 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdPZ0F3SUJBZ0lSQVBYclNNcXJGc2QveUkwYXNoOGg2TlV3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkJ0TDBabjVtOHJMM09uSTNhVTFkTjJZTjlKdTRmMU01bFV2a2lZMFFIejYKOUYrRytBeXhtcHNKRU5Ia21hcElnWkxDcFAzd3hFYmZ2Nk1ySEFQbWJnK2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNREFLQmdncQpoa2pPUFFRREFnTkhBREJFQWlBYlBpejFUNDZDTlJiNGZzODhoeFR0VTZsTkZuNTN0NmZOU0JXS0RiY1hzUUlnCkYveUtuYUhMbGJpK3JDcmo2eDdyZFZndFliZ3dVTm53ekUxazZzUTBQM3c9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/original_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..a50846fc3e6da3760ad43e61074bc254ec119a5d GIT binary patch literal 21369 zcmeHP%a7|=UY?%rzFl+rF&E#S?&+GDrga&H=^MJ^IB(Dhj-Rm;J8@#?wHY~%>m^rc2 z!hR!j_R@I?RhsKlFK8J?5Mn=reG7a8yyK%k@Q*!I@nd7HxxQn3tb6XmUn`$KfMeI1 zhv$FxA$U1G$)9|P{lSOW?|pcA+JAWPQTmT$I9~dIV%iGN@)T5FOwf)m4p zF;7C1m%CmwDO;teTNC75OW=4oDwsB`lcu?t&g^DOmT72{8&M8pK*2A>bu5M zQ6A-mx!5T>2FFG^w{{w?v>GXlE|T814qS`MfMAy3=@p^D#`wCaz@li&u}G^$ktQ`% zmh8%yLm3cj;+on(fi$Hq2?q*vx{BBqV`g`2JQMr$pttsiZZ#RX&QxpHiyY|n-1$d!DZkXB-Q7PIlTLY-NY=>GL}!|fIZy<9xv)a8JvMq)dTIdfZw2FzNr z2c6>6E3&hgi3hd1H{>@qPCMa4SdiuIYXuY)a!^)TG8QQ`Py*6qSQ2#)DzKG4*jig8 z;iSTl3PjzmWkqVXJppaX7D-W6&}C?uif74OC^U%yZ#2hhLFL;O*e7$Xd|sy=4zBcM zP`f@7O{oTHk^#_y^R-Y9H?pBqGf`HZVzvv_T(1yKi1MJ|t+dT@i064ZBRDc|@=G>0 z+HtwM9Cs((r~@{}5{hG{&Ed^{De^-#)6xTK*jiY!tIk|$f-zm zyW*PJ!1iwFnhG_OrX$XA5hj*ek6E)eRCmX8h3=wb7RdqKWzi6HHUpxv<`ndNx8vSZ z7_OQOH_UR_pH4@8G8}e__K3jOwGABa>WB(EZ-)Sl@o58r;VG5l+EkZBWfnIT9v5kt zLuiY8X_>t(Tc>4UTWFI+I)gmV1Okp{kY}7gCh5=x=@f-#klvVEqvyaZpFW9@Xhsq_ zGFfmPu~3C3!%@`kcK~Ci25}ye^^upa3T0NJS&D86d}q=owe?J=liF$~G>TS9$d|l% z-=5?6W+jucH*sh+0XfE4SMy=Tvxg2#yM(XSr?rBBN5wJQnsfF@Ap;Q>b|8rvG8@b3 z7$ALn_clPSqcXeqdxW-hz{CTRl+_yQVN9p9P#afv&{bnpMrJqAPhTgf$pwZtWmEH6 zi7U)Jei8LNcECG+FEj1cdDCtMp=9OaaU;7h&4dc!l@W=a0Z(@zjN39lg>~7HwIWRB zO<3lL+`OhG^~u~A*|pVVOwn*f4W`p4L8L2IxY6&A!x1p60|oe{vRV~llv01H!I$Up!H!mg=ADUCai18!*Yv~ z=Q%H44dHy#6|;<$6(U2lr%tbim!gqmkPX)q*h1(;Gd#*Nz{e|2Nn*rGl?)wqRio|1 zBo;qDg0=~?VqczAtG1&16N}3>4TB{e+02uTswVAHHH^}=Yu#Y84=+9q!fT`i*2+EAB$evFePppQwl*l4VV z=G03v#R<9cs}))t)hGCE6wwWW_J?;8wB1db5+U{kt=uQ;U7V(>6RlP+P@XTB^V&wa zcApo7=I5Lexd9|*%V-`Gn&7}_-l%*()PXctBGv}aofZLUUgREWk(*#@SK=DVy8x6^ zqM7v&AJq=2k(-roK_1xWMj%Pkwfw@ZHrhqY4n`uYOEYztaTAa2XX#!yl*2%+&TX@^ zP?kn>Qxe)i&rm?7Jye=AZa^*a_N11J-EKWGyk;RLxDj=a)Ckz;MxHk{0(Q9(NR6Et zC+PgBp{O<9639hw*-0B}DcV#WV3Y6t7sgch>&Ysq|7oUW@37}6&Lf))+3)1#L1E)1EO+xoIQc< z1h!K^dGCPovyihVsGXp8g4+F|_F2f;6V^^xJ7MkqSi3>a-iv8XNz7+sTCcRY4*{Gu zxFmr0pAS&=cJ;vXtk#RzyuTYp#1^gEl7C+}bK{ z-v{5!qVoCNaI!~=-0THK3>ffJN9U23Mvy$qX)d_wYu(wNM$%j(^fmpcHzD?E-Pxa~ z2p;L7u4g$TqP+RUGD*kNXLmL$0PJcrB`}OTTm1s~*0xp0a+i)48M`Z{O;vx4{=V}B zAA#466;g?0@7GIobGz!Ss{{**ByO-|-R`-DAf$^gCPrB6xq_lAni>Hjgay9LI;t-`(k-2k)g~fXkazyhH0d zFaI%kW81hDc)k~Y`up1te)K{X7o%{5MwWx-5+lUk!QKD> zJm}`WU-&+OeQ96s@ni7XKI8N*_U75kX;$i@;Hb_%%k*{ZEmQ@aXQ$?W_~k>Lp9QZo z^RX9%MmpfIZ()y6#jjo|JgQv;Z#VW6;4?Hso!uwY4xPOy*mq<<=VHH1rs=h94iEcJ zi2cgf0J!)Q`53VOc>DbC9_^e6fBgvii$~a>KRO&wQ)qv4C-dG?5c6(y_RM=5HfAtC zgPCmB)65R-@Qb9@tRva*HEFb_yl81OOT*4y8ch+`)%$wP?(6|H6BkqQ{?@1fE}aVZ zW7@YwJ2yKJ?cjL~2**TwD$Yg*1UY7Q=7KsCN7p?ReUVi69*Sm~D>zns10?y5dkR!Y zQ@^l#@Z_cSLnO&qq9Bx+f;6+3=2Gv?+fHFqD$Lp;T$^eU6bl)=Xhz0p;)Hf3Q?ScY z#d35Umy5QY$@=bmG;#UJ5G18<+HuYiy3>}lVB}8E^U%eCwt>y`$=Bq{&NBc-3TlIG zVgRX`9g^G{FpiYYJQ8Lf{0AhG$XB+yX=bOJW<|I)AH?gb;=TV{Hij0hi@=bm@?v3UXf7tOE z$M3Ey{Y6gzZHddy#QZQ9Y!-4kCyj+1k7UnvL#<(?JAZOkxdw%>&cOr>Ob66wp5=pHv^4&(1AW|MpHy$acEAxO+^<++Zq3BRk(GRHiZRIx{;rM+UI#R=4nlTisNV zK=R$ZThOd0yX8Y8yhC<(+Tn_QmlMGsuFpPvKr)AfFDJE10R#kp&~G zpOq*+zrox3TmZ9dwZ`i#&XFs3JttaoemtFQ*y$>WH!zyyI!!~9OQAB=ayqFJo%*ao zjoK`2iPbo7mm$bBn|GRPZu8cF`V&2wiv>Ru zif#xgo(zImYGPutB2TI$MN0e9{q9tGN$}4_C9KMe$?!(G-|#G8;{uo)My_y-@DO1GClt` z_zI~-`m|$h3?vDA^X%VWe)!2JpS=2Y^y45NJAWU%v8|<8uHh{s>@DmS@MR+0-|c+^ z{PUj#kI=>=G8`vK|!G8YG!!90kJHsv#owSh;x9#X|Hxa4p^0up! z77|!oS^^J_Kr(9J!+FuI1dV)i&gV5XHTG_PF*IGYsAAa)T)Z13-(T4MwTs+ zq9``Ck#gN+*yrQxqB_%@UOwCloftTH$}fasC{7-=tW8cSlqjh^DonykWx7@(wd6?b zyqJ$l6RAV?>hwtOhseka*lbdtYqf?mvN8b`*rjzj7$Dy#8JNw8b;5fA#(PCqo@dWRA?ztQQ+bw_RYz6n;|| z{Y8)Fdx+|KvC(`@fusF~<7oQ6`O%7NGB6~vJba+w@G%OUwzMJHQ*)9uUAlTvo6~A5 zKPMLJu2M8jBA4k2RKK7OyO}w#13?i+Rv~LJ<-ua;#nV1JoU}{*h0NuKwxwh$_=I6; zRcn$iO_50Ac!e55Xhh$e(BLiHP`W}NxFJe}Xg`m3z!%gIh2kI>Bg=e>Z=0m#nD?Oh zw5a{lf_890Dzy=*6!Sc-8`Chpg(l*&R1 z@YF0rZF-5jp1`?XR_flSGVC>^R)y~C(G13=dI&8a_lJGw7RKv7`@a+7p6e57C&XQT z0qt{TT)tR{!!Yn_5y#!|A^7@BAH4cq#MFX4fr=y)cgrK5fUj;}`O@fo=NeVl*t5_ovQb;I#EFv1Y& zMjT8A?>&wA{kbw;#1DtAY>KZQx)LvJ51qezkhNW0FMIKI$dAB#+s8yBsnbQDJ5jLI zqh(-V50T&cztO+19(sJ6$R&R%ayfqjK+14?L1Zmmlo!Cj!_M~Wl$WLZbKdK1-b07- IEN|$40B<)JA^-pY literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 0000000000000000000000000000000000000000..0f873e5b1ad0694b52c63c3ab73c21b271b17b66 GIT binary patch literal 20295 zcmeHPYpmngUGHpnXJ^muPDkFB-Myt{H9+Z1w2ke&K~;PFjGfqt6FV0*FO8*>NmdN2%rA@zxKBd<>lgpw+yDB)-IpUPjLeblPTk@C z&l+~As1s&cw{tn&whE+STe@zQ^Mq}c3gvvIK$19FsuXqI9$I$E7!tW+p-kEpQm^C< z96Q3^_=PuL`(FH2>^Hvm0u0FM9LSUA{!efa3RuYnIr?I!kDuVLSL4g1sAPWscvzrOi)`bDw4 zAiqVkEmhzI8mjEJ6-a_WH&vR3R@;HGKtV@n!TK2H#xRr32D;N`Cc-?aHfmu^JAI)R z41|q`vuJFrt85)eaLhwOW2uoucRJFV-M|**$Q^Vhl^)9@gP-_DPF(6;cFlQE+x3|$ z(?NYM#RJplmVI)v>67I($H4Y(K%mlOC*SW9vB7JozY<9;Gv<^&(@_+LjSF7CU6@!r z7Xg!BPwKwBGE``BF}`l7upoI#EHPR^VkjN8CA&8Eq)p<-YkC94^kRU5eHBhRs??HV zc6SAVjb}{1yPggFN@Dnvk<{wP9Nb>L%EpA+@8+G>R2&(;JOd^vucVd|v(9!vjg6!2 zt)1Q(+mk45`<~!hYV=8VIp~c>Mvn>y?Scmk5|6toR4K=tkH%i3sR$J1ILH5%C@Pj| z2o*Ljk6pI0G`rK*B)=)<$E^^q9jyQg`3zogBFnHRp;yl2y^>sZCnk<71<%W5Xa3Z% zeIc?$S?xJqOiaYis434`rQHnzba9|>U?Y7QRi#WpyUbEhqM_c8tLgh_;S-A5KEF_l z`xK>URrL4gX*%SgqH$C#QD`2N)8`wqF-v7*g_EF^o+z&EPSBueffWSV6xyWT$d2Js z@ax@4aYPRodN{UN!0TMG6pNZgkEe8vb|n~~E6n+}l&@^>1~;L^Dzs4D_oUCFWX+5aWp_UpZ+x1!h)5Vi%_}y`9~s&-XJ6y{3()}VKnpWQ9@+3c#-Kv^`+d& zkAJ9;#Py#!l7g7uL5*Q3jvDa9%otM-Ac`7Dl*CiXZh}CE-A)#e&K4N6Rfr3ak~e|5 z7{`UpDw8Q1_1;MB(u1L1%FN?pi|2}~g6e9OLbIe->}<`S6q5nql7d(Y$BN`R?Q*G5 zh>3`rXJs-8P1oWZauw%2Ri)|@%x~vAvzza!L999ql)x56t?lGzp$8F;5K0g*gjg9% zbPZkwf)oSbY7jUG1R5?T(TS|a3IqTgkmt1v*_2G6&vki>4LKMO_i zZy$*X#Y?@5zsH2a_eWA>c)1>_vGrkRGWLimvcI)cd#5naqe4juV?giBG0(+dgV7$r{Nm1$K~tez)N1J=rrhtR_*y?%kr^1v>Nu9T0JRC*Hc35c ziw%ZFb7ahe^md=rIi|i5T+cb4Vg~tH+^EWzImpXFa}G0ACURlq_Odc9MW+|w}2S{8d3uCe1hmaPi#Uj@D@|+IhaIOy9 zgV8d!XNw+Z<^n6fED6FI)N;lmg5AOu9_HvK9Qy7wyqg0rwk#b*d?EHp?Blm?piuD^ zb`$-6?$!s6Zey>U4e-t$)LppI;~kU-$JfN}V{f4g{OFkr-NA03y-*qm@9yvZ@$aLb z054HGiiq3p#=>65UcL1nAH4IV7K*PIt{J((G{kP54EO|ih1O@f;ZEGhwL$_)HF zUn(8_+as-6k3rVVY3!|83pRU;wlrUG;V_#BxE_wmqoS-mIIp(m;Ju8MFE56nOuMIkxDexAeDjIG+Yq6#Nd=SK=9yhRC z#ok=uiGk;;nKEv(9HZ$C%4cY5qMoOQkpGitN{3f)LuoR8!VS?9MEU$FHAJI02*xO^ zPx0+hv=R#eyfkWmSkMlRNu?Gdm102{_QVAnSQiGE0?St0S-0mV^AC7HI-i=hk8+Qfh74 z+~k@@R-+x4A=&zvGs_Z7=i^R4X_(K%{~ZwbB;@kB{P}>m1LEEWXZ;`f1pY6rm7LB0 zYGXAMh?-CFv+hQX`mSH@W`slj_mFzYqw_!aiSoakun=ozzeX-aW;j&?TQzl`XYEyA zS>@EFvSjLQ$ESTq1Ub18&nhVEnU7}5xI8f2xSscxO=uNI*ysne~9T10#sZU;^ zJRq*jzN?JO`wMXx23{!OxF6mDZ`^q6g-;@;7VHVsyLZ8hdkQ&ab3cf^bkcBU%$_lR z1G|leAR>0h3g3C|WXyf=A!-ts^C#1Xu=^<3B<2tj{fA{P9pIK_poo>!+z`D zY3DyZlJnJ4&eyh1a^6nRNJ?%o>QqIAXo|c5jl6R)=iNN>3KlAPn)?ctf^wdzbgY3m zB}-XTqJr%hBs5S{p#ivj;Pts*AXTN467Q2(B2+^=6-(^6-*L?CxZfJPrVu@8Ud(%2 zam?@Z6bxY3+j7?B10P6`FUyaC76-JWHLAK=s1!w27^o|;F`IWMb3Wkpf>CN~m64h2 z*7;7`AK2ZUSmy<#*AwM^4o(1XsLVz0_^FVu{G@JPgUw}>n5 z5r+zL!6ptmN>3jqUf5a8H{B8~NEf2)q4%s6NxX{Q?^ezfsBFq4Y#wA7@O5>wt6(BR zLFJ~cFx3O0;_;<}PgL>T839$*+ZIvE4n`#Wjl=L^$=1MD=(Hn zuOszXf7#Sxo0RAvhzS;_mQ-_NMX<^GRKQFsZFr?>Y4FD%MP=RZ-vkFg_Xthk!OtE1 z+|&3u?4~(!t!Z@h&j+wQQh<8^+W~A(1-9pBmbJM1F9)a{pmxaL-qrjKdqGcCiT8hS zz}f+82durjSbOnUn!2Yx@8-eF>~t6`Ld!?7CH9k8n$Ep`My305O41%PohL`(rvl>Z zAF-!?uXzNqCw{S?!ajy>>diAZ^(yxA$xU6<4P(E)BWKB!oc&Vf=#P%c+26Z|ee)jn zwH-OT?R@;CRg-d5VNo8hSW;`(k>MI_$l-&Om`A-A);GsvGr;#PX{xll+!mC7xZk&%xAiw=OUYV0Z8nY%}kfz?8!{DoaUI#yfFBB zr~~PmQmJ~n>g{n$BH+RGqYo*GTm)0Ayw%)+oo0TpU*(gQMJ^7$0(nS7xYG?nieaj` zxnHTb3a+;>B+it_+92a60oThi-A<^43#~FmYvJbV(rRpqVr$X0RFG*6)W(?a)AO8X zSBco~)DkObv#L(z@QeALTj*Nn9()EQLkOI##k>mUzZ1Yh1I{Z1`lWP36K(t)_HMz7X{~ik@37)a4b@ho>NB4?gbk z7HeOp0C^EW2Oqap?H(5(-^V`g>4@0_*bZPj1eDhfD6yv?W)Dz1KqG5nh}i?y z4p=*2?fO`|K+GbF_0fcBN@AXnvezL@(*sTk)9bUp=Pq0d z)>gRN3?{CbAd2@Dr1ibEr+klI&mND<9&bgKJ>DAPVI6nh-XDwoICcxs#m{5Up{*Mp zHvIm>I*zW|3?g@CGl)-sJ5{tDgFAKL#0k*G7$YCU(kIyMT(keH9K8+R+-j8>J<^X4 zXh(~s87&tUb_eac@xSQnLnp)ExdHARKQbH+7giXe4Jjs=0^YoAQ;DB0;RXDp>)d+V j^IhkbB5k`K`f5^@_I`Jehbg9?m6H2pVgT@g{rCR?xmc{( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..fd6c3d3f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:05Z", + "tls_cert_hash": null, + "tx_id": "bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json-flat.json new file mode 100644 index 00000000..4b03a850 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_0.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9 +.data.data[0].signature=None +.header.data_hash=nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 0000000000000000000000000000000000000000..ca9ee819bc751586ddfdd85258a1b7315c219cf4 GIT binary patch literal 27706 zcmeHQ3$!a&S?;~Py*=HxkL&cwu`QQN3)~yqB$GEFFz-x~nPifgyb$YTGMUUIlSwj@ zOp;|E$WpP03tgZH2-ONAwgR=3YFn^aTd`WPK8lDUT`YkXp(>UISaDBslJo32r?;0X zntRth_neu%XHWLbxBq{C|Ns35&?^U!V^`nsJD+Vn`FHo-dFaotyyT0A9(;S`CHFDM z%8!5cc(2H458l6e>>D@L-+TSL{_(M&`c7QE+c(_c8RD>g2W1hrZUTnD>ZNX#g^cW{D zj=3d~%5Yd~IvBv498oNCBWi->XCr7L(c+smrft?jsexRgMzn!RvvZ0_7U4M^XB3l$ z1Ggujg2qQl5v$E_k7g3%DpMR+%d9)U&Ba~PEthgD$+T5vCq{t4gbEARejqVHAq5Si zvSrh%Q&Iz?GMOM7#}s~Grzc!MYEP7gCK^ephc-iFT8%p?LND5&!f?*m#fMR$-{e|Y zmm0(CkZMs8DE%UYPG1>I(*YQ=m45!Ne?T<%e+7MDWvVWA4Fa({@m^Wk(sVXZXl5?X~_ z`&blwvB(0vU|wLGShgk&lSYOxYfWh+>w~_N!Nj2iauz*C{ro70=`Ll_)vO$|F&$2- z8%Rpg4k?gMqweFPBdlZ$CyFDMOZ=e03VgTLaD1&kXb3<0qhR`0Q#`r-O-C+!^IbQz z{`~1*zB>0~pZ@*c2QQcY;N}1DE1&${eRbr0pFRK{{S)}_F!0}EhXP#f5KN40GT zu1-g7FTu40*AiUM0+icn7wA->OhbwbiCO|9F;R=zq z%FvF&jM^EKAJ#-l;c#o(1{-l=1*HaH=Z2U{yMa+w#3Gy_xEv`#dxp#K*m!n~S{wsh zk{b~dEHyJl6%lI}MJ~^|)XYq?l-ngMrBSzPCdM_h-Q@BWm&T?hJW07h5t`$$mhYsR zHIwfuC_m)#EtmETfgq%*5e{v+GTLU-@~+ExRs}i+fEw{er4ZS<;SR=ctL+1lYZ021 zP0C^<5lx9~RUD?W-Cn8PV=P9F)M5oG(NsdE3{xza)kevw5rcx*?Z=}A8g0q~U_)sv z6F~zpzM0DPd{Mp|@5iFN!!bJ!!G zqRlON$BgN*k#`JC4;nb?tstl341d~`#O!;3xl|Ghuo#}MS)oKKM)M?1khv6FXykEu)KbWCa@a~`B6>6x zidvnr(Fp`5LjiZKMw^tzAV{gBM97X?Mzu|oCfb$K&15(ga3Xa&*I|sBi1#@xJVhBf z^DsT95bqkZrvZ`$iJH0C8_?!?kZuLX1t|&d&?RT?s5tXmB^MsU{S&O~Jx-7m!W63s zn%t#%Cfu^vo>Q{u3fu0Me9cmt)r?%<=JlXk&-i4x3qKLM>~fcR@%DSaaO;w1l!W7TsoEC zSEmv=)K%5~@vknSwuIUeYTsX|oh8>zy>s%(CDxW$TVn0|i?y?@S(I({Fy?{IJ{|;X z-yttYu7Eqa7a=RiVfg>Sl`~e)LyjzX%%d>Iu+}9Ej!>Pt)wfj>x}(U|h_?g0bVI)* z$T^FCi(Ub6c3zcXh|hiwJxYDu*?*6d^N;e&GjbO77}=YBt9PuCvmZKvyzd0^o*6ki zJ^9=>tr8c)BmH=5NTE_81Lv?hLF-#7F#~@g$XR{A##tHr5wxYlD_)ECkWjn%5A>=072 zst8@S9>AkOspC>4lNnaErZx6O8u+lAh?86`-3UAg^VjQrKEXl#;BT!h5AbL28Um8Ox|4QYxt3Sa%$32HIQR zNPuZP3*#a*rc+o{ca*SG4*5rI^=!%tMjg3V3ix_tC_xcyk`0EN z@(2t9J|iyCxqL2bqWJ=g- z;Vwv<0}U)~oEL!npRsYzkCLfYn+Dn!mAkRWoS0pG890}ayK+r$>yED4$R)_R z0D!~A;C12aP~?pHM_GMp1suYNjE#JG1^N66puttwwe^OojFq~_v{z}7bcPwZ6E6 zy(c>kE}36}RJ(0!>_sICT~*n0?9HzgVVS1xEC$}kN1wkY@QKauV7JZMYpVr$jDx=o- z_kM-I56xeU>FltbhPCHd*MK9lvGzAc0$e&DL+r~PTUNXU0Uz%@7xN|O`0+&`>@wv1 zl`|2zEY0FwM-MLAM8HLv`7*RI1a<{-A?$I%rnuOKZa=c=1hPl#UP$eregXORMXQfoIMXgXcp-An zg~;6(F3x-5vxoNN>vNtIPc6*(`aG6tVWAf0^ZPAXE0ArrH%?~LFwuCky2_QIp6&D| zQ`00?m?u*c=uB$2(6Hqdm!1gHbq`16bEK?2n(H((_DfLC*smd+w5jjr6>i z&J86Cf=kWh2x-c7wyG}594^gO7g;aDurWs*K&c^A2Vx?wDQjX!7GD=Wayaht1cnJz zm~ZJ+cA%6x`F3~`4Y%?(HqxXBh=hHCh~}uZM%y;xzOWJF<9b^O1cZoT`21b7Q)`&4 zqo#PVtQl^wohmkSe2)?eCCh??19^gFy_ru6@tMj1;|NTyOv4FKx7Wt;sbphAZZr#1 zxfhBB9KHwfX{Pm>mXGGJsa(NLdygz1$l?S`u`I8!1ys)ZTiAd#Go^O4NmNOq-cl*R z$aFO3rX-bUb%->fbC|VA7Kidn0t+Y@M+uN#pM(bWQmxbIRtsIK-7Svd89_Q3E9 zUS)#aS_|KTsGXGsU@9}1D+~CErSw~FWHR*mqP0x9DVB(8U5@#BZZyx((P2c?r9>nb zlM@Yp+H6P1RX~p;shHgoI2h83$089o=-@p+kB)6cSD7rI3^0Z$;!w!DO<9oCNQ?th z6s>7>Fav{cE<_0wxw5X%;)pc18wflMfZai$K@dm;E0Do9V-q}8w@`i@ukrm-*JP`i z@E{9HA!A(BGAT7w!6R%iCS$Bt^x+xH4fAqYOB9pJ#`?QPWb`^Rv23DC_ z9!{jnd3&bNDTbjmE$A*x&~p%b*T|XJdn%MURi%+9G=lNyHdNTeN4p!xb<9BB_&o5t z)j;kHnoXEVl8%l!dfCqtY-ke5E1eW*`4dT2p#uy)G)EmY*J10;#)NJT`|bpD8o@$V zm4&D+Hszp#OK2h8iW9XwP3m024H+>E__EnOkaln4$ICC{lnMhR4c$Q!)VoVz1 zrhlvuAd`qC+*n@@XHxk96tc4ce_%YWY+Z@TJXH8VHJPTE;rt+H7Ak7I=%dCONW`1T zP^`*jIz)n2P+1)JdTc8dF>Q=s@qXWxn0Sw{T)QXM3)SYpZFKu(S_xTdco1XR5lDw> zeFrN=c8U1TJ-_3jb?@*M$dxcTYjs0%*7@F+d%f1eqEmS8?;)P9Z%gnU5Foz@$CAImsViw07u{B$5 z^J)U~CDzq_3vnOrWCGPr#Ekbdp=^f@$x^V+qZK}p8iX4`E&{W$T6!fQBqvdjpnZ%F z8;{Jcouc?;%apq?k10cRb0K#`)f&Sn*H2X2x7o-iWx3szb67++%7hu}SoqjfN8mzHBdC2y-EXzu;DnP4RPPG+d zGvif5QG!@6ST&lHJ=6XBjP03kbO{>fPG^#3)3NKErWDaI=Z5rHBVCMC(M&kSDX~O3 zU*v})6{bA{$&pw*LyuAkM@ScVWfIEO{1Tz*BuZskv=ZkiBJ36`asK_QmHHH;o7!n7oWLdq3d0}5}Z42 zCF-VX4IJcro?5+hk%qQ5o`050vU(B#kIA86Pw$O>4ihqt)iHQ+_lsV8A-(prat(;q0#psylFq3Zj4@XrPF=HBe@ zm1DB6C%%uTIFAS*Z~S5Ku~qQzUQJt=b+hs-(_+!vYTEwQVQ|;sg~A;9(4Opm+GF<> z--6vx;$kcrz+gk5qLWY17; zu{jO08ynQHu3HjHc}FfqFt4;9*j`C=v-`Ir`%hu0#K>WctrK80&XHJ#kZWYy2w@qy zDwxfr6z->uPASq&;LV~RkA+GKkx7b9TpT%QQ?NP-1+^UuN=kFUN(6Fo6PA-^qPs@m zH!}Jg%?nsW;4?u<;NiW9X{DpZpddON35rdjnRIa_Dft_9H!D?$#3ZGub7I1akxu!Q zMH&hfwsBO`V+k$iOGYO|xJ46kHWXwkBgJ2lgh7W2*~OL=wnmV|PZ}K}2SOCr9f}2B zY@&6=)|eKn-3O0d{J^#K5B~E# zPu+X@KcS!cr)%H*R3Z%1q^>`4VDi0py!azO^ZvC9-Fl6F*57=){n)?U=G^|7kKgcX zx4iNvN@<`2kq{(X1dc!&0mRr(8oGquls`1*^V{OsF)|HfMnpLg)s ztH0U)yOj?=e*aIMcg7{98y;GD;DIl{|39b?z2=sO&i>@>cYNnPtG{(N_{Foq1;Fz) z&jDv1IC$pKLzkU}JaZTzi^{LIh2b@1Ic{o6m>^5eHY^6=OH{+-~- zgU4>9FZtK*FCF^Er0*FO8*>NmdN2%rA@zxKBd<>lgpw+yDB)-IpUPjLeblPTk@C z&l+~As1s&cw{tn&whE+STe@zQ^Mq}c3gvvIK$19FsuXqI9$I$E7!tW+p-kEpQm^C< z96Q3^_=PuL`(FH2>^Hvm0u0FM9LSUA{!efa3RuYnIr?I!kDuVLSL4g1sAPWscvzrOi)`bDw4 zAiqVkEmhzI8mjEJ6-a_WH&vR3R@;HGKtV@n!TK2H#xRr32D;N`Cc-?aHfmu^JAI)R z41|q`vuJFrt85)eaLhwOW2uoucRJFV-M|**$Q^Vhl^)9@gP-_DPF(6;cFlQE+x3|$ z(?NYM#RJplmVI)v>67I($H4Y(K%mlOC*SW9vB7JozY<9;Gv<^&(@_+LjSF7CU6@!r z7Xg!BPwKwBGE``BF}`l7upoI#EHPR^VkjN8CA&8Eq)p<-YkC94^kRU5eHBhRs??HV zc6SAVjb}{1yPggFN@Dnvk<{wP9Nb>L%EpA+@8+G>R2&(;JOd^vucVd|v(9!vjg6!2 zt)1Q(+mk45`<~!hYV=8VIp~c>Mvn>y?Scmk5|6toR4K=tkH%i3sR$J1ILH5%C@Pj| z2o*Ljk6pI0G`rK*B)=)<$E^^q9jyQg`3zogBFnHRp;yl2y^>sZCnk<71<%W5Xa3Z% zeIc?$S?xJqOiaYis434`rQHnzba9|>U?Y7QRi#WpyUbEhqM_c8tLgh_;S-A5KEF_l z`xK>URrL4gX*%SgqH$C#QD`2N)8`wqF-v7*g_EF^o+z&EPSBueffWSV6xyWT$d2Js z@ax@4aYPRodN{UN!0TMG6pNZgkEe8vb|n~~E6n+}l&@^>1~;L^Dzs4D_oUCFWX+5aWp_UpZ+x1!h)5Vi%_}y`9~s&-XJ6y{3()}VKnpWQ9@+3c#-Kv^`+d& zkAJ9;#Py#!l7g7uL5*Q3jvDa9%otM-Ac`7Dl*CiXZh}CE-A)#e&K4N6Rfr3ak~e|5 z7{`UpDw8Q1_1;MB(u1L1%FN?pi|2}~g6e9OLbIe->}<`S6q5nql7d(Y$BN`R?Q*G5 zh>3`rXJs-8P1oWZauw%2Ri)|@%x~vAvzza!L999ql)x56t?lGzp$8F;5K0g*gjg9% zbPZkwf)oSbY7jUG1R5?T(TS|a3IqTgkmt1v*_2G6&vki>4LKMO_i zZy$*X#Y?@5zsH2a_eWA>c)1>_vGrkRGWLimvcI)cd#5naqe4juV?giBG0(+dgV7$r{Nm1$K~tez)N1J=rrhtR_*y?%kr^1v>Nu9T0JRC*Hc35c ziw%ZFb7ahe^md=rIi|i5T+cb4Vg~tH+^EWzImpXFa}G0ACURlq_Odc9MW+|w}2S{8d3uCe1hmaPi#Uj@D@|+IhaIOy9 zgV8d!XNw+Z<^n6fED6FI)N;lmg5AOu9_HvK9Qy7wyqg0rwk#b*d?EHp?Blm?piuD^ zb`$-6?$!s6Zey>U4e-t$)LppI;~kU-$JfN}V{f4g{OFkr-NA03y-*qm@9yvZ@$aLb z054HGiiq3p#=>65UcL1nAH4IV7K*PIt{J((G{kP54EO|ih1O@f;ZEGhwL$_)HF zUn(8_+as-6k3rVVY3!|83pRU;wlrUG;V_#BxE_wmqoS-mIIp(m;Ju8MFE56nOuMIkxDexAeDjIG+Yq6#Nd=SK=9yhRC z#ok=uiGk;;nKEv(9HZ$C%4cY5qMoOQkpGitN{3f)LuoR8!VS?9MEU$FHAJI02*xO^ zPx0+hv=R#eyfkWmSkMlRNu?Gdm102{_QVAnSQiGE0?St0S-0mV^AC7HI-i=hk8+Qfh74 z+~k@@R-+x4A=&zvGs_Z7=i^R4X_(K%{~ZwbB;@kB{P}>m1LEEWXZ;`f1pY6rm7LB0 zYGXAMh?-CFv+hQX`mSH@W`slj_mFzYqw_!aiSoakun=ozzeX-aW;j&?TQzl`XYEyA zS>@EFvSjLQ$ESTq1Ub18&nhVEnU7}5xI8f2xSscxO=uNI*ysne~9T10#sZU;^ zJRq*jzN?JO`wMXx23{!OxF6mDZ`^q6g-;@;7VHVsyLZ8hdkQ&ab3cf^bkcBU%$_lR z1G|leAR>0h3g3C|WXyf=A!-ts^C#1Xu=^<3B<2tj{fA{P9pIK_poo>!+z`D zY3DyZlJnJ4&eyh1a^6nRNJ?%o>QqIAXo|c5jl6R)=iNN>3KlAPn)?ctf^wdzbgY3m zB}-XTqJr%hBs5S{p#ivj;Pts*AXTN467Q2(B2+^=6-(^6-*L?CxZfJPrVu@8Ud(%2 zam?@Z6bxY3+j7?B10P6`FUyaC76-JWHLAK=s1!w27^o|;F`IWMb3Wkpf>CN~m64h2 z*7;7`AK2ZUSmy<#*AwM^4o(1XsLVz0_^FVu{G@JPgUw}>n5 z5r+zL!6ptmN>3jqUf5a8H{B8~NEf2)q4%s6NxX{Q?^ezfsBFq4Y#wA7@O5>wt6(BR zLFJ~cFx3O0;_;<}PgL>T839$*+ZIvE4n`#Wjl=L^$=1MD=(Hn zuOszXf7#Sxo0RAvhzS;_mQ-_NMX<^GRKQFsZFr?>Y4FD%MP=RZ-vkFg_Xthk!OtE1 z+|&3u?4~(!t!Z@h&j+wQQh<8^+W~A(1-9pBmbJM1F9)a{pmxaL-qrjKdqGcCiT8hS zz}f+82durjSbOnUn!2Yx@8-eF>~t6`Ld!?7CH9k8n$Ep`My305O41%PohL`(rvl>Z zAF-!?uXzNqCw{S?!ajy>>diAZ^(yxA$xU6<4P(E)BWKB!oc&Vf=#P%c+26Z|ee)jn zwH-OT?R@;CRg-d5VNo8hSW;`(k>MI_$l-&Om`A-A);GsvGr;#PX{xll+!mC7xZk&%xAiw=OUYV0Z8nY%}kfz?8!{DoaUI#yfFBB zr~~PmQmJ~n>g{n$BH+RGqYo*GTm)0Ayw%)+oo0TpU*(gQMJ^7$0(nS7xYG?nieaj` zxnHTb3a+;>B+it_+92a60oThi-A<^43#~FmYvJbV(rRpqVr$X0RFG*6)W(?a)AO8X zSBco~)DkObv#L(z@QeALTj*Nn9()EQLkOI##k>mUzZ1Yh1I{Z1`lWP36K(t)_HMz7X{~ik@37)a4b@ho>NB4?gbk z7HeOp0C^EW2Oqap?H(5(-^V`g>4@0_*bZPj1eDhfD6yv?W)Dz1KqG5nh}i?y z4p=*2?fO`|K+GbF_0fcBN@AXnvezL@(*sTk)9bUp=Pq0d z)>gRN3?{CbAd2@Dr1ibEr+klI&mND<9&bgKJ>DAPVI6nh-XDwoICcxs#m{5Up{*Mp zHvIm>I*zW|3?g@CGl)-sJ5{tDgFAKL#0k*G7$YCU(kIyMT(keH9K8+R+-j8>J<^X4 zXh(~s87&tUb_eac@xSQnLnp)ExdHARKQbH+7giXe4Jjs=0^YoAQ;DB0;RXDp>)d+V j^IhkbB5k`K`f5^@_I`Jehbg9?m6H2pVgT@g{rCR?xmc{( literal 0 HcmV?d00001 diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..fd6c3d3f --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,756 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNDekNDQWJHZ0F3SUJBZ0lSQVBzdHBtTHR5MS9Vd3IrWHRMdU5WNGt3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmFNRll4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJvd0dBWURWUVFEREJGQlpHMXBia0JsZUdGdGNHeGxMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHClNNNDlBd0VIQTBJQUJOem9jcmt3NXp2Kys2YkxYaFRXQ1pkYTcrcXc2UkdGNnY1VGlVOTVQN2E5Zi9LbWw2eVoKRnk1Sjdza1FNamdTODc1NXcxdEJxL04yeXNjaWVHT05IMEdqVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTQpCZ05WSFJNQkFmOEVBakFBTUNzR0ExVWRJd1FrTUNLQUlJTmNJUzJhTy9rQXVJbUxXbDZoQ1pEQ2RrZUVHYUY2Cjd3SlVlQ2tuQ0tDaU1Bb0dDQ3FHU000OUJBTUNBMGdBTUVVQ0lRRDFsR3NDTkVkbzJOeThiTnJXcG1JWkw0dU8KVzNqeVZnTEplM1lCNUkxN2FBSWdWK0JMb3c0TmFYZzlWaDVqcjA3TEpBa09FTXh5ZlBGNW9SSkFHUkptV0VnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2019-09-24T01:04:05Z", + "tls_cert_hash": null, + "tx_id": "bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json-flat.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json-flat.json new file mode 100644 index 00000000..4b03a850 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/testchainid_config.block.json-flat.json @@ -0,0 +1,273 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nUwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ\nI3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9\nVEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE\nAiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS\nzeuAMdERG0OX6tpsU+PcrCZVqBE=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICWDCCAf6gAwIBAgIRAIozwoVQXadyjsVrqzW7CIMwCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1\nOTAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABKbo39J7FNDFCDPJISfRBaxkcDyHvkJL5i6J36onXjn00zvQBwoflDUy\n1Eex93s8ojZlFDm2pUKhH4J0t5dFPnGjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgapFNG4koIqtWoFYIlpW+hWKIgjPrsNi1wdL/qggyCsAwCgYIKoZIzj0E\nAwIDSAAwRQIhAKQlQa5AynOA7G21nHayKfnebjHvfdCDAvCYhh/VDjjXAiAye4J7\nXVMXEmuPUwf2MCoow1E0BuBPzetAPEmBoDl9SA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\npAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E\np08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO\na5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE\nAiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6\ncdBU5LLvZghoy+5fBvp98DMbKf0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nu0+j8UFPRPOm2RSB3szKKQWcG5tXVQa3vrTu\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.admins[0]=b64(b'-----BEGIN CERTIFICATE-----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\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n1g==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nK3brtAW5\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nF/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n\njrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw\nKQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG\nSM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n\njrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw\nKQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG\nSM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg\nUtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2019-09-24T01:04:05Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=ghkT53eUEpnni6VzyXSfqBu7sDIG6rp9 +.data.data[0].signature=None +.header.data_hash=nEDOSJ6EZ0k91MU7L1F/2I/PYoQ/9godCaMORgfCKz8= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.json new file mode 100644 index 00000000..cdf5b793 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.json @@ -0,0 +1,948 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVm9PeTdpNnRWSEpRMVBKR0lBYjRnakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKVXdvQ2dVT0hhVDU5NkpUSVpUdkpPcHFXbHFHb0dhNWI3U1U5aGMzV0xHVlNtWmZXdGJDdVNUcHI4NmoyNmhhUQpJM0tBTDUyMDdOaEpQcSs2TnA4cjc2TnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQzkKVkVEUUN3a3luSjRPMllJZU9kVTRVSVI4QVhCMVAzM2NEbEdBdmN5WUhqQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUFueEpLc3pRZWNDa01RVWw1L1ZBVTFXNHRmMjdZNG92YXp1WjAzSVErSmxRSWdJdUZ3ZVJ3Nzl1ZFZmVnRTCnpldUFNZEVSRzBPWDZ0cHNVK1BjckNaVnFCRT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVU0zQjVyOGt2RTJVU0xkbWlaejJkakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHhPVEE1TWpRd01EVTVNREJhRncweU9UQTVNakV3TURVNU1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKcEFzaEFCdDllZkZtaVFaN1BDUW4xb3d2WkFuelZNL0VpL0p0ZU1qaGxXSDA2dGJOZUJMbWdKRjRzbHRrMHQvRQpwMDhsNk5FTTg5QnNsVXZIRGp5ZzJxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ08KYTVYUWY5OWpUY3BmaUcvT2VlRkJsUWczQjEzalRTSjBnWjExd3N5MDFEQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUJ4OUJ3bWIwMkRTV2kyNWVwTi9HTExneTY4cUFPZzhFSzRicUd3MiszZ2pnSWdabWF0Q1VIWmNRcElkMEI2CmNkQlU1TEx2Wmdob3krNWZCdnA5OERNYktmMD0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [ + "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" + ], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": null, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQUtrVCtvSlVtQkdwV3pUdFlpbThXK0l3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB4T1RBNU1qUXdNRFU1TURCYUZ3MHlPVEE1TWpFd01EVTVNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1pNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkIzSXJKS2NZSzJ1SkRkblRvZlRjYW1HRWZ2WVF2M1R1UXVETFNnbUNtZ0oKM05Pd3A5QURCcWhwUWs4WmJpd0w0anVQZlU4T2xpZmY4N2s3NG5kdjJhbWpnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUZ3dldadkRnaG1FKzFMd1p2OG5BaS9lL2NPNjJ1Q3lVZEZLdGlOUDlNc20KTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNakFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQTJtMkZSMWtob0pJRUx0L0x2YnVUejFVeStyZTRGN3hjdzFnMHBLOUNVRkFDCklDaytDeld5bXhmQW5qN1RLb3o4WldMTlA4RFhjdGtBdzZLc0FpcDBwWlhsCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.3/raft/channel-artifacts/updated_config.pb new file mode 100644 index 0000000000000000000000000000000000000000..3a78bb1cbf6c4a270a575afed3ab25005ff4cfd3 GIT binary patch literal 26900 zcmeHQON{GSTINna=FaKITylG+r)y@K(Pe*v18}8899#Q*s}k+zYmzF(%_c(w+p=v9uGKu*(0ivq{cC4Z}ZTA zS<7y(ReW+rb`mpjuT~HG{Kmy7sPy>r&oop_TCpJmX0?*fwtSc$i$OnY&c^tvPBq$# zY}N8At45{NU6!0&Sq?VwIL%qu2$K1(GENLR zlDIIY)5}z`CRA!U5~6o+bG}4k>01~Iin4vJfTBVUDmqKX5``+tg0vZyM3)CO*i0X6 zO_fMEsxYJm(Ph_i5;fVLfVLHfq(}$MJ*_ds2cyud1)ch=W#zJ!QnBd<4AGR`q>5L> zIj>PHbG0VgG7o8z1<+w2wh<}SC=_diWqTugT#)Gce6W-!BLTu{scTLe&Sn_tT@q3} z*B$A^hT#IvH+oYZ40~}aKORr*niJc7tk6zOZdtVTCY5!;7A}lTUxyI+Hh8sFgGA=_ z^mnl&{NPr^wKpl^N_)hqurAHJy%s&1*QH!9Sz}WIlV_EfvJdYXp^%S-?9m{=MeX3e@#-yJhGx{Z!GBnM2NMODz-^oYuu(_nX( zA^IL|}MA=D0RCWl5XF4UNYn z8sZ3TaVJf4w`uD%4Qvx#l1N*S=V?H|aSQT{4ag|1x*%<$Pz%x-a%=P)nB|ij5fZgX z5=SO;t|b+!&}KM_+IfoK@E>oYuw}orocP0!_`zu)S*te1C3lru&@J3%#gWQ zN$UVPb9Zk8)LJ^Td%s6$ODjy=BS}TCp(~8(v=ve@Z3kUFMrmYj183>$1U03=@U~(X zXXKVaqa8NUVg_e9@e^*=2Vnx74ZtE7eh0o!OUaBzgust)g?Pkhj|lp*+vE zxxB`%vice}2wC#lw8XnbTE6zK7 z2Vxcj8^dBv_10QG@7;jB{-1pn^@RWSIym)lr#|k~$GyZpF7vwSIo32f`K z7e2zl`KQd!WxkGPa_?pCXI@8tKX?Bp&fdzrao{i?+&hF6z#GhT7%W1|N5j#~&t%dW z;JZh0Z)Co3h&x1K;Pa|wpu)pvi0CYw=!@qKM2G-mUTH%G*yQ5=+8dUb5(J0jO^`TbER8c@rYHd|Cm zE>RjA3gGi~C>9BUgIRjfiru5Uh;NvXA9? zB`bIeZ}Uqww$!*>T@Kr$cGLnJYYC+xqjFfITZ(3(o^6^7s^6ZI%(rhKh^|qyKfINi z?Q9WuM9uQSCJx$4*BB;l*j~&xoifEsmx!=Wi<)Jgg_^yV`LjmNUTYVa8>rc9neRf) z)(1hpDwJ87W+}QU@U4+b8taKkC$-f?5Q|Pp$d`g?*PUY6W~GpEF!E?U0XSo=tNE}J zxP6bMePX89$F+ihMa3c8oN}KcHEYaRnJY{JejarKw#R$3PIla>^S0YugtCLjLoqkE z?Su;9r5d@VW?K+ZvkE_kb;VPRB21lw|2-@G?5wt`~(0)H9Xm7bs;wks}WXQbI8E-I51 zL+C9L(c}FMF}zBreL9+3=dQ%=wTz!JVmG-fv3ot^T_(IU7>*$sRjm>0J4(OYq?9Qh z#H&7>ZrW0gadJXrN$%L|)UZ-CkS$X5ZGkO>UNpg?91`tf6|W>SQl(0Up1!KlZekPj zPmkDb0HfGdM%AjTnX{3@f7TW z$reZCYF4e#(x5)VZlad15xaNQ+!A}utBcoO?P{B+o=Z(!(ZSlEA^(Cv^ zuK{VtgdS^D!9k>YE%V(_2U7XFRO>zW5CNo8_d6)vuY*ag#5E+P2WXoB&8+*_pmtEZ zU(b94^1xp14oRA><>!7?REv(g7)Y!sPxOA)PXe}^qdVe{WjwzL|XlAta+ zmIktFUu#Ub9yQOqqZ%Ij?RsJbjY3Rt1L_V-Dqt^ne_pja*vZ`?HS{K&VDbY|(`&pV zkn_&6rH>NdfTESB^_Dd&&k}r$c~@#Afah}eRPA1JBC`;6^SL!`ZHgj|ws0g4(kS=% zVM7S;Qe@0KSawe5s|>~0c)Tz+)?kTc-HOgO)n>yd)E1c!H}$&GF}Y&YZ7W88wa}I~ zEUA0~Quoxyz4(14*8%htQulhs8<4gK8aVZF>Eh*&rjPq%r0xl9C$OCcly@FbeiBmm z1ho^?PEfl$)IJHRd&1fYYbUJT9cx!f-A8xgO;Zx{z_i|l&P@ZJmCijbWKYhX{l|Uq zDx}0P^Mm`Df4mP^@Xhad&d4$o)3b6^;QLNQjSXjN21ARsM$XjPdLq0JzLrDj)2Zd< zj=U0b=M*tuz)v5YM_F2n& zg6YVyNiQ%bw}ur!=5m;}u&i67ehGYi8`X0BrDsIeuEaD{pAFIfx1Qib@P@TQYU|wH zt`gncE<5XZNI-23?-o`9?|A7mIlLEU?S#?o&$0}@w2e!j<)LO6k#Xy7Rlt|`fwVRA zf+SUxw`P`kYveD3_xF+fG>nXC%MV*04PI$$fd-XTeWL z!L316@a{fHTNu;OFw^#cOl~i4-@cvwEO?VLX2!trP+MY!nJ;JF1OU9=#=lee4w3nZ zeZEIU@Q%1|ijMand_D8<{wtX;UfP)O;B$wtM;Ch!-p#y)a-#hS=k368p8aChAF6NhOm&CXQy3Y$`4qK0s7>qSs3WU-%CVqZ)MQH4DMy0A!OeqAuLd)r#3+a;-{hCW&R{y4^;o3+=K?z|%a zRpxRNDc{Ezo4HcP<)MJ{NG@Hs^h$MBC-70Uw1}?WsH|KjO8l-GjLmk0De|)AwrE=i zxP7Bs`q8i4iXG4Zi7k*GSn2?Qwyz|A1A5eRgOS7_YhLP}P zGp+0X?X8$l+_ZP`_n1()-dKtTZoW(Cj5ut26BnN%Pp_-)W#J2VFViKG-!{S2SQ3w$ z-_%2ib761S^GF)gRl}WyQoDe>!;U<`$U>La801toNn{$vGV)Q9*Z`&R+cXJzDV?Xq z1DZi~WU_NIdR{B2)Cmf$EbpwKZtff}FoRsB_Di@|JIE)4<`QOVbmYLu>E>jL&u=i* zoC;u)tJZjv#W-^1uct(F$`8k*4Le>f;th;Oc&lL)IeovN2$XS3-Q#qGVh}uv}Z>n6fk?Gm{;7!tq%(3S9R=!-@XtF?b8ji$iM~E<-JuS(!h6 zocV*t;Jy`^!-X-5GQas4{Lfq9o%1cs*dPp%5f!U&g&NSHNo zdYDq%lt7iua#@(H{aGk5a&6)pGbCvesaZ20ubIJURgxAp*z^Z>*0uXKG7;1-nJ1$0 zOX{B3v9G!(9*=Y{nJ2nvlzU{J2%gyCv+)Xx$XcqvmJrz7W95QI|c4S(1d|g$XQIeH}41WxXboOYNFo-#8RM# zQ!N;2rr~qUXw_3zd2OjIX|ZMd6xzB2@^T}dRgt67d^}SomHxnq#e%zRj`T_csT4+) z@}yjt4p)TX{}|5yt|`PX&Hv6vX2dddK;RiM%89GNQrqBql3iE@ zw!AiD+{R}0Dy6fK0z5UzQkzcVuSam|mbH4Ysq{Od+^o=DGn&A-R1cvu!)E>NP2S&k zng5*-_gvp+aYEe1*Hye!#^uKgahVKwt%zZM_yBz6-Zx(R*2f=z3=Rb9H^CRSOl`~A zSjdm@t^5D^$^(?)wXdLG7w(OZ!56m*l(ykHNP3iho6QY+hXZkZ$n%nP69>NeL-5}A z`e>vdN;NXh)NVzKr5P<3R^|cnru<*@^ToqW-=rMLUnob;9s`h)%fTXYmOkRmGvGmM zyL0*?_2`@r&P#@#9Uu$Jv7gCg?t}9$7dhnn_#Sw0PSV5SaAAcZlCF3e1-$npiuxDI sSP?rMx-@&geCX1^W_#%D-Gj33yu94GednXYg22-iDKAL// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_3: true + V1_4_2: false + V1_3: false + V1_1: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.3/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.3/raft/logs/dev_all.log new file mode 100644 index 00000000..41ce9774 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/logs/dev_all.log @@ -0,0 +1,35214 @@ +Attaching to peer1.org2.example.com, peer0.org2.example.com, peer0.org1.example.com, peer1.org1.example.com, orderer1.example.com, orderer2.example.com, fabric-cli, orderer0.example.com +peer1.org2.example.com | "2019-09-24 01:04:18.622 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 1.4.3 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.12.9 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Image Version: 0.4.15 +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-09-24 01:04:18.625 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org2.example.com | "2019-09-24 01:04:18.626 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org2.example.com | "2019-09-24 01:04:18.684 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org2.example.com | "2019-09-24 01:04:18.759 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org2.example.com | "2019-09-24 01:04:18.759 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.8:7051" +peer1.org2.example.com | "2019-09-24 01:04:18.760 UTC [peer] func1 -> INFO 007 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-09-24 01:04:18.761 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.8:7051" +peer1.org2.example.com | "2019-09-24 01:04:18.762 UTC [peer] func1 -> INFO 009 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-09-24 01:04:18.779 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org2.example.com | "2019-09-24 01:04:18.789 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-09-24 01:04:18.789 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-09-24 01:04:18.802 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-09-24 01:04:18.802 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-09-24 01:04:18.803 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-09-24 01:04:18.803 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org2.example.com | "2019-09-24 01:04:18.817 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 01:04:18.832 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7, Metadata: " +peer1.org2.example.com | "2019-09-24 01:04:18.834 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-09-24 01:04:18.838 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:18.841 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org2.example.com | "2019-09-24 01:04:18.841 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:18.844 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org2.example.com | "2019-09-24 01:04:18.844 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:18.844 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org2.example.com | "2019-09-24 01:04:18.845 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org2.example.com | "2019-09-24 01:04:18.850 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-09-24 01:04:18.850 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org2.example.com | "2019-09-24 01:04:18.854 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 01:04:18.856 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-09-24 01:04:18.856 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org2.example.com | "2019-09-24 01:04:18.856 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org2.example.com | "2019-09-24 01:04:18.856 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org2.example.com | "2019-09-24 01:04:18.856 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org2.example.com | "2019-09-24 01:04:26.287 UTC [endorser] callChaincode -> INFO 023 [][f11e20c7] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 01:04:26.288 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-09-24 01:04:26.291 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org2.example.com | "2019-09-24 01:04:26.304 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=1ms) commitHash=[]" +peer1.org2.example.com | "2019-09-24 01:04:26.306 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-09-24 01:04:26.308 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 01:04:26.308 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 01:04:26.309 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 01:04:26.331 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-09-24 01:04:26.335 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:26.335 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org2.example.com | "2019-09-24 01:04:26.336 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:26.336 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org2.example.com | "2019-09-24 01:04:26.336 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-09-24 01:04:26.337 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org2.example.com | "2019-09-24 01:04:26.337 UTC [endorser] callChaincode -> INFO 032 [][f11e20c7] Exit chaincode: name:"cscc" (50ms)" +peer1.org2.example.com | "2019-09-24 01:04:26.337 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45566 grpc.code=OK grpc.call_duration=51.8704ms +peer1.org2.example.com | "2019-09-24 01:04:27.161 UTC [endorser] callChaincode -> INFO 034 [][4aeb4bf5] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 01:04:27.162 UTC [endorser] callChaincode -> INFO 035 [][4aeb4bf5] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-09-24 01:04:27.162 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45574 grpc.code=OK grpc.call_duration=1.4612ms +peer1.org2.example.com | "2019-09-24 01:04:30.408 UTC [endorser] callChaincode -> INFO 037 [][fc4e01d7] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-09-24 01:04:30.411 UTC [endorser] callChaincode -> INFO 038 [][fc4e01d7] Exit chaincode: name:"qscc" (3ms)" +peer1.org2.example.com | "2019-09-24 01:04:30.411 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45582 grpc.code=OK grpc.call_duration=3.2963ms +peer1.org2.example.com | "2019-09-24 01:04:32.336 UTC [gossip.election] beLeader -> INFO 03a 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 : Becoming a leader" +peer1.org2.example.com | "2019-09-24 01:04:32.338 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" +peer1.org2.example.com | "2019-09-24 01:04:32.355 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-09-24 01:04:32.359 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 01:04:32.359 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 01:04:32.360 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 01:04:32.400 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 43ms" +peer1.org2.example.com | "2019-09-24 01:04:32.440 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 39ms (state_validation=2ms block_and_pvtdata_commit=28ms state_commit=5ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org2.example.com | "2019-09-24 01:04:33.386 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-09-24 01:04:33.399 UTC [gossip.gossip] JoinChan -> INFO 043 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-09-24 01:04:33.399 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 01:04:33.399 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 01:04:33.455 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [2] in 69ms" +peer1.org2.example.com | "2019-09-24 01:04:33.499 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [2] with 1 transaction(s) in 41ms (state_validation=0ms block_and_pvtdata_commit=33ms state_commit=4ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org2.example.com | "2019-09-24 01:04:33.519 UTC [gossip.comm] func1 -> WARN 048 peer0.org1.example.com:7051, PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f isn't responsive: EOF" +peer1.org2.example.com | "2019-09-24 01:04:33.521 UTC [gossip.discovery] expireDeadMembers -> WARN 049 Entering [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f]" +peer1.org2.example.com | "2019-09-24 01:04:33.521 UTC [gossip.discovery] expireDeadMembers -> WARN 04a Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: " +peer1.org2.example.com | "2019-09-24 01:04:33.521 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Exiting" +peer1.org2.example.com | "2019-09-24 01:04:33.628 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.626Z grpc.peer_address=172.18.0.7:39478 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=156.4µs +peer1.org2.example.com | "2019-09-24 01:04:33.911 UTC [gossip.gossip] validateMsg -> WARN 04d StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-09-24 01:04:33.911 UTC [gossip.gossip] handleMessage -> WARN 04e Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes isn't valid" +peer1.org2.example.com | "2019-09-24 01:04:36.309 UTC [gossip.channel] reportMembershipChanges -> INFO 04f Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-09-24 01:04:37.150 UTC [gossip.election] stopBeingLeader -> INFO 050 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 Stopped being a leader" +peer1.org2.example.com | "2019-09-24 01:04:37.150 UTC [gossip.service] func1 -> INFO 051 Renounced leadership, stopping delivery service for channel businesschannel" +peer1.org2.example.com | "2019-09-24 01:04:37.151 UTC [deliveryClient] try -> WARN 052 Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s" +peer1.org2.example.com | "2019-09-24 01:04:37.152 UTC [blocksProvider] DeliverBlocks -> WARN 053 [businesschannel] Receive error: client is closing" +peer1.org2.example.com | "2019-09-24 01:04:39.856 UTC [endorser] callChaincode -> INFO 054 [][0b543d5b] Entry chaincode: name:"lscc" " +peer1.org2.example.com | "2019-09-24 01:04:39.857 UTC [lscc] executeInstall -> INFO 055 Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org2.example.com | "2019-09-24 01:04:39.858 UTC [endorser] callChaincode -> INFO 056 [][0b543d5b] Exit chaincode: name:"lscc" (1ms)" +peer1.org2.example.com | "2019-09-24 01:04:39.858 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45650 grpc.code=OK grpc.call_duration=2.5061ms +peer1.org2.example.com | "2019-09-24 01:04:46.309 UTC [gossip.channel] reportMembershipChanges -> INFO 058 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-09-24 01:05:14.014 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-09-24 01:05:14.015 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [3] in 1ms" +peer1.org2.example.com | "2019-09-24 01:05:14.016 UTC [cceventmgmt] HandleStateUpdates -> INFO 05b Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-09-24 01:05:14.029 UTC [kvledger] CommitWithPvtData -> INFO 05c [businesschannel] Committed block [3] with 1 transaction(s) in 13ms (state_validation=0ms block_and_pvtdata_commit=8ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org2.example.com | "2019-09-24 01:05:16.919 UTC [gossip.privdata] StoreBlock -> INFO 05d [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-09-24 01:05:16.920 UTC [committer.txvalidator] Validate -> INFO 05e [businesschannel] Validated block [4] in 0ms" +peer1.org2.example.com | "2019-09-24 01:05:16.935 UTC [kvledger] CommitWithPvtData -> INFO 05f [businesschannel] Committed block [4] with 1 transaction(s) in 11ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org2.example.com | "2019-09-24 01:05:19.523 UTC [gossip.privdata] StoreBlock -> INFO 060 [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-09-24 01:05:19.525 UTC [committer.txvalidator] Validate -> INFO 061 [businesschannel] Validated block [5] in 1ms" +peer1.org2.example.com | "2019-09-24 01:05:19.540 UTC [kvledger] CommitWithPvtData -> INFO 062 [businesschannel] Committed block [5] with 1 transaction(s) in 14ms (state_validation=0ms block_and_pvtdata_commit=11ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org2.example.com | "2019-09-24 01:05:34.281 UTC [gossip.privdata] StoreBlock -> INFO 063 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-09-24 01:05:34.285 UTC [cauthdsl] deduplicate -> WARN 064 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer1.org2.example.com | "2019-09-24 01:05:34.288 UTC [cauthdsl] deduplicate -> WARN 065 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer1.org2.example.com | "2019-09-24 01:05:34.329 UTC [gossip.gossip] JoinChan -> INFO 066 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-09-24 01:05:34.330 UTC [gossip.gossip] learnAnchorPeers -> INFO 067 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-09-24 01:05:34.331 UTC [gossip.gossip] learnAnchorPeers -> INFO 068 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 01:05:34.332 UTC [gossip.gossip] learnAnchorPeers -> INFO 069 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-09-24 01:05:34.332 UTC [gossip.service] updateEndpoints -> WARN 06a Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-09-24 01:05:34.366 UTC [committer.txvalidator] Validate -> INFO 06b [businesschannel] Validated block [6] in 83ms" +peer1.org2.example.com | "2019-09-24 01:05:34.394 UTC [kvledger] CommitWithPvtData -> INFO 06c [businesschannel] Committed block [6] with 1 transaction(s) in 27ms (state_validation=1ms block_and_pvtdata_commit=13ms state_commit=4ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org2.example.com | "2019-09-24 01:05:34.397 UTC [gossip.comm] func1 -> WARN 06d peer0.org2.example.com:7051, PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 isn't responsive: EOF" +peer1.org2.example.com | "2019-09-24 01:05:34.400 UTC [gossip.discovery] expireDeadMembers -> WARN 06e Entering [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2]" +peer1.org2.example.com | "2019-09-24 01:05:34.401 UTC [gossip.discovery] expireDeadMembers -> WARN 06f Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: " +peer1.org2.example.com | "2019-09-24 01:05:34.401 UTC [gossip.discovery] expireDeadMembers -> WARN 070 Exiting" +peer1.org2.example.com | "2019-09-24 01:05:34.450 UTC [comm.grpc.server] 1 -> INFO 071 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:39478 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m0.8885099s +peer1.org2.example.com | "2019-09-24 01:05:34.546 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.544Z grpc.peer_address=172.18.0.7:39622 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0227ms +peer1.org2.example.com | "2019-09-24 01:05:34.856 UTC [comm.grpc.server] 1 -> INFO 073 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.855Z grpc.peer_address=172.18.0.9:48206 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=106.9µs +peer1.org2.example.com | "2019-09-24 01:05:50.047 UTC [endorser] callChaincode -> INFO 074 [][797fcb28] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-09-24 01:05:50.048 UTC [endorser] callChaincode -> INFO 075 [][797fcb28] Exit chaincode: name:"cscc" (0ms)" +peer1.org2.example.com | "2019-09-24 01:05:50.048 UTC [comm.grpc.server] 1 -> INFO 076 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45822 grpc.code=OK grpc.call_duration=4.528ms +peer1.org2.example.com | "2019-09-24 01:05:51.041 UTC [endorser] callChaincode -> INFO 077 [][f75667da] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-09-24 01:05:51.042 UTC [endorser] callChaincode -> INFO 078 [][f75667da] Exit chaincode: name:"qscc" (1ms)" +peer1.org2.example.com | "2019-09-24 01:05:51.042 UTC [comm.grpc.server] 1 -> INFO 079 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:45830 grpc.code=OK grpc.call_duration=2.3143ms +peer0.org2.example.com | "2019-09-24 01:04:18.726 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 1.4.3 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.12.9 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.15 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-09-24 01:04:18.728 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer0.org2.example.com | "2019-09-24 01:04:18.729 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer0.org2.example.com | "2019-09-24 01:04:18.769 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer0.org2.example.com | "2019-09-24 01:04:18.834 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer0.org2.example.com | "2019-09-24 01:04:18.835 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.9:7051" +peer0.org2.example.com | "2019-09-24 01:04:18.835 UTC [peer] func1 -> INFO 007 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-09-24 01:04:18.835 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.9:7051" +peer0.org2.example.com | "2019-09-24 01:04:18.836 UTC [peer] func1 -> INFO 009 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-09-24 01:04:18.847 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer0.org2.example.com | "2019-09-24 01:04:18.857 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-09-24 01:04:18.857 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-09-24 01:04:18.880 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-09-24 01:04:18.882 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-09-24 01:04:18.883 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-09-24 01:04:18.883 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer0.org2.example.com | "2019-09-24 01:04:18.893 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 01:04:18.898 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: " +peer0.org2.example.com | "2019-09-24 01:04:18.899 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-09-24 01:04:18.900 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:18.901 UTC [cscc] Init -> INFO 015 Init CSCC" +peer0.org2.example.com | "2019-09-24 01:04:18.901 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:18.902 UTC [qscc] Init -> INFO 017 Init QSCC" +peer0.org2.example.com | "2019-09-24 01:04:18.902 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:18.902 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-09-24 01:04:18.902 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer0.org2.example.com | "2019-09-24 01:04:18.903 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-09-24 01:04:18.903 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org2.example.com | "2019-09-24 01:04:18.904 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer0.org2.example.com | "2019-09-24 01:04:26.065 UTC [endorser] callChaincode -> INFO 023 [][18654ca2] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-09-24 01:04:26.066 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-09-24 01:04:26.068 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer0.org2.example.com | "2019-09-24 01:04:26.104 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 30ms (state_validation=21ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[]" +peer0.org2.example.com | "2019-09-24 01:04:26.106 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-09-24 01:04:26.108 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-09-24 01:04:26.108 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 01:04:26.109 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 01:04:26.132 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-09-24 01:04:26.133 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:26.134 UTC [cscc] Init -> INFO 02d Init CSCC" +peer0.org2.example.com | "2019-09-24 01:04:26.134 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:26.134 UTC [qscc] Init -> INFO 02f Init QSCC" +peer0.org2.example.com | "2019-09-24 01:04:26.135 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-09-24 01:04:26.135 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org2.example.com | "2019-09-24 01:04:26.135 UTC [endorser] callChaincode -> INFO 032 [][18654ca2] Exit chaincode: name:"cscc" (71ms)" +peer0.org2.example.com | "2019-09-24 01:04:26.136 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:51900 grpc.code=OK grpc.call_duration=72.4696ms +peer0.org2.example.com | "2019-09-24 01:04:27.014 UTC [endorser] callChaincode -> INFO 034 [][26f7b518] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-09-24 01:04:27.015 UTC [endorser] callChaincode -> INFO 035 [][26f7b518] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-09-24 01:04:27.015 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:51908 grpc.code=OK grpc.call_duration=1.8381ms +peer0.org2.example.com | "2019-09-24 01:04:30.165 UTC [endorser] callChaincode -> INFO 037 [][185ad666] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-09-24 01:04:30.167 UTC [endorser] callChaincode -> INFO 038 [][185ad666] Exit chaincode: name:"qscc" (1ms)" +peer0.org2.example.com | "2019-09-24 01:04:30.167 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:51916 grpc.code=OK grpc.call_duration=2.8076ms +peer0.org2.example.com | "2019-09-24 01:04:32.135 UTC [gossip.election] beLeader -> INFO 03a 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 : Becoming a leader" +peer0.org2.example.com | "2019-09-24 01:04:32.135 UTC [gossip.service] func1 -> INFO 03b Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-09-24 01:04:32.161 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-09-24 01:04:32.165 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-09-24 01:04:32.165 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 01:04:32.166 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-09-24 01:04:32.202 UTC [committer.txvalidator] Validate -> INFO 040 [businesschannel] Validated block [1] in 40ms" +peer0.org2.example.com | "2019-09-24 01:04:32.233 UTC [kvledger] CommitWithPvtData -> INFO 041 [businesschannel] Committed block [1] with 1 transaction(s) in 30ms (state_validation=0ms block_and_pvtdata_commit=9ms state_commit=18ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org2.example.com | "2019-09-24 01:04:33.388 UTC [gossip.privdata] StoreBlock -> INFO 042 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-09-24 01:04:33.411 UTC [comm.grpc.server] 1 -> INFO 043 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.411Z grpc.peer_address=172.18.0.8:42104 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=133.6µs +peer0.org2.example.com | "2019-09-24 01:04:33.420 UTC [gossip.gossip] JoinChan -> INFO 044 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-09-24 01:04:33.420 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-09-24 01:04:33.420 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-09-24 01:04:33.420 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-09-24 01:04:33.442 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.413Z grpc.peer_address=172.18.0.8:42104 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.5783ms +peer0.org2.example.com | "2019-09-24 01:04:33.456 UTC [committer.txvalidator] Validate -> INFO 049 [businesschannel] Validated block [2] in 67ms" +peer0.org2.example.com | "2019-09-24 01:04:33.460 UTC [comm.grpc.server] 1 -> INFO 04a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.46Z grpc.peer_address=172.18.0.8:42112 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=91.6µs +peer0.org2.example.com | "2019-09-24 01:04:33.480 UTC [kvledger] CommitWithPvtData -> INFO 04b [businesschannel] Committed block [2] with 1 transaction(s) in 23ms (state_validation=0ms block_and_pvtdata_commit=12ms state_commit=2ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org2.example.com | "2019-09-24 01:04:33.496 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.495Z grpc.peer_address=172.18.0.6:37394 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=195.5µs +peer0.org2.example.com | "2019-09-24 01:04:33.519 UTC [comm.grpc.server] 1 -> INFO 04d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.519Z grpc.peer_address=172.18.0.6:37396 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=89.4µs +peer0.org2.example.com | "2019-09-24 01:04:33.520 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.498Z grpc.peer_address=172.18.0.6:37394 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.4752ms +peer0.org2.example.com | "2019-09-24 01:04:33.589 UTC [gossip.comm] func1 -> WARN 04f peer0.org1.example.com:7051, PKIid:d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f isn't responsive: EOF" +peer0.org2.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] expireDeadMembers -> WARN 050 Entering [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f]" +peer0.org2.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] expireDeadMembers -> WARN 051 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: " +peer0.org2.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] expireDeadMembers -> WARN 052 Exiting" +peer0.org2.example.com | "2019-09-24 01:04:33.616 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.615Z grpc.peer_address=172.18.0.7:52146 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=363.8µs +peer0.org2.example.com | "2019-09-24 01:04:33.623 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.621Z grpc.peer_address=172.18.0.7:52144 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=571.1µs +peer0.org2.example.com | "2019-09-24 01:04:33.643 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:52144 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.9464ms +peer0.org2.example.com | "2019-09-24 01:04:33.644 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.62Z grpc.peer_address=172.18.0.7:52146 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=23.6415ms +peer0.org2.example.com | "2019-09-24 01:04:34.261 UTC [comm.grpc.server] 1 -> INFO 057 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:36.261Z grpc.peer_address=172.18.0.7:52150 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=150µs +peer0.org2.example.com | "2019-09-24 01:04:36.109 UTC [gossip.channel] reportMembershipChanges -> INFO 058 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer1.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-09-24 01:04:39.188 UTC [endorser] callChaincode -> INFO 059 [][ccf98f3a] Entry chaincode: name:"lscc" " +peer0.org2.example.com | "2019-09-24 01:04:39.189 UTC [lscc] executeInstall -> INFO 05a Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org2.example.com | "2019-09-24 01:04:39.190 UTC [endorser] callChaincode -> INFO 05b [][ccf98f3a] Exit chaincode: name:"lscc" (2ms)" +peer0.org2.example.com | "2019-09-24 01:04:39.190 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:51982 grpc.code=OK grpc.call_duration=2.805ms +peer0.org2.example.com | "2019-09-24 01:05:14.009 UTC [gossip.privdata] StoreBlock -> INFO 05d [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-09-24 01:05:14.011 UTC [committer.txvalidator] Validate -> INFO 05e [businesschannel] Validated block [3] in 2ms" +peer0.org2.example.com | "2019-09-24 01:05:14.022 UTC [cceventmgmt] HandleStateUpdates -> INFO 05f Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-09-24 01:05:14.034 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [3] with 1 transaction(s) in 14ms (state_validation=3ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org2.example.com | "2019-09-24 01:05:16.903 UTC [gossip.privdata] StoreBlock -> INFO 061 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-09-24 01:05:16.907 UTC [committer.txvalidator] Validate -> INFO 062 [businesschannel] Validated block [4] in 3ms" +peer0.org2.example.com | "2019-09-24 01:05:16.919 UTC [kvledger] CommitWithPvtData -> INFO 063 [businesschannel] Committed block [4] with 1 transaction(s) in 10ms (state_validation=0ms block_and_pvtdata_commit=7ms state_commit=1ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org2.example.com | "2019-09-24 01:05:19.512 UTC [gossip.privdata] StoreBlock -> INFO 064 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-09-24 01:05:19.514 UTC [committer.txvalidator] Validate -> INFO 065 [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-09-24 01:05:19.540 UTC [kvledger] CommitWithPvtData -> INFO 066 [businesschannel] Committed block [5] with 1 transaction(s) in 26ms (state_validation=0ms block_and_pvtdata_commit=22ms state_commit=2ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org2.example.com | "2019-09-24 01:05:34.239 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-09-24 01:05:34.240 UTC [cauthdsl] deduplicate -> WARN 068 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer0.org2.example.com | "2019-09-24 01:05:34.240 UTC [cauthdsl] deduplicate -> WARN 069 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer0.org2.example.com | "2019-09-24 01:05:34.245 UTC [gossip.gossip] JoinChan -> INFO 06a Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-09-24 01:05:34.245 UTC [gossip.gossip] learnAnchorPeers -> INFO 06b No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-09-24 01:05:34.246 UTC [gossip.gossip] learnAnchorPeers -> INFO 06c Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-09-24 01:05:34.246 UTC [gossip.gossip] learnAnchorPeers -> INFO 06d Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-09-24 01:05:34.246 UTC [gossip.gossip] learnAnchorPeers -> INFO 06e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-09-24 01:05:34.283 UTC [committer.txvalidator] Validate -> INFO 06f [businesschannel] Validated block [6] in 44ms" +peer0.org2.example.com | "2019-09-24 01:05:34.306 UTC [kvledger] CommitWithPvtData -> INFO 070 [businesschannel] Committed block [6] with 1 transaction(s) in 21ms (state_validation=5ms block_and_pvtdata_commit=12ms state_commit=1ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org2.example.com | "2019-09-24 01:05:34.381 UTC [comm.grpc.server] 1 -> INFO 071 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.377Z grpc.peer_address=172.18.0.8:42262 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=675.7µs +peer0.org2.example.com | "2019-09-24 01:05:34.385 UTC [comm.grpc.server] 1 -> INFO 072 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:52150 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m0.1907598s +peer0.org2.example.com | "2019-09-24 01:05:34.388 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:42112 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m0.9944623s +peer0.org2.example.com | "2019-09-24 01:05:34.389 UTC [comm.grpc.server] 1 -> INFO 074 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.386Z grpc.peer_address=172.18.0.8:42262 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.0494ms +peer0.org2.example.com | "2019-09-24 01:05:34.524 UTC [comm.grpc.server] 1 -> INFO 075 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.523Z grpc.peer_address=172.18.0.6:37546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=117.6µs +peer0.org2.example.com | "2019-09-24 01:05:34.581 UTC [comm.grpc.server] 1 -> INFO 076 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:37396 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m1.1285902s +peer0.org2.example.com | "2019-09-24 01:05:34.581 UTC [comm.grpc.server] 1 -> INFO 077 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.571Z grpc.peer_address=172.18.0.6:37546 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.4777ms +peer0.org2.example.com | "2019-09-24 01:05:34.589 UTC [comm.grpc.server] 1 -> INFO 078 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.588Z grpc.peer_address=172.18.0.7:52294 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.3µs +peer0.org2.example.com | "2019-09-24 01:05:34.635 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.591Z grpc.peer_address=172.18.0.7:52294 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.9085ms +peer0.org2.example.com | "2019-09-24 01:05:34.660 UTC [comm.grpc.server] 1 -> INFO 07a unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.66Z grpc.peer_address=172.18.0.7:52298 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=113.3µs +peer0.org2.example.com | "2019-09-24 01:05:49.882 UTC [endorser] callChaincode -> INFO 07b [][71662df0] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-09-24 01:05:49.883 UTC [endorser] callChaincode -> INFO 07c [][71662df0] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-09-24 01:05:49.884 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:52156 grpc.code=OK grpc.call_duration=3.0497ms +peer0.org2.example.com | "2019-09-24 01:05:50.836 UTC [endorser] callChaincode -> INFO 07e [][dd740168] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-09-24 01:05:50.848 UTC [endorser] callChaincode -> INFO 07f [][dd740168] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-09-24 01:05:50.850 UTC [comm.grpc.server] 1 -> INFO 080 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:52164 grpc.code=OK grpc.call_duration=13.7068ms +peer0.org1.example.com | "2019-09-24 01:04:18.599 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +peer0.org1.example.com | "2019-09-24 01:04:18.600 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 01:04:18.600 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" +peer0.org1.example.com | "2019-09-24 01:04:18.600 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" +peer0.org1.example.com | "2019-09-24 01:04:18.601 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 01:04:18.601 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +peer0.org1.example.com | "2019-09-24 01:04:18.602 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" +peer0.org1.example.com | "2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" +peer0.org1.example.com | "2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +peer0.org1.example.com | "2019-09-24 01:04:18.603 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +peer0.org1.example.com | "2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +peer0.org1.example.com | "2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" +peer0.org1.example.com | "2019-09-24 01:04:18.604 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.605 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Library setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.607 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.608 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Label setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.610 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.610 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Pin setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.612 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.612 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Hash setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.613 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.613 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for peer.BCCSP.PKCS11.Security setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.613 UTC [viperutil] getKeysRecursively -> DEBU 017 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +peer0.org1.example.com | "2019-09-24 01:04:18.615 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.616 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.617 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +peer0.org1.example.com | "2019-09-24 01:04:18.620 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +peer0.org1.example.com | "2019-09-24 01:04:18.620 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +peer0.org1.example.com | "2019-09-24 01:04:18.620 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +peer0.org1.example.com | "2019-09-24 01:04:18.623 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 01:04:18.626 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +peer0.org1.example.com | "2019-09-24 01:04:18.629 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 01:04:18.632 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +peer0.org1.example.com | "2019-09-24 01:04:18.634 UTC [msp] getPemMaterialFromDir -> DEBU 022 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +peer0.org1.example.com | "2019-09-24 01:04:18.634 UTC [msp] getMspConfig -> DEBU 023 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-09-24 01:04:18.634 UTC [msp] getPemMaterialFromDir -> DEBU 024 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +peer0.org1.example.com | "2019-09-24 01:04:18.637 UTC [msp] getPemMaterialFromDir -> DEBU 025 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +peer0.org1.example.com | "2019-09-24 01:04:18.638 UTC [msp] getPemMaterialFromDir -> DEBU 026 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +peer0.org1.example.com | "2019-09-24 01:04:18.639 UTC [msp] getMspConfig -> DEBU 027 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +peer0.org1.example.com | "2019-09-24 01:04:18.639 UTC [msp] getPemMaterialFromDir -> DEBU 028 Reading directory /etc/hyperledger/fabric/msp/crls" +peer0.org1.example.com | "2019-09-24 01:04:18.639 UTC [msp] getMspConfig -> DEBU 029 crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +peer0.org1.example.com | "2019-09-24 01:04:18.642 UTC [msp] getMspConfig -> DEBU 02a Loading NodeOUs" +peer0.org1.example.com | "2019-09-24 01:04:18.653 UTC [msp] newBccspMsp -> DEBU 02b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:18.653 UTC [msp] New -> DEBU 02c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:18.653 UTC [msp] loadLocaMSP -> DEBU 02d Created new local MSP" +peer0.org1.example.com | "2019-09-24 01:04:18.653 UTC [msp] Setup -> DEBU 02e Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:18.653 UTC [msp.identity] newIdentity -> DEBU 02f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:18.654 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:18.656 UTC [bccsp_sw] loadPrivateKey -> DEBU 031 Loading private key [ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1] at [/etc/hyperledger/fabric/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk]..." +peer0.org1.example.com | "2019-09-24 01:04:18.658 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:18.658 UTC [msp] setupSigningIdentity -> DEBU 033 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +peer0.org1.example.com | "2019-09-24 01:04:18.660 UTC [nodeCmd] serve -> INFO 034 Starting peer: +peer0.org1.example.com | Version: 1.4.3 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.12.9 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.15 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-09-24 01:04:18.661 UTC [msp] GetDefaultSigningIdentity -> DEBU 035 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:18.662 UTC [msp.identity] Sign -> DEBU 036 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-09-24 01:04:18.662 UTC [msp.identity] Sign -> DEBU 037 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-09-24 01:04:18.662 UTC [ledgermgmt] initialize -> INFO 038 Initializing ledger mgmt" +peer0.org1.example.com | "2019-09-24 01:04:18.662 UTC [kvledger] NewProvider -> INFO 039 Initializing ledger provider" +peer0.org1.example.com | "2019-09-24 01:04:18.662 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03a CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +peer0.org1.example.com | "2019-09-24 01:04:18.663 UTC [kvledger.util] logDirStatus -> DEBU 03b Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.663 UTC [kvledger.util] logDirStatus -> DEBU 03c After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.678 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 03d constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +peer1.org1.example.com | "2019-09-24 01:04:18.261 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 1.4.3 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.12.9 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.15 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-09-24 01:04:18.262 UTC [ledgermgmt] initialize -> INFO 002 Initializing ledger mgmt" +peer1.org1.example.com | "2019-09-24 01:04:18.262 UTC [kvledger] NewProvider -> INFO 003 Initializing ledger provider" +peer1.org1.example.com | "2019-09-24 01:04:18.354 UTC [kvledger] NewProvider -> INFO 004 ledger provider Initialized" +peer1.org1.example.com | "2019-09-24 01:04:18.416 UTC [ledgermgmt] initialize -> INFO 005 ledger mgmt initialized" +peer1.org1.example.com | "2019-09-24 01:04:18.417 UTC [peer] func1 -> INFO 006 Auto-detected peer address: 172.18.0.6:7051" +peer1.org1.example.com | "2019-09-24 01:04:18.417 UTC [peer] func1 -> INFO 007 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-09-24 01:04:18.417 UTC [peer] func1 -> INFO 008 Auto-detected peer address: 172.18.0.6:7051" +peer1.org1.example.com | "2019-09-24 01:04:18.417 UTC [peer] func1 -> INFO 009 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-09-24 01:04:18.461 UTC [nodeCmd] serve -> INFO 00a Starting peer with TLS enabled" +peer1.org1.example.com | "2019-09-24 01:04:18.473 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-09-24 01:04:18.474 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00c Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-09-24 01:04:18.484 UTC [sccapi] registerSysCC -> INFO 00d system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-09-24 01:04:18.484 UTC [sccapi] registerSysCC -> INFO 00e system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-09-24 01:04:18.484 UTC [sccapi] registerSysCC -> INFO 00f system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-09-24 01:04:18.484 UTC [sccapi] registerSysCC -> INFO 010 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer1.org1.example.com | "2019-09-24 01:04:18.504 UTC [gossip.service] func1 -> INFO 011 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 01:04:18.522 UTC [gossip.gossip] NewGossipService -> INFO 012 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da, Metadata: " +peer1.org1.example.com | "2019-09-24 01:04:18.523 UTC [gossip.gossip] start -> INFO 013 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-09-24 01:04:18.525 UTC [sccapi] deploySysCC -> INFO 014 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:18.526 UTC [cscc] Init -> INFO 015 Init CSCC" +peer1.org1.example.com | "2019-09-24 01:04:18.526 UTC [sccapi] deploySysCC -> INFO 016 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:18.527 UTC [qscc] Init -> INFO 017 Init QSCC" +peer1.org1.example.com | "2019-09-24 01:04:18.527 UTC [sccapi] deploySysCC -> INFO 018 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:18.527 UTC [sccapi] deploySysCC -> INFO 019 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-09-24 01:04:18.527 UTC [nodeCmd] serve -> INFO 01a Deployed system chaincodes" +peer1.org1.example.com | "2019-09-24 01:04:18.529 UTC [discovery] NewService -> INFO 01b Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-09-24 01:04:18.529 UTC [nodeCmd] registerDiscoveryService -> INFO 01c Discovery service activated" +peer1.org1.example.com | "2019-09-24 01:04:18.530 UTC [nodeCmd] serve -> INFO 01d Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 01:04:18.530 UTC [nodeCmd] serve -> INFO 01e Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-09-24 01:04:18.532 UTC [kvledger] LoadPreResetHeight -> INFO 01f Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer1.org1.example.com | "2019-09-24 01:04:18.532 UTC [fsblkstorage] LoadPreResetHeight -> INFO 020 Loading Pre-reset heights" +peer1.org1.example.com | "2019-09-24 01:04:18.532 UTC [fsblkstorage] preRestHtFiles -> INFO 021 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer1.org1.example.com | "2019-09-24 01:04:18.532 UTC [fsblkstorage] LoadPreResetHeight -> INFO 022 Pre-reset heights loaded" +peer1.org1.example.com | "2019-09-24 01:04:25.888 UTC [endorser] callChaincode -> INFO 023 [][0fd501ff] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 01:04:25.889 UTC [ledgermgmt] CreateLedger -> INFO 024 Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-09-24 01:04:25.891 UTC [fsblkstorage] newBlockfileMgr -> INFO 025 Getting block information from block storage" +peer1.org1.example.com | "2019-09-24 01:04:25.902 UTC [kvledger] CommitWithPvtData -> INFO 026 [businesschannel] Committed block [0] with 1 transaction(s) in 8ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=1ms) commitHash=[]" +peer1.org1.example.com | "2019-09-24 01:04:25.904 UTC [ledgermgmt] CreateLedger -> INFO 027 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-09-24 01:04:25.906 UTC [gossip.gossip] JoinChan -> INFO 028 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 01:04:25.906 UTC [gossip.gossip] learnAnchorPeers -> INFO 029 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 01:04:25.906 UTC [gossip.gossip] learnAnchorPeers -> INFO 02a No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 01:04:25.926 UTC [gossip.state] NewGossipStateProvider -> INFO 02b Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-09-24 01:04:25.928 UTC [sccapi] deploySysCC -> INFO 02c system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:25.929 UTC [cscc] Init -> INFO 02d Init CSCC" +peer1.org1.example.com | "2019-09-24 01:04:25.929 UTC [sccapi] deploySysCC -> INFO 02e system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:25.930 UTC [qscc] Init -> INFO 02f Init QSCC" +peer1.org1.example.com | "2019-09-24 01:04:25.930 UTC [sccapi] deploySysCC -> INFO 030 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-09-24 01:04:25.931 UTC [sccapi] deploySysCC -> INFO 031 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer1.org1.example.com | "2019-09-24 01:04:25.931 UTC [endorser] callChaincode -> INFO 032 [][0fd501ff] Exit chaincode: name:"cscc" (43ms)" +peer1.org1.example.com | "2019-09-24 01:04:25.931 UTC [comm.grpc.server] 1 -> INFO 033 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47668 grpc.code=OK grpc.call_duration=44.9447ms +peer1.org1.example.com | "2019-09-24 01:04:26.874 UTC [endorser] callChaincode -> INFO 034 [][168d1fd8] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 01:04:26.876 UTC [endorser] callChaincode -> INFO 035 [][168d1fd8] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-09-24 01:04:26.877 UTC [comm.grpc.server] 1 -> INFO 036 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47676 grpc.code=OK grpc.call_duration=4.6883ms +peer1.org1.example.com | "2019-09-24 01:04:29.881 UTC [endorser] callChaincode -> INFO 037 [][37a12096] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-09-24 01:04:29.883 UTC [endorser] callChaincode -> INFO 038 [][37a12096] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-09-24 01:04:29.883 UTC [comm.grpc.server] 1 -> INFO 039 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47684 grpc.code=OK grpc.call_duration=2.6642ms +peer1.org1.example.com | "2019-09-24 01:04:30.906 UTC [gossip.channel] reportMembershipChanges -> INFO 03a Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-09-24 01:04:31.788 UTC [gossip.election] leaderElection -> INFO 03b 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da : Some peer is already a leader" +peer1.org1.example.com | "2019-09-24 01:04:31.821 UTC [gossip.privdata] StoreBlock -> INFO 03c [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-09-24 01:04:31.831 UTC [gossip.gossip] JoinChan -> INFO 03d Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 01:04:31.831 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 01:04:31.831 UTC [gossip.gossip] learnAnchorPeers -> INFO 03f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 01:04:31.831 UTC [gossip.service] updateEndpoints -> WARN 040 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 01:04:31.877 UTC [committer.txvalidator] Validate -> INFO 041 [businesschannel] Validated block [1] in 56ms" +peer1.org1.example.com | "2019-09-24 01:04:31.895 UTC [kvledger] CommitWithPvtData -> INFO 042 [businesschannel] Committed block [1] with 1 transaction(s) in 14ms (state_validation=0ms block_and_pvtdata_commit=11ms state_commit=1ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer1.org1.example.com | "2019-09-24 01:04:33.450 UTC [comm.grpc.server] 1 -> INFO 043 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.448Z grpc.peer_address=172.18.0.7:45322 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.2µs +peer1.org1.example.com | "2019-09-24 01:04:33.465 UTC [gossip.privdata] StoreBlock -> INFO 044 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-09-24 01:04:33.469 UTC [gossip.gossip] JoinChan -> INFO 045 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-09-24 01:04:33.469 UTC [gossip.gossip] learnAnchorPeers -> INFO 046 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 01:04:33.469 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 01:04:33.469 UTC [gossip.service] updateEndpoints -> WARN 048 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 01:04:33.495 UTC [committer.txvalidator] Validate -> INFO 049 [businesschannel] Validated block [2] in 30ms" +peer1.org1.example.com | "2019-09-24 01:04:33.507 UTC [kvledger] CommitWithPvtData -> INFO 04a [businesschannel] Committed block [2] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer1.org1.example.com | "2019-09-24 01:04:33.525 UTC [comm.grpc.server] 1 -> INFO 04b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45322 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=72.0548ms +peer1.org1.example.com | "2019-09-24 01:04:33.560 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.559Z grpc.peer_address=172.18.0.7:45334 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=213.2µs +peer1.org1.example.com | "2019-09-24 01:04:35.906 UTC [gossip.channel] reportMembershipChanges -> INFO 04d Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-09-24 01:04:38.518 UTC [endorser] callChaincode -> INFO 04e [][6da96557] Entry chaincode: name:"lscc" " +peer1.org1.example.com | "2019-09-24 01:04:38.519 UTC [lscc] executeInstall -> INFO 04f Installed Chaincode [exp02] Version [1.0] to peer" +peer1.org1.example.com | "2019-09-24 01:04:38.519 UTC [endorser] callChaincode -> INFO 050 [][6da96557] Exit chaincode: name:"lscc" (1ms)" +peer1.org1.example.com | "2019-09-24 01:04:38.519 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47746 grpc.code=OK grpc.call_duration=1.9284ms +peer1.org1.example.com | "2019-09-24 01:04:38.608 UTC [comm.grpc.server] 1 -> INFO 052 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:40.607Z grpc.peer_address=172.18.0.8:39474 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=325µs +peer1.org1.example.com | "2019-09-24 01:04:45.906 UTC [gossip.channel] reportMembershipChanges -> INFO 053 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-09-24 01:05:14.037 UTC [gossip.privdata] StoreBlock -> INFO 054 [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-09-24 01:05:14.040 UTC [committer.txvalidator] Validate -> INFO 055 [businesschannel] Validated block [3] in 2ms" +peer1.org1.example.com | "2019-09-24 01:05:14.040 UTC [cceventmgmt] HandleStateUpdates -> INFO 056 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-09-24 01:05:14.050 UTC [kvledger] CommitWithPvtData -> INFO 057 [businesschannel] Committed block [3] with 1 transaction(s) in 10ms (state_validation=0ms block_and_pvtdata_commit=6ms state_commit=1ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer1.org1.example.com | "2019-09-24 01:05:16.930 UTC [gossip.privdata] StoreBlock -> INFO 058 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-09-24 01:05:16.931 UTC [committer.txvalidator] Validate -> INFO 059 [businesschannel] Validated block [4] in 0ms" +peer1.org1.example.com | "2019-09-24 01:05:16.941 UTC [kvledger] CommitWithPvtData -> INFO 05a [businesschannel] Committed block [4] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer1.org1.example.com | "2019-09-24 01:05:19.547 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-09-24 01:04:18.679 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +peer0.org1.example.com | "2019-09-24 01:04:18.679 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.679 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.696 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +peer0.org1.example.com | "2019-09-24 01:04:18.701 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.701 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.718 UTC [kvledger] NewProvider -> INFO 044 ledger provider Initialized" +peer0.org1.example.com | "2019-09-24 01:04:18.719 UTC [confighistory] newDBProvider -> DEBU 045 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +peer0.org1.example.com | "2019-09-24 01:04:18.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 046 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +peer0.org1.example.com | "2019-09-24 01:04:18.720 UTC [kvledger.util] logDirStatus -> DEBU 047 Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.720 UTC [kvledger.util] logDirStatus -> DEBU 048 After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.730 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +peer0.org1.example.com | "2019-09-24 01:04:18.730 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.730 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.739 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +peer0.org1.example.com | "2019-09-24 01:04:18.739 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.739 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.748 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +peer0.org1.example.com | "2019-09-24 01:04:18.748 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.748 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.757 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +peer0.org1.example.com | "2019-09-24 01:04:18.758 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +peer0.org1.example.com | "2019-09-24 01:04:18.758 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:18.758 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +peer0.org1.example.com | "2019-09-24 01:04:18.766 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" +peer0.org1.example.com | "2019-09-24 01:04:18.768 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" +peer0.org1.example.com | "2019-09-24 01:04:18.768 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" +peer0.org1.example.com | "2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 059 Auto-detected peer address: 172.18.0.7:7051" +peer0.org1.example.com | "2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05a Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05b Auto-detected peer address: 172.18.0.7:7051" +peer0.org1.example.com | "2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05c Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:18.785 UTC [nodeCmd] serve -> INFO 05d Starting peer with TLS enabled" +peer0.org1.example.com | "2019-09-24 01:04:18.801 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05e Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-09-24 01:04:18.801 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05f Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 01:04:18.815 UTC [inproccontroller] Register -> DEBU 060 Registering chaincode instance: lscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.815 UTC [sccapi] registerSysCC -> INFO 061 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org1.example.com | "2019-09-24 01:04:18.816 UTC [inproccontroller] Register -> DEBU 062 Registering chaincode instance: cscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 063 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-09-24 01:04:18.816 UTC [inproccontroller] Register -> DEBU 064 Registering chaincode instance: qscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 065 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 066 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +peer0.org1.example.com | "2019-09-24 01:04:18.817 UTC [nodeCmd] serve -> DEBU 067 Running peer" +peer0.org1.example.com | "2019-09-24 01:04:18.817 UTC [msp] GetDefaultSigningIdentity -> DEBU 068 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:18.818 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers" +peer0.org1.example.com | "2019-09-24 01:04:18.818 UTC [viperutil] getKeysRecursively -> DEBU 06a Found map[string]interface{} value for peer.handlers.endorsers" +peer0.org1.example.com | "2019-09-24 01:04:18.819 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for peer.handlers.endorsers.escc" +peer0.org1.example.com | "2019-09-24 01:04:18.820 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " +orderer1.example.com | 2019-09-24 01:04:16.051 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2019-09-24 01:04:16.150 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | General.Authentication.NoExpirationChecks = false +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +peer0.org1.example.com | "2019-09-24 01:04:18.820 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.endorsers.escc.library setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.821 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 01:04:18.821 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +peer0.org1.example.com | "2019-09-24 01:04:18.821 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for peer.handlers.validators" +peer0.org1.example.com | "2019-09-24 01:04:18.822 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.validators.vscc" +peer0.org1.example.com | "2019-09-24 01:04:18.822 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +peer0.org1.example.com | "2019-09-24 01:04:18.822 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +peer0.org1.example.com | "2019-09-24 01:04:18.823 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value is not a string: " +peer0.org1.example.com | "2019-09-24 01:04:18.824 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.validators.vscc.library setting to " +peer0.org1.example.com | "2019-09-24 01:04:18.825 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-09-24 01:04:18.825 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +peer0.org1.example.com | "2019-09-24 01:04:18.825 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-09-24 01:04:18.825 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +peer0.org1.example.com | "2019-09-24 01:04:18.826 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07a map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +peer0.org1.example.com | "2019-09-24 01:04:18.836 UTC [gossip.service] func1 -> INFO 07b Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-09-24 01:04:18.858 UTC [msp] DeserializeIdentity -> DEBU 07c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:18.858 UTC [msp.identity] newIdentity -> DEBU 07d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:18.860 UTC [msp] Validate -> DEBU 07e MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:18.861 UTC [msp] getCertificationChain -> DEBU 07f MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:18.862 UTC [gossip.discovery] periodicalSendAlive -> DEBU 080 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:18.862 UTC [gossip.gossip] NewGossipService -> INFO 081 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: " +peer0.org1.example.com | "2019-09-24 01:04:18.863 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 082 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 01:04:18.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:18.864 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20D925A8D65F6B3C84...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:18.864 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: F0FB10D3C1457F727357F6D557E9312864F3FC1AE0BF8DD0E150BF246E3CC1E9 " +peer0.org1.example.com | "2019-09-24 01:04:18.865 UTC [gossip.pull] Add -> DEBU 086 Added �%��_k<���\<���8 [:5AT�!�]�, total items: 1" +peer0.org1.example.com | "2019-09-24 01:04:18.865 UTC [gossip.gossip] start -> INFO 087 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-09-24 01:04:18.865 UTC [gossip.gossip] syncDiscovery -> DEBU 088 Entering discovery sync with interval 4s" +peer0.org1.example.com | "2019-09-24 01:04:18.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 089 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08b Sign: digest: 9FFF7CC1A7A9C4DC45A7632F9C88E82E49EDCEF86988E2E05267116067760F24 " +peer0.org1.example.com | "2019-09-24 01:04:18.866 UTC [msp] GetDefaultSigningIdentity -> DEBU 08c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:18.867 UTC [gossip.discovery] Connect -> DEBU 08f Skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 01:04:18.867 UTC [chaincode] LaunchConfig -> DEBU 090 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 01:04:18.867 UTC [chaincode] Start -> DEBU 091 start container: lscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.868 UTC [chaincode] Start -> DEBU 092 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 01:04:18.868 UTC [chaincode] Start -> DEBU 093 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.3 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 01:04:18.869 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.869 UTC [container] lockContainer -> DEBU 095 got container (lscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.870 UTC [inproccontroller] getInstance -> DEBU 096 chaincode instance created for lscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.870 UTC [container] unlockContainer -> DEBU 097 container lock deleted(lscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:18.870 UTC [inproccontroller] func1 -> DEBU 099 chaincode started for lscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.871 UTC [container] lockContainer -> DEBU 09a waiting for container(lscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.872 UTC [container] lockContainer -> DEBU 09b got container (lscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.872 UTC [container] unlockContainer -> DEBU 09c container lock deleted(lscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:18.870 UTC [inproccontroller] func2 -> DEBU 098 chaincode-support started for lscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.873 UTC [chaincode] handleMessage -> DEBU 09d [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 09e Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.874 UTC [chaincode] Register -> DEBU 09f registered handler complete for chaincode lscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 0a0 Got REGISTER for chaincodeID = name:"lscc:1.4.3" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 0a1 Changed state to established for name:"lscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.875 UTC [chaincode] sendReady -> DEBU 0a2 sending READY for chaincode name:"lscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.875 UTC [chaincode] sendReady -> DEBU 0a3 Changed to state ready for chaincode name:"lscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.875 UTC [chaincode] Launch -> DEBU 0a4 launch complete" +peer0.org1.example.com | "2019-09-24 01:04:18.875 UTC [chaincode] Execute -> DEBU 0a5 Entry" +peer0.org1.example.com | "2019-09-24 01:04:18.876 UTC [chaincode] handleMessage -> DEBU 0a6 [287005e4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:18.876 UTC [chaincode] Notify -> DEBU 0a7 [287005e4] notifying Txid:287005e4-508e-431f-ad8c-1116299b9ab8, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:18.876 UTC [chaincode] Execute -> DEBU 0a8 Exit" +peer0.org1.example.com | "2019-09-24 01:04:18.876 UTC [sccapi] deploySysCC -> INFO 0a9 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [chaincode] LaunchConfig -> DEBU 0aa launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ab start container: cscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ac start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ad start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.3 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0ae waiting for container(cscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0af got container (cscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [inproccontroller] getInstance -> DEBU 0b0 chaincode instance created for cscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [container] unlockContainer -> DEBU 0b1 container lock deleted(cscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [inproccontroller] func2 -> DEBU 0b2 chaincode-support started for cscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [inproccontroller] func1 -> DEBU 0b3 chaincode started for cscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] handleMessage -> DEBU 0b4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b5 Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] Register -> DEBU 0b6 registered handler complete for chaincode cscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b7 Got REGISTER for chaincodeID = name:"cscc:1.4.3" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b8 Changed state to established for name:"cscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] sendReady -> DEBU 0b9 sending READY for chaincode name:"cscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] sendReady -> DEBU 0ba Changed to state ready for chaincode name:"cscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] Launch -> DEBU 0bb launch complete" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [chaincode] Execute -> DEBU 0bc Entry" +peer0.org1.example.com | "2019-09-24 01:04:18.878 UTC [cscc] Init -> INFO 0bd Init CSCC" +peer0.org1.example.com | "2019-09-24 01:04:18.879 UTC [chaincode] handleMessage -> DEBU 0be [161b3d83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:18.879 UTC [chaincode] Notify -> DEBU 0bf [161b3d83] notifying Txid:161b3d83-cd56-426d-baf4-bf498d387a4d, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:18.879 UTC [chaincode] Execute -> DEBU 0c0 Exit" +peer0.org1.example.com | "2019-09-24 01:04:18.879 UTC [sccapi] deploySysCC -> INFO 0c1 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [chaincode] LaunchConfig -> DEBU 0c2 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c3 start container: qscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c4 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c5 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.3 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0c6 waiting for container(qscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0c7 got container (qscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [inproccontroller] getInstance -> DEBU 0c8 chaincode instance created for qscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [container] unlockContainer -> DEBU 0c9 container lock deleted(qscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0ca waiting for container(qscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [container] lockContainer -> DEBU 0cb got container (qscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [container] unlockContainer -> DEBU 0cc container lock deleted(qscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [inproccontroller] func2 -> DEBU 0cd chaincode-support started for qscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [inproccontroller] func1 -> DEBU 0ce chaincode started for qscc-1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [chaincode] handleMessage -> DEBU 0cf [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d0 Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [chaincode] Register -> DEBU 0d1 registered handler complete for chaincode qscc:1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d2 Got REGISTER for chaincodeID = name:"qscc:1.4.3" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d3 Changed state to established for name:"qscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] sendReady -> DEBU 0d4 sending READY for chaincode name:"qscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] sendReady -> DEBU 0d5 Changed to state ready for chaincode name:"qscc:1.4.3" " +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] Launch -> DEBU 0d6 launch complete" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] Execute -> DEBU 0d7 Entry" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [qscc] Init -> INFO 0d8 Init QSCC" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] handleMessage -> DEBU 0d9 [2feec172] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] Notify -> DEBU 0da [2feec172] notifying Txid:2feec172-327a-4973-9187-c44a0443d1bc, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [chaincode] Execute -> DEBU 0db Exit" +peer0.org1.example.com | "2019-09-24 01:04:18.882 UTC [sccapi] deploySysCC -> INFO 0dc system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:18.883 UTC [sccapi] deploySysCC -> INFO 0dd system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-09-24 01:04:18.883 UTC [nodeCmd] serve -> INFO 0de Deployed system chaincodes" +peer0.org1.example.com | "2019-09-24 01:04:18.883 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0df Returning []" +peer1.org1.example.com | "2019-09-24 01:05:19.549 UTC [committer.txvalidator] Validate -> INFO 05c [businesschannel] Validated block [5] in 0ms" +peer1.org1.example.com | "2019-09-24 01:05:19.558 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [5] with 1 transaction(s) in 9ms (state_validation=0ms block_and_pvtdata_commit=5ms state_commit=1ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer1.org1.example.com | "2019-09-24 01:05:34.311 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-09-24 01:05:34.313 UTC [cauthdsl] deduplicate -> WARN 05f De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer1.org1.example.com | "2019-09-24 01:05:34.315 UTC [cauthdsl] deduplicate -> WARN 060 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer1.org1.example.com | "2019-09-24 01:05:34.369 UTC [gossip.gossip] JoinChan -> INFO 061 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-09-24 01:05:34.370 UTC [gossip.gossip] learnAnchorPeers -> INFO 062 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-09-24 01:05:34.370 UTC [gossip.gossip] learnAnchorPeers -> INFO 063 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 01:05:34.370 UTC [gossip.gossip] learnAnchorPeers -> INFO 064 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-09-24 01:05:34.386 UTC [gossip.service] updateEndpoints -> WARN 065 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-09-24 01:05:34.465 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [6] in 153ms" +peer1.org1.example.com | "2019-09-24 01:05:34.574 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [6] with 1 transaction(s) in 108ms (state_validation=1ms block_and_pvtdata_commit=49ms state_commit=42ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer1.org1.example.com | "2019-09-24 01:05:34.590 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:45334 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m1.0981658s +peer1.org1.example.com | "2019-09-24 01:05:34.856 UTC [comm.grpc.server] 1 -> INFO 069 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.855Z grpc.peer_address=172.18.0.9:49194 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=307.1µs +peer1.org1.example.com | "2019-09-24 01:05:49.734 UTC [endorser] callChaincode -> INFO 06a [][e84d15a1] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-09-24 01:05:49.735 UTC [endorser] callChaincode -> INFO 06b [][e84d15a1] Exit chaincode: name:"cscc" (0ms)" +peer1.org1.example.com | "2019-09-24 01:05:49.735 UTC [comm.grpc.server] 1 -> INFO 06c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47924 grpc.code=OK grpc.call_duration=962.7µs +peer1.org1.example.com | "2019-09-24 01:05:50.691 UTC [endorser] callChaincode -> INFO 06d [][a444b4d2] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-09-24 01:05:50.692 UTC [endorser] callChaincode -> INFO 06e [][a444b4d2] Exit chaincode: name:"qscc" (1ms)" +peer1.org1.example.com | "2019-09-24 01:05:50.692 UTC [comm.grpc.server] 1 -> INFO 06f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:47932 grpc.code=OK grpc.call_duration=2.7585ms +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2019-09-24 01:04:16.189 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2019-09-24 01:04:16.255 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2019-09-24 01:04:16.257 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2019-09-24 01:04:16.269 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer1.example.com | "2019-09-24 01:04:16.285 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-09-24 01:04:16.286 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.307 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 257eabd868ebd9bdb404cd1e16e104c6943521bd472058e2d82271564767c6c1 and orderer type etcdraft" +orderer1.example.com | "2019-09-24 01:04:16.308 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.308 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | "2019-09-24 01:04:18.884 UTC [discovery] NewService -> INFO 0e0 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-09-24 01:04:18.884 UTC [nodeCmd] registerDiscoveryService -> INFO 0e1 Discovery service activated" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [nodeCmd] serve -> INFO 0e2 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [nodeCmd] serve -> INFO 0e3 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [kvledger] LoadPreResetHeight -> INFO 0e4 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0e5 Loading Pre-reset heights" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [fsblkstorage] preRestHtFiles -> INFO 0e6 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +peer0.org1.example.com | "2019-09-24 01:04:18.885 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0e7 Pre-reset heights loaded" +peer0.org1.example.com | "2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0e8 waiting for container(cscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.886 UTC [container] lockContainer -> DEBU 0e9 got container (cscc-1.4.3) lock" +peer0.org1.example.com | "2019-09-24 01:04:18.886 UTC [container] unlockContainer -> DEBU 0ea container lock deleted(cscc-1.4.3)" +peer0.org1.example.com | "2019-09-24 01:04:19.540 UTC [comm.grpc.server] 1 -> INFO 0eb unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:21.54Z grpc.peer_address=172.18.0.6:43942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.2µs +peer0.org1.example.com | "2019-09-24 01:04:19.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ec Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:19.544 UTC [msp.identity] Sign -> DEBU 0ed Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:19.544 UTC [msp.identity] Sign -> DEBU 0ee Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:19.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43942" +peer0.org1.example.com | "2019-09-24 01:04:19.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f0 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43942" +peer0.org1.example.com | "2019-09-24 01:04:19.545 UTC [msp] DeserializeIdentity -> DEBU 0f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:19.547 UTC [msp.identity] newIdentity -> DEBU 0f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:19.547 UTC [msp] Validate -> DEBU 0f3 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:19.552 UTC [msp] getCertificationChain -> DEBU 0f4 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:19.553 UTC [msp.identity] Verify -> DEBU 0f5 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:19.553 UTC [grpc] infof -> DEBU 0f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:19.553 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 48 0c 20 b3 6c cc 9d 85 70 28 54 0c |0D. H. .l...p(T.| +peer0.org1.example.com | 00000010 ca 02 0e 92 a5 bd d4 b1 1c d7 9e 92 6c 89 a0 62 |............l..b| +peer0.org1.example.com | 00000020 8f 7e f7 d0 02 20 56 d2 3e 12 4e 66 21 02 2a 3f |.~... V.>.Nf!.*?| +peer0.org1.example.com | 00000030 25 93 28 c2 9b e8 0a 0d 90 c0 4d 83 2f 8e a3 7f |%.(.......M./...| +peer0.org1.example.com | 00000040 d3 ef 7d 43 36 ee |..}C6.|" +peer0.org1.example.com | "2019-09-24 01:04:19.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:43942" +peer0.org1.example.com | "2019-09-24 01:04:19.554 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:43942" +peer0.org1.example.com | "2019-09-24 01:04:19.554 UTC [gossip.comm] readFromStream -> DEBU 0fa Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:19.555 UTC [gossip.comm] func2 -> DEBU 0fb Client 172.18.0.6:43942 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:19.555 UTC [comm.grpc.server] 1 -> INFO 0fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:29.543Z grpc.peer_address=172.18.0.6:43942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.4058ms +peer0.org1.example.com | "2019-09-24 01:04:19.555 UTC [gossip.comm] writeToStream -> DEBU 0fd Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:19.557 UTC [comm.grpc.server] 1 -> INFO 0fe unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:21.556Z grpc.peer_address=172.18.0.6:43944 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.6µs +peer0.org1.example.com | "2019-09-24 01:04:19.561 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ff Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:19.561 UTC [msp.identity] Sign -> DEBU 100 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:19.561 UTC [msp.identity] Sign -> DEBU 101 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:19.562 UTC [gossip.comm] authenticateRemotePeer -> DEBU 102 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43944" +peer0.org1.example.com | "2019-09-24 01:04:19.563 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43944" +peer0.org1.example.com | "2019-09-24 01:04:19.564 UTC [msp.identity] Verify -> DEBU 104 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:19.564 UTC [msp.identity] Verify -> DEBU 105 Verify: sig = 00000000 30 44 02 20 5e c5 a7 ac e9 20 ec a3 77 65 db bd |0D. ^.... ..we..| +peer0.org1.example.com | 00000010 8f 61 62 c4 e5 d6 36 4b 48 71 54 b2 14 1b 59 b8 |.ab...6KHqT...Y.| +peer0.org1.example.com | 00000020 53 82 3c 51 02 20 20 e7 79 08 3c 00 0e 6f 99 86 |S. DEBU 106 Authenticated 172.18.0.6:43944" +peer0.org1.example.com | "2019-09-24 01:04:19.565 UTC [gossip.comm] GossipStream -> DEBU 107 Servicing 172.18.0.6:43944" +peer0.org1.example.com | "2019-09-24 01:04:19.566 UTC [gossip.gossip] handleMessage -> DEBU 108 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:9221380010016404981 tag:EMPTY mem_req: > > , Envelope: 1107 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:19.566 UTC [gossip.gossip] handleMessage -> DEBU 109 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:19.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a Got message: GossipMessage: nonce:9221380010016404981 tag:EMPTY mem_req: > > , Envelope: 1107 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10b Verify: digest = 00000000 a6 53 cd 4e fe 4f 65 a2 e5 8d 8c fa 99 3f 71 dc |.S.N.Oe......?q.| +peer0.org1.example.com | 00000010 b7 78 78 f5 ce 6f 77 af 5b 61 80 7c 3d e4 09 cc |.xx..ow.[a.|=...|" +peer0.org1.example.com | "2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10c Verify: sig = 00000000 30 44 02 20 37 3a 05 66 63 d6 c3 52 56 3d d4 8e |0D. 7:.fc..RV=..| +peer0.org1.example.com | 00000010 b4 0d f7 e6 41 20 18 8a a5 06 6f 36 ab 1e ea 3d |....A ....o6...=| +peer0.org1.example.com | 00000020 73 9b f1 c7 02 20 6a 1e d3 47 b4 17 07 f4 4d 2e |s.... j..G....M.| +peer0.org1.example.com | 00000030 76 e8 ab 8c 0d ac f6 e7 4a 34 ac a8 81 f1 0a 9c |v.......J4......| +peer0.org1.example.com | 00000040 bf ba a1 0c ab 09 |......|" +peer0.org1.example.com | "2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:19.568 UTC [msp.identity] Verify -> DEBU 10e Verify: sig = 00000000 30 44 02 20 3c b3 6a 79 43 7f bd 8f bf 69 dc 0c |0D. <.jyC....i..| +peer0.org1.example.com | 00000010 00 d5 c5 fc cd 35 85 63 1c 6a d7 45 47 c6 ac 30 |.....5.c.j.EG..0| +peer0.org1.example.com | 00000020 7b e4 53 65 02 20 3b 63 cc 2d b9 0e 78 b3 52 61 |{.Se. ;c.-..x.Ra| +peer0.org1.example.com | 00000030 99 4d 7b ea 56 82 88 62 c9 85 b4 0e 17 36 7b d8 |.M{.V..b.....6{.| +peer0.org1.example.com | 00000040 c8 93 21 77 d4 08 |..!w..|" +peer0.org1.example.com | "2019-09-24 01:04:19.568 UTC [gossip.discovery] handleAliveMessage -> DEBU 10f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:19.568 UTC [gossip.discovery] learnNewMembers -> DEBU 110 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 01:04:19.569 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:19.569 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:19.569 UTC [gossip.discovery] handleAliveMessage -> DEBU 113 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:19.569 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:19.570 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:19.570 UTC [msp] GetDefaultSigningIdentity -> DEBU 116 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:19.570 UTC [msp.identity] Sign -> DEBU 117 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:19.570 UTC [msp.identity] Sign -> DEBU 118 Sign: digest: A2F561CEF2B4365B9213507DC6593F2F86108D16ED807EB900A430B9A3898EB1 " +peer0.org1.example.com | "2019-09-24 01:04:19.571 UTC [msp] GetDefaultSigningIdentity -> DEBU 119 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:19.571 UTC [msp.identity] Sign -> DEBU 11a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:19.571 UTC [msp.identity] Sign -> DEBU 11b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:19.572 UTC [gossip.comm] Send -> DEBU 11c Entering, sending GossipMessage: Channel: , nonce: 9221380010016404981, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:19.573 UTC [gossip.comm] sendToEndpoint -> DEBU 11d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9221380010016404981, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:19.573 UTC [gossip.comm] sendToEndpoint -> DEBU 11e Exiting" +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-09-24 01:04:16.308 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-09-24 01:04:16.308 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 01:04:16.309 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer1.example.com | "2019-09-24 01:04:16.312 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.313 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.324 UTC [orderer.common.server] Start -> INFO 017 Starting orderer: +orderer1.example.com | Version: 1.4.3 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.12.9 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2019-09-24 01:04:16.324 UTC [orderer.common.server] Start -> INFO 018 Beginning to serve requests" +orderer1.example.com | "2019-09-24 01:04:16.328 UTC [orderer.consensus.etcdraft] apply -> INFO 019 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.328 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:16.328 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.723 UTC [orderer.consensus.etcdraft] Step -> INFO 01c 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.726 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.726 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01e 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.726 UTC [orderer.consensus.etcdraft] Step -> INFO 01f 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.730 UTC [orderer.consensus.etcdraft] run -> INFO 020 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:17.731 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 021 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:24.128 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 022 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2019-09-24 01:04:24.143 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +orderer1.example.com | "2019-09-24 01:04:24.156 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 024 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2019-09-24 01:04:24.158 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 025 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.167 UTC [orderer.commmon.multichannel] newChain -> INFO 026 Created and starting new chain businesschannel" +orderer1.example.com | "2019-09-24 01:04:24.167 UTC [orderer.consensus.etcdraft] Start -> INFO 027 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.168 UTC [orderer.common.cluster] Configure -> INFO 028 Entering, channel: businesschannel, nodes: [ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | 2019-09-24 01:04:15.903 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 011 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 014 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 022 Found map[interface{}]interface{} value for general +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 027 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.LedgerType setting to string file +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.Cluster.ServerCertificate setting to +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 033 Unmarshal JSON: value is not a string: +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer1.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer1.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer1.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | 2019-09-24 01:04:16.436 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2019-09-24 01:04:16.542 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | General.Authentication.NoExpirationChecks = false +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +peer0.org1.example.com | "2019-09-24 01:04:19.573 UTC [gossip.discovery] sendMemResponse -> DEBU 11f Exiting, replying with alive: > alive:\006\037\306/\306D\344\216\010" > > " +peer0.org1.example.com | "2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 120 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.527 UTC [gossip.pull] HandleMessage -> DEBU 121 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.527 UTC [gossip.pull] SendDigest -> DEBU 122 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 123 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 124 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.528 UTC [gossip.gossip] handleMessage -> DEBU 125 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 126 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.529 UTC [msp.identity] Verify -> DEBU 127 Verify: digest = 00000000 12 f3 39 e4 64 f1 86 24 af 44 34 58 f7 f4 d6 14 |..9.d..$.D4X....| +peer0.org1.example.com | 00000010 58 7e c7 5c 3f 80 f1 87 13 12 36 10 40 81 80 9c |X~.\?.....6.@...|" +peer0.org1.example.com | "2019-09-24 01:04:22.530 UTC [msp.identity] Verify -> DEBU 128 Verify: sig = 00000000 30 45 02 21 00 b4 e2 01 9e 86 c5 fb 79 92 9c fe |0E.!........y...| +peer0.org1.example.com | 00000010 27 92 93 b9 23 cd 90 3f 16 fc b9 e6 e6 02 2c 16 |'...#..?......,.| +peer0.org1.example.com | 00000020 f9 4c cc 11 dc 02 20 20 45 5f 75 25 89 21 58 6d |.L.... E_u%.!Xm| +peer0.org1.example.com | 00000030 31 43 a2 1a ee 61 a0 67 b4 6d a1 4a 67 77 11 ef |1C...a.g.m.Jgw..| +peer0.org1.example.com | 00000040 20 03 52 e1 d8 de 53 | .R...S|" +peer0.org1.example.com | "2019-09-24 01:04:22.530 UTC [msp.identity] Verify -> DEBU 129 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:22.531 UTC [msp.identity] Verify -> DEBU 12a Verify: sig = 00000000 30 44 02 20 71 01 b4 6d 26 cc 0c d7 e9 c6 91 26 |0D. q..m&......&| +peer0.org1.example.com | 00000010 3f 4d b8 8d bd be ca b0 36 5d e2 aa 42 a1 fb 2f |?M......6]..B../| +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 034 Found real value for general.Cluster.ReplicationRetryTimeout setting to +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 035 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 036 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.Cluster.ListenAddress setting to +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 03d Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 03e Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.Cluster.ListenPort setting to +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 047 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 048 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for general.Cluster.ServerPrivateKey setting to +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 053 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05f Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 060 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.Authentication.NoExpirationChecks setting to +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.TLS +peer0.org1.example.com | 00000020 99 e4 1a cd 02 20 2c 86 f7 dc dd 52 58 5a e8 2b |..... ,....RXZ.+| +peer0.org1.example.com | 00000030 0f ef 99 45 25 be 07 a2 3c 2b e0 34 4a 33 60 1c |...E%...<+.4J3`.| +peer0.org1.example.com | 00000040 cc 57 eb 68 66 66 |.W.hff|" +peer0.org1.example.com | "2019-09-24 01:04:22.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 12c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:22.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 12d updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 12f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 130 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 131 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 132 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.534 UTC [gossip.discovery] sendMemResponse -> DEBU 133 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:22.535 UTC [msp] GetDefaultSigningIdentity -> DEBU 134 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:22.535 UTC [msp.identity] Sign -> DEBU 135 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:22.535 UTC [msp.identity] Sign -> DEBU 136 Sign: digest: EBB5737678BA30EDFD636E9306A9E8D1823896E4B7728B3E9ED648F4FF999C38 " +peer0.org1.example.com | "2019-09-24 01:04:22.536 UTC [msp] GetDefaultSigningIdentity -> DEBU 137 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:22.536 UTC [msp.identity] Sign -> DEBU 138 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:22.536 UTC [msp.identity] Sign -> DEBU 139 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +orderer1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer1.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer1.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer1.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer1.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer1.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer1.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer1.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer1.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer1.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer1.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2019-09-24 01:04:24.168 UTC [orderer.common.cluster] updateStubInMapping -> INFO 029 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-09-24 01:04:24.171 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 01:04:24.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2019-09-24 01:04:24.173 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.common.cluster] Configure -> INFO 02f Exiting" +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.consensus.etcdraft] start -> INFO 030 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 031 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.consensus.etcdraft] newRaft -> INFO 032 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.174 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 033 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.177 UTC [orderer.consensus.etcdraft] apply -> INFO 034 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.177 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:24.177 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.251 UTC [orderer.consensus.etcdraft] Step -> INFO 037 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.258 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.258 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 039 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.258 UTC [orderer.consensus.etcdraft] Step -> INFO 03a 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.275 UTC [orderer.consensus.etcdraft] run -> INFO 03b raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:25.276 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03c Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:30.970 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03d Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:04:33.295 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:05:13.988 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:05:16.895 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 040 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2019-09-24 01:04:16.667 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2019-09-24 01:04:16.726 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2019-09-24 01:04:16.727 UTC [orderer.common.server] configureClusterListener -> INFO 005 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2019-09-24 01:04:16.732 UTC [fsblkstorage] newBlockfileMgr -> INFO 006 Getting block information from block storage" +orderer2.example.com | "2019-09-24 01:04:16.747 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 007 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-09-24 01:04:16.747 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 008 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.753 UTC [orderer.commmon.multichannel] Initialize -> INFO 009 Starting system channel 'testchainid' with genesis block hash 257eabd868ebd9bdb404cd1e16e104c6943521bd472058e2d82271564767c6c1 and orderer type etcdraft" +orderer2.example.com | "2019-09-24 01:04:16.753 UTC [orderer.consensus.etcdraft] Start -> INFO 00a Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.753 UTC [orderer.common.cluster] Configure -> INFO 00b Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-09-24 01:04:16.753 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-09-24 01:04:16.753 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 01:04:16.754 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer2.example.com | "2019-09-24 01:04:16.754 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 01:04:16.754 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 010 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-09-24 01:04:16.754 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer2.example.com | "2019-09-24 01:04:16.755 UTC [orderer.common.cluster] Configure -> INFO 012 Exiting" +orderer2.example.com | "2019-09-24 01:04:16.755 UTC [orderer.consensus.etcdraft] start -> INFO 013 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.755 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 014 3 became follower at term 0" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.755 UTC [orderer.consensus.etcdraft] newRaft -> INFO 015 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.755 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 016 3 became follower at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.756 UTC [orderer.consensus.etcdraft] run -> INFO 017 This node is picked to start campaign" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.756 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: +orderer2.example.com | Version: 1.4.3 +orderer2.example.com | Commit SHA: development build +orderer2.example.com | Go version: go1.12.9 +orderer2.example.com | OS/Arch: linux/amd64" +orderer2.example.com | "2019-09-24 01:04:16.757 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +orderer2.example.com | "2019-09-24 01:04:16.757 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.757 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:16.757 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.722 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 3 is starting a new election at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.722 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01e 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.722 UTC [orderer.consensus.etcdraft] poll -> INFO 01f 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.722 UTC [orderer.consensus.etcdraft] campaign -> INFO 020 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.722 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +orderer1.example.com | "2019-09-24 01:05:19.487 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:05:34.127 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2019-09-24 01:05:34.166 UTC [cauthdsl] deduplicate -> WARN 043 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer1.example.com | "2019-09-24 01:05:34.171 UTC [cauthdsl] deduplicate -> WARN 044 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for general.BCCSP.Default setting to string SW +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07a Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.SystemChannel setting to +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 088 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 089 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 08a Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 08b Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2019-09-24 01:04:15.915 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2019-09-24 01:04:15.915 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.916 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2019-09-24 01:04:15.916 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.916 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.923 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.923 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for kafka.TLS.ClientAuthRequired setting to +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 099 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 09a Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09b Found real value for kafka.SASLPlain.Enabled setting to bool false +peer0.org1.example.com | "2019-09-24 01:04:22.536 UTC [gossip.comm] Send -> DEBU 13a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:22.537 UTC [gossip.discovery] sendMemResponse -> DEBU 13b Exiting, replying with alive: > alive:-]\026\206\270PY\177\242/b\362R\017+\321\252\262n\372Y\243\351>\213\333" > > " +peer0.org1.example.com | "2019-09-24 01:04:22.537 UTC [gossip.comm] sendToEndpoint -> DEBU 13c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.537 UTC [gossip.comm] sendToEndpoint -> DEBU 13d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.864 UTC [gossip.pull] Hello -> DEBU 13e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:22.866 UTC [gossip.comm] Send -> DEBU 13f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:22.866 UTC [gossip.comm] sendToEndpoint -> DEBU 140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.867 UTC [gossip.comm] sendToEndpoint -> DEBU 141 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 142 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 143 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 144 Sign: digest: 2855E10F782B53DEA7D402B4BC9FDE4A9CAAC8D32B7DE8BC56361D84DD3CD1B9 " +peer0.org1.example.com | "2019-09-24 01:04:22.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 145 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 146 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:22.869 UTC [msp.identity] Sign -> DEBU 147 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:22.869 UTC [gossip.gossip] handleMessage -> DEBU 148 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.871 UTC [gossip.pull] HandleMessage -> DEBU 14a GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.871 UTC [gossip.gossip] handleMessage -> DEBU 14b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.871 UTC [gossip.comm] Send -> DEBU 149 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] poll -> INFO 022 3 received MsgPreVoteResp from 1 at term 1" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 023 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 024 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] poll -> INFO 025 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] campaign -> INFO 026 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.725 UTC [orderer.consensus.etcdraft] campaign -> INFO 027 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] poll -> INFO 028 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 029 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02a 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] run -> INFO 02b raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.730 UTC [orderer.consensus.etcdraft] run -> INFO 02c Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.730 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02d Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:17.732 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 02e Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:24.087 UTC [orderer.consensus.etcdraft] propose -> INFO 02f Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:24.087 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:24.102 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 031 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2019-09-24 01:04:24.156 UTC [fsblkstorage] newBlockfileMgr -> INFO 032 Getting block information from block storage" +orderer2.example.com | "2019-09-24 01:04:24.175 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 033 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2019-09-24 01:04:24.175 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 034 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.commmon.multichannel] newChain -> INFO 035 Created and starting new chain businesschannel" +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.consensus.etcdraft] Start -> INFO 036 Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.common.cluster] Configure -> INFO 037 Entering, channel: businesschannel, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgOgAwIBAgIRAPXrSMqrFsd/yI0ash8h6NUwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABBtL0Zn5m8rL3OnI3aU1dN2YN9Ju4f1M5lUvkiY0QHz6 +orderer2.example.com | 9F+G+AyxmpsJENHkmapIgZLCpP3wxEbfv6MrHAPmbg+jgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIwLmV4YW1wbGUuY29tgghvcmRlcmVyMDAKBggq +orderer2.example.com | hkjOPQQDAgNHADBEAiAbPiz1T46CNRb4fs88hxTtU6lNFn53t6fNSBWKDbcXsQIg +orderer2.example.com | F/yKnaHLlbi+rCrj6x7rdVgtYbgwUNnwzE1k6sQ0P3w= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer2.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer2.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.common.cluster] updateStubInMapping -> INFO 038 Allocating a new stub for node 1 with endpoint of orderer0.example.com:7050 for channel businesschannel" +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Version setting to +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b1 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b2 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b9 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found map[interface{}]interface{} value for debug +orderer0.example.com | 2019-09-24 01:04:15.927 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.927 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2019-09-24 01:04:15.934 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: +orderer0.example.com | 2019-09-24 01:04:15.934 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for debug.DeliverTraceDir setting to +peer0.org1.example.com | "2019-09-24 01:04:22.873 UTC [gossip.comm] sendToEndpoint -> DEBU 14c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.873 UTC [gossip.comm] sendToEndpoint -> DEBU 14d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.876 UTC [gossip.gossip] handleMessage -> DEBU 14e Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.876 UTC [gossip.gossip] handleMessage -> DEBU 14f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 150 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.877 UTC [msp.identity] Verify -> DEBU 151 Verify: digest = 00000000 28 55 e1 0f 78 2b 53 de a7 d4 02 b4 bc 9f de 4a |(U..x+S........J| +peer0.org1.example.com | 00000010 9c aa c8 d3 2b 7d e8 bc 56 36 1d 84 dd 3c d1 b9 |....+}..V6...<..|" +peer0.org1.example.com | "2019-09-24 01:04:22.877 UTC [msp.identity] Verify -> DEBU 152 Verify: sig = 00000000 30 45 02 21 00 de d8 cd bb 95 9c cd f5 24 4c 3c |0E.!.........$L<| +peer0.org1.example.com | 00000010 ee 79 74 60 6f 59 67 4b e3 2b 79 a0 2a 29 71 49 |.yt`oYgK.+y.*)qI| +peer0.org1.example.com | 00000020 8b 8e 6a 75 0f 02 20 04 8c 0c 0d 4a 63 7e 38 8f |..ju.. ....Jc~8.| +peer0.org1.example.com | 00000030 36 22 36 98 71 c7 29 de e1 c7 02 88 bf 4e cc ea |6"6.q.)......N..| +peer0.org1.example.com | 00000040 6e 6a e3 8c 22 86 71 |nj..".q|" +peer0.org1.example.com | "2019-09-24 01:04:22.878 UTC [msp.identity] Verify -> DEBU 153 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:22.878 UTC [msp.identity] Verify -> DEBU 154 Verify: sig = 00000000 30 44 02 20 6f 1b 21 cc 7a 8d 81 2f 04 21 e5 8e |0D. o.!.z../.!..| +peer0.org1.example.com | 00000010 51 ed b6 37 f9 a0 6a 65 22 53 4b 0c de ec 9e 42 |Q..7..je"SK....B| +peer0.org1.example.com | 00000020 9d 3a a6 5f 02 20 75 aa 96 9b cf 29 b5 30 66 9d |.:._. u....).0f.| +peer0.org1.example.com | 00000030 be 55 4b 0b 96 57 f2 7a 21 02 c6 60 30 e7 df a3 |.UK..W.z!..`0...| +peer0.org1.example.com | 00000040 8f 06 76 ae 68 3b |..v.h;|" +peer0.org1.example.com | "2019-09-24 01:04:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 155 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.878 UTC [gossip.discovery] isSentByMe -> DEBU 156 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 157 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 158 Verify: digest = 00000000 5a 7a 93 00 75 b6 23 ce 05 2f b0 59 4e 04 5a d1 |Zz..u.#../.YN.Z.| +peer0.org1.example.com | 00000010 8b 3e 10 0a 45 f3 64 4c f7 83 75 e6 a3 7c 70 7c |.>..E.dL..u..|p||" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 159 Verify: sig = 00000000 30 45 02 21 00 cf 4c b7 ac cf 78 44 55 8f 5d 5a |0E.!..L...xDU.]Z| +peer0.org1.example.com | 00000010 87 95 52 09 a4 04 6c 80 e2 19 46 c0 bb 11 4d 52 |..R...l...F...MR| +peer0.org1.example.com | 00000020 33 9b 76 08 57 02 20 59 19 14 28 72 f9 4c b9 fb |3.v.W. Y..(r.L..| +peer0.org1.example.com | 00000030 0a 03 1b c2 29 be 9b f0 2f 66 f4 72 c4 19 b3 59 |....).../f.r...Y| +peer0.org1.example.com | 00000040 ac 37 f3 57 08 cd b1 |.7.W...|" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 15a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 15b Verify: sig = 00000000 30 45 02 21 00 8a 22 41 e0 61 0e 5f 81 3f b6 6a |0E.!.."A.a._.?.j| +peer0.org1.example.com | 00000010 41 9e 47 d4 1f 60 6d 08 90 83 ef f0 87 6b a7 3b |A.G..`m......k.;| +peer0.org1.example.com | 00000020 63 83 10 08 b7 02 20 7b 45 41 d8 c0 58 db 8b dd |c..... {EA..X...| +peer0.org1.example.com | 00000030 ad 8f 87 0f 09 39 86 54 7f 98 f9 33 5e 80 96 79 |.....9.T...3^..y| +peer0.org1.example.com | 00000040 63 d7 ae 8b 51 bf 7b |c...Q.{|" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15f Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 160 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 161 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 162 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:22.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 163 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.526 UTC [gossip.gossip] handleMessage -> DEBU 164 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.527 UTC [gossip.pull] HandleMessage -> DEBU 165 GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.527 UTC [gossip.gossip] handleMessage -> DEBU 166 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.528 UTC [gossip.pull] SendRes -> DEBU 167 Sending 1 IDENTITY_MSG items to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:23.531 UTC [gossip.gossip] handleMessage -> DEBU 168 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.532 UTC [gossip.gossip] handleMessage -> DEBU 169 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.533 UTC [msp.identity] Verify -> DEBU 16b Verify: digest = 00000000 3f 18 18 af 54 dd 3c 26 4a 07 43 c3 4f 46 41 19 |?...T.<&J.C.OFA.| +peer0.org1.example.com | 00000010 40 a4 30 55 79 a8 a1 38 43 e1 d9 8a da e7 1d 4d |@.0Uy..8C......M|" +peer0.org1.example.com | "2019-09-24 01:04:23.533 UTC [msp.identity] Verify -> DEBU 16c Verify: sig = 00000000 30 45 02 21 00 b8 8c 4d c4 8e bc 14 13 9f 2f 97 |0E.!...M....../.| +peer0.org1.example.com | 00000010 8d 12 d1 30 4e 60 44 2e b0 9a 6a 7f b0 5e f5 4e |...0N`D...j..^.N| +peer0.org1.example.com | 00000020 49 6b 73 ff 53 02 20 2e d6 ce 00 dd c8 ad 94 22 |Iks.S. ........"| +peer0.org1.example.com | 00000030 44 4f b5 33 b8 d0 84 80 1a d2 e4 47 8b a7 a2 7b |DO.3.......G...{| +peer0.org1.example.com | 00000040 0b db 02 36 5b 7f c2 |...6[..|" +peer0.org1.example.com | "2019-09-24 01:04:23.534 UTC [msp.identity] Verify -> DEBU 16d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:23.534 UTC [msp.identity] Verify -> DEBU 16e Verify: sig = 00000000 30 44 02 20 54 0b b3 bf 60 0f bb b3 94 f0 67 63 |0D. T...`.....gc| +peer0.org1.example.com | 00000010 d2 7e 17 d4 3c c0 3b 60 fd 50 c2 29 d4 f8 87 71 |.~..<.;`.P.)...q| +peer0.org1.example.com | 00000020 4e 10 87 bf 02 20 21 67 e7 e9 30 96 b2 3d e6 f5 |N.... !g..0..=..| +peer0.org1.example.com | 00000030 26 6c 78 7f 12 6f 43 82 4c 7d 61 e7 a8 7c 09 12 |&lx..oC.L}a..|..| +peer0.org1.example.com | 00000040 f8 7b 02 6a bf 02 |.{.j..|" +peer0.org1.example.com | "2019-09-24 01:04:23.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 16f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 170 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:23.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 171 updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +orderer0.example.com | 2019-09-24 01:04:15.935 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey: TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2019-09-24 01:04:15.937 UTC [localconfig] completeInitialization -> INFO 0ca Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-09-24 01:04:15.949 UTC [bccsp_sw] openKeyStore -> DEBU 0cb KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +orderer0.example.com | "2019-09-24 01:04:15.949 UTC [bccsp] initBCCSP -> DEBU 0cc Initialize BCCSP [SW]" +orderer0.example.com | "2019-09-24 01:04:15.949 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2019-09-24 01:04:15.959 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2019-09-24 01:04:15.965 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2019-09-24 01:04:15.975 UTC [msp] getPemMaterialFromDir -> DEBU 0d0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +orderer0.example.com | "2019-09-24 01:04:15.989 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2019-09-24 01:04:16.005 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +orderer0.example.com | "2019-09-24 01:04:16.055 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2019-09-24 01:04:16.057 UTC [msp] getMspConfig -> DEBU 0d4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2019-09-24 01:04:16.057 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2019-09-24 01:04:16.065 UTC [msp] getPemMaterialFromDir -> DEBU 0d6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2019-09-24 01:04:16.069 UTC [msp] getPemMaterialFromDir -> DEBU 0d7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2019-09-24 01:04:16.069 UTC [msp] getMspConfig -> DEBU 0d8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2019-09-24 01:04:16.069 UTC [msp] getPemMaterialFromDir -> DEBU 0d9 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2019-09-24 01:04:16.070 UTC [msp] getMspConfig -> DEBU 0da crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2019-09-24 01:04:16.071 UTC [msp] getMspConfig -> DEBU 0db MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +orderer0.example.com | "2019-09-24 01:04:16.071 UTC [msp] newBccspMsp -> DEBU 0dc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.072 UTC [msp] New -> DEBU 0dd Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.072 UTC [msp] loadLocaMSP -> DEBU 0de Created new local MSP" +orderer0.example.com | "2019-09-24 01:04:16.072 UTC [msp] Setup -> DEBU 0df Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:16.072 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.072 UTC [msp.identity] newIdentity -> DEBU 0e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.097 UTC [bccsp_sw] loadPrivateKey -> DEBU 0e2 Loading private key [0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f] at [/var/hyperledger/orderer/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk]..." +orderer0.example.com | "2019-09-24 01:04:16.102 UTC [msp.identity] newIdentity -> DEBU 0e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.102 UTC [msp] setupSigningIdentity -> DEBU 0e4 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +peer0.org1.example.com | "2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 172 Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 173 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 174 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 175 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 177 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 178 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 179 Sign: digest: 9CEC1B70556CCF561B469C0BC6D5B347EAB3CDCE5DD91E40FFDDA501A0C5C29F " +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 17b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 17c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:23.865 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17d Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:23.867 UTC [gossip.pull] SendReq -> DEBU 17e Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:23.867 UTC [gossip.comm] Send -> DEBU 17f Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:23.867 UTC [gossip.comm] sendToEndpoint -> DEBU 180 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.867 UTC [gossip.comm] sendToEndpoint -> DEBU 181 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.868 UTC [gossip.gossip] handleMessage -> DEBU 182 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 18374924587763373038, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.869 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +peer0.org1.example.com | 00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..|" +peer0.org1.example.com | "2019-09-24 01:04:23.869 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 57 88 0b 88 0e 64 f3 f4 10 f2 5c f1 |0D. W....d....\.| +peer0.org1.example.com | 00000010 89 c1 c2 46 61 cd 47 7f e0 40 6e 42 89 17 c7 ca |...Fa.G..@nB....| +peer0.org1.example.com | 00000020 58 4c 19 ed 02 20 4a 64 ea 4a e7 be 89 4f 2a 15 |XL... Jd.J...O*.| +peer0.org1.example.com | 00000030 c2 96 d6 da 69 79 ce 7f 3f 36 5d c9 16 de 38 35 |....iy..?6]...85| +peer0.org1.example.com | 00000040 43 2a 40 54 4d 96 |C*@TM.|" +peer0.org1.example.com | "2019-09-24 01:04:23.870 UTC [gossip.pull] HandleMessage -> DEBU 185 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 18374924587763373038, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.870 UTC [gossip.gossip] func2 -> DEBU 186 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 01:04:23.870 UTC [gossip.pull] HandleMessage -> DEBU 187 Added �o��X +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.common.cluster] updateStubInMapping -> INFO 039 Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 01:04:24.190 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03a Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03c 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03d 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.common.cluster] Configure -> INFO 03e Exiting" +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.consensus.etcdraft] start -> INFO 03f Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 040 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.191 UTC [orderer.consensus.etcdraft] newRaft -> INFO 041 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.192 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 042 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.194 UTC [orderer.consensus.etcdraft] apply -> INFO 043 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.194 UTC [orderer.consensus.etcdraft] apply -> INFO 044 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:24.194 UTC [orderer.consensus.etcdraft] apply -> INFO 045 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.251 UTC [orderer.consensus.etcdraft] Step -> INFO 046 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.259 UTC [orderer.consensus.etcdraft] Step -> INFO 047 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.259 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 048 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.259 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.273 UTC [orderer.consensus.etcdraft] run -> INFO 04a raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:25.276 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04b Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:30.966 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04c Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:33.295 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04d Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:04:37.152 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.8:47708 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=4.8001603s +orderer2.example.com | "2019-09-24 01:05:13.987 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:05:16.908 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:05:19.493 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:05:34.190 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2019-09-24 01:05:34.199 UTC [cauthdsl] deduplicate -> WARN 053 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer2.example.com | "2019-09-24 01:05:34.205 UTC [cauthdsl] deduplicate -> WARN 054 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-09-24 01:04:16.103 UTC [msp.identity] newIdentity -> DEBU 0e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.103 UTC [msp] Validate -> DEBU 0e6 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:16.103 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e7 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | General.Authentication.NoExpirationChecks = false +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-09-24 01:04:16.108 UTC [common.channelconfig] NewStandardValues -> DEBU 0e8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ea Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] NewStandardValues -> DEBU 0ee Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f1 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f3 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.109 UTC [common.channelconfig] NewStandardValues -> DEBU 0f5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] NewStandardValues -> DEBU 0f7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] validateMSP -> DEBU 0f9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp] newBccspMsp -> DEBU 0fa Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp] New -> DEBU 0fb Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp] Setup -> DEBU 0fc Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp.identity] newIdentity -> DEBU 0fd Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp.identity] newIdentity -> DEBU 0fe Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [msp] Validate -> DEBU 0ff MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] NewStandardValues -> DEBU 100 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | 8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 2" +peer0.org1.example.com | "2019-09-24 01:04:23.871 UTC [gossip.gossip] handleMessage -> DEBU 188 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:23.872 UTC [gossip.comm] Send -> DEBU 189 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 18a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 18b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:25.661 UTC [endorser] ProcessProposal -> DEBU 18c Entering: request from 172.18.0.5:49804" +peer0.org1.example.com | "2019-09-24 01:04:25.661 UTC [protoutils] ValidateProposalMessage -> DEBU 18d ValidateProposalMessage starts for signed proposal 0xc002839db0" +peer0.org1.example.com | "2019-09-24 01:04:25.661 UTC [protoutils] validateChannelHeader -> DEBU 18e validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 01:04:25.661 UTC [protoutils] checkSignatureFromCreator -> DEBU 18f begin" +peer0.org1.example.com | "2019-09-24 01:04:25.661 UTC [msp] DeserializeIdentity -> DEBU 190 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:25.662 UTC [msp.identity] newIdentity -> DEBU 191 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:25.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 192 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:04:25.662 UTC [msp] Validate -> DEBU 193 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:25.662 UTC [msp] getCertificationChain -> DEBU 194 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 195 creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [msp.identity] Verify -> DEBU 196 Verify: digest = 00000000 8e 86 bb a3 15 c4 12 a0 3d ce 88 07 63 c7 17 c1 |........=...c...| +peer0.org1.example.com | 00000010 c5 d6 f2 3a 78 d7 03 6a 64 db d1 46 7a 77 f9 88 |...:x..jd..Fzw..|" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [msp.identity] Verify -> DEBU 197 Verify: sig = 00000000 30 45 02 21 00 fe b0 fd c8 ef 03 53 cf 9c 73 39 |0E.!.......S..s9| +peer0.org1.example.com | 00000010 dc bb 99 a7 23 10 fe 32 6a 17 fb e5 3f 0a f2 b3 |....#..2j...?...| +peer0.org1.example.com | 00000020 79 a5 8d 67 d1 02 20 4c 5f 72 ad ff 89 b9 fa 46 |y..g.. L_r.....F| +peer0.org1.example.com | 00000030 cb 14 bf 76 f8 ea 7e 15 37 59 42 9b 78 92 eb 97 |...v..~.7YB.x...| +peer0.org1.example.com | 00000040 4a e9 4b 25 ba 1a ff |J.K%...|" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 199 validateChaincodeProposalMessage starts for proposal 0xc00288f0a0, header 0xc00290c6e0" +peer0.org1.example.com | "2019-09-24 01:04:25.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19a validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:25.664 UTC [endorser] preProcess -> DEBU 19b [][0fa9a48c] processing txid: 0fa9a48c09972a34f19aed7fdfc70d0718fba652c1eeca4fd699e846fa16b56b" +peer0.org1.example.com | "2019-09-24 01:04:25.664 UTC [endorser] SimulateProposal -> DEBU 19c [][0fa9a48c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:25.664 UTC [endorser] callChaincode -> INFO 19d [][0fa9a48c] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:25.664 UTC [chaincode] Execute -> DEBU 19e Entry" +peer0.org1.example.com | "2019-09-24 01:04:25.665 UTC [cscc] Invoke -> DEBU 19f Invoke function: JoinChain" +peer0.org1.example.com | "2019-09-24 01:04:25.666 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1a0 Checking if identity has been named explicitly as an admin for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.666 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1a1 Checking if identity carries the admin ou for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.666 UTC [msp] Validate -> DEBU 1a2 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:25.667 UTC [msp] getCertificationChain -> DEBU 1a3 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:25.668 UTC [msp] hasOURole -> DEBU 1a4 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 01:04:25.668 UTC [msp] getCertificationChain -> DEBU 1a5 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:25.669 UTC [msp.identity] Verify -> DEBU 1a6 Verify: digest = 00000000 8e 86 bb a3 15 c4 12 a0 3d ce 88 07 63 c7 17 c1 |........=...c...| +peer0.org1.example.com | 00000010 c5 d6 f2 3a 78 d7 03 6a 64 db d1 46 7a 77 f9 88 |...:x..jd..Fzw..|" +peer0.org1.example.com | "2019-09-24 01:04:25.669 UTC [msp.identity] Verify -> DEBU 1a7 Verify: sig = 00000000 30 45 02 21 00 fe b0 fd c8 ef 03 53 cf 9c 73 39 |0E.!.......S..s9| +peer0.org1.example.com | 00000010 dc bb 99 a7 23 10 fe 32 6a 17 fb e5 3f 0a f2 b3 |....#..2j...?...| +peer0.org1.example.com | 00000020 79 a5 8d 67 d1 02 20 4c 5f 72 ad ff 89 b9 fa 46 |y..g.. L_r.....F| +peer0.org1.example.com | 00000030 cb 14 bf 76 f8 ea 7e 15 37 59 42 9b 78 92 eb 97 |...v..~.7YB.x...| +peer0.org1.example.com | 00000040 4a e9 4b 25 ba 1a ff |J.K%...|" +peer0.org1.example.com | "2019-09-24 01:04:25.669 UTC [ledgermgmt] CreateLedger -> INFO 1a8 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-09-24 01:04:25.671 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1a9 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +peer0.org1.example.com | "2019-09-24 01:04:25.671 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1aa CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +peer0.org1.example.com | "2019-09-24 01:04:25.671 UTC [kvledger.util] logDirStatus -> DEBU 1ab Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:25.672 UTC [kvledger.util] logDirStatus -> DEBU 1ac After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +peer0.org1.example.com | "2019-09-24 01:04:25.672 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ad Getting block information from block storage" +peer0.org1.example.com | "2019-09-24 01:04:25.672 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ae Retrieving checkpoint info from block files" +peer0.org1.example.com | "2019-09-24 01:04:25.672 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1af retrieveLastFileSuffix()" +peer0.org1.example.com | "2019-09-24 01:04:25.673 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1b0 retrieveLastFileSuffix() - biggestFileNum = -1" +peer0.org1.example.com | "2019-09-24 01:04:25.673 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b1 Last file number found = -1" +peer0.org1.example.com | "2019-09-24 01:04:25.673 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b2 No block file found" +peer0.org1.example.com | "2019-09-24 01:04:25.674 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b3 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002869640)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer0.org1.example.com | "2019-09-24 01:04:25.677 UTC [fsblkstorage] newBlockIndex -> DEBU 1b4 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +peer0.org1.example.com | "2019-09-24 01:04:25.679 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1b5 Starting to process collection eligibility events" +peer0.org1.example.com | "2019-09-24 01:04:25.679 UTC [leveldbhelper] GetIterator -> DEBU 1b6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +peer0.org1.example.com | "2019-09-24 01:04:25.679 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1b7 Converted [0] inelligible mising data entries to elligible" +peer0.org1.example.com | "2019-09-24 01:04:25.679 UTC [pvtdatastorage] func1 -> DEBU 1b8 Waiting for collection eligibility event" +peer0.org1.example.com | "2019-09-24 01:04:25.679 UTC [pvtdatastorage] OpenStore -> DEBU 1b9 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +peer0.org1.example.com | "2019-09-24 01:04:25.680 UTC [leveldbhelper] GetIterator -> DEBU 1ba Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +peer0.org1.example.com | "2019-09-24 01:04:25.680 UTC [kvledger] newKVLedger -> DEBU 1bb Creating KVLedger ledgerID=businesschannel: " +peer0.org1.example.com | "2019-09-24 01:04:25.681 UTC [kvledger] lastPersistedCommitHash -> DEBU 1bc Chain is empty" +peer0.org1.example.com | "2019-09-24 01:04:25.681 UTC [kvledger] newKVLedger -> DEBU 1bd Register state db for chaincode lifecycle events: false" +peer0.org1.example.com | "2019-09-24 01:04:25.681 UTC [kvledger] recoverDBs -> DEBU 1be Entering recoverDB()" +peer0.org1.example.com | "2019-09-24 01:04:25.682 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1bf Block storage is empty." +peer0.org1.example.com | "2019-09-24 01:04:25.682 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c0 [businesschannel:] Filtering pvtData of invalidation transactions" +peer0.org1.example.com | "2019-09-24 01:04:25.682 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c1 [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +peer0.org1.example.com | "2019-09-24 01:04:25.682 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c2 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:04:25.682 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c3 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +peer0.org1.example.com | "2019-09-24 01:04:25.683 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c4 Constructing unique pvtData by removing duplicate entries" +peer0.org1.example.com | "2019-09-24 01:04:25.683 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c5 [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +peer0.org1.example.com | "2019-09-24 01:04:25.686 UTC [kvledger] CommitWithPvtData -> DEBU 1c6 [businesschannel] Validating state for block [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.686 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c7 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:04:25.686 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c8 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:04:25.687 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c9 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:04:25.687 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ca ValidateAndPrepareBatch() for block number = [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.687 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1cb preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:25.687 UTC [valimpl] preprocessProtoBlock -> DEBU 1cc txType=CONFIG" +peer0.org1.example.com | "2019-09-24 01:04:25.687 UTC [valimpl] processNonEndorserTx -> DEBU 1cd Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 01:04:25.688 UTC [valimpl] processNonEndorserTx -> DEBU 1ce Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 01:04:25.688 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1cf constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:25.688 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1d0 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 01:04:25.689 UTC [peer] GenerateSimulationResults -> DEBU 1d1 Processing CONFIG" +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [common.channelconfig] validateMSP -> DEBU 10b Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] newBccspMsp -> DEBU 10c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] New -> DEBU 10d Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp] Setup -> DEBU 10e Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.111 UTC [msp.identity] newIdentity -> DEBU 10f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.112 UTC [msp] Setup -> DEBU 110 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:16.112 UTC [msp] Setup -> DEBU 111 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:16.112 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 113 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 114 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 115 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 116 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 117 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 118 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 119 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] GetPolicy -> DEBU 123 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] GetPolicy -> DEBU 125 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.113 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:16.115 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:16.116 UTC [orderer.common.server] createLedgerFactory -> DEBU 14e Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2019-09-24 01:04:16.117 UTC [kvledger.util] CreateDirIfMissing -> DEBU 14f CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2019-09-24 01:04:16.117 UTC [kvledger.util] logDirStatus -> DEBU 150 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2019-09-24 01:04:16.117 UTC [kvledger.util] logDirStatus -> DEBU 151 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [peer] processChannelConfigTx -> DEBU 1d2 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1d3 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [lockbasedtxmgr] Done -> DEBU 1d4 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1d5 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [valinternal] ApplyWriteSet -> DEBU 1d6 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a26540)}" +peer0.org1.example.com | "2019-09-24 01:04:25.690 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d7 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:04:25.691 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d8 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:25.691 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d9 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:04:25.691 UTC [kvledger] CommitWithPvtData -> DEBU 1da [businesschannel] Adding CommitHash to the block [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.691 UTC [kvledger] CommitWithPvtData -> DEBU 1db [businesschannel] Committing block [0] to storage" +peer0.org1.example.com | "2019-09-24 01:04:25.692 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1dc Writing block [0] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:04:25.694 UTC [pvtdatastorage] Prepare -> DEBU 1dd Saved 0 private data write sets for block [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1de Indexing block [blockNum=0, blockHash=[]byte{0x2f, 0xbc, 0x19, 0xc6, 0x1e, 0x52, 0xc5, 0x88, 0xe6, 0x4e, 0xa4, 0x19, 0xae, 0x2b, 0x7c, 0x3f, 0x7, 0x35, 0xa0, 0xe4, 0x28, 0x1e, 0xc1, 0x63, 0xa9, 0x5f, 0x8c, 0xba, 0xac, 0xe2, 0x90, 0xc5} txOffsets= +peer0.org1.example.com | txId=ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551 locPointer=offset=39, bytesLength=25762 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1df Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25762] for tx ID: [ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551] to txid-index" +peer0.org1.example.com | "2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1e0 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25762] for tx number:[0] ID: [ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:04:25.697 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25808], isChainEmpty=[false], lastBlockNumber=[0]" +peer0.org1.example.com | "2019-09-24 01:04:25.697 UTC [pvtdatastorage] Commit -> DEBU 1e2 Committing private data for block [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.699 UTC [pvtdatastorage] Commit -> DEBU 1e3 Committed private data for block [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.699 UTC [kvledger] CommitWithPvtData -> DEBU 1e4 [businesschannel] Committing block [0] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:04:25.699 UTC [pvtdatastorage] func1 -> DEBU 1e5 Purger started: Purging expired private data till block number [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 1e6 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1e7 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [leveldbhelper] GetIterator -> DEBU 1e8 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [pvtdatastorage] func1 -> DEBU 1e9 Purger finished" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ea Preparing potential purge list working-set for expiringAtBlk [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [leveldbhelper] GetIterator -> DEBU 1eb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1ec Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ed No expiry entry found for expiringAtBlk [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1ee Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1ef Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:25.700 UTC [stateleveldb] ApplyUpdates -> DEBU 1f0 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [lockbasedtxmgr] Commit -> DEBU 1f1 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1f2 Preparing potential purge list working-set for expiringAtBlk [1]" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [leveldbhelper] GetIterator -> DEBU 1f3 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1f4 No expiry entry found for expiringAtBlk [1]" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [lockbasedtxmgr] func1 -> DEBU 1f5 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [kvledger] CommitWithPvtData -> DEBU 1f6 [businesschannel] Committing block [0] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [historyleveldb] Commit -> DEBU 1f7 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:04:25.702 UTC [historyleveldb] Commit -> DEBU 1f8 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 01:04:25.703 UTC [historyleveldb] Commit -> DEBU 1f9 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +peer0.org1.example.com | "2019-09-24 01:04:25.703 UTC [kvledger] CommitWithPvtData -> INFO 1fa [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[]" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [ledgermgmt] CreateLedger -> INFO 1fb Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fc constructing new query executor txid = [957956d9-4be1-4b43-9b49-8b325c1bda27]" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [stateleveldb] GetState -> DEBU 1fd GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [lockbasedtxmgr] Done -> DEBU 1fe Done with transaction simulation / query execution [957956d9-4be1-4b43-9b49-8b325c1bda27]" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 1ff Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 200 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 201 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 203 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 205 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 206 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 208 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 209 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 20a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 20b Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] Validate -> DEBU 20c Anchor peers for org Org1MSP are " +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] validateMSP -> DEBU 20d Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] newBccspMsp -> DEBU 20e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] New -> DEBU 20f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] Setup -> DEBU 210 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp.identity] newIdentity -> DEBU 211 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] NewStandardValues -> DEBU 212 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 213 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] NewStandardValues -> DEBU 214 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 215 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] Validate -> DEBU 216 Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [common.channelconfig] validateMSP -> DEBU 217 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] newBccspMsp -> DEBU 218 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] New -> DEBU 219 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.706 UTC [msp] Setup -> DEBU 21a Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [msp.identity] newIdentity -> DEBU 21b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 21c Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21d Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21e Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21f Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 220 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 221 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 222 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 223 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 224 Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 225 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 226 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [common.channelconfig] validateMSP -> DEBU 227 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [msp] newBccspMsp -> DEBU 228 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [msp] New -> DEBU 229 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [msp] Setup -> DEBU 22a Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:04:25.707 UTC [msp.identity] newIdentity -> DEBU 22b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | 1g== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:25.708 UTC [msp.identity] newIdentity -> DEBU 22c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:25.708 UTC [msp] Validate -> DEBU 22d MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:25.708 UTC [msp] Setup -> DEBU 22e Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 01:04:25.708 UTC [msp] Setup -> DEBU 22f MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 01:04:25.708 UTC [policies] NewManagerImpl -> DEBU 230 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 231 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 232 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 233 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 234 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 235 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 236 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 237 Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 238 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 239 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23a Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:16.127 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 152 Bootstrapping because no existing channels" +orderer0.example.com | "2019-09-24 01:04:16.127 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 153 Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [common.channelconfig] NewStandardValues -> DEBU 163 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [common.channelconfig] validateMSP -> DEBU 165 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [msp] newBccspMsp -> DEBU 166 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [msp] New -> DEBU 167 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [msp] Setup -> DEBU 168 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:16.129 UTC [msp.identity] newIdentity -> DEBU 169 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [msp] Validate -> DEBU 16b MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [common.channelconfig] NewStandardValues -> DEBU 16e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [common.channelconfig] validateMSP -> DEBU 170 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [msp] newBccspMsp -> DEBU 171 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [msp] New -> DEBU 172 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.131 UTC [msp] Setup -> DEBU 173 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.132 UTC [msp.identity] newIdentity -> DEBU 174 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.134 UTC [common.channelconfig] NewStandardValues -> DEBU 175 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.135 UTC [common.channelconfig] validateMSP -> DEBU 177 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.136 UTC [msp] newBccspMsp -> DEBU 178 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.136 UTC [msp] New -> DEBU 179 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.136 UTC [msp] Setup -> DEBU 17a Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.136 UTC [msp.identity] newIdentity -> DEBU 17b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [msp] Setup -> DEBU 17c Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [msp] Setup -> DEBU 17d MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] GetPolicy -> DEBU 18e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] GetPolicy -> DEBU 190 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:16.172 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ba Booted with a genesis block, replication isn't an option" +orderer0.example.com | "2019-09-24 01:04:16.189 UTC [orderer.common.server] initializeServerConfig -> INFO 1bb Starting orderer with TLS enabled" +orderer0.example.com | "2019-09-24 01:04:16.190 UTC [orderer.common.server] configureClusterListener -> INFO 1bc Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1bd newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1be CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [kvledger.util] logDirStatus -> DEBU 1bf Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [kvledger.util] logDirStatus -> DEBU 1c0 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [fsblkstorage] newBlockfileMgr -> INFO 1c1 Getting block information from block storage" +orderer0.example.com | "2019-09-24 01:04:16.193 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c2 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-09-24 01:04:16.194 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c3 retrieveLastFileSuffix()" +orderer0.example.com | "2019-09-24 01:04:16.194 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c4 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-09-24 01:04:16.194 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c5 Last file number found = -1" +orderer0.example.com | "2019-09-24 01:04:16.194 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c6 No block file found" +orderer0.example.com | "2019-09-24 01:04:16.197 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c7 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0001bd1a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-09-24 01:04:16.199 UTC [fsblkstorage] newBlockIndex -> DEBU 1c8 newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-09-24 01:04:16.202 UTC [fsblkstorage] indexBlock -> DEBU 1c9 Indexing block [blockNum=0, blockHash=[]byte{0x25, 0x7e, 0xab, 0xd8, 0x68, 0xeb, 0xd9, 0xbd, 0xb4, 0x4, 0xcd, 0x1e, 0x16, 0xe1, 0x4, 0xc6, 0x94, 0x35, 0x21, 0xbd, 0x47, 0x20, 0x58, 0xe2, 0xd8, 0x22, 0x71, 0x56, 0x47, 0x67, 0xc6, 0xc1} txOffsets= +orderer0.example.com | txId=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 locPointer=offset=39, bytesLength=20242 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:16.204 UTC [fsblkstorage] updateCheckpoint -> DEBU 1ca Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[20287], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-09-24 01:04:16.205 UTC [common.channelconfig] NewStandardValues -> DEBU 1cb Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d3 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23b Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23c Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23d Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 240 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 241 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 242 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 243 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 244 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 245 Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 246 Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:25.709 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 251 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 252 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 253 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 254 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 255 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 256 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 257 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 258 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 259 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25b Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25c Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 260 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 261 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 262 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 263 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 264 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 265 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 266 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 267 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 268 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 269 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26a Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26b Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26c Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26d Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26f Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 270 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.configtx] addToMap -> DEBU 271 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.configtx] addToMap -> DEBU 272 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.capabilities] Supported -> DEBU 273 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.capabilities] Supported -> DEBU 274 Channel capability V1_4_3 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.channelconfig] LogSanityChecks -> DEBU 275 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [common.channelconfig] LogSanityChecks -> DEBU 276 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:25.720 UTC [policies] Manager -> DEBU 277 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 278 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 279 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27a Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27b Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27c Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27d As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27e As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27f As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 280 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 281 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 282 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 283 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 284 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 285 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 286 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 287 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 288 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.service] ProcessConfigUpdate -> DEBU 289 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.service] ProcessConfigUpdate -> DEBU 28a Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28b Org1MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28c Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28d Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.gossip] JoinChan -> INFO 28e Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.gossip] learnAnchorPeers -> INFO 28f No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [gossip.gossip] learnAnchorPeers -> INFO 290 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 01:04:25.722 UTC [peer] updateTrustedRoots -> DEBU 291 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.737 UTC [peer] buildTrustedRootsForChain -> DEBU 292 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 293 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 294 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 295 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 01:04:25.739 UTC [kvledger.util] CreateDirIfMissing -> DEBU 296 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +peer0.org1.example.com | "2019-09-24 01:04:25.739 UTC [kvledger.util] logDirStatus -> DEBU 297 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +peer0.org1.example.com | "2019-09-24 01:04:25.740 UTC [kvledger.util] logDirStatus -> DEBU 298 After creating dir - [/var/hyperledger/production/transientStore/] exists" +peer0.org1.example.com | "2019-09-24 01:04:25.751 UTC [gossip.service] InitializeChannel -> DEBU 299 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.753 UTC [msp] GetDefaultSigningIdentity -> DEBU 29a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:25.753 UTC [msp.identity] Sign -> DEBU 29b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +peer0.org1.example.com | "2019-09-24 01:04:25.753 UTC [msp.identity] Sign -> DEBU 29c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +peer0.org1.example.com | "2019-09-24 01:04:25.754 UTC [gossip.privdata] NewReconciler -> DEBU 29d Private data reconciliation is enabled" +peer0.org1.example.com | "2019-09-24 01:04:25.757 UTC [gossip.state] NewGossipStateProvider -> INFO 29e Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-09-24 01:04:25.757 UTC [gossip.state] NewGossipStateProvider -> DEBU 29f Updating gossip ledger height to 1" +peer0.org1.example.com | "2019-09-24 01:04:25.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:25.758 UTC [msp.identity] Sign -> DEBU 2a1 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020801 " +peer0.org1.example.com | "2019-09-24 01:04:25.758 UTC [msp.identity] Sign -> DEBU 2a2 Sign: digest: C6683BE853D565E431E2E27D6D9AB1A500773910996A866C5B6477689A162499 " +peer0.org1.example.com | "2019-09-24 01:04:25.758 UTC [gossip.service] InitializeChannel -> DEBU 2a3 Delivery uses dynamic leader election mechanism, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.759 UTC [peer] InitChain -> DEBU 2a4 Initializing channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.759 UTC [nodeCmd] func6 -> DEBU 2a5 Deploying system CC, for channel " +peer0.org1.example.com | "2019-09-24 01:04:25.759 UTC [gossip.election] handleMessages -> DEBU 2a7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:25.759 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2a6 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:25.760 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a8 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:25.760 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a9 constructing new tx simulator txid = [638d9655-8058-4978-98f9-0a293f945ce1]" +peer0.org1.example.com | "2019-09-24 01:04:25.760 UTC [chaincode] Execute -> DEBU 2aa Entry" +peer0.org1.example.com | "2019-09-24 01:04:25.760 UTC [chaincode] handleMessage -> DEBU 2ab [638d9655] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:25.761 UTC [chaincode] Notify -> DEBU 2ac [638d9655] notifying Txid:638d9655-8058-4978-98f9-0a293f945ce1, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.761 UTC [chaincode] Execute -> DEBU 2ad Exit" +peer0.org1.example.com | "2019-09-24 01:04:25.761 UTC [sccapi] deploySysCC -> INFO 2ae system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:25.761 UTC [lockbasedtxmgr] Done -> DEBU 2af Done with transaction simulation / query execution [638d9655-8058-4978-98f9-0a293f945ce1]" +peer0.org1.example.com | "2019-09-24 01:04:25.761 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b0 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:25.762 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b1 constructing new tx simulator txid = [f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e]" +peer0.org1.example.com | "2019-09-24 01:04:25.762 UTC [chaincode] Execute -> DEBU 2b2 Entry" +peer0.org1.example.com | "2019-09-24 01:04:25.762 UTC [cscc] Init -> INFO 2b3 Init CSCC" +peer0.org1.example.com | "2019-09-24 01:04:25.762 UTC [chaincode] handleMessage -> DEBU 2b4 [f9e35f71] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:25.763 UTC [chaincode] Notify -> DEBU 2b5 [f9e35f71] notifying Txid:f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.763 UTC [chaincode] Execute -> DEBU 2b6 Exit" +peer0.org1.example.com | "2019-09-24 01:04:25.763 UTC [sccapi] deploySysCC -> INFO 2b7 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:25.763 UTC [lockbasedtxmgr] Done -> DEBU 2b8 Done with transaction simulation / query execution [f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e]" +peer0.org1.example.com | "2019-09-24 01:04:25.763 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b9 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:25.764 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2ba constructing new tx simulator txid = [053fbb7b-6f84-47dd-94e8-03f558f80f47]" +peer0.org1.example.com | "2019-09-24 01:04:25.764 UTC [chaincode] Execute -> DEBU 2bb Entry" +peer0.org1.example.com | "2019-09-24 01:04:25.764 UTC [qscc] Init -> INFO 2bc Init QSCC" +peer0.org1.example.com | "2019-09-24 01:04:25.764 UTC [chaincode] handleMessage -> DEBU 2bd [053fbb7b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:25.764 UTC [chaincode] Notify -> DEBU 2be [053fbb7b] notifying Txid:053fbb7b-6f84-47dd-94e8-03f558f80f47, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:25.765 UTC [chaincode] Execute -> DEBU 2bf Exit" +peer0.org1.example.com | "2019-09-24 01:04:25.765 UTC [sccapi] deploySysCC -> INFO 2c0 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-09-24 01:04:25.765 UTC [lockbasedtxmgr] Done -> DEBU 2c1 Done with transaction simulation / query execution [053fbb7b-6f84-47dd-94e8-03f558f80f47]" +peer0.org1.example.com | "2019-09-24 01:04:25.765 UTC [sccapi] deploySysCC -> INFO 2c2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +peer0.org1.example.com | "2019-09-24 01:04:25.765 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2c3 constructing new query executor txid = [11e7aafd-9a80-4de9-bbd4-f6e8514966e7]" +peer0.org1.example.com | "2019-09-24 01:04:25.766 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2c4 Returning []" +peer0.org1.example.com | "2019-09-24 01:04:25.766 UTC [lockbasedtxmgr] Done -> DEBU 2c5 Done with transaction simulation / query execution [11e7aafd-9a80-4de9-bbd4-f6e8514966e7]" +peer0.org1.example.com | "2019-09-24 01:04:25.766 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:25.766 UTC [msp.identity] Sign -> DEBU 2c7 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020801 " +peer0.org1.example.com | "2019-09-24 01:04:25.767 UTC [msp.identity] Sign -> DEBU 2c8 Sign: digest: E131F7E7888DCCC272F6314434C9524AC7074B63C2A5EE0F2504861E522C4A2D " +peer0.org1.example.com | "2019-09-24 01:04:25.767 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2c9 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-09-24 01:04:25.767 UTC [chaincode] handleMessage -> DEBU 2ca [0fa9a48c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:25.767 UTC [chaincode] Notify -> DEBU 2cb [0fa9a48c] notifying Txid:0fa9a48c09972a34f19aed7fdfc70d0718fba652c1eeca4fd699e846fa16b56b, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:25.768 UTC [chaincode] Execute -> DEBU 2cc Exit" +peer0.org1.example.com | "2019-09-24 01:04:25.768 UTC [endorser] callChaincode -> INFO 2cd [][0fa9a48c] Exit chaincode: name:"cscc" (104ms)" +peer0.org1.example.com | "2019-09-24 01:04:25.768 UTC [endorser] SimulateProposal -> DEBU 2ce [][0fa9a48c] Exit" +peer0.org1.example.com | "2019-09-24 01:04:25.768 UTC [endorser] func1 -> DEBU 2cf Exit: request from 172.18.0.5:49804" +peer0.org1.example.com | "2019-09-24 01:04:25.768 UTC [comm.grpc.server] 1 -> INFO 2d0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49804 grpc.code=OK grpc.call_duration=108.5891ms +peer0.org1.example.com | "2019-09-24 01:04:25.775 UTC [grpc] infof -> DEBU 2d1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:26.525 UTC [gossip.gossip] handleMessage -> DEBU 2d2 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.525 UTC [gossip.pull] HandleMessage -> DEBU 2d3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.525 UTC [gossip.pull] SendDigest -> DEBU 2d4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:26.525 UTC [gossip.gossip] handleMessage -> DEBU 2d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.527 UTC [gossip.gossip] handleMessage -> DEBU 2d6 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > > , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.527 UTC [gossip.gossip] handleMessage -> DEBU 2d7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8 Got message: GossipMessage: tag:EMPTY mem_req:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > > , Envelope: 1099 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2d9 Verify: digest = 00000000 18 1b 9b e4 e2 ee e7 21 9a 3e 0c 66 f7 7c 95 57 |.......!.>.f.|.W| +peer0.org1.example.com | 00000010 ce 93 38 d0 36 3b 71 0c af 1b b4 de 50 db 91 a2 |..8.6;q.....P...|" +peer0.org1.example.com | "2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2da Verify: sig = 00000000 30 45 02 21 00 f5 13 72 47 67 dc 00 ea dd da 48 |0E.!...rGg.....H| +peer0.org1.example.com | 00000010 20 0c e7 8e b3 46 b9 ea e3 a3 75 cd 2a b2 69 7c | ....F....u.*.i|| +peer0.org1.example.com | 00000020 a8 2e 8e 8e 3c 02 20 4a f7 ab 74 17 9b df 56 16 |....<. J..t...V.| +peer0.org1.example.com | 00000030 d2 c4 0d c7 67 9b 34 ca 49 9c 55 e1 16 92 ba 3b |....g.4.I.U....;| +peer0.org1.example.com | 00000040 dc 93 70 f8 fd a7 f7 |..p....|" +peer0.org1.example.com | "2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2db Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2dc Verify: sig = 00000000 30 45 02 21 00 9b 84 82 d1 69 c3 2b 40 8b d2 c9 |0E.!.....i.+@...| +peer0.org1.example.com | 00000010 bb 62 b5 b7 c5 3e f6 2e 02 94 0c 9e 2c 58 92 98 |.b...>......,X..| +peer0.org1.example.com | 00000020 37 5a da 9a d4 02 20 54 37 f4 ff 28 10 85 19 e6 |7Z.... T7..(....| +peer0.org1.example.com | 00000030 93 97 45 a7 08 1b 53 ce 6d d6 09 99 0f 7a 30 05 |..E...S.m....z0.| +peer0.org1.example.com | 00000040 64 b9 6f 0a 50 e4 92 |d.o.P..|" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0 Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] sendMemResponse -> DEBU 2e5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.comm] Send -> DEBU 2e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.discovery] sendMemResponse -> DEBU 2e7 Exiting, replying with alive:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > alive:\326E\306\312" secret_envelope: > " +peer0.org1.example.com | "2019-09-24 01:04:26.529 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.714 UTC [endorser] ProcessProposal -> DEBU 2ea Entering: request from 172.18.0.5:49812" +peer0.org1.example.com | "2019-09-24 01:04:26.714 UTC [protoutils] ValidateProposalMessage -> DEBU 2eb ValidateProposalMessage starts for signed proposal 0xc0003e3cc0" +peer0.org1.example.com | "2019-09-24 01:04:26.715 UTC [protoutils] validateChannelHeader -> DEBU 2ec validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ed begin" +peer0.org1.example.com | "2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ee creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ef creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:26.716 UTC [msp.identity] Verify -> DEBU 2f0 Verify: digest = 00000000 61 12 37 db cc e7 15 e1 38 89 49 19 c9 de 16 ed |a.7.....8.I.....| +peer0.org1.example.com | 00000010 bb 2e 8c 2d 52 16 0a 38 e0 e1 37 3b 66 71 80 f4 |...-R..8..7;fq..|" +peer0.org1.example.com | "2019-09-24 01:04:26.716 UTC [msp.identity] Verify -> DEBU 2f1 Verify: sig = 00000000 30 45 02 21 00 d2 7b b5 08 af 46 87 18 00 5f cc |0E.!..{...F..._.| +peer0.org1.example.com | 00000010 01 a4 50 f0 c0 aa 62 a7 6e c7 b5 a9 a3 b5 5e aa |..P...b.n.....^.| +peer0.org1.example.com | 00000020 fd 44 33 68 ed 02 20 60 86 b9 c1 93 ce c5 9c 5c |.D3h.. `.......\| +peer0.org1.example.com | 00000030 23 86 09 68 96 f4 fb d8 93 9f 89 2a 11 50 6d ad |#..h.......*.Pm.| +peer0.org1.example.com | 00000040 dc f7 c4 e6 62 0a 11 |....b..|" +peer0.org1.example.com | "2019-09-24 01:04:26.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f2 exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:26.716 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2f3 validateChaincodeProposalMessage starts for proposal 0xc00012a0e0, header 0xc0024820f0" +peer0.org1.example.com | "2019-09-24 01:04:26.716 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2f4 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:26.717 UTC [endorser] preProcess -> DEBU 2f5 [][805b1cf4] processing txid: 805b1cf4866a1b94f5e8023fb57cd89be24c284e163a5b8e5eee1fb52db99783" +peer0.org1.example.com | "2019-09-24 01:04:26.717 UTC [endorser] SimulateProposal -> DEBU 2f6 [][805b1cf4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:26.717 UTC [endorser] callChaincode -> INFO 2f7 [][805b1cf4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:04:26.717 UTC [chaincode] Execute -> DEBU 2f8 Entry" +peer0.org1.example.com | "2019-09-24 01:04:26.718 UTC [cscc] Invoke -> DEBU 2f9 Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 01:04:26.718 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2fa Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:26.718 UTC [msp] Validate -> DEBU 2fb MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:26.719 UTC [msp] getCertificationChain -> DEBU 2fc MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:26.719 UTC [msp.identity] Verify -> DEBU 2fd Verify: digest = 00000000 61 12 37 db cc e7 15 e1 38 89 49 19 c9 de 16 ed |a.7.....8.I.....| +peer0.org1.example.com | 00000010 bb 2e 8c 2d 52 16 0a 38 e0 e1 37 3b 66 71 80 f4 |...-R..8..7;fq..|" +peer0.org1.example.com | "2019-09-24 01:04:26.720 UTC [msp.identity] Verify -> DEBU 2fe Verify: sig = 00000000 30 45 02 21 00 d2 7b b5 08 af 46 87 18 00 5f cc |0E.!..{...F..._.| +peer0.org1.example.com | 00000010 01 a4 50 f0 c0 aa 62 a7 6e c7 b5 a9 a3 b5 5e aa |..P...b.n.....^.| +peer0.org1.example.com | 00000020 fd 44 33 68 ed 02 20 60 86 b9 c1 93 ce c5 9c 5c |.D3h.. `.......\| +peer0.org1.example.com | 00000030 23 86 09 68 96 f4 fb d8 93 9f 89 2a 11 50 6d ad |#..h.......*.Pm.| +peer0.org1.example.com | 00000040 dc f7 c4 e6 62 0a 11 |....b..|" +peer0.org1.example.com | "2019-09-24 01:04:26.720 UTC [chaincode] handleMessage -> DEBU 2ff [805b1cf4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:26.720 UTC [chaincode] Notify -> DEBU 300 [805b1cf4] notifying Txid:805b1cf4866a1b94f5e8023fb57cd89be24c284e163a5b8e5eee1fb52db99783, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:26.721 UTC [chaincode] Execute -> DEBU 301 Exit" +peer0.org1.example.com | "2019-09-24 01:04:26.721 UTC [endorser] callChaincode -> INFO 302 [][805b1cf4] Exit chaincode: name:"cscc" (4ms)" +peer0.org1.example.com | "2019-09-24 01:04:26.721 UTC [endorser] SimulateProposal -> DEBU 303 [][805b1cf4] Exit" +peer0.org1.example.com | "2019-09-24 01:04:26.725 UTC [endorser] func1 -> DEBU 304 Exit: request from 172.18.0.5:49812" +peer0.org1.example.com | "2019-09-24 01:04:26.726 UTC [comm.grpc.server] 1 -> INFO 305 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49812 grpc.code=OK grpc.call_duration=11.7387ms +peer0.org1.example.com | "2019-09-24 01:04:26.729 UTC [grpc] warningf -> DEBU 306 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49812: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:04:26.729 UTC [grpc] infof -> DEBU 307 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:26.760 UTC [gossip.election] waitForMembershipStabilization -> DEBU 308 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting, peers found 1" +peer0.org1.example.com | "2019-09-24 01:04:26.760 UTC [gossip.election] leaderElection -> DEBU 309 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:26.761 UTC [gossip.election] propose -> DEBU 30a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:26.761 UTC [gossip.election] propose -> DEBU 30b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.761 UTC [msp] GetDefaultSigningIdentity -> DEBU 30c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:26.761 UTC [msp.identity] Sign -> DEBU 30d Sign: plaintext: 120F627573696E6573736368616E6E65...E31F120C08F4AAA7C9D9C8CEE3151001 " +peer0.org1.example.com | "2019-09-24 01:04:26.761 UTC [msp.identity] Sign -> DEBU 30e Sign: digest: FF06CAAFDF4977F4871EF8D7E5F8C245971B93C6F3C0F09EBF814ECA99201AFF " +peer0.org1.example.com | "2019-09-24 01:04:26.762 UTC [gossip.election] waitForInterrupt -> DEBU 30f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:26.867 UTC [gossip.pull] Hello -> DEBU 310 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:26.867 UTC [gossip.comm] Send -> DEBU 311 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:26.868 UTC [gossip.comm] sendToEndpoint -> DEBU 312 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.868 UTC [gossip.comm] sendToEndpoint -> DEBU 313 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.870 UTC [gossip.gossip] handleMessage -> DEBU 314 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.871 UTC [gossip.pull] HandleMessage -> DEBU 315 GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.871 UTC [gossip.gossip] handleMessage -> DEBU 316 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.873 UTC [msp] GetDefaultSigningIdentity -> DEBU 317 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:26.873 UTC [msp.identity] Sign -> DEBU 318 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:04:26.873 UTC [msp.identity] Sign -> DEBU 319 Sign: digest: 8EA726AFA067356E11C06B650B9CBED8CA4AB1EDD475507AC1F759B195DF9445 " +peer0.org1.example.com | "2019-09-24 01:04:26.874 UTC [msp] GetDefaultSigningIdentity -> DEBU 31a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:26.874 UTC [msp.identity] Sign -> DEBU 31b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:26.874 UTC [msp.identity] Sign -> DEBU 31c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:26.875 UTC [gossip.comm] Send -> DEBU 31d Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:26.876 UTC [gossip.comm] sendToEndpoint -> DEBU 31e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.877 UTC [gossip.comm] sendToEndpoint -> DEBU 31f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.879 UTC [gossip.gossip] handleMessage -> DEBU 320 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.879 UTC [gossip.gossip] handleMessage -> DEBU 321 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 322 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 323 Verify: digest = 00000000 8e a7 26 af a0 67 35 6e 11 c0 6b 65 0b 9c be d8 |..&..g5n..ke....| +peer0.org1.example.com | 00000010 ca 4a b1 ed d4 75 50 7a c1 f7 59 b1 95 df 94 45 |.J...uPz..Y....E|" +peer0.org1.example.com | "2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 324 Verify: sig = 00000000 30 45 02 21 00 be 4e 0e 8b e1 35 1e c8 23 08 36 |0E.!..N...5..#.6| +peer0.org1.example.com | 00000010 92 cf c7 b5 a9 1e fc 44 bd 0c cc 04 32 07 30 24 |.......D....2.0$| +peer0.org1.example.com | 00000020 04 7a 9c bb 18 02 20 0c a8 5e f1 46 8c e0 d8 ae |.z.... ..^.F....| +peer0.org1.example.com | 00000030 c6 2e 1b 7c 03 07 72 ca c7 c9 2a f3 e4 e3 70 d6 |...|..r...*...p.| +peer0.org1.example.com | 00000040 cc 8b 81 b3 a2 e1 78 |......x|" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d5 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1da Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [common.channelconfig] validateMSP -> DEBU 1dc Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [msp] newBccspMsp -> DEBU 1dd Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.211 UTC [msp] New -> DEBU 1de Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.212 UTC [msp] Setup -> DEBU 1df Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:16.212 UTC [msp.identity] newIdentity -> DEBU 1e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.212 UTC [msp.identity] newIdentity -> DEBU 1e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.212 UTC [msp] Validate -> DEBU 1e2 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1e3 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [common.channelconfig] validateMSP -> DEBU 1e7 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [msp] newBccspMsp -> DEBU 1e8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [msp] New -> DEBU 1e9 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [msp] Setup -> DEBU 1ea Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.213 UTC [msp.identity] newIdentity -> DEBU 1eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [common.channelconfig] validateMSP -> DEBU 1ee Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [msp] newBccspMsp -> DEBU 1ef Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [msp] New -> DEBU 1f0 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [msp] Setup -> DEBU 1f1 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.214 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [msp] Setup -> DEBU 1f3 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [msp] Setup -> DEBU 1f4 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 325 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 326 Verify: sig = 00000000 30 45 02 21 00 e6 a8 09 3d e8 9a 55 4a ab c4 d2 |0E.!....=..UJ...| +peer0.org1.example.com | 00000010 3b 18 b1 af b7 5f 76 5b 9d 96 62 7d 87 7b ab 67 |;...._v[..b}.{.g| +peer0.org1.example.com | 00000020 9d 8d 4d 22 e3 02 20 1e 31 84 ad 2e 0f 74 39 ca |..M".. .1....t9.| +peer0.org1.example.com | 00000030 5a a5 3f 25 57 fb d8 94 c9 9c b5 b9 aa 4c 4b e4 |Z.?%W........LK.| +peer0.org1.example.com | 00000040 cf 1e f2 dd 5c 7b b4 |....\{.|" +peer0.org1.example.com | "2019-09-24 01:04:26.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 327 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.881 UTC [gossip.discovery] isSentByMe -> DEBU 328 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:26.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 329 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:26.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:28.583 UTC [gossip.gossip] handleMessage -> DEBU 32b Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:28.583 UTC [gossip.gossip] handleMessage -> DEBU 32c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:28.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:28.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32e Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 32f Verify: digest = 00000000 e7 0a 65 09 05 f7 f2 33 9e 11 63 ee 5e 8a a3 16 |..e....3..c.^...| +peer0.org1.example.com | 00000010 b0 ac 62 bb e2 ce b8 40 c9 ec 4c 48 ec 8c 08 fd |..b....@..LH....|" +peer0.org1.example.com | "2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 330 Verify: sig = 00000000 30 45 02 21 00 cd 55 ab 1f b0 44 21 fb 71 ae 72 |0E.!..U...D!.q.r| +peer0.org1.example.com | 00000010 2e 4e 85 c6 de ab 53 6a 3a 1f 9a 2a d3 72 ed 6f |.N....Sj:..*.r.o| +peer0.org1.example.com | 00000020 c8 ff 7e c8 d2 02 20 6b 2d ec d8 e8 bc 51 3d 94 |..~... k-....Q=.| +peer0.org1.example.com | 00000030 4b d2 6c 97 34 50 95 58 97 07 9d a6 5f f4 67 0a |K.l.4P.X...._.g.| +peer0.org1.example.com | 00000040 85 2f b8 4d 88 cf a7 |./.M...|" +peer0.org1.example.com | "2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 331 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 332 Verify: sig = 00000000 30 45 02 21 00 d7 3a 96 c4 c2 26 c1 bc d3 fe 26 |0E.!..:...&....&| +peer0.org1.example.com | 00000010 47 b1 f6 a1 c7 c7 ad 51 76 94 4e a3 56 81 e8 32 |G......Qv.N.V..2| +peer0.org1.example.com | 00000020 0b 3f 1d 04 ff 02 20 33 2f c0 a8 08 78 bb 15 19 |.?.... 3/...x...| +peer0.org1.example.com | 00000030 e5 51 b3 6b 51 71 a5 1d d5 ad ee d6 4f f9 fe f2 |.Q.kQq......O...| +peer0.org1.example.com | 00000040 c2 3b 7c d6 7b 56 4e |.;|.{VN|" +peer0.org1.example.com | "2019-09-24 01:04:28.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 333 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:28.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 334 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 335 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 336 Updating aliveness data: membership: timestamp: " +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] GetPolicy -> DEBU 205 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [policies] GetPolicy -> DEBU 208 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 337 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 338 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 339 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:28.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [endorser] ProcessProposal -> DEBU 33b Entering: request from 172.18.0.5:49820" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] ValidateProposalMessage -> DEBU 33c ValidateProposalMessage starts for signed proposal 0xc002483a90" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] validateChannelHeader -> DEBU 33d validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 33e begin" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 33f creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 340 creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [msp.identity] Verify -> DEBU 341 Verify: digest = 00000000 5e 8f fe 6d 87 85 5a 3c 72 79 e9 66 2d 79 ab f6 |^..m..Z DEBU 342 Verify: sig = 00000000 30 45 02 21 00 d7 7f 6f 13 cc 24 43 50 4c 90 e8 |0E.!...o..$CPL..| +peer0.org1.example.com | 00000010 13 72 2f e1 98 e0 e5 52 3d a4 4f 95 91 e3 08 62 |.r/....R=.O....b| +peer0.org1.example.com | 00000020 1b 6a c4 db c4 02 20 60 d9 a2 99 a2 c9 48 76 dd |.j.... `.....Hv.| +peer0.org1.example.com | 00000030 16 40 d2 28 3c 9e a1 d3 68 fe 69 17 f2 22 79 87 |.@.(<...h.i.."y.| +peer0.org1.example.com | 00000040 31 0e d2 df 37 f8 62 |1...7.b|" +peer0.org1.example.com | "2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 343 exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 344 validateChaincodeProposalMessage starts for proposal 0xc00012b5e0, header 0xc002483f40" +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 345 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [endorser] preProcess -> DEBU 346 [][4d028da1] processing txid: 4d028da15790cbbccd1ce09019c3707640c0b9fb5aa98ebbb0baa7c8bc4c79bb" +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [endorser] SimulateProposal -> DEBU 347 [][4d028da1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [endorser] callChaincode -> INFO 348 [][4d028da1] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [chaincode] Execute -> DEBU 349 Entry" +peer0.org1.example.com | "2019-09-24 01:04:28.671 UTC [qscc] Invoke -> DEBU 34a Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:28.684 UTC [aclmgmt] CheckACL -> DEBU 34b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 01:04:28.684 UTC [aclmgmt] CheckACL -> DEBU 34c acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:04:28.684 UTC [policies] Evaluate -> DEBU 34d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:28.685 UTC [policies] Evaluate -> DEBU 34e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:28.685 UTC [policies] Evaluate -> DEBU 34f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:28.685 UTC [msp] DeserializeIdentity -> DEBU 350 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [msp.identity] newIdentity -> DEBU 351 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [cauthdsl] func1 -> DEBU 352 0xc002657850 gate 1569287068686398000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [cauthdsl] func2 -> DEBU 353 0xc002657850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [cauthdsl] func2 -> DEBU 354 0xc002657850 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 355 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:28.686 UTC [msp] Validate -> DEBU 356 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:28.687 UTC [msp] getCertificationChain -> DEBU 357 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:28.687 UTC [cauthdsl] func2 -> DEBU 358 0xc002657850 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:28.688 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 5e 8f fe 6d 87 85 5a 3c 72 79 e9 66 2d 79 ab f6 |^..m..Z DEBU 35a Verify: sig = 00000000 30 45 02 21 00 d7 7f 6f 13 cc 24 43 50 4c 90 e8 |0E.!...o..$CPL..| +peer0.org1.example.com | 00000010 13 72 2f e1 98 e0 e5 52 3d a4 4f 95 91 e3 08 62 |.r/....R=.O....b| +peer0.org1.example.com | 00000020 1b 6a c4 db c4 02 20 60 d9 a2 99 a2 c9 48 76 dd |.j.... `.....Hv.| +peer0.org1.example.com | 00000030 16 40 d2 28 3c 9e a1 d3 68 fe 69 17 f2 22 79 87 |.@.(<...h.i.."y.| +peer0.org1.example.com | 00000040 31 0e d2 df 37 f8 62 |1...7.b|" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:16.229 UTC [fsblkstorage] Next -> DEBU 231 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:16.229 UTC [fsblkstorage] newBlockfileStream -> DEBU 232 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:16.229 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 233 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 234 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 235 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:16.230 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:16.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:16.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:16.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:16.232 UTC [common.channelconfig] NewStandardValues -> DEBU 23b Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:16.232 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.232 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] NewStandardValues -> DEBU 241 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:16.234 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.234 UTC [common.channelconfig] validateMSP -> DEBU 24c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.234 UTC [msp] newBccspMsp -> DEBU 24d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.234 UTC [msp] New -> DEBU 24e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.235 UTC [msp] Setup -> DEBU 24f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:16.235 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.238 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.238 UTC [msp] Validate -> DEBU 252 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:16.239 UTC [common.channelconfig] NewStandardValues -> DEBU 253 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2019-09-24 01:04:16.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.240 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.240 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.240 UTC [common.channelconfig] validateMSP -> DEBU 257 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.240 UTC [msp] newBccspMsp -> DEBU 258 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:28.688 UTC [cauthdsl] func2 -> DEBU 35b 0xc002657850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:28.688 UTC [cauthdsl] func1 -> DEBU 35c 0xc002657850 gate 1569287068686398000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:28.688 UTC [policies] Evaluate -> DEBU 35d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.240 UTC [msp] New -> DEBU 259 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 35e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 35f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:28.689 UTC [chaincode] handleMessage -> DEBU 361 [4d028da1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:28.690 UTC [chaincode] Notify -> DEBU 362 [4d028da1] notifying Txid:4d028da15790cbbccd1ce09019c3707640c0b9fb5aa98ebbb0baa7c8bc4c79bb, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:28.690 UTC [chaincode] Execute -> DEBU 363 Exit" +peer0.org1.example.com | "2019-09-24 01:04:28.690 UTC [endorser] callChaincode -> INFO 364 [][4d028da1] Exit chaincode: name:"qscc" (19ms)" +peer0.org1.example.com | "2019-09-24 01:04:28.690 UTC [endorser] SimulateProposal -> DEBU 365 [][4d028da1] Exit" +peer0.org1.example.com | "2019-09-24 01:04:28.690 UTC [endorser] func1 -> DEBU 366 Exit: request from 172.18.0.5:49820" +peer0.org1.example.com | "2019-09-24 01:04:28.691 UTC [comm.grpc.server] 1 -> INFO 367 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49820 grpc.code=OK grpc.call_duration=21.4423ms +peer0.org1.example.com | "2019-09-24 01:04:29.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 368 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:29.211 UTC [msp.identity] Sign -> DEBU 369 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151008 " +peer0.org1.example.com | "2019-09-24 01:04:29.211 UTC [msp.identity] Sign -> DEBU 36a Sign: digest: 503E01FB6F84183DF9B14EA6BE1C7882E11E457CF18F8F53E20AF7ACCB23D831 " +peer0.org1.example.com | "2019-09-24 01:04:29.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 36b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:29.212 UTC [msp.identity] Sign -> DEBU 36c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:29.212 UTC [msp.identity] Sign -> DEBU 36d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:29.213 UTC [gossip.discovery] periodicalSendAlive -> DEBU 36e Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:29.217 UTC [grpc] infof -> DEBU 36f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:29.217 UTC [gossip.comm] Send -> DEBU 370 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:29.218 UTC [gossip.comm] sendToEndpoint -> DEBU 371 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.219 UTC [gossip.comm] sendToEndpoint -> DEBU 372 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.726 UTC [gossip.comm] Send -> DEBU 373 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:29.726 UTC [gossip.comm] sendToEndpoint -> DEBU 374 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.726 UTC [gossip.comm] sendToEndpoint -> DEBU 375 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.731 UTC [gossip.gossip] handleMessage -> DEBU 376 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.732 UTC [msp.identity] Verify -> DEBU 377 Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +peer0.org1.example.com | 00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +peer0.org1.example.com | "2019-09-24 01:04:29.732 UTC [msp.identity] Verify -> DEBU 378 Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +peer0.org1.example.com | 00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +peer0.org1.example.com | 00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +peer0.org1.example.com | 00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +peer0.org1.example.com | 00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +peer0.org1.example.com | "2019-09-24 01:04:29.731 UTC [gossip.comm] Send -> DEBU 379 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:29.734 UTC [gossip.comm] sendToEndpoint -> DEBU 37a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.734 UTC [gossip.comm] sendToEndpoint -> DEBU 37c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:29.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 37e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 37f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:29.736 UTC [msp] DeserializeIdentity -> DEBU 381 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:29.736 UTC [msp.identity] newIdentity -> DEBU 382 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | "2019-09-24 01:04:16.241 UTC [msp] Setup -> DEBU 25a Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.241 UTC [msp.identity] newIdentity -> DEBU 25b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [common.channelconfig] NewStandardValues -> DEBU 25c Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [common.channelconfig] validateMSP -> DEBU 25e Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [msp] newBccspMsp -> DEBU 25f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [msp] New -> DEBU 260 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [msp] Setup -> DEBU 261 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.247 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:16.248 UTC [msp] Setup -> DEBU 263 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:16.248 UTC [msp] Setup -> DEBU 264 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.250 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.250 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] GetPolicy -> DEBU 275 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] GetPolicy -> DEBU 277 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Group] /Channel" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:29.737 UTC [cauthdsl] func1 -> DEBU 383 0xc002674bf0 gate 1569287069737694100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:29.737 UTC [cauthdsl] func2 -> DEBU 384 0xc002674bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:29.737 UTC [cauthdsl] func2 -> DEBU 385 0xc002674bf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:29.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 386 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:29.738 UTC [msp] Validate -> DEBU 387 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:29.739 UTC [msp] getCertificationChain -> DEBU 388 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:29.739 UTC [cauthdsl] func2 -> DEBU 389 0xc002674bf0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:29.740 UTC [msp.identity] Verify -> DEBU 38a Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +peer0.org1.example.com | 00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +peer0.org1.example.com | "2019-09-24 01:04:29.740 UTC [msp.identity] Verify -> DEBU 38b Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +peer0.org1.example.com | 00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +peer0.org1.example.com | 00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +peer0.org1.example.com | 00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +peer0.org1.example.com | 00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +peer0.org1.example.com | "2019-09-24 01:04:29.742 UTC [cauthdsl] func2 -> DEBU 38c 0xc002674bf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:29.742 UTC [cauthdsl] func1 -> DEBU 38d 0xc002674bf0 gate 1569287069737694100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 38e Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 38f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 390 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 391 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:29.743 UTC [gossip.gossip] handleMessage -> DEBU 392 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.907 UTC [gossip.gossip] handleMessage -> DEBU 393 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.907 UTC [gossip.pull] HandleMessage -> DEBU 394 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 395 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 396 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 397 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:29.916 UTC [gossip.gossip] handleMessage -> DEBU 398 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:29.917 UTC [msp.identity] Verify -> DEBU 399 Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +peer0.org1.example.com | 00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +peer0.org1.example.com | "2019-09-24 01:04:29.917 UTC [msp.identity] Verify -> DEBU 39a Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +peer0.org1.example.com | 00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +peer0.org1.example.com | 00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +peer0.org1.example.com | 00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +peer0.org1.example.com | 00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +peer0.org1.example.com | "2019-09-24 01:04:29.918 UTC [gossip.gossip] handleMessage -> DEBU 39b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.526 UTC [gossip.gossip] handleMessage -> DEBU 39c Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.526 UTC [gossip.pull] HandleMessage -> DEBU 39d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.526 UTC [gossip.pull] SendDigest -> DEBU 39e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:30.526 UTC [gossip.gossip] handleMessage -> DEBU 39f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.529 UTC [gossip.gossip] handleMessage -> DEBU 3a0 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.529 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" +orderer0.example.com | "2019-09-24 01:04:16.251 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a1 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:16.260 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a2 As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:30.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a2 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a3 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a4 Verify: digest = 00000000 82 57 2b 80 a1 9d 2c 27 03 4a 71 ef af 98 9c 5d |.W+...,'.Jq....]| +peer0.org1.example.com | 00000010 b9 b3 0f 0d d2 f8 c0 00 17 0f 71 87 39 30 f7 d8 |..........q.90..|" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a5 Verify: sig = 00000000 30 45 02 21 00 fc 45 ca 66 35 8a 43 6e dc cc 08 |0E.!..E.f5.Cn...| +peer0.org1.example.com | 00000010 62 81 1f 90 73 40 2e 46 93 12 f9 cf fe 50 58 69 |b...s@.F.....PXi| +peer0.org1.example.com | 00000020 c7 c7 e0 19 ef 02 20 47 d4 96 b1 43 86 4a cc 30 |...... G...C.J.0| +peer0.org1.example.com | 00000030 3d 12 0e 6c a4 68 60 1b af db 77 a7 87 89 d1 bb |=..l.h`...w.....| +peer0.org1.example.com | 00000040 d3 57 f2 f8 ae b4 b6 |.W.....|" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 45 02 21 00 d6 49 b2 99 50 e9 8c 35 c1 07 43 |0E.!..I..P..5..C| +peer0.org1.example.com | 00000010 4e 45 90 0a 7f da 67 2c 7d ec 23 a4 b2 62 d0 31 |NE....g,}.#..b.1| +peer0.org1.example.com | 00000020 40 65 51 e4 2e 02 20 48 c6 a1 61 51 f7 83 34 f5 |@eQ... H..aQ..4.| +peer0.org1.example.com | 00000030 10 dd 0d f1 f1 ee a9 9a 43 9e d2 ce 98 62 2c f3 |........C....b,.| +peer0.org1.example.com | 00000040 db 42 c1 69 9c 76 7c |.B.i.v||" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ae Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.530 UTC [gossip.discovery] sendMemResponse -> DEBU 3b0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:30.531 UTC [gossip.comm] Send -> DEBU 3b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:30.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Exiting, replying with alive: > alive: > " +peer0.org1.example.com | "2019-09-24 01:04:30.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3b4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.725 UTC [gossip.channel] reportMembershipChanges -> INFO 3b5 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer0.org1.example.com | "2019-09-24 01:04:30.868 UTC [gossip.pull] Hello -> DEBU 3b6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:30.868 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:30.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a3 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a4 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a5 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a6 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a7 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a8 Manager Channel has managers Consortiums" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a9 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2aa Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ab As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ac As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ad As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ae As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.capabilities] Supported -> DEBU 2af Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [common.capabilities] Supported -> DEBU 2b0 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [orderer.common.server] func1 -> DEBU 2b1 Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b2 updating root CAs for channel [testchainid]" +orderer0.example.com | "2019-09-24 01:04:16.261 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b3 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b4 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b5 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [fsblkstorage] Next -> DEBU 2b6 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [fsblkstorage] newBlockfileStream -> DEBU 2b7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b8 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b9 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ba blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2bb [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +orderer0.example.com | "2019-09-24 01:04:16.262 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2bc EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-09-24 01:04:16.263 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2bd No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.263 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2be No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.300 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2bf Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c0 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c1 Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] Next -> DEBU 2c2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c4 Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2c7 [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2c8 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] Next -> DEBU 2c9 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ca newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cb Remaining bytes=[20287], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cc Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cd blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:16.302 UTC [orderer.commmon.multichannel] Initialize -> INFO 2ce Starting system channel 'testchainid' with genesis block hash 257eabd868ebd9bdb404cd1e16e104c6943521bd472058e2d82271564767c6c1 and orderer type etcdraft" +orderer0.example.com | "2019-09-24 01:04:16.303 UTC [orderer.consensus.etcdraft] Start -> INFO 2cf Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.303 UTC [orderer.common.cluster] Configure -> INFO 2d0 Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +peer0.org1.example.com | "2019-09-24 01:04:30.871 UTC [gossip.gossip] handleMessage -> DEBU 3ba Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.871 UTC [gossip.pull] HandleMessage -> DEBU 3bb GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.872 UTC [gossip.gossip] handleMessage -> DEBU 3bc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.877 UTC [msp] GetDefaultSigningIdentity -> DEBU 3bd Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:30.877 UTC [msp.identity] Sign -> DEBU 3be Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151009 " +peer0.org1.example.com | "2019-09-24 01:04:30.877 UTC [msp.identity] Sign -> DEBU 3bf Sign: digest: 18F2220278F127E6AC94A93CCC42696FA9C0B510881E359748E9B580769B494A " +peer0.org1.example.com | "2019-09-24 01:04:30.877 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:30.878 UTC [msp.identity] Sign -> DEBU 3c1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:30.878 UTC [msp.identity] Sign -> DEBU 3c2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:30.878 UTC [gossip.comm] Send -> DEBU 3c3 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.879 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.881 UTC [gossip.gossip] handleMessage -> DEBU 3c6 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.882 UTC [gossip.gossip] handleMessage -> DEBU 3c7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.883 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:30.883 UTC [msp.identity] Verify -> DEBU 3ca Verify: digest = 00000000 18 f2 22 02 78 f1 27 e6 ac 94 a9 3c cc 42 69 6f |..".x.'....<.Bio| +peer0.org1.example.com | 00000010 a9 c0 b5 10 88 1e 35 97 48 e9 b5 80 76 9b 49 4a |......5.H...v.IJ|" +peer0.org1.example.com | "2019-09-24 01:04:30.884 UTC [msp.identity] Verify -> DEBU 3cb Verify: sig = 00000000 30 44 02 20 33 fb 58 f6 6d da ed 98 5d 3a 28 b3 |0D. 3.X.m...]:(.| +peer0.org1.example.com | 00000010 cc 71 78 3b cb 76 a9 18 90 f0 2a fc dd e9 b8 7f |.qx;.v....*.....| +peer0.org1.example.com | 00000020 ef ca 9b c7 02 20 03 8a 30 4c 96 6d 98 fd b8 d5 |..... ..0L.m....| +peer0.org1.example.com | 00000030 3b b5 d9 19 e5 41 2f a5 5a 39 5d f9 3b 41 26 2e |;....A/.Z9].;A&.| +peer0.org1.example.com | 00000040 dc da fa d4 6c 2e |....l.|" +peer0.org1.example.com | "2019-09-24 01:04:30.886 UTC [msp.identity] Verify -> DEBU 3cc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:30.886 UTC [msp.identity] Verify -> DEBU 3cd Verify: sig = 00000000 30 45 02 21 00 e2 5b 54 75 48 42 4f f1 5a 09 0f |0E.!..[TuHBO.Z..| +peer0.org1.example.com | 00000010 84 5b ca 9c fa 1d f7 7f 5a 3a 32 a8 09 37 50 1d |.[......Z:2..7P.| +peer0.org1.example.com | 00000020 6e 14 00 c5 87 02 20 11 b4 fd a8 70 d3 cb 4a cb |n..... ....p..J.| +peer0.org1.example.com | 00000030 dc 29 bf c2 48 c2 cb ea 09 f7 eb dd 4e 9d 92 18 |.)..H.......N...| +peer0.org1.example.com | 00000040 63 62 00 33 66 c7 0d |cb.3f..|" +peer0.org1.example.com | "2019-09-24 01:04:30.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.888 UTC [gossip.discovery] isSentByMe -> DEBU 3cf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:30.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:30.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.762 UTC [gossip.election] waitForInterrupt -> DEBU 3d2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [gossip.election] beLeader -> INFO 3d3 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Becoming a leader" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [gossip.service] func1 -> INFO 3d4 Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3d5 This peer will pass blocks from orderer service to other peers for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [gossip.election] leaderElection -> DEBU 3d6 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [gossip.election] IsLeader -> DEBU 3d7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d8 Obtaining default signing identity" +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:16.303 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d1 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-09-24 01:04:16.303 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d2 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 01:04:16.304 UTC [orderer.common.cluster] func1 -> DEBU 2d3 Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-09-24 01:04:16.304 UTC [grpc] DialContext -> DEBU 2d4 parsed scheme: """ +orderer0.example.com | "2019-09-24 01:04:16.304 UTC [grpc] DialContext -> DEBU 2d5 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-09-24 01:04:16.304 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2019-09-24 01:04:16.304 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.cluster] func1 -> DEBU 2d8 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [msp.identity] Sign -> DEBU 3d9 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510021801 " +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [msp.identity] Sign -> DEBU 3da Sign: digest: 48BB9EE71D606B70252E932C70612B7F184577C39E62F9F1E0DF64C0A2E69531 " +peer0.org1.example.com | "2019-09-24 01:04:31.763 UTC [gossip.election] waitForInterrupt -> DEBU 3db d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:31.764 UTC [ConnProducer] NewConnection -> DEBU 3dc Creating a new connection" +peer0.org1.example.com | "2019-09-24 01:04:31.765 UTC [grpc] DialContext -> DEBU 3dd parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:31.765 UTC [grpc] DialContext -> DEBU 3de scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:31.765 UTC [grpc] watcher -> DEBU 3df ccResolverWrapper: sending new addresses to cc: [{orderer0.example.com:7050 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:31.765 UTC [grpc] switchBalancer -> DEBU 3e0 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:31.765 UTC [grpc] HandleSubConnStateChange -> DEBU 3e1 pickfirstBalancer: HandleSubConnStateChange: 0xc00293fee0, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:31.775 UTC [grpc] HandleSubConnStateChange -> DEBU 3e2 pickfirstBalancer: HandleSubConnStateChange: 0xc00293fee0, READY" +peer0.org1.example.com | "2019-09-24 01:04:31.775 UTC [ConnProducer] NewConnection -> DEBU 3e3 Connected to {orderer0.example.com:7050 [OrdererMSP]}" +peer0.org1.example.com | "2019-09-24 01:04:31.775 UTC [deliveryClient] connect -> DEBU 3e4 Connected to orderer0.example.com:7050" +peer0.org1.example.com | "2019-09-24 01:04:31.776 UTC [deliveryClient] connect -> DEBU 3e5 Establishing gRPC stream with orderer0.example.com:7050 ..." +peer0.org1.example.com | "2019-09-24 01:04:31.776 UTC [deliveryClient] afterConnect -> DEBU 3e6 Entering" +peer0.org1.example.com | "2019-09-24 01:04:31.776 UTC [deliveryClient] RequestBlocks -> DEBU 3e7 Starting deliver with block [1] for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.776 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:31.776 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:31.777 UTC [msp.identity] Sign -> DEBU 3ea Sign: plaintext: 0A91070A3D08051A06089FD7A5EC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +peer0.org1.example.com | "2019-09-24 01:04:31.777 UTC [msp.identity] Sign -> DEBU 3eb Sign: digest: C4F9503E5301D3D23927882C3353751138F3AB2BF634639FCFE2F8D0FD14F5CC " +peer0.org1.example.com | "2019-09-24 01:04:31.777 UTC [deliveryClient] afterConnect -> DEBU 3ec Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.785 UTC [gossip.comm] Send -> DEBU 3ed Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:31.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:31.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:31.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3f1 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:04:31.801 UTC [msp] DeserializeIdentity -> DEBU 3f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:31.801 UTC [msp.identity] newIdentity -> DEBU 3f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | fQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:31.802 UTC [cauthdsl] func1 -> DEBU 3f7 0xc00278dcf0 gate 1569287071802348800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:31.802 UTC [cauthdsl] func2 -> DEBU 3f8 0xc00278dcf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:31.803 UTC [cauthdsl] func2 -> DEBU 3f9 0xc00278dcf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:31.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3fa Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:04:31.804 UTC [msp] Validate -> DEBU 3fb MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:31.805 UTC [cauthdsl] func2 -> DEBU 3fc 0xc00278dcf0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.805 UTC [msp.identity] Verify -> DEBU 3fd Verify: digest = 00000000 77 dd b6 d7 72 80 8a d1 f8 5a de 4c 70 a6 68 f5 |w...r....Z.Lp.h.| +peer0.org1.example.com | 00000010 ad 49 05 05 64 ca bd b4 ac 1d 58 51 69 e0 b2 26 |.I..d.....XQi..&|" +peer0.org1.example.com | "2019-09-24 01:04:31.805 UTC [msp.identity] Verify -> DEBU 3fe Verify: sig = 00000000 30 45 02 21 00 e3 64 df 09 3e 72 bb 2d cb d0 c5 |0E.!..d..>r.-...| +peer0.org1.example.com | 00000010 b7 ec aa d5 28 ed 2d 8f 36 1a 6a ba 0e 58 0e a0 |....(.-.6.j..X..| +peer0.org1.example.com | 00000020 7c d5 38 95 99 02 20 40 98 33 47 f8 c6 7b 0f 05 ||.8... @.3G..{..| +peer0.org1.example.com | 00000030 bd 0b 82 87 31 b0 8a 6a 42 ee ef 0a 44 ca 27 14 |....1..jB...D.'.| +peer0.org1.example.com | 00000040 63 3e 0b 89 f9 6e ac |c>...n.|" +peer0.org1.example.com | "2019-09-24 01:04:31.806 UTC [cauthdsl] func2 -> DEBU 3ff 0xc00278dcf0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.806 UTC [cauthdsl] func1 -> DEBU 400 0xc00278dcf0 gate 1569287071802348800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 401 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 402 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 403 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [grpc] DialContext -> DEBU 2d9 parsed scheme: """ +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [grpc] DialContext -> DEBU 2da scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2db 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2dc 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.cluster] Configure -> INFO 2dd Exiting" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] start -> DEBU 2de Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] start -> INFO 2df Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e0 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2e1 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e2 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.server] Start -> INFO 2e3 Starting orderer: +orderer0.example.com | Version: 1.4.3 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.12.9 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-09-24 01:04:16.305 UTC [orderer.common.server] Start -> INFO 2e4 Beginning to serve requests" +orderer0.example.com | "2019-09-24 01:04:16.315 UTC [grpc] watcher -> DEBU 2e5 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2019-09-24 01:04:16.315 UTC [grpc] switchBalancer -> DEBU 2e6 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-09-24 01:04:16.316 UTC [grpc] HandleSubConnStateChange -> DEBU 2e7 pickfirstBalancer: HandleSubConnStateChange: 0xc00036a250, CONNECTING" +orderer0.example.com | "2019-09-24 01:04:16.317 UTC [grpc] watcher -> DEBU 2e8 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2019-09-24 01:04:16.317 UTC [grpc] switchBalancer -> DEBU 2e9 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2019-09-24 01:04:16.317 UTC [grpc] HandleSubConnStateChange -> DEBU 2ea pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, CONNECTING" +orderer0.example.com | "2019-09-24 01:04:16.323 UTC [orderer.consensus.etcdraft] apply -> INFO 2eb Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.324 UTC [orderer.consensus.etcdraft] apply -> INFO 2ec Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.324 UTC [orderer.consensus.etcdraft] apply -> INFO 2ed Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:16.344 UTC [grpc] createTransport -> DEBU 2ee grpc: addrConn.createTransport failed to connect to {orderer2.example.com:7050 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 172.18.0.3:7050: connect: connection refused". Reconnecting..." +orderer0.example.com | "2019-09-24 01:04:16.344 UTC [grpc] HandleSubConnStateChange -> DEBU 2ef pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, TRANSIENT_FAILURE" +orderer0.example.com | "2019-09-24 01:04:16.371 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc00036a250, READY" +orderer0.example.com | "2019-09-24 01:04:17.284 UTC [grpc] HandleSubConnStateChange -> DEBU 2f1 pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, CONNECTING" +orderer0.example.com | "2019-09-24 01:04:17.288 UTC [grpc] HandleSubConnStateChange -> DEBU 2f2 pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, READY" +orderer0.example.com | "2019-09-24 01:04:17.723 UTC [orderer.common.cluster] Step -> DEBU 2f3 Connection from orderer2.example.com(172.18.0.3:44808)" +orderer0.example.com | "2019-09-24 01:04:17.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:17.723 UTC [orderer.consensus.etcdraft] Step -> INFO 2f5 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:17.724 UTC [orderer.common.cluster] NewStream -> DEBU 2f6 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 01:04:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2f7 Sending msg of 28 bytes to 3 on channel testchainid took 72.9µs" +orderer0.example.com | "2019-09-24 01:04:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.5µs " +orderer0.example.com | "2019-09-24 01:04:17.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] Step -> INFO 2fa 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2fb 1 became follower at term 2" channel=testchainid node=1 +peer0.org1.example.com | "2019-09-24 01:04:31.808 UTC [blocksProvider] DeliverBlocks -> DEBU 405 [businesschannel] Adding payload to local buffer, blockNum = [1]" +orderer0.example.com | "2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] Step -> INFO 2fc 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +peer0.org1.example.com | "2019-09-24 01:04:31.808 UTC [gossip.state] addPayload -> DEBU 406 [businesschannel] Adding payload to local buffer, blockNum = [1]" +orderer0.example.com | "2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2fd Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +peer0.org1.example.com | "2019-09-24 01:04:31.808 UTC [gossip.state] addPayload -> DEBU 407 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +orderer0.example.com | "2019-09-24 01:04:17.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +peer0.org1.example.com | "2019-09-24 01:04:31.808 UTC [blocksProvider] DeliverBlocks -> DEBU 408 [businesschannel] Gossiping block [1], peers number [1]" +orderer0.example.com | "2019-09-24 01:04:17.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2ff Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 36" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [gossip.state] deliverPayloads -> DEBU 409 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +orderer0.example.com | "2019-09-24 01:04:17.731 UTC [orderer.consensus.etcdraft] run -> INFO 300 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [gossip.state] deliverPayloads -> DEBU 40a [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [gossip.privdata] StoreBlock -> INFO 40b [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [gossip.privdata] StoreBlock -> DEBU 40c [businesschannel] Validating block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [committer.txvalidator] Validate -> DEBU 40d [businesschannel] START Block Validation for block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [committer.txvalidator] Validate -> DEBU 40e expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [committer.txvalidator] validateTx -> DEBU 40f [businesschannel] validateTx starts for block 0xc00274b380 env 0xc00266f770 txn 0" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [protoutils] ValidateTransaction -> DEBU 410 ValidateTransactionEnvelope starts for envelope 0xc00266f770" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [protoutils] ValidateTransaction -> DEBU 411 Header is channel_header:"\010\001\032\006\010\236\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\273\243\202\352\224\302P0\022\312\244\020\033\371un\321\321\312S\240\207\334\217" " +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [protoutils] validateChannelHeader -> DEBU 412 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 01:04:31.809 UTC [protoutils] checkSignatureFromCreator -> DEBU 413 begin" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [msp] GetManagerForChain -> DEBU 414 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 415 creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [msp] Validate -> DEBU 416 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 417 creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [msp.identity] Verify -> DEBU 418 Verify: digest = 00000000 3a 3b a8 fa 19 47 c6 4f 70 72 3b 87 eb a8 a9 3a |:;...G.Opr;....:| +peer0.org1.example.com | 00000010 cc 79 a8 f3 d8 cd 6e 6d 4b a9 0a 08 86 60 29 5f |.y....nmK....`)_|" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [msp.identity] Verify -> DEBU 419 Verify: sig = 00000000 30 44 02 20 3a b0 a4 59 8c 0d d1 93 63 37 ae 85 |0D. :..Y....c7..| +peer0.org1.example.com | 00000010 3c d5 31 b6 01 9c 7d 0e 86 9f fd b5 ba 94 55 e6 |<.1...}.......U.| +peer0.org1.example.com | 00000020 2d 17 bd 56 02 20 63 81 1a 3b 99 93 cf 7e 2f fe |-..V. c..;...~/.| +peer0.org1.example.com | 00000030 d4 28 43 f3 2d 43 fb 57 79 ee b6 15 b0 f5 fc aa |.(C.-C.Wy.......| +peer0.org1.example.com | 00000040 1a b2 84 1a bc 27 |.....'|" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 41a exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [protoutils] validateConfigTransaction -> DEBU 41b validateConfigTransaction starts for data 0xc002542000, header channel_header:"\010\001\032\006\010\236\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\273\243\202\352\224\302P0\022\312\244\020\033\371un\321\321\312S\240\207\334\217" " +peer0.org1.example.com | "2019-09-24 01:04:31.810 UTC [committer.txvalidator] validateTx -> DEBU 41c Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] verifyDeltaSet -> DEBU 42c Processing change to key: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [common.configtx] policyForItem -> DEBU 42d Getting policy for item Org1MSP with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 42e Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 42f Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 430 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 431 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 432 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 433 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 434 Manager Channel/Application looking up path [Org1MSP]" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 435 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 436 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 437 Manager Channel/Application/Org1MSP looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [policies] Evaluate -> DEBU 438 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 01:04:31.812 UTC [cauthdsl] func1 -> DEBU 439 0xc002b40cd0 gate 1569287071812951600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 43a 0xc002b40cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 43b 0xc002b40cd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [gossip.channel] AddToMsgStore -> DEBU 43c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [gossip.pull] Add -> DEBU 43d Added 1, total items: 1" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 43e Checking if identity has been named explicitly as an admin for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 43f Checking if identity carries the admin ou for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] Validate -> DEBU 440 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] getCertificationChain -> DEBU 441 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] hasOURole -> DEBU 442 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp] getCertificationChain -> DEBU 443 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 444 0xc002b40cd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.813 UTC [msp.identity] Verify -> DEBU 445 Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +peer0.org1.example.com | 00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [msp.identity] Verify -> DEBU 446 Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +peer0.org1.example.com | 00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +peer0.org1.example.com | 00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +peer0.org1.example.com | 00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +peer0.org1.example.com | 00000040 0a 8e 87 e4 30 41 |....0A|" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [cauthdsl] func2 -> DEBU 447 0xc002b40cd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [cauthdsl] func1 -> DEBU 448 0xc002b40cd0 gate 1569287071812951600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [policies] Evaluate -> DEBU 449 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [policies] Evaluate -> DEBU 44a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.814 UTC [common.configtx] verifyDeltaSet -> DEBU 44b Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44c Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44d Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44e Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44f Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 450 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 451 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 452 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 453 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 454 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 455 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 456 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 457 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 458 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 459 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:17.732 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 301 Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:17.732 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 302 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 01:04:17.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 303 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " +orderer0.example.com | "2019-09-24 01:04:17.733 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:17.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2019-09-24 01:04:17.734 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.9µs " +orderer0.example.com | "2019-09-24 01:04:18.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:18.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 01:04:18.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +orderer0.example.com | "2019-09-24 01:04:18.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:18.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 01:04:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +orderer0.example.com | "2019-09-24 01:04:19.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:19.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 107.7µs" +orderer0.example.com | "2019-09-24 01:04:19.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.8µs " +orderer0.example.com | "2019-09-24 01:04:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:19.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +orderer0.example.com | "2019-09-24 01:04:19.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +orderer0.example.com | "2019-09-24 01:04:20.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:20.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +orderer0.example.com | "2019-09-24 01:04:20.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.7µs " +orderer0.example.com | "2019-09-24 01:04:20.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:20.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +orderer0.example.com | "2019-09-24 01:04:20.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.9µs " +orderer0.example.com | "2019-09-24 01:04:21.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:21.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-09-24 01:04:21.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +orderer0.example.com | "2019-09-24 01:04:21.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:21.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 43µs" +orderer0.example.com | "2019-09-24 01:04:21.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.1µs " +orderer0.example.com | "2019-09-24 01:04:22.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.9µs " +orderer0.example.com | "2019-09-24 01:04:22.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 321 Sending msg of 28 bytes to 3 on channel testchainid took 46.5µs" +orderer0.example.com | "2019-09-24 01:04:22.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:22.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 57.2µs" +orderer0.example.com | "2019-09-24 01:04:22.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.2µs " +orderer0.example.com | "2019-09-24 01:04:23.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +orderer0.example.com | "2019-09-24 01:04:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +orderer0.example.com | "2019-09-24 01:04:23.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:23.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 01:04:23.722 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +orderer0.example.com | "2019-09-24 01:04:23.972 UTC [orderer.common.server] Deliver -> DEBU 32b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:23.972 UTC [common.deliver] Handle -> DEBU 32c Starting new deliver loop for 172.18.0.5:53642" +orderer0.example.com | "2019-09-24 01:04:23.974 UTC [common.deliver] Handle -> DEBU 32d Attempting to read seek info message from 172.18.0.5:53642" +orderer0.example.com | "2019-09-24 01:04:24.012 UTC [orderer.common.server] Broadcast -> DEBU 32e Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:04:24.015 UTC [orderer.common.broadcast] Handle -> DEBU 32f Starting new broadcast loop for 172.18.0.5:53644" +orderer0.example.com | "2019-09-24 01:04:24.016 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 330 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53644" +orderer0.example.com | "2019-09-24 01:04:24.018 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 331 Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.019 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 332 Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2019-09-24 01:04:24.020 UTC [common.channelconfig] NewStandardValues -> DEBU 333 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:24.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 334 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 335 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] NewStandardValues -> DEBU 462 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 463 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 464 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 467 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.817 UTC [common.channelconfig] NewStandardValues -> DEBU 468 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 469 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] NewStandardValues -> DEBU 46b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46c Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] NewStandardValues -> DEBU 46d Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46e Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] Validate -> DEBU 46f Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [common.channelconfig] validateMSP -> DEBU 470 Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [msp] newBccspMsp -> DEBU 471 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [msp] New -> DEBU 472 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.818 UTC [msp] Setup -> DEBU 473 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [msp.identity] newIdentity -> DEBU 474 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [gossip.comm] Send -> DEBU 475 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [gossip.comm] sendToEndpoint -> DEBU 476 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [gossip.comm] sendToEndpoint -> DEBU 477 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [common.channelconfig] NewStandardValues -> DEBU 478 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 479 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [common.channelconfig] NewStandardValues -> DEBU 47a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47b Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.819 UTC [common.channelconfig] Validate -> DEBU 47c Anchor peers for org Org2MSP are " +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [common.channelconfig] validateMSP -> DEBU 47d Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [msp] newBccspMsp -> DEBU 47e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [msp] New -> DEBU 47f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [msp] Setup -> DEBU 480 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [common.channelconfig] NewStandardValues -> DEBU 482 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 483 Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48b Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48c Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [common.channelconfig] validateMSP -> DEBU 48d Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [msp] newBccspMsp -> DEBU 48e Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [msp] New -> DEBU 48f Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [msp] Setup -> DEBU 490 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:04:31.821 UTC [msp.identity] newIdentity -> DEBU 491 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 336 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 337 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 338 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 339 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33a Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33b Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33c Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 340 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 342 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 343 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [common.channelconfig] validateMSP -> DEBU 344 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [msp] newBccspMsp -> DEBU 345 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [msp] New -> DEBU 346 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.022 UTC [msp] Setup -> DEBU 347 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:24.023 UTC [msp.identity] newIdentity -> DEBU 348 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.023 UTC [msp.identity] newIdentity -> DEBU 349 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.023 UTC [msp] Validate -> DEBU 34a MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.023 UTC [common.channelconfig] NewStandardValues -> DEBU 34b Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:24.023 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:24.026 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.026 UTC [common.channelconfig] NewStandardValues -> DEBU 34e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.027 UTC [common.channelconfig] NewStandardValues -> DEBU 350 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 351 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.027 UTC [common.channelconfig] Validate -> DEBU 352 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 01:04:24.027 UTC [common.channelconfig] validateMSP -> DEBU 353 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.028 UTC [msp] newBccspMsp -> DEBU 354 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.028 UTC [msp] New -> DEBU 355 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.028 UTC [msp] Setup -> DEBU 356 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.029 UTC [msp.identity] newIdentity -> DEBU 357 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] NewStandardValues -> DEBU 358 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] initializeProtosStruct -> DEBU 359 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] NewStandardValues -> DEBU 35a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] Validate -> DEBU 35c Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [common.channelconfig] validateMSP -> DEBU 35d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [msp] newBccspMsp -> DEBU 35e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [msp] New -> DEBU 35f Creating Cache-MSP instance" +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | 1g== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [msp.identity] newIdentity -> DEBU 492 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [msp] Validate -> DEBU 493 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [msp] Setup -> DEBU 494 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [msp] Setup -> DEBU 495 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 499 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49b Proposed new policy Endorsement for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49d Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] GetPolicy -> DEBU 49e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49f Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] GetPolicy -> DEBU 4a0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a1 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a2 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a3 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a7 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a8 Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a9 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4aa Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ab Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ac Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ad Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.031 UTC [msp] Setup -> DEBU 360 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [msp.identity] newIdentity -> DEBU 361 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [msp] Setup -> DEBU 362 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [msp] Setup -> DEBU 363 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 364 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 365 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 366 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 367 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 368 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 369 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 36a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 36b Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36c Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36e Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 370 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 371 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 372 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 373 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 374 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 375 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 376 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 377 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 378 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 379 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [common.configtx] addToMap -> DEBU 37a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.033 UTC [common.configtx] addToMap -> DEBU 37b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.034 UTC [common.configtx] addToMap -> DEBU 37c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.035 UTC [common.configtx] addToMap -> DEBU 37d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 37e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 37f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 380 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 381 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 382 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 383 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 384 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 385 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 386 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 387 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 388 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 389 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38a Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38b Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 390 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4da As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4db As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4dc Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4dd Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4df Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e2 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e3 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e4 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e5 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e6 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e7 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [policies] Manager -> DEBU 4e8 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [policies] Manager -> DEBU 4e9 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ea As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4eb As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ec As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b1 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b2 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b3 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [common.configtx] policyForItem -> DEBU 3b4 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b5 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b6 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b7 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b8 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b9 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3ba Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bb Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bc Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bd Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [msp] DeserializeIdentity -> DEBU 3c1 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [msp.identity] newIdentity -> DEBU 3c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [cauthdsl] func1 -> DEBU 3c3 0xc0002b6e90 gate 1569287064043721200 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:24.043 UTC [cauthdsl] func2 -> DEBU 3c4 0xc0002b6e90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:24.044 UTC [cauthdsl] func2 -> DEBU 3c5 0xc0002b6e90 processing identity 0 with bytes of fd4750" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ed As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.capabilities] Supported -> DEBU 4ee Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [common.capabilities] Supported -> DEBU 4ef Channel capability V1_4_3 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:31.826 UTC [gossip.service] ProcessConfigUpdate -> DEBU 4f0 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [gossip.service] ProcessConfigUpdate -> DEBU 4f1 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f2 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f3 Org2MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f4 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [policies] Evaluate -> DEBU 4f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:31.827 UTC [policies] Evaluate -> DEBU 4f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [policies] Evaluate -> DEBU 4f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [cauthdsl] func1 -> DEBU 4fa 0xc0024ae260 gate 1569287071828149900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fb 0xc0024ae260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fc 0xc0024ae260 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fd 0xc0024ae260 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [msp.identity] Verify -> DEBU 4fe Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +peer0.org1.example.com | 00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +peer0.org1.example.com | "2019-09-24 01:04:31.828 UTC [msp.identity] Verify -> DEBU 4ff Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +peer0.org1.example.com | 00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +peer0.org1.example.com | 00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +peer0.org1.example.com | 00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +peer0.org1.example.com | 00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [cauthdsl] func2 -> DEBU 500 0xc0024ae260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [cauthdsl] func1 -> DEBU 501 0xc0024ae260 gate 1569287071828149900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 502 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 503 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 504 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 505 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [gossip.gossip] JoinChan -> INFO 506 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 507 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 508 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 509 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 01:04:31.829 UTC [gossip.service] updateEndpoints -> DEBU 50a Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 01:04:31.830 UTC [peer] updateTrustedRoots -> DEBU 50b Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.847 UTC [comm.grpc.server] 1 -> INFO 50c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:33.847Z grpc.peer_address=172.18.0.6:43990 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.9µs +peer0.org1.example.com | "2019-09-24 01:04:31.849 UTC [msp] GetDefaultSigningIdentity -> DEBU 50d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:31.850 UTC [msp.identity] Sign -> DEBU 50e Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:31.851 UTC [msp.identity] Sign -> DEBU 50f Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:31.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 510 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43990" +orderer0.example.com | "2019-09-24 01:04:24.044 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3c6 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.044 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3c7 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.044 UTC [msp] Validate -> DEBU 3c8 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.044 UTC [msp] getCertificationChain -> DEBU 3c9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:24.045 UTC [msp] hasOURole -> DEBU 3ca MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:04:24.045 UTC [msp] getCertificationChain -> DEBU 3cb MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:24.045 UTC [cauthdsl] func2 -> DEBU 3cc 0xc0002b6e90 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:24.046 UTC [msp.identity] Verify -> DEBU 3cd Verify: digest = 00000000 88 88 59 3f 5b f7 0b f9 95 ad aa 76 17 fe 8f 43 |..Y?[......v...C| +orderer0.example.com | 00000010 85 c2 8b 2d 7a e3 6d 0c 62 3b 92 69 26 70 18 41 |...-z.m.b;.i&p.A|" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [msp.identity] Verify -> DEBU 3ce Verify: sig = 00000000 30 44 02 20 39 d0 3f ea bb 39 bd e4 1f 1c a9 88 |0D. 9.?..9......| +orderer0.example.com | 00000010 69 8b b1 77 90 f7 c1 bc 40 8d 8b b4 8c fc 09 f6 |i..w....@.......| +orderer0.example.com | 00000020 4f 3c b0 50 02 20 01 18 1f 83 44 e2 60 04 40 a4 |O<.P. ....D.`.@.| +orderer0.example.com | 00000030 ed 10 b8 da 29 7d cb 56 45 c7 bc d3 8a 66 ee d1 |....)}.VE....f..| +orderer0.example.com | 00000040 f6 62 6d 94 8a 78 |.bm..x|" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [cauthdsl] func2 -> DEBU 3cf 0xc0002b6e90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0002b6e90 gate 1569287064043721200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d1 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d3 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d5 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d6 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d7 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d8 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d9 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3da Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3db Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3dc Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3dd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3de Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3df Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3ea Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3eb Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ec Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ee Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:31.853 UTC [gossip.comm] authenticateRemotePeer -> DEBU 511 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43990" +peer0.org1.example.com | "2019-09-24 01:04:31.854 UTC [msp.identity] Verify -> DEBU 512 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:31.854 UTC [msp.identity] Verify -> DEBU 513 Verify: sig = 00000000 30 45 02 21 00 c3 24 bf b4 3e e6 76 c5 c3 58 a7 |0E.!..$..>.v..X.| +peer0.org1.example.com | 00000010 e2 70 9a 4d 9b 29 f4 27 67 6a 4f ea 1c 96 45 50 |.p.M.).'gjO...EP| +peer0.org1.example.com | 00000020 98 79 63 d4 52 02 20 1f 0c 66 49 e7 53 5a 23 d1 |.yc.R. ..fI.SZ#.| +peer0.org1.example.com | 00000030 d3 ca d6 76 fc 12 1a 5c be 1a 18 f8 64 e7 29 83 |...v...\....d.).| +peer0.org1.example.com | 00000040 a3 a6 15 0a 16 af 21 |......!|" +peer0.org1.example.com | "2019-09-24 01:04:31.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 514 Authenticated 172.18.0.6:43990" +peer0.org1.example.com | "2019-09-24 01:04:31.855 UTC [gossip.comm] GossipStream -> DEBU 515 Servicing 172.18.0.6:43990" +peer0.org1.example.com | "2019-09-24 01:04:31.855 UTC [peer] buildTrustedRootsForChain -> DEBU 516 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:31.856 UTC [peer] buildTrustedRootsForChain -> DEBU 517 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 01:04:31.856 UTC [gossip.comm] serviceConnection -> DEBU 518 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:04:31.856 UTC [gossip.comm] func2 -> DEBU 51a Client 172.18.0.6:43944 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:31.857 UTC [comm.grpc.server] 1 -> INFO 51c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43944 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2960769s +peer0.org1.example.com | "2019-09-24 01:04:31.856 UTC [peer] buildTrustedRootsForChain -> DEBU 519 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 01:04:31.857 UTC [gossip.comm] writeToStream -> DEBU 51b Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:31.857 UTC [gossip.comm] serviceConnection -> DEBU 51d Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:04:31.858 UTC [gossip.comm] func2 -> DEBU 51f Client 172.18.0.6:43990 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:31.859 UTC [comm.grpc.server] 1 -> INFO 520 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:41.849Z grpc.peer_address=172.18.0.6:43990 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.7062ms +peer0.org1.example.com | "2019-09-24 01:04:31.858 UTC [peer] buildTrustedRootsForChain -> DEBU 51e adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 01:04:31.860 UTC [committer.txvalidator] validateTx -> DEBU 521 config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:31.860 UTC [committer.txvalidator] validateTx -> DEBU 522 [businesschannel] validateTx completes for block 0xc00274b380 env 0xc00266f770 txn 0" +peer0.org1.example.com | "2019-09-24 01:04:31.861 UTC [committer.txvalidator] Validate -> DEBU 523 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:04:31.861 UTC [committer.txvalidator] Validate -> INFO 524 [businesschannel] Validated block [1] in 51ms" +peer0.org1.example.com | "2019-09-24 01:04:31.862 UTC [gossip.privdata] listMissingPrivateData -> DEBU 525 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:04:31.862 UTC [gossip.privdata] StoreBlock -> DEBU 526 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:04:31.863 UTC [committer] preCommit -> DEBU 527 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 01:04:31.863 UTC [kvledger] CommitWithPvtData -> DEBU 528 [businesschannel] Validating state for block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 529 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 52a lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 52b Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 52c ValidateAndPrepareBatch() for block number = [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 52d preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:31.864 UTC [valimpl] preprocessProtoBlock -> DEBU 52e txType=CONFIG" +peer0.org1.example.com | "2019-09-24 01:04:31.865 UTC [valimpl] processNonEndorserTx -> DEBU 52f Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 01:04:31.865 UTC [valimpl] processNonEndorserTx -> DEBU 530 Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 01:04:31.865 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 531 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:31.865 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 532 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 01:04:31.865 UTC [peer] GenerateSimulationResults -> DEBU 533 Processing CONFIG" +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ef Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.050 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f2 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f3 Sign: plaintext: 0AD2060A1B08011A060898D7A5EC0522...F039342E636F7D29017AFF951FB086A5 " +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f4 Sign: digest: 21F7193067F79881F5EB3A7E5EFFE226D4D037B76440AE0026CA35BD072DD550 " +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f5 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f6 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f7 Sign: plaintext: 0ACE060A1708041A060898D7A5EC0522...EAA34C85FCE8248A0EF6C3233EE88DB1 " +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f8 Sign: digest: 04693A2E09EA3A4FB231521A014B95692D3CDC756A25BDBC7A726322FC1B50D3 " +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:04:24.051 UTC [msp] DeserializeIdentity -> DEBU 3fe Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [msp.identity] newIdentity -> DEBU 3ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [cauthdsl] func1 -> DEBU 400 0xc0003b3d50 gate 1569287064052482900 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [cauthdsl] func2 -> DEBU 401 0xc0003b3d50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [cauthdsl] func2 -> DEBU 402 0xc0003b3d50 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 403 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:24.052 UTC [msp] Validate -> DEBU 404 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.053 UTC [cauthdsl] func2 -> DEBU 405 0xc0003b3d50 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:24.053 UTC [msp.identity] Verify -> DEBU 406 Verify: digest = 00000000 04 69 3a 2e 09 ea 3a 4f b2 31 52 1a 01 4b 95 69 |.i:...:O.1R..K.i| +orderer0.example.com | 00000010 2d 3c dc 75 6a 25 bd bc 7a 72 63 22 fc 1b 50 d3 |-<.uj%..zrc"..P.|" +orderer0.example.com | "2019-09-24 01:04:24.053 UTC [msp.identity] Verify -> DEBU 407 Verify: sig = 00000000 30 44 02 20 25 0a 6a 8a a6 61 64 4e 9f b6 7f b2 |0D. %.j..adN....| +orderer0.example.com | 00000010 67 95 1a 46 df 30 03 67 da af 7d 15 eb d8 90 b9 |g..F.0.g..}.....| +orderer0.example.com | 00000020 7f a3 06 0d 02 20 3c f4 6c d9 08 af e2 c1 82 0d |..... <.l.......| +orderer0.example.com | 00000030 00 16 57 7e c7 08 c4 c4 e7 a5 f5 45 aa 3e a0 c7 |..W~.......E.>..| +orderer0.example.com | 00000040 07 bf ad b2 fa 9c |......|" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [cauthdsl] func2 -> DEBU 408 0xc0003b3d50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [cauthdsl] func1 -> DEBU 409 0xc0003b3d50 gate 1569287064052482900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40c Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40e Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 410 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 411 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 412 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 413 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 414 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 415 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 416 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 417 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 418 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 419 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41a Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41b Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41c Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 41d Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41e Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [common.channelconfig] NewStandardValues -> DEBU 41f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [common.channelconfig] initializeProtosStruct -> DEBU 420 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [common.channelconfig] validateMSP -> DEBU 421 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [msp] newBccspMsp -> DEBU 422 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [msp] New -> DEBU 423 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [msp] Setup -> DEBU 424 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:24.056 UTC [msp.identity] newIdentity -> DEBU 425 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.057 UTC [msp.identity] newIdentity -> DEBU 426 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.057 UTC [msp] Validate -> DEBU 427 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.057 UTC [common.channelconfig] NewStandardValues -> DEBU 428 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:24.057 UTC [common.channelconfig] initializeProtosStruct -> DEBU 429 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] NewStandardValues -> DEBU 42b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] NewStandardValues -> DEBU 42d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] Validate -> DEBU 42f Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [common.channelconfig] validateMSP -> DEBU 430 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [msp] newBccspMsp -> DEBU 431 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [msp] New -> DEBU 432 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [msp] Setup -> DEBU 433 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.058 UTC [msp.identity] newIdentity -> DEBU 434 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] NewStandardValues -> DEBU 435 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] NewStandardValues -> DEBU 437 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] Validate -> DEBU 439 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [common.channelconfig] validateMSP -> DEBU 43a Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [msp] newBccspMsp -> DEBU 43b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [msp] New -> DEBU 43c Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [msp] Setup -> DEBU 43d Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.059 UTC [msp.identity] newIdentity -> DEBU 43e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [msp] Setup -> DEBU 43f Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [msp] Setup -> DEBU 440 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 441 Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:31.866 UTC [peer] processChannelConfigTx -> DEBU 534 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 01:04:31.866 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 535 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:04:31.866 UTC [lockbasedtxmgr] Done -> DEBU 536 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 537 Block [1] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [valinternal] ApplyWriteSet -> DEBU 538 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002aeca40)}" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 539 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 53a postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 53b ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [kvledger] CommitWithPvtData -> DEBU 53c [businesschannel] Adding CommitHash to the block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [kvledger] CommitWithPvtData -> DEBU 53d [businesschannel] Committing block [1] to storage" +peer0.org1.example.com | "2019-09-24 01:04:31.867 UTC [ledgerstorage] CommitWithPvtData -> DEBU 53e Writing block [1] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:04:31.868 UTC [gossip.comm] readFromStream -> DEBU 53f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:04:31.868 UTC [grpc] infof -> DEBU 540 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:31.869 UTC [gossip.comm] writeToStream -> DEBU 541 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:31.870 UTC [gossip.comm] readFromStream -> DEBU 542 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:04:31.871 UTC [pvtdatastorage] Prepare -> DEBU 543 Saved 0 private data write sets for block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.874 UTC [fsblkstorage] indexBlock -> DEBU 544 Indexing block [blockNum=1, blockHash=[]byte{0x2d, 0x35, 0x2, 0xb4, 0xa1, 0xf4, 0x55, 0x5, 0x99, 0x27, 0xd1, 0x6d, 0xe6, 0x7c, 0x19, 0xc, 0x5f, 0x50, 0x26, 0x8f, 0x7a, 0x87, 0x5a, 0xb8, 0xa2, 0xc9, 0x82, 0xeb, 0xf2, 0x57, 0xa0, 0x33} txOffsets= +peer0.org1.example.com | txId=33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636 locPointer=offset=71, bytesLength=24469 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:04:31.874 UTC [fsblkstorage] indexBlock -> DEBU 545 Adding txLoc [fileSuffixNum=0, offset=25879, bytesLength=24469] for tx ID: [33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636] to txid-index" +peer0.org1.example.com | "2019-09-24 01:04:31.875 UTC [fsblkstorage] indexBlock -> DEBU 546 Adding txLoc [fileSuffixNum=0, offset=25879, bytesLength=24469] for tx number:[0] ID: [33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:04:31.876 UTC [fsblkstorage] updateCheckpoint -> DEBU 547 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1]" +peer0.org1.example.com | "2019-09-24 01:04:31.876 UTC [pvtdatastorage] Commit -> DEBU 548 Committing private data for block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.878 UTC [pvtdatastorage] Commit -> DEBU 549 Committed private data for block [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.878 UTC [kvledger] CommitWithPvtData -> DEBU 54a [businesschannel] Committing block [1] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:04:31.878 UTC [lockbasedtxmgr] Commit -> DEBU 54b lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:31.879 UTC [lockbasedtxmgr] Commit -> DEBU 54c Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:31.879 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 54d Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:04:31.879 UTC [lockbasedtxmgr] Commit -> DEBU 54e Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:31.879 UTC [stateleveldb] ApplyUpdates -> DEBU 54f Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 01:04:31.881 UTC [lockbasedtxmgr] Commit -> DEBU 550 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:04:31.881 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 551 Preparing potential purge list working-set for expiringAtBlk [2]" +peer0.org1.example.com | "2019-09-24 01:04:31.881 UTC [leveldbhelper] GetIterator -> DEBU 552 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:04:31.882 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 553 No expiry entry found for expiringAtBlk [2]" +peer0.org1.example.com | "2019-09-24 01:04:31.882 UTC [lockbasedtxmgr] func1 -> DEBU 554 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:04:31.882 UTC [kvledger] CommitWithPvtData -> DEBU 555 [businesschannel] Committing block [1] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:04:31.883 UTC [historyleveldb] Commit -> DEBU 556 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:04:31.883 UTC [historyleveldb] Commit -> DEBU 557 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 01:04:31.885 UTC [historyleveldb] Commit -> DEBU 558 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +peer0.org1.example.com | "2019-09-24 01:04:31.885 UTC [kvledger] CommitWithPvtData -> INFO 559 [businesschannel] Committed block [1] with 1 transaction(s) in 21ms (state_validation=3ms block_and_pvtdata_commit=11ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +peer0.org1.example.com | "2019-09-24 01:04:31.886 UTC [msp] GetDefaultSigningIdentity -> DEBU 55a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:31.886 UTC [msp.identity] Sign -> DEBU 55b Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020802 " +peer0.org1.example.com | "2019-09-24 01:04:31.887 UTC [msp.identity] Sign -> DEBU 55c Sign: digest: 289BEBC9C4C7E4FBAD661C0B1C8ED00872608B07E9B2EF58134D31304C87B0DE " +peer0.org1.example.com | "2019-09-24 01:04:31.887 UTC [gossip.state] commitBlock -> DEBU 55d [businesschannel] Committed block [1] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:04:32.179 UTC [comm.grpc.server] 1 -> INFO 55e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.178Z grpc.peer_address=172.18.0.9:51370 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=191.6µs +peer0.org1.example.com | "2019-09-24 01:04:32.183 UTC [msp] GetDefaultSigningIdentity -> DEBU 55f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:32.183 UTC [msp.identity] Sign -> DEBU 560 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:32.184 UTC [msp.identity] Sign -> DEBU 561 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:32.184 UTC [gossip.comm] authenticateRemotePeer -> DEBU 562 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:51370" +peer0.org1.example.com | "2019-09-24 01:04:32.185 UTC [gossip.comm] authenticateRemotePeer -> DEBU 563 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51370" +peer0.org1.example.com | "2019-09-24 01:04:32.185 UTC [msp] DeserializeIdentity -> DEBU 564 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.185 UTC [msp] DeserializeIdentity -> DEBU 565 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.187 UTC [msp.identity] newIdentity -> DEBU 566 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:32.188 UTC [msp] Validate -> DEBU 567 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:32.188 UTC [msp] getCertificationChain -> DEBU 568 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 569 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.189 UTC [msp] DeserializeIdentity -> DEBU 56a Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 442 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 443 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 444 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 445 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 446 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 447 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 448 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 449 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 44e Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 44f Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 450 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 451 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 452 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 453 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 454 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 455 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 456 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 457 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 458 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 459 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 460 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.189 UTC [msp] DeserializeIdentity -> DEBU 56c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.190 UTC [msp] DeserializeIdentity -> DEBU 56d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 570 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 571 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 572 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 573 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [cauthdsl] func1 -> DEBU 574 0xc00303a690 gate 1569287072192565100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [cauthdsl] func2 -> DEBU 575 0xc00303a690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.192 UTC [cauthdsl] func2 -> DEBU 576 0xc00303a690 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [cauthdsl] func2 -> DEBU 577 0xc00303a690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [cauthdsl] func2 -> DEBU 578 0xc00303a690 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [cauthdsl] func1 -> DEBU 579 0xc00303a690 gate 1569287072192565100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.193 UTC [cauthdsl] func1 -> DEBU 57d 0xc00303aef0 gate 1569287072193874300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 57e 0xc00303aef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 57f 0xc00303aef0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 580 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [msp] Validate -> DEBU 581 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [msp] getCertificationChain -> DEBU 582 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 583 0xc00303aef0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.195 UTC [msp.identity] Verify -> DEBU 584 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 586 Verify: sig = 00000000 30 44 02 20 27 f3 cc 00 48 3d 94 c6 4c 60 f1 0a |0D. '...H=..L`..| +peer0.org1.example.com | 00000010 d6 69 d3 70 80 b5 00 68 50 7e b7 d0 ab 4b b9 67 |.i.p...hP~...K.g| +peer0.org1.example.com | 00000020 42 90 29 00 02 20 39 6c 76 d0 68 d4 4e 67 3b 3e |B.).. 9lv.h.Ng;>| +peer0.org1.example.com | 00000030 55 26 88 ad 32 8b 24 30 b1 ed ba 8f 2d 4a f3 7c |U&..2.$0....-J.|| +peer0.org1.example.com | 00000040 c9 56 d4 f1 4b ac |.V..K.|" +peer0.org1.example.com | "2019-09-24 01:04:32.196 UTC [cauthdsl] func2 -> DEBU 587 0xc00303aef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.196 UTC [cauthdsl] func1 -> DEBU 588 0xc00303aef0 gate 1569287072193874300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.195 UTC [grpc] infof -> DEBU 585 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 589 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 58a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 58b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [policies] Evaluate -> DEBU 58c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 58d Authenticated 172.18.0.9:51370" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [gossip.comm] GossipStream -> DEBU 58e Servicing 172.18.0.9:51370" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [gossip.comm] readFromStream -> DEBU 58f Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [gossip.comm] func2 -> DEBU 590 Client 172.18.0.9:51370 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:32.197 UTC [comm.grpc.server] 1 -> INFO 591 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:42.182Z grpc.peer_address=172.18.0.9:51370 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6099ms +peer0.org1.example.com | "2019-09-24 01:04:32.198 UTC [gossip.comm] writeToStream -> DEBU 592 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:32.212 UTC [comm.grpc.server] 1 -> INFO 593 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.21Z grpc.peer_address=172.18.0.9:51372 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=785.3µs +peer0.org1.example.com | "2019-09-24 01:04:32.214 UTC [msp] GetDefaultSigningIdentity -> DEBU 594 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:32.214 UTC [msp.identity] Sign -> DEBU 595 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:32.214 UTC [msp.identity] Sign -> DEBU 596 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:32.214 UTC [gossip.comm] authenticateRemotePeer -> DEBU 597 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:51372" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [gossip.comm] authenticateRemotePeer -> DEBU 598 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51372" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 599 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 59b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 59d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5a0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [policies] Evaluate -> DEBU 5a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.215 UTC [policies] Evaluate -> DEBU 5a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5a4 0xc003096150 gate 1569287072216078000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a5 0xc003096150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a6 0xc003096150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a7 0xc003096150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a8 0xc003096150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5a9 0xc003096150 gate 1569287072216078000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5ad 0xc003096990 gate 1569287072216555200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5ae 0xc003096990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5af 0xc003096990 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5b0 0xc003096990 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.216 UTC [msp.identity] Verify -> DEBU 5b1 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 5b2 Verify: sig = 00000000 30 44 02 20 7f 2c 1e 6c 98 3d c0 b3 1e ef e4 93 |0D. .,.l.=......| +peer0.org1.example.com | 00000010 50 79 fc 83 71 90 65 c2 4b 18 08 d7 c1 d2 eb cc |Py..q.e.K.......| +peer0.org1.example.com | 00000020 0e 36 45 24 02 20 5c 24 21 6f b9 c9 be 36 5b 33 |.6E$. \$!o...6[3| +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 48e Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 48f Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 490 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [common.configtx] policyForItem -> DEBU 491 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 492 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 493 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 494 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 495 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 496 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 497 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 498 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 499 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 49a Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:24.064 UTC [msp] DeserializeIdentity -> DEBU 49e Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp.identity] newIdentity -> DEBU 49f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [cauthdsl] func1 -> DEBU 4a0 0xc000405f60 gate 1569287064065343300 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [cauthdsl] func2 -> DEBU 4a1 0xc000405f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [cauthdsl] func2 -> DEBU 4a2 0xc000405f60 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a3 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a4 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] Validate -> DEBU 4a5 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] getCertificationChain -> DEBU 4a6 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] hasOURole -> DEBU 4a7 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:04:24.065 UTC [msp] getCertificationChain -> DEBU 4a8 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [cauthdsl] func2 -> DEBU 4a9 0xc000405f60 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [msp.identity] Verify -> DEBU 4aa Verify: digest = 00000000 88 88 59 3f 5b f7 0b f9 95 ad aa 76 17 fe 8f 43 |..Y?[......v...C| +orderer0.example.com | 00000010 85 c2 8b 2d 7a e3 6d 0c 62 3b 92 69 26 70 18 41 |...-z.m.b;.i&p.A|" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [msp.identity] Verify -> DEBU 4ab Verify: sig = 00000000 30 44 02 20 39 d0 3f ea bb 39 bd e4 1f 1c a9 88 |0D. 9.?..9......| +orderer0.example.com | 00000010 69 8b b1 77 90 f7 c1 bc 40 8d 8b b4 8c fc 09 f6 |i..w....@.......| +orderer0.example.com | 00000020 4f 3c b0 50 02 20 01 18 1f 83 44 e2 60 04 40 a4 |O<.P. ....D.`.@.| +orderer0.example.com | 00000030 ed 10 b8 da 29 7d cb 56 45 c7 bc d3 8a 66 ee d1 |....)}.VE....f..| +peer0.org1.example.com | 00000030 51 8f a6 b0 2d 28 ac 68 21 97 90 25 cd 19 92 dc |Q...-(.h!..%....| +peer0.org1.example.com | 00000040 c9 29 18 cc fe 3f |.)...?|" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [cauthdsl] func2 -> DEBU 5b3 0xc003096990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [cauthdsl] func1 -> DEBU 5b4 0xc003096990 gate 1569287072216555200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b9 Authenticated 172.18.0.9:51372" +peer0.org1.example.com | "2019-09-24 01:04:32.217 UTC [gossip.comm] GossipStream -> DEBU 5ba Servicing 172.18.0.9:51372" +peer0.org1.example.com | "2019-09-24 01:04:32.220 UTC [gossip.gossip] handleMessage -> DEBU 5bb Entering, 172.18.0.9:51372 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:15137377372724668305 tag:EMPTY mem_req:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.220 UTC [gossip.gossip] handleMessage -> DEBU 5bc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5bd Got message: GossipMessage: nonce:15137377372724668305 tag:EMPTY mem_req:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5be Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [msp] DeserializeIdentity -> DEBU 5bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [cauthdsl] func1 -> DEBU 5c6 0xc00304dc50 gate 1569287072221682500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c7 0xc00304dc50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c8 0xc00304dc50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c9 0xc00304dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5ca 0xc00304dc50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5cb 0xc00304dc50 gate 1569287072221682500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5cf 0xc0030b8490 gate 1569287072222293500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d0 0xc0030b8490 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | 00000040 f6 62 6d 94 8a 78 |.bm..x|" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [cauthdsl] func2 -> DEBU 4ac 0xc000405f60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [cauthdsl] func1 -> DEBU 4ad 0xc000405f60 gate 1569287064065343300 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4ae Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4b0 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b2 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b3 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b4 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b5 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] verifyDeltaSet -> DEBU 4b6 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] NewStandardValues -> DEBU 4ce Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4cf Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d0 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d1 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d2 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d3 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] NewStandardValues -> DEBU 4d4 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d7 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d1 0xc0030b8490 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d2 0xc0030b8490 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [msp.identity] Verify -> DEBU 5d3 Verify: digest = 00000000 3b 50 4b 8e e1 8e 8c 67 5b 27 88 fe b2 22 01 22 |;PK....g['..."."| +peer0.org1.example.com | 00000010 83 ae b3 5b 80 f7 15 8a ff 05 72 72 59 f3 71 1f |...[......rrY.q.|" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [msp.identity] Verify -> DEBU 5d4 Verify: sig = 00000000 30 44 02 20 3c 03 aa c1 61 96 1d 65 ac 22 c2 d8 |0D. <...a..e."..| +peer0.org1.example.com | 00000010 90 c4 2f 39 43 04 17 e2 1d 21 6b 90 3e 9c 88 54 |../9C....!k.>..T| +peer0.org1.example.com | 00000020 ef 5b 35 da 02 20 30 1c 51 d3 6f 81 05 c1 b8 df |.[5.. 0.Q.o.....| +peer0.org1.example.com | 00000030 f3 60 1d 75 39 c2 b5 58 b6 03 b9 c2 21 dc c9 e4 |.`.u9..X....!...| +peer0.org1.example.com | 00000040 ac 4b d7 2b 9f 94 |.K.+..|" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d5 0xc0030b8490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5d6 0xc0030b8490 gate 1569287072222293500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] handleAliveMessage -> DEBU 5db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5dc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5dd Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5de Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] handleAliveMessage -> DEBU 5df Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [gossip.discovery] sendMemResponse -> DEBU 5e1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [msp] DeserializeIdentity -> DEBU 5e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [msp] DeserializeIdentity -> DEBU 5e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [gossip.comm] Send -> DEBU 5e4 Entering, sending GossipMessage: Channel: , nonce: 15137377372724668305, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [gossip.discovery] sendMemResponse -> DEBU 5e5 Exiting, replying with alive: alive:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > alive: " +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 5e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15137377372724668305, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 5e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.370 UTC [comm.grpc.server] 1 -> INFO 5e8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.368Z grpc.peer_address=172.18.0.8:35314 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.3µs +peer0.org1.example.com | "2019-09-24 01:04:32.372 UTC [msp] GetDefaultSigningIdentity -> DEBU 5e9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:32.373 UTC [msp.identity] Sign -> DEBU 5ea Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:32.373 UTC [msp.identity] Sign -> DEBU 5eb Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:32.374 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ec Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35314" +peer0.org1.example.com | "2019-09-24 01:04:32.375 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35314" +peer0.org1.example.com | "2019-09-24 01:04:32.375 UTC [msp] DeserializeIdentity -> DEBU 5ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.375 UTC [msp] DeserializeIdentity -> DEBU 5ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.376 UTC [msp.identity] newIdentity -> DEBU 5f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer0.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer0.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer0.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:32.377 UTC [msp] Validate -> DEBU 5f1 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:32.377 UTC [msp] getCertificationChain -> DEBU 5f2 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:32.378 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.378 UTC [msp] DeserializeIdentity -> DEBU 5f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.379 UTC [msp] DeserializeIdentity -> DEBU 5f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.380 UTC [msp] DeserializeIdentity -> DEBU 5f7 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d9 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] NewStandardValues -> DEBU 4db Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dc Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] NewStandardValues -> DEBU 4dd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4de Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [common.channelconfig] validateMSP -> DEBU 4df Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [msp] newBccspMsp -> DEBU 4e0 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.072 UTC [msp] New -> DEBU 4e1 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.073 UTC [msp] Setup -> DEBU 4e2 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:24.074 UTC [msp.identity] newIdentity -> DEBU 4e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.075 UTC [msp.identity] newIdentity -> DEBU 4e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.075 UTC [msp] Validate -> DEBU 4e5 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.075 UTC [common.channelconfig] NewStandardValues -> DEBU 4e6 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:24.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e7 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e8 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ea Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] NewStandardValues -> DEBU 4eb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ec Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] Validate -> DEBU 4ed Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [common.channelconfig] validateMSP -> DEBU 4ee Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [msp] newBccspMsp -> DEBU 4ef Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [msp] New -> DEBU 4f0 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [msp] Setup -> DEBU 4f1 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.076 UTC [msp.identity] newIdentity -> DEBU 4f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] NewStandardValues -> DEBU 4f3 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f4 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] NewStandardValues -> DEBU 4f5 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f6 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] Validate -> DEBU 4f7 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [common.channelconfig] validateMSP -> DEBU 4f8 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [msp] newBccspMsp -> DEBU 4f9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [msp] New -> DEBU 4fa Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.077 UTC [msp] Setup -> DEBU 4fb Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.078 UTC [msp.identity] newIdentity -> DEBU 4fc Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | "2019-09-24 01:04:32.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.381 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.381 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5fa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.383 UTC [cauthdsl] func1 -> DEBU 5fe 0xc0031143e0 gate 1569287072383081800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.383 UTC [cauthdsl] func2 -> DEBU 5ff 0xc0031143e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 600 0xc0031143e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 601 0xc0031143e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 602 0xc0031143e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [cauthdsl] func1 -> DEBU 603 0xc0031143e0 gate 1569287072383081800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 604 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 605 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 606 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [cauthdsl] func1 -> DEBU 607 0xc003114c40 gate 1569287072385457000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 608 0xc003114c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 609 0xc003114c40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 60a Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [msp] Validate -> DEBU 60b MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [msp] getCertificationChain -> DEBU 60c MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 60d 0xc003114c40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [msp.identity] Verify -> DEBU 60e Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:04:32.385 UTC [msp.identity] Verify -> DEBU 60f Verify: sig = 00000000 30 45 02 21 00 e4 05 55 96 ba 37 1f 23 62 19 6f |0E.!...U..7.#b.o| +peer0.org1.example.com | 00000010 c9 5b c0 b3 27 3a 06 d1 69 73 31 e0 9a 88 ef b2 |.[..':..is1.....| +peer0.org1.example.com | 00000020 06 80 31 d7 d5 02 20 57 a1 b5 72 fb 3b 3d ce cd |..1... W..r.;=..| +peer0.org1.example.com | 00000030 8d 42 7c 9b 58 8d 76 1d 84 29 d8 77 79 c0 0e 62 |.B|.X.v..).wy..b| +peer0.org1.example.com | 00000040 f7 36 77 8e 02 55 f2 |.6w..U.|" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [cauthdsl] func2 -> DEBU 610 0xc003114c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [cauthdsl] func1 -> DEBU 611 0xc003114c40 gate 1569287072385457000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 614 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [gossip.comm] authenticateRemotePeer -> DEBU 616 Authenticated 172.18.0.8:35314" +peer0.org1.example.com | "2019-09-24 01:04:32.386 UTC [gossip.comm] GossipStream -> DEBU 617 Servicing 172.18.0.8:35314" +peer0.org1.example.com | "2019-09-24 01:04:32.390 UTC [gossip.comm] readFromStream -> DEBU 618 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:32.391 UTC [gossip.comm] func2 -> DEBU 619 Client 172.18.0.8:35314 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:32.391 UTC [comm.grpc.server] 1 -> INFO 61a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:42.372Z grpc.peer_address=172.18.0.8:35314 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.4572ms +peer0.org1.example.com | "2019-09-24 01:04:32.391 UTC [grpc] infof -> DEBU 61b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | "2019-09-24 01:04:32.391 UTC [gossip.comm] writeToStream -> DEBU 61c Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:32.402 UTC [comm.grpc.server] 1 -> INFO 61d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.401Z grpc.peer_address=172.18.0.8:35316 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=117.7µs +peer0.org1.example.com | "2019-09-24 01:04:32.404 UTC [msp] GetDefaultSigningIdentity -> DEBU 61e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:32.404 UTC [msp.identity] Sign -> DEBU 61f Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:32.405 UTC [msp.identity] Sign -> DEBU 620 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:32.405 UTC [gossip.comm] authenticateRemotePeer -> DEBU 621 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35316" +peer0.org1.example.com | "2019-09-24 01:04:32.406 UTC [gossip.comm] authenticateRemotePeer -> DEBU 622 Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35316" +peer0.org1.example.com | "2019-09-24 01:04:32.406 UTC [msp] DeserializeIdentity -> DEBU 623 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.406 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.407 UTC [msp] DeserializeIdentity -> DEBU 625 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 626 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.407 UTC [msp] DeserializeIdentity -> DEBU 627 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 628 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 629 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.408 UTC [policies] Evaluate -> DEBU 62b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.409 UTC [policies] Evaluate -> DEBU 62c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.409 UTC [policies] Evaluate -> DEBU 62d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.409 UTC [cauthdsl] func1 -> DEBU 62e 0xc003155fe0 gate 1569287072409691900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 62f 0xc003155fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 630 0xc003155fe0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 631 0xc003155fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 632 0xc003155fe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.411 UTC [cauthdsl] func1 -> DEBU 633 0xc003155fe0 gate 1569287072409691900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 634 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 635 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.412 UTC [cauthdsl] func1 -> DEBU 637 0xc003176820 gate 1569287072412188700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 638 0xc003176820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 639 0xc003176820 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 63a 0xc003176820 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.413 UTC [msp.identity] Verify -> DEBU 63b Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:04:32.413 UTC [msp.identity] Verify -> DEBU 63c Verify: sig = 00000000 30 44 02 20 67 e6 a2 12 d0 bc 15 3a f1 2a a6 40 |0D. g......:.*.@| +peer0.org1.example.com | 00000010 68 09 63 c9 75 20 fc f7 b4 6d 6f 62 3b 6a 6d 8c |h.c.u ...mob;jm.| +peer0.org1.example.com | 00000020 cb 37 28 02 02 20 3a ab d1 d5 06 84 59 ce 25 75 |.7(.. :.....Y.%u| +peer0.org1.example.com | 00000030 45 a2 e9 80 f3 85 e7 52 53 d5 01 ab 31 e6 d7 dd |E......RS...1...| +peer0.org1.example.com | 00000040 13 11 5a 88 e8 d6 |..Z...|" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [cauthdsl] func2 -> DEBU 63d 0xc003176820 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [cauthdsl] func1 -> DEBU 63e 0xc003176820 gate 1569287072412188700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 63f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 641 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 643 Authenticated 172.18.0.8:35316" +peer0.org1.example.com | "2019-09-24 01:04:32.414 UTC [gossip.comm] GossipStream -> DEBU 644 Servicing 172.18.0.8:35316" +peer0.org1.example.com | "2019-09-24 01:04:32.418 UTC [gossip.gossip] handleMessage -> DEBU 645 Entering, 172.18.0.8:35316 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:15252018863320230344 tag:EMPTY mem_req:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.418 UTC [gossip.gossip] handleMessage -> DEBU 646 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 647 Got message: GossipMessage: nonce:15252018863320230344 tag:EMPTY mem_req:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.420 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 648 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:32.420 UTC [msp] DeserializeIdentity -> DEBU 649 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.423 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:32.423 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.429 UTC [cauthdsl] func1 -> DEBU 650 0xc0030d3f70 gate 1569287072429233700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.429 UTC [cauthdsl] func2 -> DEBU 651 0xc0030d3f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.430 UTC [cauthdsl] func2 -> DEBU 652 0xc0030d3f70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.430 UTC [cauthdsl] func2 -> DEBU 653 0xc0030d3f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:32.431 UTC [cauthdsl] func2 -> DEBU 654 0xc0030d3f70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.431 UTC [cauthdsl] func1 -> DEBU 655 0xc0030d3f70 gate 1569287072429233700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:32.431 UTC [policies] Evaluate -> DEBU 656 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.432 UTC [policies] Evaluate -> DEBU 657 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.432 UTC [policies] Evaluate -> DEBU 658 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:32.432 UTC [cauthdsl] func1 -> DEBU 659 0xc0031927b0 gate 1569287072432623900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:32.432 UTC [cauthdsl] func2 -> DEBU 65a 0xc0031927b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:32.433 UTC [cauthdsl] func2 -> DEBU 65b 0xc0031927b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:32.433 UTC [cauthdsl] func2 -> DEBU 65c 0xc0031927b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.434 UTC [msp.identity] Verify -> DEBU 65d Verify: digest = 00000000 e0 08 3f bc 33 88 48 6f 3a e5 70 7f 4b 8c 3c c1 |..?.3.Ho:.p.K.<.| +peer0.org1.example.com | 00000010 6c 1e ab c0 9d 22 21 1b 00 4c 41 eb 96 94 1b e9 |l...."!..LA.....|" +peer0.org1.example.com | "2019-09-24 01:04:32.434 UTC [msp.identity] Verify -> DEBU 65e Verify: sig = 00000000 30 44 02 20 6b e0 9d 7e b5 f3 f5 f8 90 59 c0 94 |0D. k..~.....Y..| +peer0.org1.example.com | 00000010 4c 49 94 6a 2d 84 3e 29 83 2c 6d ba c4 93 75 8c |LI.j-.>).,m...u.| +peer0.org1.example.com | 00000020 fd 84 3a 31 02 20 01 21 27 c4 a7 85 f0 d0 6e 08 |..:1. .!'.....n.| +peer0.org1.example.com | 00000030 25 92 65 d6 e8 c6 c3 5d 03 1e 47 b8 26 84 b3 ea |%.e....]..G.&...| +peer0.org1.example.com | 00000040 86 79 03 00 69 3a |.y..i:|" +peer0.org1.example.com | "2019-09-24 01:04:32.435 UTC [cauthdsl] func2 -> DEBU 65f 0xc0031927b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:32.435 UTC [cauthdsl] func1 -> DEBU 660 0xc0031927b0 gate 1569287072432623900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 661 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 662 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.078 UTC [msp] Setup -> DEBU 4fd Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [msp] Setup -> DEBU 4fe MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 4ff Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 500 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 501 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 502 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 503 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 504 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 505 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 506 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 507 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 508 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 509 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50a Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50b Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50c Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:24.080 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 663 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [policies] Evaluate -> DEBU 664 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 665 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 666 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 667 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 668 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 669 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [gossip.discovery] sendMemResponse -> DEBU 66b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:32.436 UTC [msp] DeserializeIdentity -> DEBU 66c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.437 UTC [msp] DeserializeIdentity -> DEBU 66d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.437 UTC [msp] DeserializeIdentity -> DEBU 66e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:32.438 UTC [gossip.comm] Send -> DEBU 66f Entering, sending GossipMessage: Channel: , nonce: 15252018863320230344, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:32.438 UTC [gossip.comm] sendToEndpoint -> DEBU 670 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15252018863320230344, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:32.438 UTC [gossip.comm] sendToEndpoint -> DEBU 671 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:32.441 UTC [gossip.discovery] sendMemResponse -> DEBU 672 Exiting, replying with alive: alive:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > alive:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > alive: " +peer0.org1.example.com | "2019-09-24 01:04:33.389 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 673 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.389 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 674 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.389 UTC [policies] Evaluate -> DEBU 675 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:04:33.390 UTC [policies] Evaluate -> DEBU 676 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.390 UTC [policies] Evaluate -> DEBU 677 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.390 UTC [msp] DeserializeIdentity -> DEBU 678 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.391 UTC [msp.identity] newIdentity -> DEBU 679 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | fQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.391 UTC [cauthdsl] func1 -> DEBU 67a 0xc003177ca0 gate 1569287073391770800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.391 UTC [cauthdsl] func2 -> DEBU 67b 0xc003177ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.391 UTC [cauthdsl] func2 -> DEBU 67c 0xc003177ca0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.392 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 67d Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:04:33.392 UTC [msp] Validate -> DEBU 67e MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.392 UTC [cauthdsl] func2 -> DEBU 67f 0xc003177ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.392 UTC [msp.identity] Verify -> DEBU 680 Verify: digest = 00000000 37 d4 5c c2 90 fe c3 96 91 55 87 14 16 48 72 4a |7.\......U...HrJ| +peer0.org1.example.com | 00000010 86 b6 2c da 34 a4 85 2f 58 9f 09 90 a6 23 6d e8 |..,.4../X....#m.|" +peer0.org1.example.com | "2019-09-24 01:04:33.392 UTC [msp.identity] Verify -> DEBU 681 Verify: sig = 00000000 30 45 02 21 00 87 3a a5 77 e1 56 48 06 f4 a8 f1 |0E.!..:.w.VH....| +peer0.org1.example.com | 00000010 a7 25 e4 8e de e7 b8 fd d4 67 7c f9 ed 26 5e 8f |.%.......g|..&^.| +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.capabilities] Supported -> DEBU 542 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [common.capabilities] Supported -> DEBU 543 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [orderer.common.cluster] NewStream -> DEBU 544 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 545 Sending msg of 26612 bytes to 3 on channel testchainid took 172.4µs" +orderer0.example.com | "2019-09-24 01:04:24.083 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 546 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53644" +orderer0.example.com | "2019-09-24 01:04:24.084 UTC [orderer.common.broadcast] Handle -> DEBU 547 Received EOF from 172.18.0.5:53644, hangup" +orderer0.example.com | "2019-09-24 01:04:24.084 UTC [orderer.common.server] func1 -> DEBU 548 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:04:24.084 UTC [comm.grpc.server] 1 -> INFO 549 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53644 grpc.code=OK grpc.call_duration=73.1977ms +orderer0.example.com | "2019-09-24 01:04:24.085 UTC [common.deliver] deliverBlocks -> DEBU 54a Rejecting deliver for 172.18.0.5:53642 because channel businesschannel not found" +orderer0.example.com | "2019-09-24 01:04:24.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54b Send of SubmitRequest for channel testchainid with payload of size 26612 to orderer2.example.com(orderer2.example.com:7050) took 1.7356ms " +orderer0.example.com | "2019-09-24 01:04:24.085 UTC [orderer.common.server] func1 -> DEBU 54c Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:24.085 UTC [comm.grpc.server] 1 -> INFO 54d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53642 grpc.code=OK grpc.call_duration=113.9102ms +orderer0.example.com | "2019-09-24 01:04:24.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 26822" +orderer0.example.com | "2019-09-24 01:04:24.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54f Sending msg of 28 bytes to 3 on channel testchainid took 90.7µs" +orderer0.example.com | "2019-09-24 01:04:24.095 UTC [orderer.common.cluster.step] sendMessage -> DEBU 550 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +orderer0.example.com | "2019-09-24 01:04:24.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 551 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:24.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 552 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +orderer0.example.com | "2019-09-24 01:04:24.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 553 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +orderer0.example.com | "2019-09-24 01:04:24.127 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 554 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2019-09-24 01:04:24.128 UTC [common.channelconfig] NewStandardValues -> DEBU 555 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:24.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:24.130 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.130 UTC [common.channelconfig] NewStandardValues -> DEBU 55b Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:24.130 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:24.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.131 UTC [common.channelconfig] NewStandardValues -> DEBU 55e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.132 UTC [common.channelconfig] NewStandardValues -> DEBU 560 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.133 UTC [common.channelconfig] Validate -> DEBU 562 Anchor peers for org Org1MSP are " +orderer0.example.com | "2019-09-24 01:04:24.133 UTC [common.channelconfig] validateMSP -> DEBU 563 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.133 UTC [msp] newBccspMsp -> DEBU 564 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.133 UTC [msp] New -> DEBU 565 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.133 UTC [msp] Setup -> DEBU 566 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.134 UTC [msp.identity] newIdentity -> DEBU 567 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.136 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:24.137 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.139 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.142 UTC [common.channelconfig] Validate -> DEBU 56d Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:24.143 UTC [common.channelconfig] validateMSP -> DEBU 56e Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.143 UTC [msp] newBccspMsp -> DEBU 56f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.143 UTC [msp] New -> DEBU 570 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.144 UTC [msp] Setup -> DEBU 571 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.149 UTC [msp.identity] newIdentity -> DEBU 572 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.141 UTC [orderer.common.server] Deliver -> DEBU 56c Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:24.151 UTC [common.deliver] Handle -> DEBU 573 Starting new deliver loop for 172.18.0.5:53646" +orderer0.example.com | "2019-09-24 01:04:24.152 UTC [common.deliver] Handle -> DEBU 575 Attempting to read seek info message from 172.18.0.5:53646" +orderer0.example.com | "2019-09-24 01:04:24.151 UTC [common.channelconfig] NewStandardValues -> DEBU 574 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:24.152 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 579 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57b Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.155 UTC [common.channelconfig] NewStandardValues -> DEBU 57c Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:24.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57d Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:24.156 UTC [common.channelconfig] NewStandardValues -> DEBU 57e Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:24.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57f Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:24.158 UTC [common.channelconfig] validateMSP -> DEBU 580 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.159 UTC [msp] newBccspMsp -> DEBU 581 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.159 UTC [msp] New -> DEBU 582 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:24.160 UTC [msp] Setup -> DEBU 583 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:24.163 UTC [msp.identity] newIdentity -> DEBU 584 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.164 UTC [msp.identity] newIdentity -> DEBU 585 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:24.168 UTC [msp] Validate -> DEBU 586 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:24.172 UTC [msp] Setup -> DEBU 587 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:24.176 UTC [msp] Setup -> DEBU 588 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:24.176 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.182 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org1.example.com | 00000020 06 c6 ce 4d bb 02 20 09 a2 01 0d 9f cd a3 fa 23 |...M.. ........#| +peer0.org1.example.com | 00000030 a2 d1 08 b0 94 19 f3 b4 39 7a 7a b0 f0 b9 01 c9 |........9zz.....| +peer0.org1.example.com | 00000040 51 01 49 73 c7 85 86 |Q.Is...|" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [cauthdsl] func2 -> DEBU 682 0xc003177ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [cauthdsl] func1 -> DEBU 683 0xc003177ca0 gate 1569287073391770800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 684 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 685 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 686 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 687 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:33.394 UTC [blocksProvider] DeliverBlocks -> DEBU 688 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.394 UTC [gossip.state] addPayload -> DEBU 689 [businesschannel] Adding payload to local buffer, blockNum = [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.394 UTC [gossip.state] addPayload -> DEBU 68a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 01:04:33.394 UTC [blocksProvider] DeliverBlocks -> DEBU 68b [businesschannel] Gossiping block [2], peers number [1]" +peer0.org1.example.com | "2019-09-24 01:04:33.394 UTC [gossip.channel] AddToMsgStore -> DEBU 68c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:04:33.395 UTC [gossip.pull] Add -> DEBU 68d Added 2, total items: 2" +peer0.org1.example.com | "2019-09-24 01:04:33.395 UTC [gossip.state] deliverPayloads -> DEBU 68e [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.395 UTC [gossip.state] deliverPayloads -> DEBU 68f [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:04:33.395 UTC [gossip.privdata] StoreBlock -> INFO 690 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-09-24 01:04:33.395 UTC [gossip.privdata] StoreBlock -> DEBU 691 [businesschannel] Validating block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.396 UTC [committer.txvalidator] Validate -> DEBU 692 [businesschannel] START Block Validation for block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.396 UTC [committer.txvalidator] Validate -> DEBU 693 expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:04:33.396 UTC [committer.txvalidator] validateTx -> DEBU 694 [businesschannel] validateTx starts for block 0xc003156940 env 0xc003161450 txn 0" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] ValidateTransaction -> DEBU 695 ValidateTransactionEnvelope starts for envelope 0xc003161450" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] ValidateTransaction -> DEBU 696 Header is channel_header:"\010\001\032\006\010\241\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\204\003\200\326F*\227KJ]\304\004S\311\313\030\245o\272\343/\366\3427" " +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] validateChannelHeader -> DEBU 697 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 698 begin" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [msp] GetManagerForChain -> DEBU 699 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69a creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [msp] Validate -> DEBU 69b MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69c creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [msp.identity] Verify -> DEBU 69d Verify: digest = 00000000 28 96 ca 3d 3c a0 fc 64 a9 39 d7 14 f3 d4 02 6a |(..=<..d.9.....j| +peer0.org1.example.com | 00000010 9b 34 f0 5e 8e 28 88 4f e0 e7 72 82 c6 de 2f 91 |.4.^.(.O..r.../.|" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [msp.identity] Verify -> DEBU 69e Verify: sig = 00000000 30 44 02 20 06 57 d2 e6 fa fb 14 eb ac bb 01 32 |0D. .W.........2| +peer0.org1.example.com | 00000010 48 8c ba 3a 9d 7f cf ef 14 a1 79 36 35 a5 6d 68 |H..:......y65.mh| +peer0.org1.example.com | 00000020 e1 c0 da 62 02 20 17 4a cf 02 a0 12 2a 69 1d 56 |...b. .J....*i.V| +peer0.org1.example.com | 00000030 75 3a 9f de b0 ec 1d 08 95 54 c8 6d 3b 37 99 49 |u:.......T.m;7.I| +peer0.org1.example.com | 00000040 20 87 e3 8c 71 39 | ...q9|" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69f exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [protoutils] validateConfigTransaction -> DEBU 6a0 validateConfigTransaction starts for data 0xc00320c000, header channel_header:"\010\001\032\006\010\241\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\204\003\200\326F*\227KJ]\304\004S\311\313\030\245o\272\343/\366\3427" " +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [committer.txvalidator] validateTx -> DEBU 6a1 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.183 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.184 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.184 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.185 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.186 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.186 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.187 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.189 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.190 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.194 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.195 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.195 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.196 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59d Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:24.198 UTC [policies] NewManagerImpl -> DEBU 59f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:24.198 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:24.199 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:24.199 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] verifyDeltaSet -> DEBU 6b1 Processing change to key: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [common.configtx] policyForItem -> DEBU 6b2 Getting policy for item Org2MSP with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b3 Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b4 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b5 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b6 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b7 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application looking up path [Org2MSP]" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6bb Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6bc Manager Channel/Application/Org2MSP looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [policies] Evaluate -> DEBU 6bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [msp] DeserializeIdentity -> DEBU 6be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [msp.identity] newIdentity -> DEBU 6bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.398 UTC [cauthdsl] func1 -> DEBU 6c0 0xc00322ac10 gate 1569287073398978100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c1 0xc00322ac10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c2 0xc00322ac10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 6c3 Checking if identity has been named explicitly as an admin for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 6c4 Checking if identity carries the admin ou for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] Validate -> DEBU 6c5 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] getCertificationChain -> DEBU 6c6 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] hasOURole -> DEBU 6c7 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp] getCertificationChain -> DEBU 6c8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c9 0xc00322ac10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp.identity] Verify -> DEBU 6ca Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +peer0.org1.example.com | 00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +peer0.org1.example.com | "2019-09-24 01:04:33.399 UTC [msp.identity] Verify -> DEBU 6cb Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +peer0.org1.example.com | 00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +peer0.org1.example.com | 00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +peer0.org1.example.com | 00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +peer0.org1.example.com | 00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +peer0.org1.example.com | "2019-09-24 01:04:33.410 UTC [cauthdsl] func2 -> DEBU 6cc 0xc00322ac10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.410 UTC [cauthdsl] func1 -> DEBU 6cd 0xc00322ac10 gate 1569287073398978100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.410 UTC [policies] Evaluate -> DEBU 6ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.410 UTC [policies] Evaluate -> DEBU 6cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.411 UTC [gossip.comm] Send -> DEBU 6d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.412 UTC [msp] DeserializeIdentity -> DEBU 6d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.412 UTC [gossip.comm] sendToEndpoint -> DEBU 6d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.412 UTC [gossip.comm] createConnection -> DEBU 6d5 Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:33.412 UTC [msp] DeserializeIdentity -> DEBU 6d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.412 UTC [common.configtx] verifyDeltaSet -> DEBU 6d2 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.413 UTC [common.configtx] recurseConfigMap -> DEBU 6d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.414 UTC [common.configtx] recurseConfigMap -> DEBU 6d7 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.414 UTC [common.configtx] recurseConfigMap -> DEBU 6d8 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6d9 Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6da Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6db Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6dc Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6dd Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6de Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6df Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6e0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.417 UTC [common.configtx] recurseConfigMap -> DEBU 6e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.417 UTC [common.configtx] recurseConfigMap -> DEBU 6e2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.418 UTC [common.configtx] recurseConfigMap -> DEBU 6e3 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.419 UTC [common.configtx] recurseConfigMap -> DEBU 6e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.419 UTC [common.configtx] recurseConfigMap -> DEBU 6e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.421 UTC [common.configtx] recurseConfigMap -> DEBU 6e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.421 UTC [common.configtx] recurseConfigMap -> DEBU 6e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.422 UTC [common.configtx] recurseConfigMap -> DEBU 6e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.419 UTC [grpc] DialContext -> DEBU 6e7 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:33.422 UTC [grpc] DialContext -> DEBU 6ea scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:33.422 UTC [grpc] watcher -> DEBU 6eb ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:33.422 UTC [common.configtx] recurseConfigMap -> DEBU 6ec Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.423 UTC [common.configtx] recurseConfigMap -> DEBU 6ee Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.422 UTC [grpc] switchBalancer -> DEBU 6ed ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:33.425 UTC [common.channelconfig] NewStandardValues -> DEBU 6ef Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f0 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:33.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f1 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:33.427 UTC [grpc] HandleSubConnStateChange -> DEBU 6f2 pickfirstBalancer: HandleSubConnStateChange: 0xc003295ef0, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:33.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f3 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:33.428 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f4 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 01:04:33.429 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f5 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.431 UTC [common.channelconfig] NewStandardValues -> DEBU 6f6 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.431 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f7 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 01:04:33.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f8 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.434 UTC [common.channelconfig] NewStandardValues -> DEBU 6f9 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6fa Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.436 UTC [common.channelconfig] NewStandardValues -> DEBU 6fb Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6fc Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.438 UTC [common.channelconfig] Validate -> DEBU 6fd Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 01:04:33.439 UTC [common.channelconfig] validateMSP -> DEBU 6fe Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.440 UTC [msp] newBccspMsp -> DEBU 6ff Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.440 UTC [msp] New -> DEBU 700 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.441 UTC [msp] Setup -> DEBU 701 Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.443 UTC [msp.identity] newIdentity -> DEBU 702 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:24.211 UTC [common.channelconfig] LogSanityChecks -> DEBU 5cc As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:24.211 UTC [common.channelconfig] LogSanityChecks -> DEBU 5cd As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:04:24.211 UTC [policies] Manager -> DEBU 5ce Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:24.211 UTC [policies] Manager -> DEBU 5cf Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d0 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d1 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d3 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:24.212 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d4 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:04:24.213 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d5 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:04:24.213 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d6 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d7 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d8 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d9 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:24.214 UTC [policies] Manager -> DEBU 5da Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:24.214 UTC [policies] Manager -> DEBU 5db Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dd As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5de As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:24.216 UTC [common.channelconfig] LogSanityChecks -> DEBU 5df As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:24.216 UTC [common.capabilities] Supported -> DEBU 5e0 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:24.216 UTC [common.capabilities] Supported -> DEBU 5e1 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:24.216 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5e2 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2019-09-24 01:04:24.217 UTC [kvledger.util] CreateDirIfMissing -> DEBU 5e3 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2019-09-24 01:04:24.217 UTC [kvledger.util] logDirStatus -> DEBU 5e4 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2019-09-24 01:04:24.217 UTC [kvledger.util] logDirStatus -> DEBU 5e5 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2019-09-24 01:04:24.218 UTC [fsblkstorage] newBlockfileMgr -> INFO 5e6 Getting block information from block storage" +orderer0.example.com | "2019-09-24 01:04:24.218 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e7 Retrieving checkpoint info from block files" +orderer0.example.com | "2019-09-24 01:04:24.218 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e8 retrieveLastFileSuffix()" +orderer0.example.com | "2019-09-24 01:04:24.219 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e9 retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2019-09-24 01:04:24.219 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5ea Last file number found = -1" +orderer0.example.com | "2019-09-24 01:04:24.219 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5eb No block file found" +orderer0.example.com | "2019-09-24 01:04:24.220 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5ec Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000cdb540)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2019-09-24 01:04:24.222 UTC [fsblkstorage] newBlockIndex -> DEBU 5ed newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2019-09-24 01:04:24.222 UTC [orderer.common.server] func1 -> DEBU 5ee Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 01:04:24.223 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ef updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 01:04:24.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5f0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:24.223 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f1 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 01:04:24.224 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f2 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:24.224 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f3 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:24.227 UTC [fsblkstorage] indexBlock -> DEBU 5f4 Indexing block [blockNum=0, blockHash=[]byte{0x2f, 0xbc, 0x19, 0xc6, 0x1e, 0x52, 0xc5, 0x88, 0xe6, 0x4e, 0xa4, 0x19, 0xae, 0x2b, 0x7c, 0x3f, 0x7, 0x35, 0xa0, 0xe4, 0x28, 0x1e, 0xc1, 0x63, 0xa9, 0x5f, 0x8c, 0xba, 0xac, 0xe2, 0x90, 0xc5} txOffsets= +orderer0.example.com | txId=ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551 locPointer=offset=39, bytesLength=25762 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:24.229 UTC [fsblkstorage] updateCheckpoint -> DEBU 5f5 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2019-09-24 01:04:24.229 UTC [fsblkstorage] Next -> DEBU 5f6 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:24.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 5f7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:24.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f8 Remaining bytes=[25807], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:24.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f9 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:24.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5fa blockbytes [25804] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:24.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 5fb [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2019-09-24 01:04:24.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 5fc EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2019-09-24 01:04:24.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fd No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.235 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 5fe No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.239 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 5ff Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 600 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 601 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [fsblkstorage] Next -> DEBU 602 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [fsblkstorage] newBlockfileStream -> DEBU 603 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 604 Remaining bytes=[25807], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 605 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 606 blockbytes [25804] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 607 [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2019-09-24 01:04:24.240 UTC [orderer.commmon.multichannel] newChain -> INFO 608 Created and starting new chain businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.consensus.etcdraft] Start -> INFO 609 Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] Configure -> INFO 60a Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] func1 -> DEBU 60d Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.446 UTC [grpc] HandleSubConnStateChange -> DEBU 703 pickfirstBalancer: HandleSubConnStateChange: 0xc003295ef0, READY" +peer0.org1.example.com | "2019-09-24 01:04:33.447 UTC [common.channelconfig] NewStandardValues -> DEBU 704 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.447 UTC [common.channelconfig] initializeProtosStruct -> DEBU 705 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.448 UTC [common.channelconfig] NewStandardValues -> DEBU 706 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.448 UTC [comm.grpc.server] 1 -> INFO 707 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.447Z grpc.peer_address=172.18.0.8:35324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=106.7µs +peer0.org1.example.com | "2019-09-24 01:04:33.448 UTC [common.channelconfig] initializeProtosStruct -> DEBU 708 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.450 UTC [common.channelconfig] Validate -> DEBU 709 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 01:04:33.450 UTC [common.channelconfig] validateMSP -> DEBU 70a Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.450 UTC [msp] newBccspMsp -> DEBU 70b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.450 UTC [msp] New -> DEBU 70c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.450 UTC [msp] Setup -> DEBU 70d Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.451 UTC [msp.identity] newIdentity -> DEBU 70e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 70f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.458 UTC [msp.identity] Sign -> DEBU 710 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.458 UTC [msp.identity] Sign -> DEBU 711 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.459 UTC [gossip.comm] authenticateRemotePeer -> DEBU 712 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.459 UTC [gossip.comm] authenticateRemotePeer -> DEBU 713 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [msp.identity] Verify -> DEBU 714 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [msp.identity] Verify -> DEBU 716 Verify: sig = 00000000 30 45 02 21 00 ba eb 39 7a 17 cc 2c 86 ac 88 12 |0E.!...9z..,....| +peer0.org1.example.com | 00000010 eb 44 a1 d3 82 26 e9 5d 4d 45 5e bc f1 8d dd 2e |.D...&.]ME^.....| +peer0.org1.example.com | 00000020 d2 b2 bf bd 14 02 20 4e a7 72 f2 50 b7 a8 67 1d |...... N.r.P..g.| +peer0.org1.example.com | 00000030 d7 d1 86 b9 3e 36 fd f1 48 e3 45 c4 eb e1 dc 3a |....>6..H.E....:| +peer0.org1.example.com | 00000040 c3 d2 31 3e bb 71 93 |..1>.q.|" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 717 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [gossip.comm] createConnection -> DEBU 718 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [gossip.comm] sendToEndpoint -> DEBU 719 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.460 UTC [common.channelconfig] NewStandardValues -> DEBU 715 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71a Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:33.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71b Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:33.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71c Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:33.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71d Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 01:04:33.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71e Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:33.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71f Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.464 UTC [common.channelconfig] NewStandardValues -> DEBU 720 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU 721 Processing field: Endpoints" +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +orderer0.example.com | jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +orderer0.example.com | SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +orderer0.example.com | UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60f Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2019-09-24 01:04:24.242 UTC [orderer.common.cluster] func1 -> DEBU 610 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +orderer0.example.com | 3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +orderer0.example.com | ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 611 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 612 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.common.cluster] Configure -> INFO 613 Exiting" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] start -> DEBU 614 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] start -> INFO 615 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 616 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] newRaft -> INFO 617 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 618 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 619 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [msp] GetDefaultSigningIdentity -> DEBU 61a Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [msp] GetDefaultSigningIdentity -> DEBU 61b Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [msp.identity] Sign -> DEBU 61c Sign: plaintext: 0A00120B0A090A03010203100418050A...B379AC4E99C5BB79D174EC242C21D00F " +orderer0.example.com | "2019-09-24 01:04:24.243 UTC [msp.identity] Sign -> DEBU 61d Sign: digest: 9106FFD99E535522C060659E7DA0B88E67D04C56BE350834CF35B2F29BD45257 " +orderer0.example.com | "2019-09-24 01:04:24.245 UTC [orderer.consensus.etcdraft] run -> INFO 61e This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 61f Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 620 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 621 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:24.247 UTC [fsblkstorage] indexBlock -> DEBU 622 Indexing block [blockNum=1, blockHash=[]byte{0xc9, 0x45, 0xdf, 0x37, 0x81, 0x48, 0xe9, 0xcf, 0x2f, 0x67, 0x79, 0xf2, 0x8, 0xa2, 0x45, 0x82, 0x78, 0x1, 0x40, 0x7d, 0x53, 0x8c, 0x1b, 0x24, 0x72, 0x1b, 0x17, 0xb8, 0xe0, 0x6f, 0x62, 0x94} txOffsets= +orderer0.example.com | txId=6c31ef6b312999199af53620b2990731085e5abd5ebbe05e585103b587b39c7d locPointer=offset=71, bytesLength=26691 +orderer0.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:04:33.475 UTC [common.channelconfig] NewStandardValues -> DEBU 722 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.475 UTC [common.channelconfig] initializeProtosStruct -> DEBU 723 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.476 UTC [common.channelconfig] validateMSP -> DEBU 724 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.477 UTC [msp] newBccspMsp -> DEBU 725 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.477 UTC [msp] New -> DEBU 726 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:33.477 UTC [msp] Setup -> DEBU 727 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:04:33.477 UTC [msp] GetDefaultSigningIdentity -> DEBU 728 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.481 UTC [msp.identity] Sign -> DEBU 729 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.481 UTC [msp.identity] Sign -> DEBU 72a Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35324" +peer0.org1.example.com | "2019-09-24 01:04:33.486 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72c Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35324" +peer0.org1.example.com | "2019-09-24 01:04:33.486 UTC [msp] DeserializeIdentity -> DEBU 72d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 72e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.487 UTC [msp] DeserializeIdentity -> DEBU 72f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 730 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.488 UTC [msp] DeserializeIdentity -> DEBU 731 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 732 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 733 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 734 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.489 UTC [policies] Evaluate -> DEBU 735 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.490 UTC [policies] Evaluate -> DEBU 736 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.490 UTC [policies] Evaluate -> DEBU 737 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.490 UTC [cauthdsl] func1 -> DEBU 738 0xc0033e1620 gate 1569287073490152400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.490 UTC [msp.identity] newIdentity -> DEBU 739 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | 1g== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.493 UTC [grpc] infof -> DEBU 73b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.490 UTC [cauthdsl] func2 -> DEBU 73a 0xc0033e1620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.498 UTC [cauthdsl] func2 -> DEBU 73d 0xc0033e1620 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.499 UTC [cauthdsl] func2 -> DEBU 73e 0xc0033e1620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.499 UTC [cauthdsl] func2 -> DEBU 73f 0xc0033e1620 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.499 UTC [cauthdsl] func1 -> DEBU 740 0xc0033e1620 gate 1569287073490152400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.499 UTC [policies] Evaluate -> DEBU 741 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.500 UTC [policies] Evaluate -> DEBU 742 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.500 UTC [policies] Evaluate -> DEBU 743 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.501 UTC [cauthdsl] func1 -> DEBU 744 0xc0033c7300 gate 1569287073501006500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.501 UTC [cauthdsl] func2 -> DEBU 745 0xc0033c7300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.502 UTC [cauthdsl] func2 -> DEBU 746 0xc0033c7300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.504 UTC [cauthdsl] func2 -> DEBU 747 0xc0033c7300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.504 UTC [msp.identity] Verify -> DEBU 748 Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:04:33.505 UTC [msp.identity] Verify -> DEBU 74a Verify: sig = 00000000 30 45 02 21 00 86 a1 f8 ee 12 3d 69 2b 7b d1 8d |0E.!......=i+{..| +peer0.org1.example.com | 00000010 02 78 ea 54 87 be c6 0b b1 e0 0e 72 6e d9 67 00 |.x.T.......rn.g.| +peer0.org1.example.com | 00000020 5d 9a 17 42 7e 02 20 0a 74 d2 81 fa 76 65 51 87 |]..B~. .t...veQ.| +peer0.org1.example.com | 00000030 6e 7d 40 bb 33 a5 2a e5 df 33 a6 03 97 f0 1f 17 |n}@.3.*..3......| +peer0.org1.example.com | 00000040 e0 a3 c1 2a b8 22 50 |...*."P|" +peer0.org1.example.com | "2019-09-24 01:04:33.505 UTC [msp.identity] newIdentity -> DEBU 749 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.495 UTC [comm.grpc.server] 1 -> INFO 73c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.495Z grpc.peer_address=172.18.0.9:51390 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.1678ms +orderer0.example.com | "2019-09-24 01:04:24.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 623 Sending msg of 28 bytes to 3 on channel testchainid took 366.6µs" +orderer0.example.com | "2019-09-24 01:04:24.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 624 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.5µs " +orderer0.example.com | "2019-09-24 01:04:24.249 UTC [fsblkstorage] updateCheckpoint -> DEBU 625 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47980], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-09-24 01:04:24.250 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 626 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2019-09-24 01:04:24.349 UTC [common.deliver] deliverBlocks -> WARN 627 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53646 because of consenter error" +orderer0.example.com | "2019-09-24 01:04:24.350 UTC [orderer.common.server] func1 -> DEBU 628 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:24.350 UTC [comm.grpc.server] 1 -> INFO 629 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53646 grpc.code=OK grpc.call_duration=209.3085ms +orderer0.example.com | "2019-09-24 01:04:24.376 UTC [orderer.common.server] Deliver -> DEBU 62a Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:24.376 UTC [common.deliver] Handle -> DEBU 62b Starting new deliver loop for 172.18.0.5:53648" +orderer0.example.com | "2019-09-24 01:04:24.376 UTC [common.deliver] Handle -> DEBU 62c Attempting to read seek info message from 172.18.0.5:53648" +orderer0.example.com | "2019-09-24 01:04:24.580 UTC [common.deliver] deliverBlocks -> WARN 62d [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53648 because of consenter error" +orderer0.example.com | "2019-09-24 01:04:24.581 UTC [orderer.common.server] func1 -> DEBU 62e Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:24.582 UTC [comm.grpc.server] 1 -> INFO 62f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53648 grpc.code=OK grpc.call_duration=207.4685ms +orderer0.example.com | "2019-09-24 01:04:24.605 UTC [orderer.common.server] Deliver -> DEBU 630 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:24.605 UTC [common.deliver] Handle -> DEBU 631 Starting new deliver loop for 172.18.0.5:53650" +orderer0.example.com | "2019-09-24 01:04:24.605 UTC [common.deliver] Handle -> DEBU 632 Attempting to read seek info message from 172.18.0.5:53650" +orderer0.example.com | "2019-09-24 01:04:24.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 633 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:24.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 634 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +orderer0.example.com | "2019-09-24 01:04:24.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 635 Sending msg of 28 bytes to 3 on channel testchainid took 158.7µs" +orderer0.example.com | "2019-09-24 01:04:24.809 UTC [common.deliver] deliverBlocks -> WARN 636 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53650 because of consenter error" +orderer0.example.com | "2019-09-24 01:04:24.810 UTC [orderer.common.server] func1 -> DEBU 637 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:24.811 UTC [comm.grpc.server] 1 -> INFO 638 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53650 grpc.code=OK grpc.call_duration=205.8058ms +orderer0.example.com | "2019-09-24 01:04:24.845 UTC [orderer.common.server] Deliver -> DEBU 639 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:24.845 UTC [common.deliver] Handle -> DEBU 63a Starting new deliver loop for 172.18.0.5:53652" +orderer0.example.com | "2019-09-24 01:04:24.846 UTC [common.deliver] Handle -> DEBU 63b Attempting to read seek info message from 172.18.0.5:53652" +orderer0.example.com | "2019-09-24 01:04:25.047 UTC [common.deliver] deliverBlocks -> WARN 63c [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53652 because of consenter error" +orderer0.example.com | "2019-09-24 01:04:25.047 UTC [orderer.common.server] func1 -> DEBU 63d Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:25.048 UTC [comm.grpc.server] 1 -> INFO 63e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53652 grpc.code=OK grpc.call_duration=202.9277ms +orderer0.example.com | "2019-09-24 01:04:25.066 UTC [orderer.common.server] Deliver -> DEBU 63f Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:25.066 UTC [common.deliver] Handle -> DEBU 640 Starting new deliver loop for 172.18.0.5:53654" +orderer0.example.com | "2019-09-24 01:04:25.067 UTC [common.deliver] Handle -> DEBU 641 Attempting to read seek info message from 172.18.0.5:53654" +orderer0.example.com | "2019-09-24 01:04:25.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 642 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 643 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +orderer0.example.com | "2019-09-24 01:04:25.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 644 Sending msg of 28 bytes to 3 on channel testchainid took 1.0063ms" +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] Step -> INFO 645 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 646 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] poll -> INFO 647 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] campaign -> INFO 648 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] campaign -> INFO 649 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.247 UTC [orderer.common.cluster] NewStream -> DEBU 64a Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 01:04:25.248 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 64b Sending msg of 28 bytes to 2 on channel businesschannel took 190.7µs" +orderer0.example.com | "2019-09-24 01:04:25.248 UTC [orderer.common.cluster] NewStream -> DEBU 64c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2019-09-24 01:04:25.248 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 64d Sending msg of 28 bytes to 3 on channel businesschannel took 150.4µs" +orderer0.example.com | "2019-09-24 01:04:25.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.7µs " +orderer0.example.com | "2019-09-24 01:04:25.249 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.7µs " +orderer0.example.com | "2019-09-24 01:04:25.252 UTC [orderer.common.cluster] Step -> DEBU 650 Connection from orderer2.example.com(172.18.0.3:44808)" +orderer0.example.com | "2019-09-24 01:04:25.253 UTC [orderer.common.cluster.step] handleMessage -> DEBU 651 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] poll -> INFO 652 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 653 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.254 UTC [orderer.common.cluster] Step -> DEBU 654 Connection from orderer1.example.com(172.18.0.4:54914)" +orderer0.example.com | "2019-09-24 01:04:25.255 UTC [orderer.common.cluster.step] handleMessage -> DEBU 656 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 655 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.255 UTC [orderer.consensus.etcdraft] poll -> INFO 657 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.256 UTC [orderer.consensus.etcdraft] campaign -> INFO 658 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.256 UTC [orderer.consensus.etcdraft] campaign -> INFO 659 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.257 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65a Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +orderer0.example.com | "2019-09-24 01:04:25.257 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65b Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-09-24 01:04:25.258 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.1µs " +orderer0.example.com | "2019-09-24 01:04:25.258 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +orderer0.example.com | "2019-09-24 01:04:25.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 65e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] poll -> INFO 65f 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 660 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 661 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.263 UTC [orderer.consensus.etcdraft] run -> INFO 662 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 663 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.264 UTC [orderer.consensus.etcdraft] run -> INFO 664 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.265 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 665 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.265 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 666 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:25.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU 667 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 227.3µs " +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 668 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 669 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:04:25.270 UTC [msp] DeserializeIdentity -> DEBU 66d Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:25.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66e Sending msg of 36 bytes to 2 on channel businesschannel took 3.1207ms" +orderer0.example.com | "2019-09-24 01:04:25.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66f Sending msg of 36 bytes to 3 on channel businesschannel took 23.8µs" +orderer0.example.com | "2019-09-24 01:04:25.272 UTC [msp.identity] newIdentity -> DEBU 670 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:25.273 UTC [orderer.common.cluster.step] sendMessage -> DEBU 671 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 941.5µs " +orderer0.example.com | "2019-09-24 01:04:25.276 UTC [orderer.common.cluster.step] handleMessage -> DEBU 672 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:33.510 UTC [grpc] infof -> DEBU 74b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.510 UTC [cauthdsl] func2 -> DEBU 74c 0xc0033c7300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.511 UTC [msp] Validate -> DEBU 74d MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.512 UTC [comm.grpc.server] 1 -> INFO 74e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.511Z grpc.peer_address=172.18.0.6:44018 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.9µs +peer0.org1.example.com | "2019-09-24 01:04:33.512 UTC [cauthdsl] func1 -> DEBU 74f 0xc0033c7300 gate 1569287073501006500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.513 UTC [policies] Evaluate -> DEBU 750 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.514 UTC [msp] Setup -> DEBU 751 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | "2019-09-24 01:04:33.514 UTC [msp] Setup -> DEBU 752 MSP manager setup complete, setup 3 msps" +peer0.org1.example.com | "2019-09-24 01:04:33.514 UTC [policies] NewManagerImpl -> DEBU 753 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.514 UTC [policies] Evaluate -> DEBU 754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.515 UTC [policies] Evaluate -> DEBU 755 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.515 UTC [policies] Evaluate -> DEBU 756 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.515 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Authenticated 172.18.0.8:35324" +peer0.org1.example.com | "2019-09-24 01:04:33.516 UTC [gossip.comm] GossipStream -> DEBU 758 Servicing 172.18.0.8:35324" +peer0.org1.example.com | "2019-09-24 01:04:33.516 UTC [gossip.comm] serviceConnection -> DEBU 759 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:04:33.516 UTC [gossip.comm] func2 -> DEBU 75b Client 172.18.0.8:35316 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [comm.grpc.server] 1 -> INFO 75f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:35316 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.1132031s +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [msp] GetDefaultSigningIdentity -> DEBU 760 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [msp.identity] Sign -> DEBU 761 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [msp.identity] Sign -> DEBU 762 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [gossip.comm] authenticateRemotePeer -> DEBU 763 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:44018" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [gossip.comm] authenticateRemotePeer -> DEBU 764 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44018" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [gossip.comm] writeToStream -> DEBU 765 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [msp] GetDefaultSigningIdentity -> DEBU 75c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.518 UTC [msp.identity] Sign -> DEBU 766 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.518 UTC [msp.identity] Sign -> DEBU 768 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.519 UTC [gossip.comm] authenticateRemotePeer -> DEBU 76b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51390" +peer0.org1.example.com | "2019-09-24 01:04:33.520 UTC [gossip.comm] authenticateRemotePeer -> DEBU 76c Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51390" +peer0.org1.example.com | "2019-09-24 01:04:33.521 UTC [msp] DeserializeIdentity -> DEBU 76d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.518 UTC [msp.identity] Verify -> DEBU 767 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:33.521 UTC [msp.identity] Verify -> DEBU 76e Verify: sig = 00000000 30 44 02 20 70 42 ee ef 1e 63 b5 5a 62 d6 0f 38 |0D. pB...c.Zb..8| +peer0.org1.example.com | 00000010 b8 94 b0 30 a2 9d fd b1 8e e8 99 63 f8 b3 ce 44 |...0.......c...D| +peer0.org1.example.com | 00000020 52 f6 e9 f1 02 20 17 37 92 69 d5 57 55 be f7 7c |R.... .7.i.WU..|| +peer0.org1.example.com | 00000030 6f e6 21 88 16 31 9e 66 3f 30 e1 db 76 67 53 2c |o.!..1.f?0..vgS,| +peer0.org1.example.com | 00000040 57 34 95 c0 eb d1 |W4....|" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 76f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [msp] DeserializeIdentity -> DEBU 774 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.518 UTC [gossip.comm] readFromStream -> DEBU 769 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [gossip.comm] authenticateRemotePeer -> DEBU 770 Authenticated 172.18.0.6:44018" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [gossip.comm] func2 -> DEBU 75e Client 172.18.0.8:35324 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:33.516 UTC [policies] NewManagerImpl -> DEBU 75a Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.518 UTC [gossip.comm] writeToStream -> DEBU 76a Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:33.517 UTC [gossip.comm] readFromStream -> DEBU 75d Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [grpc] infof -> DEBU 771 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [gossip.comm] func1 -> DEBU 772 Got message: GossipMessage: nonce:5554066734959271297 tag:EMPTY mem_req:0\323\027\241\257\375\tq\201(\352\263S" secret_envelope: DEBU 691 Verify: sig = 00000000 30 44 02 20 31 29 77 ac d0 41 07 5e 87 90 bb 3d |0D. 1)w..A.^...=| +orderer0.example.com | 00000010 f3 8e 3d fc a6 3a e5 5f 6c af 8e 1a e5 5f 3c 45 |..=..:._l...._..u.|" +orderer0.example.com | "2019-09-24 01:04:25.286 UTC [cauthdsl] func2 -> DEBU 692 0xc00036b1c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:25.287 UTC [cauthdsl] func1 -> DEBU 693 0xc00036b1c0 gate 1569287065282907700 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 694 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 696 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 697 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 698 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 699 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [common.deliver] deliverBlocks -> DEBU 69a [channel: businesschannel] Received seekInfo (0xc0002b0780) start: > stop: > from 172.18.0.5:53654" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [fsblkstorage] Next -> DEBU 69b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2019-09-24 01:04:25.288 UTC [fsblkstorage] newBlockfileStream -> DEBU 69c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69d Remaining bytes=[25807], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69e Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69f blockbytes [25804] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:25.289 UTC [common.deliver] deliverBlocks -> DEBU 6a0 [channel: businesschannel] Delivering block for (0xc0002b0780) for 172.18.0.5:53654" +orderer0.example.com | "2019-09-24 01:04:25.289 UTC [common.deliver] deliverBlocks -> DEBU 6a1 [channel: businesschannel] Done delivering to 172.18.0.5:53654 for (0xc0002b0780)" +orderer0.example.com | "2019-09-24 01:04:25.294 UTC [common.deliver] Handle -> DEBU 6a2 Waiting for new SeekInfo from 172.18.0.5:53654" +peer0.org1.example.com | "2019-09-24 01:04:33.522 UTC [grpc] infof -> DEBU 773 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.294 UTC [common.deliver] Handle -> DEBU 6a3 Attempting to read seek info message from 172.18.0.5:53654" +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [common.deliver] Handle -> DEBU 6a5 Received EOF from 172.18.0.5:53654, hangup" +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [orderer.common.server] func1 -> DEBU 6a6 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [comm.grpc.server] 1 -> INFO 6a7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53654 grpc.code=OK grpc.call_duration=235.5333ms +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6aa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ab transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ad transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:25.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-09-24 01:04:25.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +orderer0.example.com | "2019-09-24 01:04:25.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b1 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 01:04:25.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b2 Sending msg of 28 bytes to 3 on channel businesschannel took 365.4µs" +orderer0.example.com | "2019-09-24 01:04:25.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.8µs " +orderer0.example.com | "2019-09-24 01:04:25.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " +orderer0.example.com | "2019-09-24 01:04:25.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:25.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.192 UTC [orderer.common.server] replicateDisabledChains -> DEBU 6b7 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 01:04:26.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b9 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +orderer0.example.com | "2019-09-24 01:04:26.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.6µs " +orderer0.example.com | "2019-09-24 01:04:26.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bb Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 01:04:26.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-09-24 01:04:26.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.8µs " +orderer0.example.com | "2019-09-24 01:04:26.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.7µs " +orderer0.example.com | "2019-09-24 01:04:26.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c2 Sending msg of 28 bytes to 3 on channel testchainid took 101µs" +orderer0.example.com | "2019-09-24 01:04:26.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +orderer0.example.com | "2019-09-24 01:04:26.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c4 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +orderer0.example.com | "2019-09-24 01:04:26.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c5 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +orderer0.example.com | "2019-09-24 01:04:26.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.6µs " +orderer0.example.com | "2019-09-24 01:04:26.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.4µs " +orderer0.example.com | "2019-09-24 01:04:26.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:26.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:27.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:27.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cb Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +peer0.org1.example.com | "2019-09-24 01:04:33.523 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 775 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.523 UTC [gossip.comm] GossipStream -> DEBU 776 Servicing 172.18.0.6:44018" +peer0.org1.example.com | "2019-09-24 01:04:33.523 UTC [comm.grpc.server] 1 -> INFO 777 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.477Z grpc.peer_address=172.18.0.8:35324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.9017ms +peer0.org1.example.com | "2019-09-24 01:04:33.523 UTC [policies] NewManagerImpl -> DEBU 778 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.524 UTC [gossip.gossip] handleMessage -> DEBU 779 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:5554066734959271297 tag:EMPTY mem_req:0\323\027\241\257\375\tq\201(\352\263S" secret_envelope: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78a Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:33.533 UTC [msp.identity] Verify -> DEBU 78d Verify: digest = 00000000 78 9d d6 67 f6 9a ce dd 0f f1 ae bc 64 5e 70 9e |x..g........d^p.| +peer0.org1.example.com | 00000010 65 13 da f5 8e fb 61 e8 17 cb b1 99 f4 c5 57 18 |e.....a.......W.|" +peer0.org1.example.com | "2019-09-24 01:04:33.533 UTC [msp.identity] Verify -> DEBU 78e Verify: sig = 00000000 30 44 02 20 03 9f 2c 74 d3 e4 70 08 f0 3c bd 41 |0D. ..,t..p..<.A| +peer0.org1.example.com | 00000010 4c 52 ee a3 e8 95 be 0f cf cc e7 ef c3 a9 11 b0 |LR..............| +peer0.org1.example.com | 00000020 36 84 c4 ff 02 20 5b 96 ed ad 01 f7 f7 69 b3 0a |6.... [......i..| +peer0.org1.example.com | 00000030 f8 0e 50 a6 14 bf d1 10 3e 30 d3 17 a1 af fd 09 |..P.....>0......| +peer0.org1.example.com | 00000040 71 81 28 ea b3 53 |q.(..S|" +peer0.org1.example.com | "2019-09-24 01:04:33.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 78b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.534 UTC [msp.identity] Verify -> DEBU 78f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:33.534 UTC [msp.identity] Verify -> DEBU 790 Verify: sig = 00000000 30 44 02 20 4a c1 c4 0b 19 92 60 f6 67 b6 32 27 |0D. J.....`.g.2'| +peer0.org1.example.com | 00000010 87 04 a6 9c a7 4c 41 65 cc 68 1f 3a c0 82 47 a9 |.....LAe.h.:..G.| +peer0.org1.example.com | 00000020 ac 3d 27 ed 02 20 4c 11 68 e9 1d b4 fb c8 05 18 |.='.. L.h.......| +peer0.org1.example.com | 00000030 17 ef 5d 3c fa 30 ac 47 85 43 dd 80 1b 9d 04 be |..]<.0.G.C......| +peer0.org1.example.com | 00000040 c6 5c f0 e6 12 b2 |.\....|" +peer0.org1.example.com | "2019-09-24 01:04:33.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 791 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 792 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 793 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [cauthdsl] func1 -> DEBU 795 0xc003451c50 gate 1569287073535490500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 796 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 798 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:33.532 UTC [policies] NewManagerImpl -> DEBU 78c Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 799 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.536 UTC [policies] NewManagerImpl -> DEBU 79a Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 79e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 79f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [policies] NewManagerImpl -> DEBU 7a0 Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.537 UTC [policies] NewManagerImpl -> DEBU 7a1 Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7a5 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:27.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +orderer0.example.com | "2019-09-24 01:04:27.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cd Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +orderer0.example.com | "2019-09-24 01:04:27.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +orderer0.example.com | "2019-09-24 01:04:27.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-09-24 01:04:27.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +orderer0.example.com | "2019-09-24 01:04:27.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:27.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +orderer0.example.com | "2019-09-24 01:04:28.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d5 Sending msg of 28 bytes to 3 on channel businesschannel took 155.2µs" +orderer0.example.com | "2019-09-24 01:04:28.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.6µs " +orderer0.example.com | "2019-09-24 01:04:28.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.1µs " +orderer0.example.com | "2019-09-24 01:04:28.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d8 Sending msg of 28 bytes to 3 on channel testchainid took 85µs" +orderer0.example.com | "2019-09-24 01:04:28.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +orderer0.example.com | "2019-09-24 01:04:28.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6da Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6db Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6dc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6dd Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 01:04:28.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2011ms " +orderer0.example.com | "2019-09-24 01:04:28.266 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 01:04:28.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +orderer0.example.com | "2019-09-24 01:04:28.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 580.9µs " +orderer0.example.com | "2019-09-24 01:04:28.270 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.2µs " +orderer0.example.com | "2019-09-24 01:04:28.290 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:28.290 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:29.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 28 bytes to 2 on channel businesschannel took 43.5µs" +orderer0.example.com | "2019-09-24 01:04:29.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e6 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:04:29.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.4µs " +orderer0.example.com | "2019-09-24 01:04:29.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.1µs " +orderer0.example.com | "2019-09-24 01:04:29.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:29.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 01:04:29.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-09-24 01:04:29.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +orderer0.example.com | "2019-09-24 01:04:29.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +orderer0.example.com | "2019-09-24 01:04:29.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:29.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +orderer0.example.com | "2019-09-24 01:04:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-09-24 01:04:29.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7a8 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [gossip.gossip] handleMessage -> DEBU 7a9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [gossip.discovery] sendMemResponse -> DEBU 7aa Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:33.539 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.539 UTC [msp] DeserializeIdentity -> DEBU 7ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.539 UTC [gossip.comm] Send -> DEBU 7ae Entering, sending GossipMessage: Channel: , nonce: 5554066734959271297, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a2 Got message: GossipMessage: nonce:7851733216047407521 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7ab Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.535 UTC [cauthdsl] func2 -> DEBU 797 0xc003451c50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.539 UTC [gossip.discovery] sendMemResponse -> DEBU 7af Exiting, replying with alive:0\323\027\241\257\375\tq\201(\352\263S" secret_envelope: DEBU 7cf Verify: sig = 00000000 30 44 02 20 64 18 ca b8 b4 57 16 8e 14 45 fd 3c |0D. d....W...E.<| +peer0.org1.example.com | 00000010 63 55 5f ae 27 d2 7f 01 7b 71 d5 c2 35 6c 00 98 |cU_.'...{q..5l..| +peer0.org1.example.com | 00000020 af ff 3f d8 02 20 07 80 28 db d9 c9 d0 e8 fc b2 |..?.. ..(.......| +peer0.org1.example.com | 00000030 a3 f0 34 cc 65 d8 34 73 82 a0 71 f8 a3 0f 5c d3 |..4.e.4s..q...\.| +peer0.org1.example.com | 00000040 d6 38 c0 28 b0 78 |.8.(.x|" +peer0.org1.example.com | "2019-09-24 01:04:33.545 UTC [cauthdsl] func2 -> DEBU 7d0 0xc0034e03a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.546 UTC [cauthdsl] func1 -> DEBU 7d1 0xc0034e03a0 gate 1569287073544081900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.546 UTC [policies] Evaluate -> DEBU 7d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.545 UTC [grpc] HandleSubConnStateChange -> DEBU 7ce pickfirstBalancer: HandleSubConnStateChange: 0xc0034da300, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:33.540 UTC [policies] NewManagerImpl -> DEBU 7b2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.540 UTC [cauthdsl] func2 -> DEBU 7b3 0xc003451c50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7d9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7da updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7db Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 7dc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 7dd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.discovery] handleAliveMessage -> DEBU 7de Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7df Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.discovery] sendMemResponse -> DEBU 7e0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.550 UTC [gossip.comm] Send -> DEBU 7e4 Entering, sending GossipMessage: Channel: , nonce: 7851733216047407521, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 01:04:30.872 UTC [orderer.common.server] Broadcast -> DEBU 715 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:04:30.873 UTC [orderer.common.broadcast] Handle -> DEBU 716 Starting new broadcast loop for 172.18.0.5:53682" +orderer0.example.com | "2019-09-24 01:04:30.873 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 717 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53682" +orderer0.example.com | "2019-09-24 01:04:30.874 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 718 Processing config update message for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:30.874 UTC [policies] Evaluate -> DEBU 719 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.874 UTC [policies] Evaluate -> DEBU 71a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.875 UTC [cauthdsl] func1 -> DEBU 71e 0xc000947f40 gate 1569287070875875100 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:30.876 UTC [cauthdsl] func2 -> DEBU 71f 0xc000947f40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:30.876 UTC [cauthdsl] func2 -> DEBU 720 0xc000947f40 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:30.877 UTC [cauthdsl] func2 -> DEBU 721 0xc000947f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 01:04:30.879 UTC [cauthdsl] func2 -> DEBU 722 0xc000947f40 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:30.880 UTC [cauthdsl] func1 -> DEBU 723 0xc000947f40 gate 1569287070875875100 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:30.880 UTC [policies] Evaluate -> DEBU 724 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.880 UTC [policies] Evaluate -> DEBU 725 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.881 UTC [policies] func1 -> DEBU 726 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-09-24 01:04:30.883 UTC [policies] Evaluate -> DEBU 727 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.886 UTC [policies] Evaluate -> DEBU 728 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.886 UTC [policies] Evaluate -> DEBU 729 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.887 UTC [policies] Evaluate -> DEBU 72a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:30.888 UTC [policies] Evaluate -> DEBU 72b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.890 UTC [cauthdsl] func1 -> DEBU 72c 0xc00097eeb0 gate 1569287070890037600 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:30.890 UTC [cauthdsl] func2 -> DEBU 72d 0xc00097eeb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:30.891 UTC [cauthdsl] func2 -> DEBU 72e 0xc00097eeb0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:30.891 UTC [cauthdsl] func2 -> DEBU 72f 0xc00097eeb0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:30.892 UTC [msp.identity] Verify -> DEBU 730 Verify: digest = 00000000 4f 60 c4 f6 4b 92 bb 51 fd 5b 23 4d c8 97 9c 8b |O`..K..Q.[#M....| +orderer0.example.com | 00000010 f0 7f c8 12 f4 f8 08 b1 fa 75 65 76 3b f3 02 5a |.........uev;..Z|" +orderer0.example.com | "2019-09-24 01:04:30.892 UTC [msp.identity] Verify -> DEBU 731 Verify: sig = 00000000 30 45 02 21 00 86 34 33 60 61 5a f4 ca 1b 01 57 |0E.!..43`aZ....W| +orderer0.example.com | 00000010 1a 0c 2d 6b ad 2a 06 5a e5 ef 24 61 be 5d 8d 04 |..-k.*.Z..$a.]..| +orderer0.example.com | 00000020 30 a9 2b 1a cd 02 20 1d 79 3c b5 c9 92 31 b4 e1 |0.+... .y<...1..| +orderer0.example.com | 00000030 d4 3c cb 25 00 7b bf ef 22 8b 79 e5 33 c3 3b c3 |.<.%.{..".y.3.;.| +orderer0.example.com | 00000040 5a 4d cd fc 57 5a f0 |ZM..WZ.|" +orderer0.example.com | "2019-09-24 01:04:30.895 UTC [cauthdsl] func2 -> DEBU 732 0xc00097eeb0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:30.895 UTC [cauthdsl] func1 -> DEBU 733 0xc00097eeb0 gate 1569287070890037600 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 734 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 735 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 736 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 737 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 738 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 739 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 740 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 741 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 742 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 743 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 744 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 745 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 746 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 747 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [gossip.discovery] sendMemResponse -> DEBU 7e5 Exiting, replying with alive:0\323\027\241\257\375\tq\201(\352\263S" > alive: alive:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > alive: " +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [gossip.comm] sendToEndpoint -> DEBU 7e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7851733216047407521, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [gossip.comm] sendToEndpoint -> DEBU 7e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.548 UTC [policies] NewManagerImpl -> DEBU 7d7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7e8 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7e9 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7ea Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7eb Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ec Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ed Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ee Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.554 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.556 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.556 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.555 UTC [grpc] HandleSubConnStateChange -> DEBU 7f9 pickfirstBalancer: HandleSubConnStateChange: 0xc0034da300, READY" +peer0.org1.example.com | "2019-09-24 01:04:33.549 UTC [cauthdsl] func2 -> DEBU 7d8 0xc003451c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.558 UTC [cauthdsl] func2 -> DEBU 801 0xc003451c50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.559 UTC [cauthdsl] func1 -> DEBU 808 0xc003451c50 gate 1569287073535490500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.559 UTC [policies] Evaluate -> DEBU 809 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.559 UTC [policies] Evaluate -> DEBU 80a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [policies] Evaluate -> DEBU 80b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [cauthdsl] func1 -> DEBU 80c 0xc00350fda0 gate 1569287073560188200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80d 0xc00350fda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80e 0xc00350fda0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80f 0xc00350fda0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [msp.identity] Verify -> DEBU 811 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 812 Verify: sig = 00000000 30 45 02 21 00 b7 4c c7 a4 7a 1f b9 69 55 f2 2a |0E.!..L..z..iU.*| +peer0.org1.example.com | 00000010 39 85 dd 89 47 8f 5a 6d e3 2c b7 57 90 5a aa 1c |9...G.Zm.,.W.Z..| +peer0.org1.example.com | 00000020 c3 d9 04 2a 45 02 20 6e 89 f9 a0 bc 85 76 0a f2 |...*E. n.....v..| +peer0.org1.example.com | 00000030 6a 3a 47 7a b2 26 0b af b1 a5 bf 67 fe f1 20 dc |j:Gz.&.....g.. .| +peer0.org1.example.com | 00000040 e6 85 35 18 37 26 dc |..5.7&.|" +peer0.org1.example.com | "2019-09-24 01:04:33.560 UTC [msp] GetDefaultSigningIdentity -> DEBU 813 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [msp.identity] Sign -> DEBU 814 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [msp.identity] Sign -> DEBU 815 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [cauthdsl] func2 -> DEBU 816 0xc00350fda0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [cauthdsl] func1 -> DEBU 818 0xc00350fda0 gate 1569287073560188200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.559 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.channelconfig] LogSanityChecks -> DEBU 82d As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [common.channelconfig] LogSanityChecks -> DEBU 82e As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 82f Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 830 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 831 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 832 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 833 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 834 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 835 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 836 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 837 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 838 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 839 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 83a Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 83b Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [policies] Manager -> DEBU 83c Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83f As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 841 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.capabilities] Supported -> DEBU 842 Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [common.capabilities] Supported -> DEBU 843 Channel capability V1_4_3 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [gossip.comm] authenticateRemotePeer -> DEBU 817 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [gossip.service] ProcessConfigUpdate -> DEBU 844 Processing new config for channel businesschannel" +orderer0.example.com | "2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 748 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.899 UTC [common.configtx] verifyDeltaSet -> DEBU 749 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.899 UTC [common.configtx] policyForItem -> DEBU 74a Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74b Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74c Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74d Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74e Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 74f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 750 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 751 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 752 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [policies] Manager -> DEBU 753 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [policies] Manager -> DEBU 754 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [cauthdsl] func1 -> DEBU 756 0xc000c29b70 gate 1569287070902577200 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [cauthdsl] func2 -> DEBU 757 0xc000c29b70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:30.902 UTC [cauthdsl] func2 -> DEBU 758 0xc000c29b70 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:30.903 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 759 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.903 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 75a Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.903 UTC [msp] Validate -> DEBU 75b MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.903 UTC [msp] getCertificationChain -> DEBU 75c MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:30.903 UTC [msp] hasOURole -> DEBU 75d MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:04:30.904 UTC [msp] getCertificationChain -> DEBU 75e MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:30.904 UTC [cauthdsl] func2 -> DEBU 75f 0xc000c29b70 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:30.904 UTC [msp.identity] Verify -> DEBU 760 Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +orderer0.example.com | 00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +orderer0.example.com | "2019-09-24 01:04:30.904 UTC [msp.identity] Verify -> DEBU 761 Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +orderer0.example.com | 00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +orderer0.example.com | 00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +orderer0.example.com | 00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +orderer0.example.com | 00000040 0a 8e 87 e4 30 41 |....0A|" +orderer0.example.com | "2019-09-24 01:04:30.905 UTC [cauthdsl] func2 -> DEBU 762 0xc000c29b70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:30.905 UTC [cauthdsl] func1 -> DEBU 763 0xc000c29b70 gate 1569287070902577200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:30.905 UTC [policies] Evaluate -> DEBU 764 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.905 UTC [policies] Evaluate -> DEBU 765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.906 UTC [common.configtx] verifyDeltaSet -> DEBU 766 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.906 UTC [common.configtx] recurseConfigMap -> DEBU 767 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 768 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 769 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 770 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 771 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 772 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 773 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [gossip.service] ProcessConfigUpdate -> DEBU 846 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [gossip.service] updateAnchors -> DEBU 847 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 01:04:33.561 UTC [policies] Evaluate -> DEBU 840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 848 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 849 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 84a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.565 UTC [gossip.comm] authenticateRemotePeer -> DEBU 84b Authenticated 172.18.0.9:51390" +peer0.org1.example.com | "2019-09-24 01:04:33.565 UTC [gossip.comm] GossipStream -> DEBU 84c Servicing 172.18.0.9:51390" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [gossip.comm] authenticateRemotePeer -> DEBU 845 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.564 UTC [gossip.service] updateAnchors -> DEBU 84d Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [gossip.service] updateAnchors -> DEBU 84e Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 850 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 851 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 852 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [msp.identity] Verify -> DEBU 853 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 61 d4 8f c5 1c 68 25 7a 75 e1 5e 70 |0D. a....h%zu.^p| +peer0.org1.example.com | 00000010 6a d2 02 18 67 35 3f 78 d3 75 cd 6c d5 c3 7f 47 |j...g5?x.u.l...G| +peer0.org1.example.com | 00000020 df 70 db 2f 02 20 63 14 a2 ef ed fd 46 f4 77 a3 |.p./. c.....F.w.| +peer0.org1.example.com | 00000030 a6 41 44 56 60 50 d5 cd f3 49 92 ae e5 60 b5 9d |.ADV`P...I...`..| +peer0.org1.example.com | 00000040 db 79 b6 88 ba 9a |.y....|" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [gossip.comm] authenticateRemotePeer -> DEBU 856 Authenticated 172.18.0.6:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [gossip.comm] createConnection -> DEBU 858 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [gossip.comm] sendToEndpoint -> DEBU 85a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [gossip.comm] readFromStream -> DEBU 859 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [gossip.comm] serviceConnection -> DEBU 857 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [gossip.comm] func2 -> DEBU 85c Client 172.18.0.9:51372 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [comm.grpc.server] 1 -> INFO 85d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51372 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.3533542s +peer0.org1.example.com | "2019-09-24 01:04:33.567 UTC [gossip.comm] func2 -> DEBU 85b Client 172.18.0.9:51390 disconnected" +peer0.org1.example.com | "2019-09-24 01:04:33.568 UTC [comm.grpc.server] 1 -> INFO 85e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.516Z grpc.peer_address=172.18.0.9:51390 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.474ms +peer0.org1.example.com | "2019-09-24 01:04:33.569 UTC [gossip.comm] writeToStream -> DEBU 85f Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:33.569 UTC [gossip.comm] writeToStream -> DEBU 860 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:33.569 UTC [gossip.comm] readFromStream -> DEBU 861 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.569 UTC [msp] DeserializeIdentity -> DEBU 862 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.570 UTC [msp.identity] newIdentity -> DEBU 863 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.571 UTC [cauthdsl] func1 -> DEBU 864 0xc00358e610 gate 1569287073571149500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.571 UTC [cauthdsl] func2 -> DEBU 865 0xc00358e610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.571 UTC [cauthdsl] func2 -> DEBU 866 0xc00358e610 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.571 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 867 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.572 UTC [msp] Validate -> DEBU 868 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.573 UTC [msp] getCertificationChain -> DEBU 869 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.573 UTC [cauthdsl] func2 -> DEBU 86a 0xc00358e610 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.573 UTC [msp.identity] Verify -> DEBU 86b Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +peer0.org1.example.com | 00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +peer0.org1.example.com | "2019-09-24 01:04:33.574 UTC [msp.identity] Verify -> DEBU 86c Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +peer0.org1.example.com | 00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +peer0.org1.example.com | 00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +peer0.org1.example.com | 00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +peer0.org1.example.com | 00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +peer0.org1.example.com | "2019-09-24 01:04:33.575 UTC [cauthdsl] func2 -> DEBU 86d 0xc00358e610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.575 UTC [cauthdsl] func1 -> DEBU 86e 0xc00358e610 gate 1569287073571149500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.575 UTC [policies] Evaluate -> DEBU 86f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.575 UTC [policies] Evaluate -> DEBU 870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.576 UTC [policies] Evaluate -> DEBU 871 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.576 UTC [policies] Evaluate -> DEBU 872 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.576 UTC [gossip.gossip] JoinChan -> INFO 873 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 874 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 875 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 876 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 01:04:33.577 UTC [gossip.discovery] Connect -> DEBU 877 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-09-24 01:04:33.578 UTC [gossip.discovery] Connect -> DEBU 878 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.578 UTC [gossip.service] updateEndpoints -> DEBU 879 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 01:04:33.578 UTC [msp] DeserializeIdentity -> DEBU 87a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.579 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 87b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.580 UTC [msp] DeserializeIdentity -> DEBU 87c Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.channelconfig] NewStandardValues -> DEBU 77d Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 77e Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 77f Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 780 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 781 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 782 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 783 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 784 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 785 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 786 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 787 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 788 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 789 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.911 UTC [common.channelconfig] Validate -> DEBU 78a Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:30.911 UTC [common.channelconfig] validateMSP -> DEBU 78b Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.911 UTC [msp] newBccspMsp -> DEBU 78c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [msp] New -> DEBU 78d Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [msp] Setup -> DEBU 78e Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [msp.identity] newIdentity -> DEBU 78f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [common.channelconfig] NewStandardValues -> DEBU 790 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [common.channelconfig] initializeProtosStruct -> DEBU 791 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [common.channelconfig] NewStandardValues -> DEBU 792 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.912 UTC [common.channelconfig] initializeProtosStruct -> DEBU 793 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.913 UTC [common.channelconfig] Validate -> DEBU 794 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:30.914 UTC [common.channelconfig] validateMSP -> DEBU 795 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.914 UTC [msp] newBccspMsp -> DEBU 796 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.914 UTC [msp] New -> DEBU 797 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.914 UTC [msp] Setup -> DEBU 798 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.914 UTC [msp.identity] newIdentity -> DEBU 799 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.915 UTC [common.channelconfig] NewStandardValues -> DEBU 79a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79c Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79d Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79e Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79f Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a0 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] NewStandardValues -> DEBU 7a1 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a2 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] NewStandardValues -> DEBU 7a3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a4 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [common.channelconfig] validateMSP -> DEBU 7a5 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [msp] newBccspMsp -> DEBU 7a6 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [msp] New -> DEBU 7a7 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [msp] Setup -> DEBU 7a8 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:30.916 UTC [msp.identity] newIdentity -> DEBU 7a9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [msp.identity] newIdentity -> DEBU 7aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | "2019-09-24 01:04:33.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 87d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.581 UTC [peer] updateTrustedRoots -> DEBU 87e Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.582 UTC [grpc] DialContext -> DEBU 87f parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:33.582 UTC [grpc] DialContext -> DEBU 880 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:33.582 UTC [grpc] watcher -> DEBU 881 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:33.582 UTC [grpc] switchBalancer -> DEBU 882 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:33.582 UTC [grpc] HandleSubConnStateChange -> DEBU 883 pickfirstBalancer: HandleSubConnStateChange: 0xc0035d4ac0, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:33.583 UTC [gossip.comm] func1 -> DEBU 884 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.583 UTC [gossip.gossip] handleMessage -> DEBU 885 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.583 UTC [gossip.gossip] handleMessage -> DEBU 886 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 887 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 888 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:33.584 UTC [msp.identity] Verify -> DEBU 889 Verify: digest = 00000000 38 fa 0b 0b bc 13 ed 75 a9 b4 d2 eb 4f 5a d2 82 |8......u....OZ..| +peer0.org1.example.com | 00000010 98 4e 35 12 8b b9 af e0 85 c1 ac ad 6d bf 00 98 |.N5.........m...|" +peer0.org1.example.com | "2019-09-24 01:04:33.584 UTC [msp.identity] Verify -> DEBU 88a Verify: sig = 00000000 30 44 02 20 5d 4e f3 a9 af a7 3a c1 89 63 27 d0 |0D. ]N....:..c'.| +peer0.org1.example.com | 00000010 90 7c c9 d0 5d c0 70 8b 43 7f 65 81 0f 25 f0 6a |.|..].p.C.e..%.j| +peer0.org1.example.com | 00000020 0c 8a fc aa 02 20 3c db 4d b4 e7 7e df 07 1a 4e |..... <.M..~...N| +peer0.org1.example.com | 00000030 5a 16 68 97 36 2c 67 a6 92 5a e2 73 1b 93 8a 93 |Z.h.6,g..Z.s....| +peer0.org1.example.com | 00000040 a8 c4 4d 11 05 34 |..M..4|" +peer0.org1.example.com | "2019-09-24 01:04:33.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 88b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 88c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:33.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 890 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 891 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.592 UTC [gossip.discovery] handleMsgFromComm -> DEBU 892 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.594 UTC [msp] DeserializeIdentity -> DEBU 893 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.595 UTC [msp] DeserializeIdentity -> DEBU 894 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.595 UTC [msp] DeserializeIdentity -> DEBU 895 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.596 UTC [gossip.comm] Send -> DEBU 896 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.596 UTC [msp] DeserializeIdentity -> DEBU 897 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.596 UTC [gossip.comm] Send -> DEBU 898 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.596 UTC [gossip.comm] sendToEndpoint -> DEBU 899 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.597 UTC [gossip.comm] createConnection -> DEBU 89a Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:33.599 UTC [grpc] DialContext -> DEBU 89b parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:33.599 UTC [grpc] DialContext -> DEBU 89c scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:33.599 UTC [grpc] watcher -> DEBU 89d ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:33.599 UTC [grpc] switchBalancer -> DEBU 89e ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:33.599 UTC [grpc] HandleSubConnStateChange -> DEBU 89f pickfirstBalancer: HandleSubConnStateChange: 0xc003605ed0, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:33.600 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.601 UTC [gossip.comm] createConnection -> DEBU 8a1 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:33.603 UTC [grpc] DialContext -> DEBU 8a2 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:33.603 UTC [grpc] DialContext -> DEBU 8a3 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:33.603 UTC [grpc] watcher -> DEBU 8a4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:33.603 UTC [grpc] switchBalancer -> DEBU 8a5 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:33.603 UTC [grpc] HandleSubConnStateChange -> DEBU 8a6 pickfirstBalancer: HandleSubConnStateChange: 0xc00362b820, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:33.607 UTC [grpc] infof -> DEBU 8a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8a8 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8a9 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8aa adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 01:04:33.610 UTC [peer] buildTrustedRootsForChain -> DEBU 8ab adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 01:04:33.610 UTC [committer.txvalidator] validateTx -> DEBU 8ac config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.611 UTC [committer.txvalidator] validateTx -> DEBU 8ad [businesschannel] validateTx completes for block 0xc003156940 env 0xc003161450 txn 0" +peer0.org1.example.com | "2019-09-24 01:04:33.612 UTC [committer.txvalidator] Validate -> DEBU 8ae got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:04:33.612 UTC [committer.txvalidator] Validate -> INFO 8b0 [businesschannel] Validated block [2] in 216ms" +peer0.org1.example.com | "2019-09-24 01:04:33.613 UTC [gossip.privdata] listMissingPrivateData -> DEBU 8b1 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:04:33.613 UTC [gossip.privdata] StoreBlock -> DEBU 8b2 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:04:33.613 UTC [committer] preCommit -> DEBU 8b3 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 01:04:33.614 UTC [grpc] HandleSubConnStateChange -> DEBU 8b4 pickfirstBalancer: HandleSubConnStateChange: 0xc0035d4ac0, READY" +peer0.org1.example.com | "2019-09-24 01:04:33.613 UTC [kvledger] CommitWithPvtData -> DEBU 8b5 [businesschannel] Validating state for block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.614 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:04:33.614 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b7 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b8 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8b9 ValidateAndPrepareBatch() for block number = [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8ba preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [valimpl] preprocessProtoBlock -> DEBU 8bb txType=CONFIG" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [valimpl] processNonEndorserTx -> DEBU 8bc Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [valimpl] processNonEndorserTx -> DEBU 8bd Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 01:04:33.615 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 8be constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:33.616 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 8bf constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 01:04:33.616 UTC [peer] GenerateSimulationResults -> DEBU 8c0 Processing CONFIG" +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [msp] Validate -> DEBU 7ab MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [msp] Setup -> DEBU 7ac Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [msp] Setup -> DEBU 7ad MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7ae Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7af Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b1 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b2 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b3 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b4 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b6 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b7 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b8 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b9 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7ba Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7bb Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7bc Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] GetPolicy -> DEBU 7bd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7be Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] GetPolicy -> DEBU 7bf Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7c0 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7c1 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c2 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c3 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c4 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c6 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7ca Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cd Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7ce Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cf Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d3 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d4 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d5 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7da Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7dd Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7de Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7f2 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7f3 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f4 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f5 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f6 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f7 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f8 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f9 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fa As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fb As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fc As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7fd Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7fe Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7ff Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 800 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 801 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 802 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 803 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 804 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 805 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.capabilities] Supported -> DEBU 806 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [common.capabilities] Supported -> DEBU 807 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:30.919 UTC [msp] GetDefaultSigningIdentity -> DEBU 808 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp] GetDefaultSigningIdentity -> DEBU 809 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp.identity] Sign -> DEBU 80a Sign: plaintext: 0AD2060A1B08011A06089ED7A5EC0522...EF228B79E533C33BC35A4DCDFC575AF0 " +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp.identity] Sign -> DEBU 80b Sign: digest: 3A3BA8FA1947C64F70723B87EBA8A93ACC79A8F3D8CD6E6D4BA90A088660295F " +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 810 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp] DeserializeIdentity -> DEBU 811 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp.identity] newIdentity -> DEBU 812 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [cauthdsl] func1 -> DEBU 813 0xc0001f3e30 gate 1569287070920693200 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 814 0xc0001f3e30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 815 0xc0001f3e30 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 816 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [msp] Validate -> DEBU 817 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 818 0xc0001f3e30 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [msp.identity] Verify -> DEBU 819 Verify: digest = 00000000 3a 3b a8 fa 19 47 c6 4f 70 72 3b 87 eb a8 a9 3a |:;...G.Opr;....:| +orderer0.example.com | 00000010 cc 79 a8 f3 d8 cd 6e 6d 4b a9 0a 08 86 60 29 5f |.y....nmK....`)_|" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [msp.identity] Verify -> DEBU 81a Verify: sig = 00000000 30 44 02 20 3a b0 a4 59 8c 0d d1 93 63 37 ae 85 |0D. :..Y....c7..| +orderer0.example.com | 00000010 3c d5 31 b6 01 9c 7d 0e 86 9f fd b5 ba 94 55 e6 |<.1...}.......U.| +orderer0.example.com | 00000020 2d 17 bd 56 02 20 63 81 1a 3b 99 93 cf 7e 2f fe |-..V. c..;...~/.| +orderer0.example.com | 00000030 d4 28 43 f3 2d 43 fb 57 79 ee b6 15 b0 f5 fc aa |.(C.-C.Wy.......| +orderer0.example.com | 00000040 1a b2 84 1a bc 27 |.....'|" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [cauthdsl] func2 -> DEBU 81b 0xc0001f3e30 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [cauthdsl] func1 -> DEBU 81c 0xc0001f3e30 gate 1569287070920693200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81f Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 820 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 821 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 822 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [orderer.common.msgprocessor] Apply -> DEBU 823 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 824 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 825 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 826 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 827 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 828 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 829 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82a Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:04:33.617 UTC [peer] processChannelConfigTx -> DEBU 8c1 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 01:04:33.617 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 8c2 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:04:33.617 UTC [lockbasedtxmgr] Done -> DEBU 8c3 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 01:04:33.618 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 8c4 Block [2] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:04:33.618 UTC [valinternal] ApplyWriteSet -> DEBU 8c5 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00353f5c0)}" +peer0.org1.example.com | "2019-09-24 01:04:33.618 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c6 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:04:33.618 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c7 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:04:33.619 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c9 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:04:33.619 UTC [grpc] HandleSubConnStateChange -> DEBU 8ca pickfirstBalancer: HandleSubConnStateChange: 0xc00362b820, READY" +peer0.org1.example.com | "2019-09-24 01:04:33.620 UTC [kvledger] CommitWithPvtData -> DEBU 8cb [businesschannel] Adding CommitHash to the block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.620 UTC [kvledger] CommitWithPvtData -> DEBU 8cc [businesschannel] Committing block [2] to storage" +peer0.org1.example.com | "2019-09-24 01:04:33.620 UTC [ledgerstorage] CommitWithPvtData -> DEBU 8cd Writing block [2] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:04:33.612 UTC [grpc] HandleSubConnStateChange -> DEBU 8af pickfirstBalancer: HandleSubConnStateChange: 0xc003605ed0, READY" +peer0.org1.example.com | "2019-09-24 01:04:33.624 UTC [pvtdatastorage] Prepare -> DEBU 8ce Saved 0 private data write sets for block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.624 UTC [msp] GetDefaultSigningIdentity -> DEBU 8cf Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.624 UTC [msp.identity] Sign -> DEBU 8d0 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.624 UTC [msp.identity] Sign -> DEBU 8d1 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.625 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.626 UTC [fsblkstorage] indexBlock -> DEBU 8d3 Indexing block [blockNum=2, blockHash=[]byte{0xba, 0xc0, 0xcb, 0xf4, 0x59, 0xfa, 0xb5, 0xea, 0x84, 0x86, 0x4a, 0x57, 0xcd, 0xad, 0xb5, 0xc7, 0xd0, 0x5a, 0x7c, 0x6a, 0x8b, 0x61, 0x16, 0xcf, 0x6f, 0x9c, 0x46, 0xa0, 0xe3, 0x2b, 0x77, 0xe0} txOffsets= +peer0.org1.example.com | txId=b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e locPointer=offset=71, bytesLength=24474 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:04:33.627 UTC [fsblkstorage] indexBlock -> DEBU 8d4 Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e] to txid-index" +peer0.org1.example.com | "2019-09-24 01:04:33.627 UTC [fsblkstorage] indexBlock -> DEBU 8d5 Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:04:33.629 UTC [fsblkstorage] updateCheckpoint -> DEBU 8d6 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76839], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org1.example.com | "2019-09-24 01:04:33.629 UTC [pvtdatastorage] Commit -> DEBU 8d7 Committing private data for block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.630 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.630 UTC [msp.identity] Sign -> DEBU 8d9 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.630 UTC [msp.identity] Sign -> DEBU 8da Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.630 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8db Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82b Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82c Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82d Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82e Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 830 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] Validate -> DEBU 831 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [common.channelconfig] validateMSP -> DEBU 832 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [msp] newBccspMsp -> DEBU 833 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [msp] New -> DEBU 834 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.921 UTC [msp] Setup -> DEBU 835 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [msp.identity] newIdentity -> DEBU 836 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] NewStandardValues -> DEBU 837 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] initializeProtosStruct -> DEBU 838 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] NewStandardValues -> DEBU 839 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] initializeProtosStruct -> DEBU 83a Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] Validate -> DEBU 83b Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [common.channelconfig] validateMSP -> DEBU 83c Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [msp] newBccspMsp -> DEBU 83d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [msp] New -> DEBU 83e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [msp] Setup -> DEBU 83f Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.922 UTC [msp.identity] newIdentity -> DEBU 840 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] NewStandardValues -> DEBU 841 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 842 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 843 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 844 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 845 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 846 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 847 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] NewStandardValues -> DEBU 848 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 849 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] NewStandardValues -> DEBU 84a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 84b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [common.channelconfig] validateMSP -> DEBU 84c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.931 UTC [msp] newBccspMsp -> DEBU 84d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.932 UTC [msp] New -> DEBU 84e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.932 UTC [msp] Setup -> DEBU 84f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:30.932 UTC [msp.identity] newIdentity -> DEBU 850 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.933 UTC [msp.identity] newIdentity -> DEBU 851 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | "2019-09-24 01:04:33.631 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8dc Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.631 UTC [msp] DeserializeIdentity -> DEBU 8dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.632 UTC [msp] DeserializeIdentity -> DEBU 8de Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.633 UTC [msp.identity] newIdentity -> DEBU 8df Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.634 UTC [msp] Validate -> DEBU 8e0 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.634 UTC [msp] getCertificationChain -> DEBU 8e1 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [pvtdatastorage] Commit -> DEBU 8e2 Committed private data for block [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [kvledger] CommitWithPvtData -> DEBU 8e4 [businesschannel] Committing block [2] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [lockbasedtxmgr] Commit -> DEBU 8e6 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [lockbasedtxmgr] Commit -> DEBU 8e7 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 8e8 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [lockbasedtxmgr] Commit -> DEBU 8e9 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [stateleveldb] ApplyUpdates -> DEBU 8ea Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8eb Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [msp] DeserializeIdentity -> DEBU 8ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.636 UTC [msp] DeserializeIdentity -> DEBU 8ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.637 UTC [msp.identity] newIdentity -> DEBU 8ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer0.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer0.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer0.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.638 UTC [lockbasedtxmgr] Commit -> DEBU 8ef Updates committed to state database and the write lock is released" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.934 UTC [msp] Validate -> DEBU 852 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.934 UTC [msp] Setup -> DEBU 853 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [msp] Setup -> DEBU 854 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 855 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 856 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 857 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 858 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 859 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 85a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85c Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85d Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85e Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 860 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 861 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 862 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.936 UTC [policies] GetPolicy -> DEBU 863 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 864 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 865 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 866 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 867 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] GetPolicy -> DEBU 868 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 869 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86b Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86c Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87c Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 880 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 881 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 882 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 883 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 884 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 885 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 886 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 887 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 888 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 889 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88a Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88c Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88d Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 890 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 891 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 892 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 893 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 894 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 895 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 896 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 897 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 898 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:30.942 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 899 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53682" +orderer0.example.com | "2019-09-24 01:04:30.944 UTC [orderer.consensus.etcdraft] propose -> INFO 89a Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:30.944 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 89b Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:30.945 UTC [orderer.consensus.etcdraft] 2 -> DEBU 89c Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:30.947 UTC [common.deliver] Handle -> WARN 89d Error reading from 172.18.0.5:53680: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:04:30.947 UTC [orderer.common.server] func1 -> DEBU 89e Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:30.947 UTC [comm.grpc.server] 1 -> INFO 89f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=90.5018ms +orderer0.example.com | "2019-09-24 01:04:30.949 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8a1 Send of ConsensusRequest for channel businesschannel with payload of size 24600 to orderer2.example.com(orderer2.example.com:7050) took 1.2986ms " +orderer0.example.com | "2019-09-24 01:04:30.950 UTC [grpc] infof -> DEBU 8a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:30.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8a0 Sending msg of 24600 bytes to 3 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 01:04:30.954 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8a3 Sending msg of 24600 bytes to 2 on channel businesschannel took 1.3423ms" +orderer0.example.com | "2019-09-24 01:04:30.956 UTC [orderer.common.broadcast] Handle -> WARN 8a4 Error reading from 172.18.0.5:53682: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:04:30.956 UTC [orderer.common.server] func1 -> DEBU 8a5 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:04:30.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8a6 Send of ConsensusRequest for channel businesschannel with payload of size 24600 to orderer1.example.com(orderer1.example.com:7050) took 1.0759ms " +orderer0.example.com | "2019-09-24 01:04:30.957 UTC [comm.grpc.server] 1 -> INFO 8a7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.8136ms +orderer0.example.com | "2019-09-24 01:04:30.958 UTC [grpc] infof -> DEBU 8a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:30.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8a9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8aa Sending msg of 28 bytes to 2 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8ab Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 8ad Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8ae Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8af Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b6 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b7 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] addToMap -> DEBU 8bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] addToMap -> DEBU 8bc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] verifyDeltaSet -> DEBU 8bd Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] policyForItem -> DEBU 8be Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8bf Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c0 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c1 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c2 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c3 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c4 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c5 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c6 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c7 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c8 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func1 -> DEBU 8ca 0xc0010ead80 gate 1569287070960426400 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cb 0xc0010ead80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cc 0xc0010ead80 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cd 0xc0010ead80 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [msp.identity] Verify -> DEBU 8ce Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +orderer0.example.com | 00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [msp.identity] Verify -> DEBU 8cf Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +orderer0.example.com | 00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +orderer0.example.com | 00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +orderer0.example.com | 00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +orderer0.example.com | 00000040 0a 8e 87 e4 30 41 |....0A|" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8d0 0xc0010ead80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [cauthdsl] func1 -> DEBU 8d1 0xc0010ead80 gate 1569287070960426400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8d2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] verifyDeltaSet -> DEBU 8d4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.960 UTC [common.configtx] recurseConfigMap -> DEBU 8d5 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d6 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d7 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8da Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8db Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8dc Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8dd Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8de Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8df Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e1 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:33.638 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8f0 Preparing potential purge list working-set for expiringAtBlk [3]" +peer0.org1.example.com | "2019-09-24 01:04:33.638 UTC [leveldbhelper] GetIterator -> DEBU 8f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:04:33.638 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8f2 No expiry entry found for expiringAtBlk [3]" +peer0.org1.example.com | "2019-09-24 01:04:33.639 UTC [lockbasedtxmgr] func1 -> DEBU 8f3 launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:04:33.639 UTC [kvledger] CommitWithPvtData -> DEBU 8f4 [businesschannel] Committing block [2] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:04:33.639 UTC [historyleveldb] Commit -> DEBU 8f6 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:04:33.640 UTC [historyleveldb] Commit -> DEBU 8f7 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 01:04:33.618 UTC [msp] GetDefaultSigningIdentity -> DEBU 8c8 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.640 UTC [msp.identity] Sign -> DEBU 8f8 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:33.640 UTC [msp.identity] Sign -> DEBU 8f9 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:33.641 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8fa Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.641 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8fb Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.641 UTC [msp] DeserializeIdentity -> DEBU 8fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.641 UTC [historyleveldb] Commit -> DEBU 8fd Channel [businesschannel]: Updates committed to history database for blockNo [2]" +peer0.org1.example.com | "2019-09-24 01:04:33.642 UTC [kvledger] CommitWithPvtData -> INFO 8ff [businesschannel] Committed block [2] with 1 transaction(s) in 28ms (state_validation=6ms block_and_pvtdata_commit=15ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +peer0.org1.example.com | "2019-09-24 01:04:33.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 900 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.642 UTC [msp.identity] Sign -> DEBU 901 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020803 " +peer0.org1.example.com | "2019-09-24 01:04:33.643 UTC [msp.identity] Sign -> DEBU 902 Sign: digest: 05862C91303EF1F3FEAEA3C4B65204B4CC6494816FBF71117F024F546F20B174 " +peer0.org1.example.com | "2019-09-24 01:04:33.643 UTC [gossip.state] commitBlock -> DEBU 903 [businesschannel] Committed block [2] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:04:33.642 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.644 UTC [msp] DeserializeIdentity -> DEBU 904 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.635 UTC [msp] DeserializeIdentity -> DEBU 8e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 905 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.645 UTC [msp] DeserializeIdentity -> DEBU 906 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 907 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 909 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 90a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.639 UTC [msp] Validate -> DEBU 8f5 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.646 UTC [policies] Evaluate -> DEBU 90b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [policies] Evaluate -> DEBU 90c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [policies] Evaluate -> DEBU 90d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [cauthdsl] func1 -> DEBU 90e 0xc003829810 gate 1569287073647333400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 910 0xc003829810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 911 0xc003829810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 912 0xc003829810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e9 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8ea Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] NewStandardValues -> DEBU 8eb Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ec Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ed Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ee Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ef Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:30.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +orderer0.example.com | "2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f1 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.965 UTC [common.channelconfig] NewStandardValues -> DEBU 8f2 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:30.965 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f3 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:30.965 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f4 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8f5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:30.967 UTC [common.channelconfig] NewStandardValues -> DEBU 8f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f7 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.968 UTC [common.channelconfig] NewStandardValues -> DEBU 8f8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f9 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.969 UTC [common.channelconfig] Validate -> DEBU 8fa Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:30.970 UTC [common.channelconfig] validateMSP -> DEBU 8fb Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.970 UTC [msp] newBccspMsp -> DEBU 8fc Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.970 UTC [msp] New -> DEBU 8fd Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.971 UTC [msp] Setup -> DEBU 8fe Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.973 UTC [msp.identity] newIdentity -> DEBU 8ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.975 UTC [common.channelconfig] NewStandardValues -> DEBU 900 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 901 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.975 UTC [common.channelconfig] NewStandardValues -> DEBU 902 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 903 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.977 UTC [common.channelconfig] Validate -> DEBU 904 Anchor peers for org Org2MSP are " +orderer0.example.com | "2019-09-24 01:04:30.977 UTC [common.channelconfig] validateMSP -> DEBU 905 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.977 UTC [msp] newBccspMsp -> DEBU 906 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.979 UTC [msp] New -> DEBU 907 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.980 UTC [msp] Setup -> DEBU 908 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.982 UTC [msp.identity] newIdentity -> DEBU 909 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.984 UTC [common.channelconfig] NewStandardValues -> DEBU 90a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:30.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90b Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90c Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90d Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90e Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90f Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 910 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 908 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.647 UTC [msp] getCertificationChain -> DEBU 90f MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.648 UTC [cauthdsl] func2 -> DEBU 913 0xc003829810 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.649 UTC [cauthdsl] func1 -> DEBU 916 0xc003829810 gate 1569287073647333400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.649 UTC [policies] Evaluate -> DEBU 917 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.650 UTC [policies] Evaluate -> DEBU 918 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.648 UTC [msp] DeserializeIdentity -> DEBU 914 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 915 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.650 UTC [policies] Evaluate -> DEBU 919 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [cauthdsl] func1 -> DEBU 91b 0xc0038406b0 gate 1569287073651118400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [cauthdsl] func2 -> DEBU 91c 0xc0038406b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 91d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [cauthdsl] func2 -> DEBU 91e 0xc0038406b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 91f Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [msp] Validate -> DEBU 920 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] NewStandardValues -> DEBU 911 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 912 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:30.985 UTC [common.channelconfig] NewStandardValues -> DEBU 913 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 914 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [common.channelconfig] validateMSP -> DEBU 915 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [msp] newBccspMsp -> DEBU 916 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [msp] New -> DEBU 917 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [msp] Setup -> DEBU 918 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 919 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 91a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:30.986 UTC [msp.identity] newIdentity -> DEBU 91b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [msp.identity] newIdentity -> DEBU 91c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [msp] Validate -> DEBU 91d MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [msp] Setup -> DEBU 91e Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [msp] Setup -> DEBU 91f MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 920 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 921 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 922 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 923 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 924 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 925 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 926 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 927 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 928 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 929 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 92a Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92b Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92c Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92d Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92e Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] GetPolicy -> DEBU 92f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 921 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 922 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 924 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 925 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [cauthdsl] func1 -> DEBU 926 0xc00384cc00 gate 1569287073652366100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [msp] getCertificationChain -> DEBU 927 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.652 UTC [cauthdsl] func2 -> DEBU 928 0xc00384cc00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 92a 0xc00384cc00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 92b 0xc00384cc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.650 UTC [msp] DeserializeIdentity -> DEBU 91a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 929 0xc0038406b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.654 UTC [cauthdsl] func2 -> DEBU 92c 0xc00384cc00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.655 UTC [cauthdsl] func1 -> DEBU 92e 0xc00384cc00 gate 1569287073652366100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.655 UTC [policies] Evaluate -> DEBU 92f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.655 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.656 UTC [msp] DeserializeIdentity -> DEBU 932 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.655 UTC [policies] Evaluate -> DEBU 931 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.656 UTC [policies] Evaluate -> DEBU 933 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.656 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 934 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 936 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 937 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 930 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] GetPolicy -> DEBU 931 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 932 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 933 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 934 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 935 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 936 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 937 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 938 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 939 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93a Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93d Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 93e Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 93f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 940 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 941 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 942 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 943 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 944 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 945 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 946 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 947 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 948 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 949 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94d Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 94e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 94f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 950 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 951 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 952 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 953 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 954 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 955 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 956 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 957 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 958 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 959 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95a Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95b Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95e Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95f Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 960 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 961 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.configtx] addToMap -> DEBU 962 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.configtx] addToMap -> DEBU 963 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 964 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 965 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 966 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 967 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 968 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:04:33.657 UTC [policies] Evaluate -> DEBU 938 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.657 UTC [policies] Evaluate -> DEBU 939 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.656 UTC [cauthdsl] func1 -> DEBU 935 0xc003841290 gate 1569287073656677800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.655 UTC [msp.identity] Verify -> DEBU 92d Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 93a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.659 UTC [cauthdsl] func1 -> DEBU 93d 0xc00386a3e0 gate 1569287073659339200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.659 UTC [cauthdsl] func2 -> DEBU 93e 0xc00386a3e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.659 UTC [cauthdsl] func2 -> DEBU 93f 0xc00386a3e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.658 UTC [cauthdsl] func2 -> DEBU 93b 0xc003841290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.660 UTC [cauthdsl] func2 -> DEBU 940 0xc003841290 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.660 UTC [cauthdsl] func2 -> DEBU 941 0xc003841290 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.660 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 942 0xc00386a3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.661 UTC [cauthdsl] func2 -> DEBU 945 0xc00386a3e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.661 UTC [cauthdsl] func1 -> DEBU 946 0xc00386a3e0 gate 1569287073659339200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.661 UTC [policies] Evaluate -> DEBU 947 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.662 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.662 UTC [policies] Evaluate -> DEBU 949 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.662 UTC [cauthdsl] func1 -> DEBU 94a 0xc00386ac40 gate 1569287073662559400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.660 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 45 02 21 00 ed 5d d1 b0 f3 a7 27 55 3c fb 0b |0E.!..]....'U<..| +peer0.org1.example.com | 00000010 d6 87 3c 4e aa 58 3a 77 b6 bb 80 f3 ef d4 d1 6d |.. DEBU 93c Verify: sig = 00000000 30 44 02 20 4e ec 0f c7 ca b3 6f 39 bb 03 ca a3 |0D. N.....o9....| +peer0.org1.example.com | 00000010 79 a3 f2 41 33 83 f5 b0 cd de 50 24 25 15 41 73 |y..A3.....P$%.As| +peer0.org1.example.com | 00000020 01 d6 7b c4 02 20 30 c8 b8 76 53 93 cd 42 00 d4 |..{.. 0..vS..B..| +peer0.org1.example.com | 00000030 eb d5 cd 74 61 fe 19 26 77 28 40 aa 5f 7f b3 04 |...ta..&w(@._...| +peer0.org1.example.com | 00000040 f8 e8 37 e6 89 e6 |..7...|" +peer0.org1.example.com | "2019-09-24 01:04:33.662 UTC [cauthdsl] func2 -> DEBU 94b 0xc00386ac40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94e 0xc00386ac40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.663 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 94f Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.663 UTC [msp] Validate -> DEBU 950 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.664 UTC [msp] getCertificationChain -> DEBU 951 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.664 UTC [cauthdsl] func2 -> DEBU 952 0xc00386ac40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.664 UTC [msp.identity] Verify -> DEBU 953 Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:04:33.664 UTC [msp.identity] Verify -> DEBU 954 Verify: sig = 00000000 30 44 02 20 3a fb 36 b2 13 68 85 40 04 3d b7 13 |0D. :.6..h.@.=..| +peer0.org1.example.com | 00000010 6f 8f fa 2f 06 f8 5a 4e b1 29 b7 2b 46 e2 1a a4 |o../..ZN.).+F...| +peer0.org1.example.com | 00000020 9e 7a 11 b6 02 20 23 40 78 1a e9 68 15 9c 2c 1d |.z... #@x..h..,.| +peer0.org1.example.com | 00000030 c5 70 6b 00 9d 74 75 1f 03 81 34 8e 8f 53 3d d2 |.pk..tu...4..S=.| +peer0.org1.example.com | 00000040 6b cf 84 64 c0 4a |k..d.J|" +peer0.org1.example.com | "2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94c 0xc003841290 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [cauthdsl] func1 -> DEBU 955 0xc003841290 gate 1569287073656677800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 957 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 958 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 959 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 95a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [gossip.comm] authenticateRemotePeer -> DEBU 95b Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [msp] DeserializeIdentity -> DEBU 95c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [msp] GetDefaultSigningIdentity -> DEBU 95d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [msp.identity] Sign -> DEBU 95e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315100F " +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [msp.identity] Sign -> DEBU 960 Sign: digest: 37D60EED559B3C3939B1ED7F6C251BAB37D85B1256FF5BEA2D98F034854867D6 " +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [grpc] infof -> DEBU 95f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.666 UTC [msp] GetDefaultSigningIdentity -> DEBU 961 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:33.667 UTC [msp.identity] Sign -> DEBU 962 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:33.667 UTC [msp.identity] Sign -> DEBU 963 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94d 0xc0038406b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.667 UTC [cauthdsl] func1 -> DEBU 964 0xc0038406b0 gate 1569287073651118400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.667 UTC [msp] DeserializeIdentity -> DEBU 965 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.667 UTC [policies] Evaluate -> DEBU 966 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 969 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 96a Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 96b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96c As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96d As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96e As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 96f Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 970 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 971 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 972 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 973 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 974 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 975 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 976 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 977 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.capabilities] Supported -> DEBU 978 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [common.capabilities] Supported -> DEBU 979 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:30.995 UTC [orderer.common.server] func1 -> DEBU 97a Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97b updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97c adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97d adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97e adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 97f [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 980 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2019-09-24 01:04:30.996 UTC [msp] GetDefaultSigningIdentity -> DEBU 981 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:30.997 UTC [msp] GetDefaultSigningIdentity -> DEBU 982 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:30.997 UTC [msp.identity] Sign -> DEBU 983 Sign: plaintext: 0A020801120B0A090A03010203100418...45D385843EC3656689A0D7DB640DA02D " +orderer0.example.com | "2019-09-24 01:04:30.997 UTC [msp.identity] Sign -> DEBU 984 Sign: digest: 77DDB6D772808AD1F85ADE4C70A668F5AD49050564CABDB4AC1D585169E0B226 " +orderer0.example.com | "2019-09-24 01:04:30.999 UTC [fsblkstorage] indexBlock -> DEBU 985 Indexing block [blockNum=1, blockHash=[]byte{0x2d, 0x35, 0x2, 0xb4, 0xa1, 0xf4, 0x55, 0x5, 0x99, 0x27, 0xd1, 0x6d, 0xe6, 0x7c, 0x19, 0xc, 0x5f, 0x50, 0x26, 0x8f, 0x7a, 0x87, 0x5a, 0xb8, 0xa2, 0xc9, 0x82, 0xeb, 0xf2, 0x57, 0xa0, 0x33} txOffsets= +orderer0.example.com | txId=33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636 locPointer=offset=71, bytesLength=24469 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:31.000 UTC [fsblkstorage] updateCheckpoint -> DEBU 986 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51285], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2019-09-24 01:04:31.000 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 987 [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2019-09-24 01:04:31.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 988 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 989 Sending msg of 28 bytes to 3 on channel testchainid took 55.5µs" +orderer0.example.com | "2019-09-24 01:04:31.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +orderer0.example.com | "2019-09-24 01:04:31.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98b Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +orderer0.example.com | "2019-09-24 01:04:31.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98c Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +orderer0.example.com | "2019-09-24 01:04:31.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 940.7µs " +orderer0.example.com | "2019-09-24 01:04:31.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +orderer0.example.com | "2019-09-24 01:04:31.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 990 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 991 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 992 Sending msg of 28 bytes to 3 on channel testchainid took 53.6µs" +orderer0.example.com | "2019-09-24 01:04:31.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 993 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 833.1µs " +orderer0.example.com | "2019-09-24 01:04:31.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 994 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 01:04:31.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 995 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-09-24 01:04:31.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 996 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.5µs " +orderer0.example.com | "2019-09-24 01:04:31.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 997 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.2µs " +orderer0.example.com | "2019-09-24 01:04:31.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU 998 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU 999 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:31.778 UTC [orderer.common.server] Deliver -> DEBU 99a Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:31.778 UTC [common.deliver] Handle -> DEBU 99b Starting new deliver loop for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:04:31.778 UTC [common.deliver] Handle -> DEBU 99c Attempting to read seek info message from 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 9a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 9a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:04:31.779 UTC [msp] DeserializeIdentity -> DEBU 9a2 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:31.780 UTC [msp.identity] newIdentity -> DEBU 9a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +orderer0.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +orderer0.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +orderer0.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:31.781 UTC [cauthdsl] func1 -> DEBU 9a4 0xc001203cc0 gate 1569287071781757700 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:31.781 UTC [cauthdsl] func2 -> DEBU 9a5 0xc001203cc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:31.782 UTC [cauthdsl] func2 -> DEBU 9a6 0xc001203cc0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:31.782 UTC [cauthdsl] func2 -> DEBU 9a7 0xc001203cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 01:04:31.783 UTC [cauthdsl] func2 -> DEBU 9a8 0xc001203cc0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:31.783 UTC [cauthdsl] func1 -> DEBU 9a9 0xc001203cc0 gate 1569287071781757700 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:31.783 UTC [policies] Evaluate -> DEBU 9aa Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:31.783 UTC [policies] Evaluate -> DEBU 9ab == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:31.783 UTC [policies] func1 -> DEBU 9ac Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9ad Signature set did not satisfy policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 967 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 968 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:04:31.785 UTC [policies] Evaluate -> DEBU 9b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [gossip.comm] Send -> DEBU 969 Entering, sending GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 01:04:31.785 UTC [policies] Evaluate -> DEBU 9b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.665 UTC [cauthdsl] func2 -> DEBU 956 0xc00386ac40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:31.786 UTC [cauthdsl] func1 -> DEBU 9b2 0xc00123f2f0 gate 1569287071786449300 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:31.787 UTC [cauthdsl] func2 -> DEBU 9b3 0xc00123f2f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:31.787 UTC [cauthdsl] func2 -> DEBU 9b4 0xc00123f2f0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:31.789 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9b5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [cauthdsl] func1 -> DEBU 96c 0xc00386ac40 gate 1569287073662559400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:31.789 UTC [msp] Validate -> DEBU 9b6 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:31.790 UTC [msp] getCertificationChain -> DEBU 9b7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:31.791 UTC [cauthdsl] func2 -> DEBU 9b8 0xc00123f2f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [gossip.comm] sendToEndpoint -> DEBU 96b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.669 UTC [gossip.comm] authenticateRemotePeer -> DEBU 971 Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.669 UTC [gossip.comm] createConnection -> DEBU 972 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.669 UTC [gossip.comm] sendToEndpoint -> DEBU 973 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 970 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 974 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.670 UTC [gossip.comm] createConnection -> DEBU 975 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.670 UTC [gossip.comm] sendToEndpoint -> DEBU 976 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.670 UTC [gossip.comm] func1 -> WARN 977 peer0.org2.example.com:7051, PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 isn't responsive: EOF" +peer0.org1.example.com | "2019-09-24 01:04:33.670 UTC [gossip.comm] sendToEndpoint -> DEBU 978 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.671 UTC [gossip.discovery] expireDeadMembers -> WARN 979 Entering [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2]" +peer0.org1.example.com | "2019-09-24 01:04:33.671 UTC [gossip.discovery] expireDeadMembers -> WARN 97a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: " +peer0.org1.example.com | "2019-09-24 01:04:33.672 UTC [gossip.comm] serviceConnection -> DEBU 97c Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:04:33.671 UTC [grpc] infof -> DEBU 97b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:33.671 UTC [gossip.comm] CloseConn -> DEBU 97d Closing connection for , PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:33.672 UTC [gossip.discovery] expireDeadMembers -> WARN 97e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.724 UTC [msp] DeserializeIdentity -> DEBU 97f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.725 UTC [gossip.comm] Send -> DEBU 980 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.725 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.725 UTC [gossip.comm] sendToEndpoint -> DEBU 982 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.728 UTC [gossip.comm] sendToEndpoint -> DEBU 983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.728 UTC [gossip.comm] sendToEndpoint -> DEBU 984 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.731 UTC [msp] DeserializeIdentity -> DEBU 985 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.731 UTC [gossip.comm] Send -> DEBU 986 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.731 UTC [msp] DeserializeIdentity -> DEBU 987 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.732 UTC [gossip.comm] sendToEndpoint -> DEBU 988 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.732 UTC [gossip.comm] sendToEndpoint -> DEBU 989 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.735 UTC [gossip.pull] Hello -> DEBU 98a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:33.735 UTC [gossip.comm] Send -> DEBU 98b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:33.735 UTC [gossip.comm] sendToEndpoint -> DEBU 98c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.735 UTC [gossip.comm] sendToEndpoint -> DEBU 98d Exiting" +orderer0.example.com | "2019-09-24 01:04:31.791 UTC [msp.identity] Verify -> DEBU 9b9 Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +orderer0.example.com | 00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +orderer0.example.com | "2019-09-24 01:04:31.791 UTC [msp.identity] Verify -> DEBU 9ba Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +orderer0.example.com | 00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +orderer0.example.com | 00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +orderer0.example.com | 00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +orderer0.example.com | 00000040 8d 91 b7 ea 04 6f |.....o|" +orderer0.example.com | "2019-09-24 01:04:31.792 UTC [cauthdsl] func2 -> DEBU 9bb 0xc00123f2f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:31.792 UTC [cauthdsl] func1 -> DEBU 9bc 0xc00123f2f0 gate 1569287071786449300 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9bd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9bf Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.736 UTC [gossip.comm] sendToEndpoint -> DEBU 98e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.736 UTC [gossip.comm] sendToEndpoint -> DEBU 98f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.740 UTC [gossip.comm] func1 -> DEBU 990 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.740 UTC [gossip.gossip] handleMessage -> DEBU 991 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.740 UTC [gossip.comm] func1 -> DEBU 992 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.743 UTC [gossip.comm] func1 -> DEBU 993 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 994 Verify: digest = 00000000 e1 31 f7 e7 88 8d cc c2 72 f6 31 44 34 c9 52 4a |.1......r.1D4.RJ| +peer0.org1.example.com | 00000010 c7 07 4b 63 c2 a5 ee 0f 25 04 86 1e 52 2c 4a 2d |..Kc....%...R,J-|" +peer0.org1.example.com | "2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 995 Verify: sig = 00000000 30 45 02 21 00 cd 65 94 88 ad e5 0a 22 fd 68 7f |0E.!..e.....".h.| +peer0.org1.example.com | 00000010 bb e9 5c db d9 8c 2e ed ae b3 54 90 7a ca 69 41 |..\.......T.z.iA| +peer0.org1.example.com | 00000020 3c cc 29 40 8c 02 20 63 d6 34 dc e1 8a 87 b1 a8 |<.)@.. c.4......| +peer0.org1.example.com | 00000030 13 df 9d d3 bd c3 e7 b5 d4 2d 72 cd d6 5a f1 89 |.........-r..Z..| +peer0.org1.example.com | 00000040 d8 50 85 64 1e ce 1f |.P.d...|" +peer0.org1.example.com | "2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 996 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 997 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:33.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 998 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 999 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.746 UTC [policies] Evaluate -> DEBU 99a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.747 UTC [policies] Evaluate -> DEBU 99b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.747 UTC [policies] Evaluate -> DEBU 99c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.747 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.747 UTC [msp.identity] newIdentity -> DEBU 99e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:33.748 UTC [cauthdsl] func1 -> DEBU 99f 0xc003895d80 gate 1569287073747885500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a0 0xc003895d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a1 0xc003895d80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9a2 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [msp] Validate -> DEBU 9a3 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [msp] getCertificationChain -> DEBU 9a4 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a5 0xc003895d80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.749 UTC [msp.identity] Verify -> DEBU 9a6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:33.750 UTC [msp.identity] Verify -> DEBU 9a7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:33.750 UTC [cauthdsl] func2 -> DEBU 9a8 0xc003895d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.750 UTC [cauthdsl] func1 -> DEBU 9a9 0xc003895d80 gate 1569287073747885500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.750 UTC [policies] Evaluate -> DEBU 9aa Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.750 UTC [policies] Evaluate -> DEBU 9ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.751 UTC [policies] Evaluate -> DEBU 9ac Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.751 UTC [policies] Evaluate -> DEBU 9ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.751 UTC [gossip.gossip] handleMessage -> DEBU 9ae Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.751 UTC [gossip.gossip] handleMessage -> DEBU 9af Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.752 UTC [msp] DeserializeIdentity -> DEBU 9b0 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:31.794 UTC [common.deliver] deliverBlocks -> DEBU 9c3 [channel: businesschannel] Received seekInfo (0xc00115ddc0) start: > stop: > from 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:04:31.795 UTC [fsblkstorage] Next -> DEBU 9c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:04:31.795 UTC [fsblkstorage] newBlockfileStream -> DEBU 9c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +orderer0.example.com | "2019-09-24 01:04:31.795 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c6 Remaining bytes=[25478], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:31.796 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c7 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +orderer0.example.com | "2019-09-24 01:04:31.796 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c8 blockbytes [25475] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:31.797 UTC [common.deliver] deliverBlocks -> DEBU 9c9 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:04:31.798 UTC [fsblkstorage] waitForBlock -> DEBU 9ca Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +orderer0.example.com | "2019-09-24 01:04:32.146 UTC [orderer.common.server] Deliver -> DEBU 9cb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:32.146 UTC [common.deliver] Handle -> DEBU 9cc Starting new deliver loop for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:04:32.147 UTC [common.deliver] Handle -> DEBU 9cd Attempting to read seek info message from 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:04:32.147 UTC [policies] Evaluate -> DEBU 9ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:32.149 UTC [policies] Evaluate -> DEBU 9d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.149 UTC [msp] DeserializeIdentity -> DEBU 9d3 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:32.149 UTC [msp.identity] newIdentity -> DEBU 9d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +orderer0.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +orderer0.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +orderer0.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +orderer0.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:32.150 UTC [cauthdsl] func1 -> DEBU 9d5 0xc001298f60 gate 1569287072150641800 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:32.150 UTC [cauthdsl] func2 -> DEBU 9d6 0xc001298f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d7 0xc001298f60 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d8 0xc001298f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d9 0xc001298f60 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [cauthdsl] func1 -> DEBU 9da 0xc001298f60 gate 1569287072150641800 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [policies] Evaluate -> DEBU 9db Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [policies] Evaluate -> DEBU 9dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:32.151 UTC [policies] func1 -> DEBU 9dd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9de Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [cauthdsl] func1 -> DEBU 9e3 0xc0012d8590 gate 1569287072152510300 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [cauthdsl] func2 -> DEBU 9e4 0xc0012d8590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:32.152 UTC [cauthdsl] func2 -> DEBU 9e5 0xc0012d8590 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [cauthdsl] func2 -> DEBU 9e6 0xc0012d8590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [cauthdsl] func2 -> DEBU 9e7 0xc0012d8590 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [cauthdsl] func1 -> DEBU 9e8 0xc0012d8590 gate 1569287072152510300 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:04:32.153 UTC [cauthdsl] func1 -> DEBU 9ec 0xc0012d8df0 gate 1569287072153970500 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9ed 0xc0012d8df0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9ee 0xc0012d8df0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ef Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [msp] Validate -> DEBU 9f0 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [msp] getCertificationChain -> DEBU 9f1 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9f2 0xc0012d8df0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.752 UTC [msp] DeserializeIdentity -> DEBU 9b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.755 UTC [msp] DeserializeIdentity -> DEBU 9b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [cauthdsl] func1 -> DEBU 9b9 0xc0038d8530 gate 1569287073756777100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.756 UTC [cauthdsl] func2 -> DEBU 9ba 0xc0038d8530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bb 0xc0038d8530 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bc 0xc0038d8530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bd 0xc0038d8530 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [cauthdsl] func1 -> DEBU 9be 0xc0038d8530 gate 1569287073756777100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.758 UTC [cauthdsl] func1 -> DEBU 9c2 0xc0038d8d70 gate 1569287073758301300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c3 0xc0038d8d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c4 0xc0038d8d70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c5 0xc0038d8d70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [msp.identity] Verify -> DEBU 9c6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [msp.identity] Verify -> DEBU 9c7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [cauthdsl] func2 -> DEBU 9c8 0xc0038d8d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [cauthdsl] func1 -> DEBU 9c9 0xc0038d8d70 gate 1569287073758301300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [policies] Evaluate -> DEBU 9ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.761 UTC [policies] Evaluate -> DEBU 9cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.762 UTC [policies] Evaluate -> DEBU 9cc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.762 UTC [policies] Evaluate -> DEBU 9cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.762 UTC [msp] DeserializeIdentity -> DEBU 9ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9cf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9d0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:33.764 UTC [policies] Evaluate -> DEBU 9d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.764 UTC [policies] Evaluate -> DEBU 9d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:33.765 UTC [policies] Evaluate -> DEBU 9d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.765 UTC [cauthdsl] func1 -> DEBU 9d4 0xc0038d9e50 gate 1569287073765565400 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [msp.identity] Verify -> DEBU 9f3 Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +orderer0.example.com | 00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [msp.identity] Verify -> DEBU 9f4 Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +orderer0.example.com | 00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +orderer0.example.com | 00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +orderer0.example.com | 00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +orderer0.example.com | 00000040 7d c0 9c 51 b2 3e |}..Q.>|" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [cauthdsl] func2 -> DEBU 9f5 0xc0012d8df0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [cauthdsl] func1 -> DEBU 9f6 0xc0012d8df0 gate 1569287072153970500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f9 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:32.156 UTC [policies] Evaluate -> DEBU 9fb Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:32.156 UTC [policies] Evaluate -> DEBU 9fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [common.deliver] deliverBlocks -> DEBU 9fd [channel: businesschannel] Received seekInfo (0xc00104e9c0) start: > stop: > from 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [fsblkstorage] Next -> DEBU 9fe Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [fsblkstorage] newBlockfileStream -> DEBU 9ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a00 Remaining bytes=[25478], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a01 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +orderer0.example.com | "2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a02 blockbytes [25475] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:32.158 UTC [common.deliver] deliverBlocks -> DEBU a03 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:04:32.158 UTC [fsblkstorage] waitForBlock -> DEBU a04 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +orderer0.example.com | "2019-09-24 01:04:32.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:32.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a06 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2019-09-24 01:04:32.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU a07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.6µs " +orderer0.example.com | "2019-09-24 01:04:32.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a08 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2019-09-24 01:04:32.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +orderer0.example.com | "2019-09-24 01:04:32.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.7µs " +orderer0.example.com | "2019-09-24 01:04:32.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.5µs " +orderer0.example.com | "2019-09-24 01:04:32.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:32.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:32.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:32.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0f Sending msg of 28 bytes to 3 on channel testchainid took 55.4µs" +orderer0.example.com | "2019-09-24 01:04:32.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU a10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.2µs " +orderer0.example.com | "2019-09-24 01:04:32.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a11 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +orderer0.example.com | "2019-09-24 01:04:32.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +orderer0.example.com | "2019-09-24 01:04:32.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +orderer0.example.com | "2019-09-24 01:04:32.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.1µs " +orderer0.example.com | "2019-09-24 01:04:32.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU a15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:32.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.154 UTC [orderer.common.server] Deliver -> DEBU a17 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:04:33.154 UTC [common.deliver] Handle -> DEBU a18 Starting new deliver loop for 172.18.0.5:53700" +orderer0.example.com | "2019-09-24 01:04:33.154 UTC [common.deliver] Handle -> DEBU a19 Attempting to read seek info message from 172.18.0.5:53700" +orderer0.example.com | "2019-09-24 01:04:33.180 UTC [orderer.common.server] Broadcast -> DEBU a1a Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:04:33.180 UTC [orderer.common.broadcast] Handle -> DEBU a1b Starting new broadcast loop for 172.18.0.5:53702" +orderer0.example.com | "2019-09-24 01:04:33.180 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53702" +orderer0.example.com | "2019-09-24 01:04:33.180 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1d Processing config update message for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d5 0xc0038d9e50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d6 0xc0038d9e50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d7 0xc0038d9e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d8 0xc0038d9e50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.767 UTC [cauthdsl] func1 -> DEBU 9d9 0xc0038d9e50 gate 1569287073765565400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:33.767 UTC [cauthdsl] func1 -> DEBU 9dd 0xc0038e8690 gate 1569287073767736100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9de 0xc0038e8690 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9df 0xc0038e8690 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9e0 0xc0038e8690 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.768 UTC [msp.identity] Verify -> DEBU 9e1 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:33.768 UTC [msp.identity] Verify -> DEBU 9e2 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [cauthdsl] func2 -> DEBU 9e3 0xc0038e8690 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [cauthdsl] func1 -> DEBU 9e4 0xc0038e8690 gate 1569287073767736100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [gossip.gossip] handleMessage -> DEBU 9e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.769 UTC [gossip.gossip] handleMessage -> DEBU 9ea Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.770 UTC [gossip.pull] HandleMessage -> DEBU 9eb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.770 UTC [gossip.gossip] handleMessage -> DEBU 9ec Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ed Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ee Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.913 UTC [gossip.gossip] handleMessage -> DEBU 9f0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.913 UTC [gossip.pull] HandleMessage -> DEBU 9f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.913 UTC [gossip.pull] SendDigest -> DEBU 9f2 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:33.913 UTC [gossip.gossip] handleMessage -> DEBU 9f3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.914 UTC [gossip.gossip] handleMessage -> DEBU 9f4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.914 UTC [msp] DeserializeIdentity -> DEBU 9f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:33.914 UTC [gossip.gossip] handleMessage -> DEBU 9f6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:33.915 UTC [gossip.gossip] handleMessage -> DEBU 9f7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:33.915 UTC [msp.identity] Verify -> DEBU 9f8 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:33.915 UTC [msp.identity] Verify -> DEBU 9f9 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:33.916 UTC [gossip.gossip] handleMessage -> DEBU 9fa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [gossip.comm] func1 -> DEBU 9fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [gossip.gossip] handleMessage -> DEBU 9fc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [gossip.gossip] handleMessage -> DEBU 9fd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9fe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ff Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.208 UTC [msp] DeserializeIdentity -> DEBU a00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a02 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a03 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.210 UTC [cauthdsl] func1 -> DEBU a07 0xc00390c670 gate 1569287074210418900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.210 UTC [cauthdsl] func2 -> DEBU a08 0xc00390c670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.210 UTC [cauthdsl] func2 -> DEBU a09 0xc00390c670 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [cauthdsl] func2 -> DEBU a0a 0xc00390c670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [cauthdsl] func2 -> DEBU a0b 0xc00390c670 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [cauthdsl] func1 -> DEBU a0c 0xc00390c670 gate 1569287074210418900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.212 UTC [cauthdsl] func1 -> DEBU a10 0xc00390ceb0 gate 1569287074212022100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a11 0xc00390ceb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a12 0xc00390ceb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a13 0xc00390ceb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.212 UTC [msp.identity] Verify -> DEBU a14 Verify: digest = 00000000 30 0d e2 1c 6f 82 b4 ca 58 54 ea 0b 23 f2 00 28 |0...o...XT..#..(| +peer0.org1.example.com | 00000010 b4 3e 73 c8 86 7a 37 d7 bf f2 b4 0e c8 5f c6 75 |.>s..z7......_.u|" +peer0.org1.example.com | "2019-09-24 01:04:34.213 UTC [msp.identity] Verify -> DEBU a15 Verify: sig = 00000000 30 44 02 20 03 0b ec ec 39 c1 28 2e 81 26 b5 99 |0D. ....9.(..&..| +peer0.org1.example.com | 00000010 38 0a 27 d2 af 55 50 11 b1 16 6f 52 0b b2 e8 46 |8.'..UP...oR...F| +peer0.org1.example.com | 00000020 02 06 c0 f1 02 20 4e 75 12 1c 08 00 a4 62 15 0f |..... Nu.....b..| +peer0.org1.example.com | 00000030 10 5c 07 eb ad 0f 92 99 00 31 90 1a c1 6c e7 a8 |.\.......1...l..| +peer0.org1.example.com | 00000040 24 43 1c 48 1f 96 |$C.H..|" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [cauthdsl] func2 -> DEBU a16 0xc00390ceb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [cauthdsl] func1 -> DEBU a17 0xc00390ceb0 gate 1569287074212022100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a1a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.215 UTC [gossip.discovery] handleAliveMessage -> DEBU a1c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.215 UTC [gossip.discovery] resurrectMember -> DEBU a1d Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1569287058898689100 17 {} [] 0}" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [gossip.discovery] resurrectMember -> DEBU a1e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [gossip.discovery] handleAliveMessage -> DEBU a1f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [gossip.discovery] handleMsgFromComm -> DEBU a20 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a21 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a22 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.218 UTC [gossip.comm] Send -> DEBU a28 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.218 UTC [msp] DeserializeIdentity -> DEBU a29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.218 UTC [msp] DeserializeIdentity -> DEBU a2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.219 UTC [gossip.comm] Send -> DEBU a2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.219 UTC [gossip.comm] sendToEndpoint -> DEBU a2c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [gossip.comm] sendToEndpoint -> DEBU a2d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp] GetDefaultSigningIdentity -> DEBU a2e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a2f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151010 " +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a30 Sign: digest: 8FBC380E3FFCDC37EB191EBDDF58384B7C17A16E43EAFE3B31332CC1B6AA640D " +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp] GetDefaultSigningIdentity -> DEBU a31 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a32 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a33 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:34.221 UTC [gossip.discovery] periodicalSendAlive -> DEBU a34 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:34.225 UTC [gossip.comm] sendToEndpoint -> DEBU a35 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.225 UTC [gossip.comm] createConnection -> DEBU a36 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:34.227 UTC [grpc] DialContext -> DEBU a37 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:04:34.227 UTC [grpc] DialContext -> DEBU a38 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:04:34.227 UTC [grpc] watcher -> DEBU a39 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:04:34.227 UTC [grpc] switchBalancer -> DEBU a3a ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:04:34.228 UTC [grpc] HandleSubConnStateChange -> DEBU a3b pickfirstBalancer: HandleSubConnStateChange: 0xc0038a7b90, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:04:34.231 UTC [msp] DeserializeIdentity -> DEBU a3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.231 UTC [msp] DeserializeIdentity -> DEBU a3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.232 UTC [gossip.comm] Send -> DEBU a3e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.232 UTC [msp] DeserializeIdentity -> DEBU a3f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.232 UTC [gossip.comm] Send -> DEBU a40 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.233 UTC [msp] DeserializeIdentity -> DEBU a41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.233 UTC [gossip.comm] Send -> DEBU a42 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.233 UTC [gossip.comm] sendToEndpoint -> DEBU a43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a22 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.181 UTC [msp.identity] newIdentity -> DEBU a24 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +orderer0.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +orderer0.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +orderer0.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +orderer0.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func1 -> DEBU a25 0xc00136e790 gate 1569287073181922900 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a26 0xc00136e790 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a27 0xc00136e790 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a28 0xc00136e790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a29 0xc00136e790 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.182 UTC [cauthdsl] func1 -> DEBU a2a 0xc00136e790 gate 1569287073181922900 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2b Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] func1 -> DEBU a2d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2e Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a33 0xc00136fdc0 gate 1569287073183364100 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a34 0xc00136fdc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a35 0xc00136fdc0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a36 0xc00136fdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a37 0xc00136fdc0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a38 0xc00136fdc0 gate 1569287073183364100 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a39 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a3c 0xc001386620 gate 1569287073183724000 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.195 UTC [cauthdsl] func2 -> DEBU a3d 0xc001386620 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.196 UTC [cauthdsl] func2 -> DEBU a3e 0xc001386620 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.196 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a3f Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.197 UTC [msp] Validate -> DEBU a40 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.197 UTC [msp] getCertificationChain -> DEBU a41 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:33.200 UTC [cauthdsl] func2 -> DEBU a42 0xc001386620 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.200 UTC [msp.identity] Verify -> DEBU a43 Verify: digest = 00000000 40 ee cd 54 53 bb 54 84 fc af d5 33 ca 67 5a e7 |@..TS.T....3.gZ.| +orderer0.example.com | 00000010 1f b2 cf 0c c3 48 82 a6 4a 47 8f d3 27 11 e1 11 |.....H..JG..'...|" +orderer0.example.com | "2019-09-24 01:04:33.200 UTC [msp.identity] Verify -> DEBU a44 Verify: sig = 00000000 30 45 02 21 00 eb d2 c7 c8 cd ac 46 29 fa 25 56 |0E.!.......F).%V| +orderer0.example.com | 00000010 59 b7 37 39 1f 77 ea a6 e4 0d ad ee 5d de 21 11 |Y.79.w......].!.| +orderer0.example.com | 00000020 ba 55 b9 75 68 02 20 51 e8 9a 2a f0 55 65 cc 94 |.U.uh. Q..*.Ue..| +orderer0.example.com | 00000030 4b fd 7b ad c9 a9 8b 25 d3 75 2e 21 5a 00 38 b0 |K.{....%.u.!Z.8.| +orderer0.example.com | 00000040 4c 20 ea c7 b0 87 4b |L ....K|" +orderer0.example.com | "2019-09-24 01:04:33.202 UTC [cauthdsl] func2 -> DEBU a45 0xc001386620 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.202 UTC [cauthdsl] func1 -> DEBU a46 0xc001386620 gate 1569287073183724000 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:33.202 UTC [policies] Evaluate -> DEBU a47 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.203 UTC [policies] Evaluate -> DEBU a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a49 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4b Signature set satisfies policy /Channel/Writers" +peer0.org1.example.com | "2019-09-24 01:04:34.233 UTC [gossip.comm] sendToEndpoint -> DEBU a44 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.234 UTC [gossip.comm] sendToEndpoint -> DEBU a45 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.234 UTC [gossip.comm] sendToEndpoint -> DEBU a46 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.235 UTC [gossip.comm] sendToEndpoint -> DEBU a47 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.253 UTC [comm.grpc.server] 1 -> INFO a48 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:36.252Z grpc.peer_address=172.18.0.9:51410 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=100µs +peer0.org1.example.com | "2019-09-24 01:04:34.254 UTC [grpc] HandleSubConnStateChange -> DEBU a49 pickfirstBalancer: HandleSubConnStateChange: 0xc0038a7b90, READY" +peer0.org1.example.com | "2019-09-24 01:04:34.255 UTC [msp] GetDefaultSigningIdentity -> DEBU a4a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.255 UTC [msp.identity] Sign -> DEBU a4b Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:34.255 UTC [msp.identity] Sign -> DEBU a4c Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:34.255 UTC [gossip.comm] authenticateRemotePeer -> DEBU a4d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51410" +peer0.org1.example.com | "2019-09-24 01:04:34.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU a4e Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51410" +peer0.org1.example.com | "2019-09-24 01:04:34.256 UTC [msp] DeserializeIdentity -> DEBU a4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.257 UTC [msp] DeserializeIdentity -> DEBU a51 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.208 UTC [common.configtx] verifyDeltaSet -> DEBU a5c Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [common.configtx] policyForItem -> DEBU a5d Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a5e Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a5f Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a60 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a61 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a62 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a63 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a64 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a65 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a66 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a67 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [policies] Evaluate -> DEBU a68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:33.210 UTC [cauthdsl] func1 -> DEBU a69 0xc000c57060 gate 1569287073210925200 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.211 UTC [cauthdsl] func2 -> DEBU a6a 0xc000c57060 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.211 UTC [cauthdsl] func2 -> DEBU a6b 0xc000c57060 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.211 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6c Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.211 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6d Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.211 UTC [msp] Validate -> DEBU a6e MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.212 UTC [msp] getCertificationChain -> DEBU a6f MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:33.212 UTC [msp] hasOURole -> DEBU a70 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:04:33.212 UTC [msp] getCertificationChain -> DEBU a71 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:33.213 UTC [cauthdsl] func2 -> DEBU a72 0xc000c57060 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.213 UTC [msp.identity] Verify -> DEBU a73 Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +orderer0.example.com | 00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +orderer0.example.com | "2019-09-24 01:04:33.213 UTC [msp.identity] Verify -> DEBU a74 Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +orderer0.example.com | 00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +orderer0.example.com | 00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +orderer0.example.com | 00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +orderer0.example.com | 00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [cauthdsl] func2 -> DEBU a75 0xc000c57060 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [cauthdsl] func1 -> DEBU a76 0xc000c57060 gate 1569287073210925200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [policies] Evaluate -> DEBU a77 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [policies] Evaluate -> DEBU a78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [common.configtx] verifyDeltaSet -> DEBU a79 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.214 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:34.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a52 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.257 UTC [msp] DeserializeIdentity -> DEBU a53 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a55 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a56 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.258 UTC [policies] Evaluate -> DEBU a57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.258 UTC [policies] Evaluate -> DEBU a58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.259 UTC [policies] Evaluate -> DEBU a59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.259 UTC [cauthdsl] func1 -> DEBU a5a 0xc0039c5ee0 gate 1569287074259636100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5b 0xc0039c5ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5c 0xc0039c5ee0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5d 0xc0039c5ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.262 UTC [msp] GetDefaultSigningIdentity -> DEBU a5e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.262 UTC [msp.identity] Sign -> DEBU a5f Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:04:34.262 UTC [msp.identity] Sign -> DEBU a60 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:04:34.263 UTC [gossip.comm] authenticateRemotePeer -> DEBU a61 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +orderer0.example.com | "2019-09-24 01:04:33.216 UTC [common.configtx] recurseConfigMap -> DEBU a81 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.216 UTC [common.configtx] recurseConfigMap -> DEBU a82 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a83 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a84 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a85 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a86 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a87 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a88 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a89 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.220 UTC [common.configtx] recurseConfigMap -> DEBU a8d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.220 UTC [common.configtx] recurseConfigMap -> DEBU a8e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.220 UTC [common.channelconfig] NewStandardValues -> DEBU a8f Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:33.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU a90 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a92 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a93 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a94 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU a95 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a96 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +orderer0.example.com | "2019-09-24 01:04:33.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU a97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.3µs " +orderer0.example.com | "2019-09-24 01:04:33.225 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:33.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:33.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.225 UTC [common.channelconfig] NewStandardValues -> DEBU a9b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.226 UTC [common.channelconfig] NewStandardValues -> DEBU a9d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9e Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.227 UTC [common.channelconfig] Validate -> DEBU a9f Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.227 UTC [common.channelconfig] validateMSP -> DEBU aa0 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.227 UTC [msp] newBccspMsp -> DEBU aa1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.228 UTC [msp] New -> DEBU aa2 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.228 UTC [msp] Setup -> DEBU aa3 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.229 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.230 UTC [common.channelconfig] NewStandardValues -> DEBU aa5 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.230 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa6 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.230 UTC [common.channelconfig] NewStandardValues -> DEBU aa7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.231 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa8 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.231 UTC [common.channelconfig] Validate -> DEBU aa9 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.232 UTC [common.channelconfig] validateMSP -> DEBU aaa Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.232 UTC [msp] newBccspMsp -> DEBU aab Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.232 UTC [msp] New -> DEBU aac Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:34.265 UTC [gossip.comm] authenticateRemotePeer -> DEBU a62 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:34.265 UTC [msp] DeserializeIdentity -> DEBU a63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.265 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.265 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [msp] DeserializeIdentity -> DEBU a67 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.232 UTC [msp] Setup -> DEBU aad Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.233 UTC [msp.identity] newIdentity -> DEBU aae Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.234 UTC [common.channelconfig] NewStandardValues -> DEBU aaf Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:33.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab1 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab3 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab5 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] NewStandardValues -> DEBU ab6 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab7 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:33.237 UTC [common.channelconfig] NewStandardValues -> DEBU ab8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.237 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab9 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.238 UTC [common.channelconfig] validateMSP -> DEBU aba Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.238 UTC [msp] newBccspMsp -> DEBU abb Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.238 UTC [msp] New -> DEBU abc Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.239 UTC [msp] Setup -> DEBU abd Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:33.240 UTC [msp.identity] newIdentity -> DEBU abe Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.241 UTC [msp.identity] newIdentity -> DEBU abf Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.242 UTC [msp] Validate -> DEBU ac0 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.242 UTC [msp] Setup -> DEBU ac1 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:33.243 UTC [msp] Setup -> DEBU ac2 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:33.243 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.243 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aca Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +orderer0.example.com | "2019-09-24 01:04:33.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU acb Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-09-24 01:04:33.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU acc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.9µs " +orderer0.example.com | "2019-09-24 01:04:33.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU acd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.5µs " +orderer0.example.com | "2019-09-24 01:04:33.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU ace Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU acf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.245 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.250 UTC [policies] GetPolicy -> DEBU ad1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad6 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad7 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ad8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ad9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ada Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU adb Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU adc Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU add Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ade Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU adf Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU ae0 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU ae1 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:33.253 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:33.258 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:33.258 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b03 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b04 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b05 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b06 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b07 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0b Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0c Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.configtx] addToMap -> DEBU b0d Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b0e As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b0f As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b10 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b11 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b12 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b13 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b14 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b15 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b17 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b18 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b19 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1a Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1b Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1c Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1d Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b1e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b1f As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b20 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b21 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.capabilities] Supported -> DEBU b22 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [common.capabilities] Supported -> DEBU b23 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [msp] GetDefaultSigningIdentity -> DEBU b24 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:33.262 UTC [msp] GetDefaultSigningIdentity -> DEBU b25 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp.identity] Sign -> DEBU b26 Sign: plaintext: 0AD2060A1B08011A0608A1D7A5EC0522...25D3752E215A0038B04C20EAC7B0874B " +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp.identity] Sign -> DEBU b27 Sign: digest: 2896CA3D3CA0FC64A939D714F3D4026A9B34F05E8E28884FE0E77282C6DE2F91 " +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b28 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b29 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp] DeserializeIdentity -> DEBU b2d Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp.identity] newIdentity -> DEBU b2e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [cauthdsl] func1 -> DEBU b2f 0xc0003b2d70 gate 1569287073263751600 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [cauthdsl] func2 -> DEBU b30 0xc0003b2d70 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [cauthdsl] func2 -> DEBU b31 0xc0003b2d70 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b32 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:33.263 UTC [msp] Validate -> DEBU b33 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [cauthdsl] func2 -> DEBU b34 0xc0003b2d70 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 28 96 ca 3d 3c a0 fc 64 a9 39 d7 14 f3 d4 02 6a |(..=<..d.9.....j| +orderer0.example.com | 00000010 9b 34 f0 5e 8e 28 88 4f e0 e7 72 82 c6 de 2f 91 |.4.^.(.O..r.../.|" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 44 02 20 06 57 d2 e6 fa fb 14 eb ac bb 01 32 |0D. .W.........2| +orderer0.example.com | 00000010 48 8c ba 3a 9d 7f cf ef 14 a1 79 36 35 a5 6d 68 |H..:......y65.mh| +orderer0.example.com | 00000020 e1 c0 da 62 02 20 17 4a cf 02 a0 12 2a 69 1d 56 |...b. .J....*i.V| +orderer0.example.com | 00000030 75 3a 9f de b0 ec 1d 08 95 54 c8 6d 3b 37 99 49 |u:.......T.m;7.I| +orderer0.example.com | 00000040 20 87 e3 8c 71 39 | ...q9|" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [cauthdsl] func2 -> DEBU b37 0xc0003b2d70 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [cauthdsl] func1 -> DEBU b38 0xc0003b2d70 gate 1569287073263751600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a69 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func1 -> DEBU a6e 0xc003a02910 gate 1569287074267321800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a6f 0xc003a02910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a70 0xc003a02910 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a71 0xc003a02910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a72 0xc003a02910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.267 UTC [cauthdsl] func1 -> DEBU a73 0xc003a02910 gate 1569287074267321800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.268 UTC [cauthdsl] func1 -> DEBU a77 0xc003a03150 gate 1569287074268880300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a78 0xc003a03150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a79 0xc003a03150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a7a 0xc003a03150 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.269 UTC [msp.identity] Verify -> DEBU a7b Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU a7c Verify: sig = 00000000 30 44 02 20 44 b8 af 4e 09 5c 83 dc 2a 8f 60 40 |0D. D..N.\..*.`@| +peer0.org1.example.com | 00000010 3b 36 f9 28 77 5e 0b d4 05 6a e4 78 94 3c 4d 72 |;6.(w^...j.x. DEBU a7d 0xc0039c5ee0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [cauthdsl] func1 -> DEBU a80 0xc0039c5ee0 gate 1569287074259636100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [cauthdsl] func1 -> DEBU a84 0xc0039da810 gate 1569287074271633200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [cauthdsl] func2 -> DEBU a85 0xc0039da810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.271 UTC [cauthdsl] func2 -> DEBU a86 0xc0039da810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.272 UTC [cauthdsl] func2 -> DEBU a87 0xc0039da810 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.272 UTC [msp.identity] Verify -> DEBU a88 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU a89 Verify: sig = 00000000 30 45 02 21 00 ca bf 06 84 fb 8f 58 62 ac 71 bd |0E.!.......Xb.q.| +peer0.org1.example.com | 00000010 8b 3e d7 c2 fd 3b 6d 00 00 31 80 e7 e3 78 b7 15 |.>...;m..1...x..| +peer0.org1.example.com | 00000020 b6 23 94 18 a5 02 20 5b f6 98 20 b6 80 76 77 69 |.#.... [.. ..vwi| +peer0.org1.example.com | 00000030 2e b2 fb 83 8e 23 14 b1 5c 53 01 35 bb 67 45 fd |.....#..\S.5.gE.| +peer0.org1.example.com | 00000040 08 91 4a 05 88 42 b7 |..J..B.|" +peer0.org1.example.com | "2019-09-24 01:04:34.270 UTC [cauthdsl] func2 -> DEBU a7e 0xc003a03150 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.270 UTC [grpc] infof -> DEBU a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:34.272 UTC [cauthdsl] func2 -> DEBU a8a 0xc0039da810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [cauthdsl] func1 -> DEBU a8c 0xc0039da810 gate 1569287074271633200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.272 UTC [cauthdsl] func1 -> DEBU a8b 0xc003a03150 gate 1569287074268880300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [gossip.comm] authenticateRemotePeer -> DEBU a91 Authenticated 172.18.0.9:51410" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [gossip.comm] GossipStream -> DEBU a93 Servicing 172.18.0.9:51410" +peer0.org1.example.com | "2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [gossip.comm] readFromStream -> DEBU a94 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a96 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [gossip.comm] func2 -> DEBU a97 Client 172.18.0.9:51410 disconnected" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b39 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3b Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3d Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [orderer.common.msgprocessor] Apply -> DEBU b3f Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] NewStandardValues -> DEBU b40 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b41 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b42 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b43 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b44 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b45 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b46 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b47 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b48 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b49 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b4b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4c Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] Validate -> DEBU b4d Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] validateMSP -> DEBU b4e Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [msp] newBccspMsp -> DEBU b4f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [msp] New -> DEBU b50 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [msp] Setup -> DEBU b51 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [msp.identity] newIdentity -> DEBU b52 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b53 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] Validate -> DEBU b57 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [common.channelconfig] validateMSP -> DEBU b58 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.265 UTC [msp] newBccspMsp -> DEBU b59 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp] New -> DEBU b5a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp] Setup -> DEBU b5b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp.identity] newIdentity -> DEBU b5c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [comm.grpc.server] 1 -> INFO a9a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51410 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8732ms +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.comm] authenticateRemotePeer -> DEBU a9b Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.comm] createConnection -> DEBU a9c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.comm] sendToEndpoint -> DEBU a9d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.274 UTC [gossip.gossip] handleMessage -> DEBU a99 Entering, 172.18.0.9:51410 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.gossip] handleMessage -> DEBU a9e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.discovery] handleMsgFromComm -> DEBU a9f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU aa0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.276 UTC [msp.identity] Verify -> DEBU aa1 Verify: digest = 00000000 8f bc 38 0e 3f fc dc 37 eb 19 1e bd df 58 38 4b |..8.?..7.....X8K| +peer0.org1.example.com | 00000010 7c 17 a1 6e 43 ea fe 3b 31 33 2c c1 b6 aa 64 0d ||..nC..;13,...d.|" +peer0.org1.example.com | "2019-09-24 01:04:34.276 UTC [msp.identity] Verify -> DEBU aa2 Verify: sig = 00000000 30 45 02 21 00 d8 80 58 15 10 77 d3 02 32 00 be |0E.!...X..w..2..| +peer0.org1.example.com | 00000010 7c c7 a5 a0 3e 28 77 03 6a c4 ec 68 38 90 1b 95 ||...>(w.j..h8...| +peer0.org1.example.com | 00000020 83 59 57 ee 19 02 20 62 81 fa 4f 9b e0 ed bc f9 |.YW... b..O.....| +peer0.org1.example.com | 00000030 f3 1a 9c 4e a0 ef df 70 11 db 4d 08 ae 9f 33 0d |...N...p..M...3.| +peer0.org1.example.com | 00000040 1c 38 fa 29 04 01 5b |.8.)..[|" +peer0.org1.example.com | "2019-09-24 01:04:34.276 UTC [gossip.discovery] isSentByMe -> DEBU aa3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU aa4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.277 UTC [gossip.comm] sendToEndpoint -> DEBU aa5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.277 UTC [gossip.comm] writeToStream -> DEBU aa6 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:04:34.311 UTC [gossip.comm] func1 -> DEBU aa7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.311 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.311 UTC [msp] DeserializeIdentity -> DEBU aa9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.312 UTC [msp] DeserializeIdentity -> DEBU aaa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.312 UTC [gossip.gossip] handleMessage -> DEBU aab Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.317 UTC [gossip.comm] func1 -> DEBU aac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.317 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [msp] DeserializeIdentity -> DEBU aae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU aaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [policies] Evaluate -> DEBU ab2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.318 UTC [policies] Evaluate -> DEBU ab3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [policies] Evaluate -> DEBU ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func1 -> DEBU ab5 0xc003a1de20 gate 1569287074319183400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab6 0xc003a1de20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab7 0xc003a1de20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab8 0xc003a1de20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab9 0xc003a1de20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.319 UTC [cauthdsl] func1 -> DEBU aba 0xc003a1de20 gate 1569287074319183400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [cauthdsl] func1 -> DEBU abe 0xc003a3a660 gate 1569287074320484000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU abf 0xc003a3a660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU ac0 0xc003a3a660 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU ac1 0xc003a3a660 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.320 UTC [msp.identity] Verify -> DEBU ac2 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:34.321 UTC [msp.identity] Verify -> DEBU ac3 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.321 UTC [cauthdsl] func2 -> DEBU ac4 0xc003a3a660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.321 UTC [cauthdsl] func1 -> DEBU ac5 0xc003a3a660 gate 1569287074320484000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.321 UTC [policies] Evaluate -> DEBU ac6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.322 UTC [msp] DeserializeIdentity -> DEBU aca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.323 UTC [gossip.gossip] handleMessage -> DEBU acb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.527 UTC [gossip.comm] func1 -> DEBU acc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.527 UTC [gossip.gossip] handleMessage -> DEBU acd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.527 UTC [gossip.pull] HandleMessage -> DEBU ace GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.528 UTC [gossip.pull] SendDigest -> DEBU acf Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:34.528 UTC [gossip.gossip] handleMessage -> DEBU ad0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.531 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.531 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.531 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.533 UTC [msp.identity] Verify -> DEBU ad6 Verify: digest = 00000000 66 b7 d1 2a ca 9e d0 48 4a f7 41 09 ac cd 33 4b |f..*...HJ.A...3K| +peer0.org1.example.com | 00000010 93 28 83 9d 7e f1 a4 4e 18 20 12 19 b4 a7 c4 74 |.(..~..N. .....t|" +peer0.org1.example.com | "2019-09-24 01:04:34.533 UTC [msp.identity] Verify -> DEBU ad7 Verify: sig = 00000000 30 44 02 20 1b e1 e8 46 f8 d0 8d 07 57 e9 21 44 |0D. ...F....W.!D| +peer0.org1.example.com | 00000010 a4 05 a7 df 5b de 36 61 55 3f 2e c0 a4 4f f2 11 |....[.6aU?...O..| +peer0.org1.example.com | 00000020 c5 f1 e1 cb 02 20 47 7c b6 1f 71 e5 a7 a2 7d 6f |..... G|..q...}o| +peer0.org1.example.com | 00000030 9a a2 28 85 d1 7d b1 d8 04 12 87 a8 8c 72 14 ce |..(..}.......r..| +peer0.org1.example.com | 00000040 13 c1 2c 2a 34 f1 |..,*4.|" +peer0.org1.example.com | "2019-09-24 01:04:34.534 UTC [msp.identity] Verify -> DEBU ad8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:34.534 UTC [msp.identity] Verify -> DEBU ad9 Verify: sig = 00000000 30 45 02 21 00 fb eb 28 ef 2e 61 02 9c ea 45 24 |0E.!...(..a...E$| +peer0.org1.example.com | 00000010 4a ba 21 d2 23 fa 60 99 55 69 ff 11 1b cb 1a bb |J.!.#.`.Ui......| +peer0.org1.example.com | 00000020 a9 de cc d3 67 02 20 3f 0e 95 ae 80 a0 75 d9 06 |....g. ?.....u..| +peer0.org1.example.com | 00000030 74 b7 05 6e c5 2a 24 c7 0c f9 d2 2a 30 26 ed d9 |t..n.*$....*0&..| +peer0.org1.example.com | 00000040 c8 9d 9e 0f 67 bf 09 |....g..|" +peer0.org1.example.com | "2019-09-24 01:04:34.534 UTC [gossip.discovery] handleAliveMessage -> DEBU ada Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.534 UTC [gossip.discovery] learnExistingMembers -> DEBU adb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU adc updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU add Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU ade Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU adf Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.536 UTC [gossip.discovery] handleAliveMessage -> DEBU ae0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU ae1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.536 UTC [gossip.discovery] sendMemResponse -> DEBU ae2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:34.536 UTC [msp] DeserializeIdentity -> DEBU ae3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.537 UTC [msp] DeserializeIdentity -> DEBU ae4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.537 UTC [gossip.comm] Send -> DEBU ae5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.537 UTC [gossip.discovery] sendMemResponse -> DEBU ae6 Exiting, replying with alive: > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:34.537 UTC [gossip.comm] sendToEndpoint -> DEBU ae7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.538 UTC [gossip.comm] sendToEndpoint -> DEBU ae8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.839 UTC [gossip.comm] func1 -> DEBU ae9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.839 UTC [gossip.gossip] handleMessage -> DEBU aea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.840 UTC [gossip.pull] HandleMessage -> DEBU aeb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.841 UTC [msp] DeserializeIdentity -> DEBU aec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.842 UTC [msp] DeserializeIdentity -> DEBU aed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.842 UTC [gossip.pull] SendDigest -> DEBU aee Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:34.844 UTC [gossip.comm] func1 -> DEBU af0 Got message: GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.844 UTC [gossip.gossip] handleMessage -> DEBU aef Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.844 UTC [gossip.gossip] handleMessage -> DEBU af1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.845 UTC [gossip.gossip] handleMessage -> DEBU af2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU af3 Got message: GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.845 UTC [gossip.gossip] ValidateAliveMsg -> DEBU af4 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.845 UTC [msp] DeserializeIdentity -> DEBU af5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU af7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU af8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.846 UTC [policies] Evaluate -> DEBU af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.846 UTC [policies] Evaluate -> DEBU afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func1 -> DEBU afc 0xc003a70450 gate 1569287074847136300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU afd 0xc003a70450 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU afe 0xc003a70450 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU aff 0xc003a70450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU b00 0xc003a70450 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [cauthdsl] func1 -> DEBU b01 0xc003a70450 gate 1569287074847136300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [policies] Evaluate -> DEBU b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [cauthdsl] func1 -> DEBU b05 0xc003a70c90 gate 1569287074848168700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b06 0xc003a70c90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b07 0xc003a70c90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b08 0xc003a70c90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [msp.identity] Verify -> DEBU b09 Verify: digest = 00000000 51 23 76 90 e1 af 05 0b 8c df ec b8 0e 58 12 37 |Q#v..........X.7| +peer0.org1.example.com | 00000010 b3 03 8f 9b ef da 31 e9 83 17 da 4f c2 2f a0 14 |......1....O./..|" +peer0.org1.example.com | "2019-09-24 01:04:34.848 UTC [msp.identity] Verify -> DEBU b0a Verify: sig = 00000000 30 45 02 21 00 df 80 f5 b1 49 64 5a d7 37 6f 12 |0E.!.....IdZ.7o.| +peer0.org1.example.com | 00000010 7e 77 bf 10 49 19 cc 4f 1e 5c da dc 5e 23 37 9c |~w..I..O.\..^#7.| +peer0.org1.example.com | 00000020 57 af 03 b3 d4 02 20 01 7b 84 25 8a ff 66 10 d6 |W..... .{.%..f..| +peer0.org1.example.com | 00000030 7a c1 3e ea 7b ef 0c bc 0e bf 03 0c d8 71 ac 2a |z.>.{........q.*| +peer0.org1.example.com | 00000040 da 7f 0c bd ed 58 08 |.....X.|" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [cauthdsl] func2 -> DEBU b0b 0xc003a70c90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [cauthdsl] func1 -> DEBU b0c 0xc003a70c90 gate 1569287074848168700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [gossip.discovery] handleAliveMessage -> DEBU b11 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.849 UTC [gossip.discovery] learnExistingMembers -> DEBU b12 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b13 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b14 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b15 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b16 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] handleAliveMessage -> DEBU b17 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU b18 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.850 UTC [gossip.discovery] sendMemResponse -> DEBU b19 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.851 UTC [gossip.comm] Send -> DEBU b1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.851 UTC [gossip.discovery] sendMemResponse -> DEBU b1e Exiting, replying with alive:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > alive: alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:34.852 UTC [gossip.comm] sendToEndpoint -> DEBU b1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.852 UTC [gossip.comm] sendToEndpoint -> DEBU b20 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.871 UTC [gossip.pull] Hello -> DEBU b21 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:34.871 UTC [gossip.comm] Send -> DEBU b22 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.872 UTC [gossip.pull] Hello -> DEBU b23 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:34.872 UTC [gossip.comm] Send -> DEBU b24 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.872 UTC [gossip.comm] sendToEndpoint -> DEBU b25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.872 UTC [gossip.comm] sendToEndpoint -> DEBU b26 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.873 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.874 UTC [gossip.comm] sendToEndpoint -> DEBU b28 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.872 UTC [gossip.pull] Hello -> DEBU b29 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:34.875 UTC [gossip.comm] Send -> DEBU b2a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.876 UTC [gossip.comm] sendToEndpoint -> DEBU b2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.876 UTC [gossip.comm] sendToEndpoint -> DEBU b2c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.877 UTC [gossip.comm] func1 -> DEBU b2d Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.877 UTC [gossip.gossip] handleMessage -> DEBU b2e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.878 UTC [gossip.comm] func1 -> DEBU b2f Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.878 UTC [gossip.comm] func1 -> DEBU b30 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.880 UTC [gossip.pull] HandleMessage -> DEBU b31 GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.880 UTC [gossip.gossip] handleMessage -> DEBU b32 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.880 UTC [gossip.gossip] handleMessage -> DEBU b33 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.881 UTC [gossip.pull] HandleMessage -> DEBU b34 GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.881 UTC [gossip.gossip] handleMessage -> DEBU b35 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.881 UTC [gossip.gossip] handleMessage -> DEBU b36 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.881 UTC [gossip.pull] HandleMessage -> DEBU b37 GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.882 UTC [gossip.gossip] handleMessage -> DEBU b38 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.882 UTC [msp] GetDefaultSigningIdentity -> DEBU b39 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.882 UTC [msp.identity] Sign -> DEBU b3a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151011 " +peer0.org1.example.com | "2019-09-24 01:04:34.882 UTC [msp.identity] Sign -> DEBU b3b Sign: digest: B3FFD4E2B95573784AD87593565880A1809FD04AC8D5D140F1DF75C4D4FD9CB5 " +peer0.org1.example.com | "2019-09-24 01:04:34.882 UTC [msp] GetDefaultSigningIdentity -> DEBU b3c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [msp.identity] Sign -> DEBU b3d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [msp.identity] Sign -> DEBU b3e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [gossip.comm] Send -> DEBU b3f Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [msp] DeserializeIdentity -> DEBU b40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [gossip.comm] Send -> DEBU b41 Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [gossip.comm] sendToEndpoint -> DEBU b42 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.884 UTC [gossip.comm] sendToEndpoint -> DEBU b43 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.883 UTC [msp] DeserializeIdentity -> DEBU b44 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.887 UTC [gossip.comm] func1 -> DEBU b45 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.887 UTC [gossip.comm] Send -> DEBU b47 Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.887 UTC [gossip.gossip] handleMessage -> DEBU b46 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.888 UTC [gossip.gossip] handleMessage -> DEBU b4a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU b4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b4c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.888 UTC [gossip.comm] sendToEndpoint -> DEBU b48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU b4d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.889 UTC [msp.identity] Verify -> DEBU b4e Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +peer0.org1.example.com | 00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.888 UTC [gossip.comm] sendToEndpoint -> DEBU b49 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.891 UTC [gossip.comm] func1 -> DEBU b50 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.892 UTC [gossip.gossip] handleMessage -> DEBU b52 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.890 UTC [msp.identity] Verify -> DEBU b4f Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +peer0.org1.example.com | 00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +peer0.org1.example.com | 00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +peer0.org1.example.com | 00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +peer0.org1.example.com | 00000040 79 c3 07 f6 f3 46 |y....F|" +peer0.org1.example.com | "2019-09-24 01:04:34.891 UTC [gossip.comm] sendToEndpoint -> DEBU b51 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.893 UTC [gossip.comm] func1 -> DEBU b53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.894 UTC [msp.identity] Verify -> DEBU b54 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:34.894 UTC [msp.identity] Verify -> DEBU b55 Verify: sig = 00000000 30 44 02 20 3a 4c 8d ce 8d ad 89 3a 42 b3 cf 1d |0D. :L.....:B...| +peer0.org1.example.com | 00000010 de 91 82 ec 95 2b 37 88 9b 11 6f f3 52 f0 e1 04 |.....+7...o.R...| +peer0.org1.example.com | 00000020 0f 4c 2d 46 02 20 6c 64 59 e5 79 d4 c0 5e 83 ba |.L-F. ldY.y..^..| +peer0.org1.example.com | 00000030 5b 70 d5 c9 88 fe d0 af a3 07 fa ef 7b 9e ab 94 |[p..........{...| +peer0.org1.example.com | 00000040 38 d3 07 8a 9a c4 |8.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.discovery] isSentByMe -> DEBU b57 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.discovery] handleAliveMessage -> DEBU b58 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU b59 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.gossip] handleMessage -> DEBU b5a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.896 UTC [gossip.gossip] handleMessage -> DEBU b5b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU b5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.897 UTC [msp.identity] Verify -> DEBU b5e Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +peer0.org1.example.com | 00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.897 UTC [msp.identity] Verify -> DEBU b5f Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +peer0.org1.example.com | 00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +peer0.org1.example.com | 00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +peer0.org1.example.com | 00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +peer0.org1.example.com | 00000040 79 c3 07 f6 f3 46 |y....F|" +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5f Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b61 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b62 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b63 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b64 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b65 Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 01:04:34.898 UTC [gossip.discovery] handleAliveMessage -> DEBU b60 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.898 UTC [gossip.discovery] isSentByMe -> DEBU b61 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.898 UTC [gossip.discovery] handleAliveMessage -> DEBU b62 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b63 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.898 UTC [msp] DeserializeIdentity -> DEBU b64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b65 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b66 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b67 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.899 UTC [policies] Evaluate -> DEBU b68 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.899 UTC [policies] Evaluate -> DEBU b69 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.900 UTC [policies] Evaluate -> DEBU b6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.900 UTC [cauthdsl] func1 -> DEBU b6b 0xc003ac5130 gate 1569287074900296200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6c 0xc003ac5130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6d 0xc003ac5130 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6e 0xc003ac5130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.901 UTC [cauthdsl] func2 -> DEBU b6f 0xc003ac5130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.902 UTC [gossip.comm] func1 -> DEBU b70 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.903 UTC [gossip.comm] func1 -> DEBU b71 Got message: GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.901 UTC [cauthdsl] func1 -> DEBU b72 0xc003ac5130 gate 1569287074900296200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.908 UTC [cauthdsl] func1 -> DEBU b76 0xc003ac5970 gate 1569287074907552800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b77 0xc003ac5970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b78 0xc003ac5970 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b79 0xc003ac5970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.908 UTC [msp.identity] Verify -> DEBU b7a Verify: digest = 00000000 06 7a 2f 87 d3 95 25 58 95 75 e3 3f 05 d8 f7 a3 |.z/...%X.u.?....| +peer0.org1.example.com | 00000010 33 ed b5 73 92 b8 ad 8c fe 5a 7b bf 65 f3 0f cb |3..s.....Z{.e...|" +peer0.org1.example.com | "2019-09-24 01:04:34.909 UTC [msp.identity] Verify -> DEBU b7b Verify: sig = 00000000 30 44 02 20 47 fd 9a b8 ed fd 59 09 74 b4 cf 67 |0D. G.....Y.t..g| +peer0.org1.example.com | 00000010 1a 0d 18 01 e2 7d 37 aa 04 a0 9e 73 31 3a 26 d9 |.....}7....s1:&.| +peer0.org1.example.com | 00000020 03 3f 37 33 02 20 58 cd 7a 0e ee f4 41 ef 51 54 |.?73. X.z...A.QT| +peer0.org1.example.com | 00000030 41 69 7e e2 74 be 4a b1 e2 55 48 5b 7a db eb a8 |Ai~.t.J..UH[z...| +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b66 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b67 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [common.channelconfig] validateMSP -> DEBU b68 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp] newBccspMsp -> DEBU b69 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp] New -> DEBU b6a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.266 UTC [msp] Setup -> DEBU b6b Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [msp.identity] newIdentity -> DEBU b6c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [msp.identity] newIdentity -> DEBU b6d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [msp] Validate -> DEBU b6e MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [msp] Setup -> DEBU b6f Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [msp] Setup -> DEBU b70 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:33.269 UTC [policies] NewManagerImpl -> DEBU b71 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b72 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b73 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b74 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b75 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b76 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b77 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b78 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b79 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7a Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b7b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b7c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7d Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7e Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7f Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b80 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b81 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b82 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b83 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b84 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b85 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b86 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b87 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b88 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | 00000040 e6 a2 0f e1 5c 24 |....\$|" +peer0.org1.example.com | "2019-09-24 01:04:34.909 UTC [cauthdsl] func2 -> DEBU b7c 0xc003ac5970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.909 UTC [cauthdsl] func1 -> DEBU b7d 0xc003ac5970 gate 1569287074907552800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b80 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.911 UTC [gossip.discovery] handleAliveMessage -> DEBU b82 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.911 UTC [gossip.discovery] handleAliveMessage -> DEBU b83 endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1569287058832472100, 20 but got ts: inc_num:1569287058832472100 seq_num:19 " +peer0.org1.example.com | "2019-09-24 01:04:34.912 UTC [gossip.discovery] handleAliveMessage -> DEBU b84 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU b85 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.912 UTC [gossip.gossip] handleMessage -> DEBU b86 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.912 UTC [gossip.gossip] handleMessage -> DEBU b87 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.912 UTC [gossip.pull] HandleMessage -> DEBU b88 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.913 UTC [msp] DeserializeIdentity -> DEBU b89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.913 UTC [msp] DeserializeIdentity -> DEBU b8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.913 UTC [gossip.pull] SendDigest -> DEBU b8b Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:34.913 UTC [gossip.gossip] handleMessage -> DEBU b8c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.913 UTC [gossip.gossip] handleMessage -> DEBU b8d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b8f Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.915 UTC [msp.identity] Verify -> DEBU b90 Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +peer0.org1.example.com | 00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.915 UTC [msp.identity] Verify -> DEBU b91 Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +peer0.org1.example.com | 00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +peer0.org1.example.com | 00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +peer0.org1.example.com | 00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +peer0.org1.example.com | 00000040 79 c3 07 f6 f3 46 |y....F|" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU b92 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [gossip.discovery] isSentByMe -> DEBU b93 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU b94 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b95 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [msp] DeserializeIdentity -> DEBU b96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b97 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b98 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b99 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [cauthdsl] func1 -> DEBU b9d 0xc003afe100 gate 1569287074918653100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [cauthdsl] func2 -> DEBU b9e 0xc003afe100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.918 UTC [cauthdsl] func2 -> DEBU b9f 0xc003afe100 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.919 UTC [cauthdsl] func2 -> DEBU ba0 0xc003afe100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.919 UTC [cauthdsl] func2 -> DEBU ba1 0xc003afe100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.919 UTC [cauthdsl] func1 -> DEBU ba2 0xc003afe100 gate 1569287074918653100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.919 UTC [policies] Evaluate -> DEBU ba3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.920 UTC [policies] Evaluate -> DEBU ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.920 UTC [policies] Evaluate -> DEBU ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.920 UTC [cauthdsl] func1 -> DEBU ba6 0xc003afe940 gate 1569287074920736900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba7 0xc003afe940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba8 0xc003afe940 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba9 0xc003afe940 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.921 UTC [msp.identity] Verify -> DEBU baa Verify: digest = 00000000 51 23 76 90 e1 af 05 0b 8c df ec b8 0e 58 12 37 |Q#v..........X.7| +peer0.org1.example.com | 00000010 b3 03 8f 9b ef da 31 e9 83 17 da 4f c2 2f a0 14 |......1....O./..|" +peer0.org1.example.com | "2019-09-24 01:04:34.922 UTC [msp.identity] Verify -> DEBU bab Verify: sig = 00000000 30 45 02 21 00 df 80 f5 b1 49 64 5a d7 37 6f 12 |0E.!.....IdZ.7o.| +peer0.org1.example.com | 00000010 7e 77 bf 10 49 19 cc 4f 1e 5c da dc 5e 23 37 9c |~w..I..O.\..^#7.| +peer0.org1.example.com | 00000020 57 af 03 b3 d4 02 20 01 7b 84 25 8a ff 66 10 d6 |W..... .{.%..f..| +peer0.org1.example.com | 00000030 7a c1 3e ea 7b ef 0c bc 0e bf 03 0c d8 71 ac 2a |z.>.{........q.*| +peer0.org1.example.com | 00000040 da 7f 0c bd ed 58 08 |.....X.|" +peer0.org1.example.com | "2019-09-24 01:04:34.922 UTC [cauthdsl] func2 -> DEBU bac 0xc003afe940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.923 UTC [cauthdsl] func1 -> DEBU bad 0xc003afe940 gate 1569287074920736900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU baf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bb0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.924 UTC [gossip.discovery] handleAliveMessage -> DEBU bb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.924 UTC [gossip.discovery] handleAliveMessage -> DEBU bb3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.924 UTC [msp.identity] Verify -> DEBU bb5 Verify: digest = 00000000 66 b7 d1 2a ca 9e d0 48 4a f7 41 09 ac cd 33 4b |f..*...HJ.A...3K| +peer0.org1.example.com | 00000010 93 28 83 9d 7e f1 a4 4e 18 20 12 19 b4 a7 c4 74 |.(..~..N. .....t|" +peer0.org1.example.com | "2019-09-24 01:04:34.925 UTC [msp.identity] Verify -> DEBU bb6 Verify: sig = 00000000 30 44 02 20 1b e1 e8 46 f8 d0 8d 07 57 e9 21 44 |0D. ...F....W.!D| +peer0.org1.example.com | 00000010 a4 05 a7 df 5b de 36 61 55 3f 2e c0 a4 4f f2 11 |....[.6aU?...O..| +peer0.org1.example.com | 00000020 c5 f1 e1 cb 02 20 47 7c b6 1f 71 e5 a7 a2 7d 6f |..... G|..q...}o| +peer0.org1.example.com | 00000030 9a a2 28 85 d1 7d b1 d8 04 12 87 a8 8c 72 14 ce |..(..}.......r..| +peer0.org1.example.com | 00000040 13 c1 2c 2a 34 f1 |..,*4.|" +peer0.org1.example.com | "2019-09-24 01:04:34.925 UTC [gossip.discovery] handleAliveMessage -> DEBU bb7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.925 UTC [gossip.discovery] handleAliveMessage -> DEBU bb8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.925 UTC [gossip.gossip] handleMessage -> DEBU bba Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU bbb Got message: GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bbc Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [msp] DeserializeIdentity -> DEBU bbd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bbe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbf Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bc0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:34.926 UTC [policies] Evaluate -> DEBU bc1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.927 UTC [policies] Evaluate -> DEBU bc2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [policies] Evaluate -> DEBU bc3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [cauthdsl] func1 -> DEBU bc4 0xc003b12ed0 gate 1569287074928085400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc5 0xc003b12ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc6 0xc003b12ed0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc7 0xc003b12ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc8 0xc003b12ed0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.929 UTC [cauthdsl] func1 -> DEBU bc9 0xc003b12ed0 gate 1569287074928085400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:34.929 UTC [policies] Evaluate -> DEBU bca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.929 UTC [policies] Evaluate -> DEBU bcb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [policies] Evaluate -> DEBU bcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [cauthdsl] func1 -> DEBU bcd 0xc003b13710 gate 1569287074930536500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bce 0xc003b13710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bcf 0xc003b13710 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bd0 0xc003b13710 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.930 UTC [msp.identity] Verify -> DEBU bd1 Verify: digest = 00000000 fd 3e 8c 90 dc df 7e c8 5c 9d 06 db 15 ff 9c 5d |.>....~.\......]| +peer0.org1.example.com | 00000010 44 03 81 05 ef 82 91 79 72 df 45 b8 ab c2 0a 0c |D......yr.E.....|" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [msp.identity] Verify -> DEBU bd2 Verify: sig = 00000000 30 45 02 21 00 de e4 df c5 fe d3 80 6e a5 19 e5 |0E.!........n...| +peer0.org1.example.com | 00000010 d4 db 09 b5 6b 31 ea 77 d1 af fc 9f 0a 60 d9 e5 |....k1.w.....`..| +peer0.org1.example.com | 00000020 92 ba e1 e5 22 02 20 72 a8 3e a2 b7 1a 09 97 96 |....". r.>......| +peer0.org1.example.com | 00000030 dc b1 83 96 78 5e 80 45 7b 32 ba a1 78 75 e2 d4 |....x^.E{2..xu..| +peer0.org1.example.com | 00000040 15 e8 af 3d fe 72 3e |...=.r>|" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [cauthdsl] func2 -> DEBU bd3 0xc003b13710 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [cauthdsl] func1 -> DEBU bd4 0xc003b13710 gate 1569287074930536500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU bd9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bda Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bdb updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bdc Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [gossip.discovery] learnExistingMembers -> DEBU bdd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [gossip.discovery] learnExistingMembers -> DEBU bde Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [gossip.discovery] handleAliveMessage -> DEBU bdf Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [gossip.discovery] sendMemResponse -> DEBU be0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [msp] DeserializeIdentity -> DEBU be1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU be2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.934 UTC [msp] DeserializeIdentity -> DEBU be3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.935 UTC [msp] DeserializeIdentity -> DEBU be4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:34.935 UTC [gossip.comm] Send -> DEBU be5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:34.935 UTC [gossip.comm] sendToEndpoint -> DEBU be6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:34.935 UTC [gossip.comm] sendToEndpoint -> DEBU be7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:34.935 UTC [gossip.discovery] sendMemResponse -> DEBU be8 Exiting, replying with alive: alive:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > alive:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:35.724 UTC [gossip.channel] reportMembershipChanges -> INFO be9 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-09-24 01:04:35.841 UTC [gossip.comm] func1 -> DEBU bea Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.842 UTC [gossip.gossip] handleMessage -> DEBU beb Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.843 UTC [gossip.pull] HandleMessage -> DEBU bec GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.843 UTC [msp] DeserializeIdentity -> DEBU bed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.844 UTC [msp] DeserializeIdentity -> DEBU bee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.844 UTC [gossip.gossip] handleMessage -> DEBU bef Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.845 UTC [gossip.pull] SendRes -> DEBU bf0 Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:35.877 UTC [gossip.pull] SendReq -> DEBU bf1 Sending [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:35.877 UTC [gossip.comm] Send -> DEBU bf2 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:35.877 UTC [gossip.pull] SendReq -> DEBU bf3 Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:35.877 UTC [gossip.comm] Send -> DEBU bf4 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU bf5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:33.276 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bb6 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53702" +orderer0.example.com | "2019-09-24 01:04:33.276 UTC [orderer.consensus.etcdraft] propose -> INFO bb7 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:33.276 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bb8 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:33.277 UTC [orderer.consensus.etcdraft] 2 -> DEBU bb9 Proposed block [2] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:33.278 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bba Sending msg of 24605 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-09-24 01:04:33.278 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbb Sending msg of 24605 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2019-09-24 01:04:33.279 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbc Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +orderer0.example.com | "2019-09-24 01:04:33.280 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbd Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer1.example.com(orderer1.example.com:7050) took 191.8µs " +orderer0.example.com | "2019-09-24 01:04:33.285 UTC [common.deliver] Handle -> WARN bbe Error reading from 172.18.0.5:53700: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:04:33.285 UTC [orderer.common.server] func1 -> DEBU bbf Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:04:33.285 UTC [comm.grpc.server] 1 -> INFO bc0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53700 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=131.4702ms +orderer0.example.com | "2019-09-24 01:04:33.286 UTC [orderer.common.broadcast] Handle -> WARN bc1 Error reading from 172.18.0.5:53702: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:04:33.287 UTC [orderer.common.server] func1 -> DEBU bc2 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:04:33.287 UTC [comm.grpc.server] 1 -> INFO bc3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53702 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=106.8329ms +orderer0.example.com | "2019-09-24 01:04:33.287 UTC [grpc] infof -> DEBU bc4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:04:33.287 UTC [grpc] infof -> DEBU bc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:35.879 UTC [gossip.comm] sendToEndpoint -> DEBU bf6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU bf7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.881 UTC [gossip.comm] func1 -> DEBU bf9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.881 UTC [gossip.gossip] handleMessage -> DEBU bfa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.882 UTC [msp] DeserializeIdentity -> DEBU bfb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bfc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:35.883 UTC [policies] Evaluate -> DEBU bff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.883 UTC [policies] Evaluate -> DEBU c00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:35.884 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.884 UTC [cauthdsl] func1 -> DEBU c02 0xc003b8ca30 gate 1569287075884618300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:35.885 UTC [cauthdsl] func2 -> DEBU c03 0xc003b8ca30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:35.885 UTC [cauthdsl] func2 -> DEBU c04 0xc003b8ca30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:35.886 UTC [cauthdsl] func2 -> DEBU c05 0xc003b8ca30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:35.886 UTC [cauthdsl] func2 -> DEBU c06 0xc003b8ca30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:35.886 UTC [cauthdsl] func1 -> DEBU c07 0xc003b8ca30 gate 1569287075884618300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c08 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [cauthdsl] func1 -> DEBU c0b 0xc003b8d270 gate 1569287075887439700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0c 0xc003b8d270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0d 0xc003b8d270 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0e 0xc003b8d270 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:35.888 UTC [msp.identity] Verify -> DEBU c0f Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +peer0.org1.example.com | 00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.|" +peer0.org1.example.com | "2019-09-24 01:04:35.888 UTC [msp.identity] Verify -> DEBU c10 Verify: sig = 00000000 30 45 02 21 00 fc 8e 7e bf 44 ff a8 33 57 cb 99 |0E.!...~.D..3W..| +peer0.org1.example.com | 00000010 77 90 d1 e2 9b 7f ae a7 d6 0e fc f7 6a 1c 7d 8e |w...........j.}.| +peer0.org1.example.com | 00000020 3f 8c cd 2c 4c 02 20 29 b0 0a bb 5c 0f bb ed 5b |?..,L. )...\...[| +peer0.org1.example.com | 00000030 92 15 a2 82 b9 c9 88 9c 81 60 5c 25 da 4f 3d 3d |.........`\%.O==| +peer0.org1.example.com | 00000040 75 2f bb 98 61 05 0e |u/..a..|" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [cauthdsl] func2 -> DEBU c11 0xc003b8d270 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [cauthdsl] func1 -> DEBU c12 0xc003b8d270 gate 1569287075887439700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c13 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c15 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.889 UTC [msp] DeserializeIdentity -> DEBU c17 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.287 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc7 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc8 Sending msg of 28 bytes to 3 on channel businesschannel took 140.1µs" +orderer0.example.com | "2019-09-24 01:04:33.288 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +orderer0.example.com | "2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bca Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bce Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcf Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bd0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd2 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd3 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd4 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] verifyDeltaSet -> DEBU bda Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [common.configtx] policyForItem -> DEBU bdb Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [policies] Manager -> DEBU bdc Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:33.290 UTC [policies] Manager -> DEBU bdd Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU bde Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU bdf Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be0 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be2 Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be3 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be4 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be5 Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.291 UTC [policies] Evaluate -> DEBU be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:04:33.292 UTC [cauthdsl] func1 -> DEBU be7 0xc00119a370 gate 1569287073292898000 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.292 UTC [cauthdsl] func2 -> DEBU be8 0xc00119a370 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.293 UTC [cauthdsl] func2 -> DEBU be9 0xc00119a370 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.293 UTC [cauthdsl] func2 -> DEBU bea 0xc00119a370 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.293 UTC [msp.identity] Verify -> DEBU beb Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +orderer0.example.com | 00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +orderer0.example.com | "2019-09-24 01:04:33.293 UTC [msp.identity] Verify -> DEBU bec Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +orderer0.example.com | 00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +orderer0.example.com | 00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +orderer0.example.com | 00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +orderer0.example.com | 00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [cauthdsl] func2 -> DEBU bed 0xc00119a370 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [cauthdsl] func1 -> DEBU bee 0xc00119a370 gate 1569287073292898000 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [policies] Evaluate -> DEBU bef Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [policies] Evaluate -> DEBU bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [common.configtx] verifyDeltaSet -> DEBU bf1 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [common.configtx] recurseConfigMap -> DEBU bf4 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.294 UTC [common.configtx] recurseConfigMap -> DEBU bf5 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.298 UTC [common.configtx] recurseConfigMap -> DEBU bf6 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:04:35.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.890 UTC [gossip.pull] HandleMessage -> DEBU c19 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.891 UTC [msp] DeserializeIdentity -> DEBU c1a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.891 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.891 UTC [msp] DeserializeIdentity -> DEBU c1c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.879 UTC [gossip.comm] sendToEndpoint -> DEBU bf8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.893 UTC [gossip.comm] func1 -> DEBU c1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:04:33.301 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf7 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.298 UTC [common.configtx] recurseConfigMap -> DEBU bf8 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bf9 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bfa Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bfb Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfe Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU bff Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU c00 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU c01 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c02 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c03 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.322 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.322 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:04:33.323 UTC [common.channelconfig] NewStandardValues -> DEBU c0a Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:04:33.323 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0b Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.324 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0d Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.326 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0e Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:04:33.327 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0f Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU c10 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.327 UTC [common.channelconfig] NewStandardValues -> DEBU c11 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:04:33.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU c12 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU c13 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU c14 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU c15 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:04:33.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU c16 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU c17 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.334 UTC [common.channelconfig] NewStandardValues -> DEBU c18 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU c19 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:04:33.335 UTC [common.channelconfig] NewStandardValues -> DEBU c1a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.335 UTC [common.channelconfig] validateMSP -> DEBU c1c Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.336 UTC [msp] newBccspMsp -> DEBU c1d Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.337 UTC [msp] New -> DEBU c1e Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.337 UTC [msp] Setup -> DEBU c1f Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:04:33.338 UTC [msp.identity] newIdentity -> DEBU c20 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.340 UTC [msp.identity] newIdentity -> DEBU c21 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.341 UTC [msp] Validate -> DEBU c22 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.343 UTC [common.channelconfig] NewStandardValues -> DEBU c23 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:04:33.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU c24 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:04:33.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU c25 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.346 UTC [common.channelconfig] NewStandardValues -> DEBU c26 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.347 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.350 UTC [common.channelconfig] Validate -> DEBU c2a Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.350 UTC [common.channelconfig] validateMSP -> DEBU c2b Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.350 UTC [msp] newBccspMsp -> DEBU c2c Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.351 UTC [msp] New -> DEBU c2d Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.351 UTC [msp] Setup -> DEBU c2e Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.351 UTC [msp.identity] newIdentity -> DEBU c2f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.352 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:04:33.352 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.353 UTC [common.channelconfig] NewStandardValues -> DEBU c32 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:04:33.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU c33 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:04:33.353 UTC [common.channelconfig] Validate -> DEBU c34 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:04:33.354 UTC [common.channelconfig] validateMSP -> DEBU c35 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.354 UTC [msp] newBccspMsp -> DEBU c36 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.355 UTC [msp] New -> DEBU c37 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:04:33.355 UTC [msp] Setup -> DEBU c38 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.355 UTC [msp.identity] newIdentity -> DEBU c39 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.359 UTC [msp] Setup -> DEBU c3a Setting up the MSP manager (3 msps)" +orderer0.example.com | "2019-09-24 01:04:33.359 UTC [msp] Setup -> DEBU c3b MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2019-09-24 01:04:33.359 UTC [policies] NewManagerImpl -> DEBU c3c Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.359 UTC [policies] NewManagerImpl -> DEBU c3d Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c3e Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c3f Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c40 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.361 UTC [policies] NewManagerImpl -> DEBU c41 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.361 UTC [policies] NewManagerImpl -> DEBU c42 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.361 UTC [policies] GetPolicy -> DEBU c43 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c44 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.362 UTC [policies] NewManagerImpl -> DEBU c45 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c46 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c47 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c48 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c49 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c4a Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:04:35.894 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.894 UTC [gossip.gossip] func2 -> DEBU c1f Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 01:04:35.894 UTC [gossip.pull] HandleMessage -> DEBU c20 Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 3" +peer0.org1.example.com | "2019-09-24 01:04:35.895 UTC [gossip.gossip] handleMessage -> DEBU c21 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.895 UTC [gossip.gossip] handleMessage -> DEBU c22 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.896 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c25 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c26 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:35.896 UTC [policies] Evaluate -> DEBU c27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.897 UTC [policies] Evaluate -> DEBU c28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:35.897 UTC [policies] Evaluate -> DEBU c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.897 UTC [cauthdsl] func1 -> DEBU c2a 0xc003bbc370 gate 1569287075897223600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:35.897 UTC [cauthdsl] func2 -> DEBU c2b 0xc003bbc370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:35.897 UTC [cauthdsl] func2 -> DEBU c2c 0xc003bbc370 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:35.899 UTC [cauthdsl] func2 -> DEBU c2d 0xc003bbc370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:35.899 UTC [cauthdsl] func2 -> DEBU c2e 0xc003bbc370 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:35.899 UTC [cauthdsl] func1 -> DEBU c2f 0xc003bbc370 gate 1569287075897223600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:35.900 UTC [cauthdsl] func1 -> DEBU c33 0xc003bbcbb0 gate 1569287075900660500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:35.901 UTC [cauthdsl] func2 -> DEBU c34 0xc003bbcbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:35.901 UTC [cauthdsl] func2 -> DEBU c35 0xc003bbcbb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:35.904 UTC [gossip.comm] func1 -> DEBU c36 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.905 UTC [cauthdsl] func2 -> DEBU c37 0xc003bbcbb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:35.905 UTC [msp.identity] Verify -> DEBU c38 Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +peer0.org1.example.com | 00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....|" +peer0.org1.example.com | "2019-09-24 01:04:35.905 UTC [msp.identity] Verify -> DEBU c39 Verify: sig = 00000000 30 45 02 21 00 e4 04 6b 40 f6 68 d3 10 64 6b c5 |0E.!...k@.h..dk.| +peer0.org1.example.com | 00000010 08 f1 62 89 36 6d 5b 06 a5 03 37 61 43 ab 11 4a |..b.6m[...7aC..J| +peer0.org1.example.com | 00000020 53 a2 ed 9b 42 02 20 6f 4b 06 f8 80 ee 24 4c 61 |S...B. oK....$La| +peer0.org1.example.com | 00000030 52 d0 71 e0 43 47 2f 2f 92 86 90 1e 65 74 63 4e |R.q.CG//....etcN| +peer0.org1.example.com | 00000040 7f b9 72 2c 11 b2 76 |..r,..v|" +peer0.org1.example.com | "2019-09-24 01:04:35.906 UTC [cauthdsl] func2 -> DEBU c3a 0xc003bbcbb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:35.907 UTC [cauthdsl] func1 -> DEBU c3b 0xc003bbcbb0 gate 1569287075900660500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.908 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:35.908 UTC [msp] DeserializeIdentity -> DEBU c40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.909 UTC [gossip.pull] HandleMessage -> DEBU c42 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.909 UTC [msp] DeserializeIdentity -> DEBU c43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c44 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.910 UTC [msp] DeserializeIdentity -> DEBU c45 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:35.911 UTC [gossip.gossip] func2 -> DEBU c47 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +peer0.org1.example.com | "2019-09-24 01:04:35.911 UTC [gossip.pull] HandleMessage -> DEBU c48 Added A^���g�� +peer0.org1.example.com | ����U���ʒ�:+��aSpq� to the in memory item map, total items: 4" +peer0.org1.example.com | "2019-09-24 01:04:35.911 UTC [gossip.gossip] handleMessage -> DEBU c49 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.912 UTC [gossip.gossip] handleMessage -> DEBU c4a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.912 UTC [gossip.pull] HandleMessage -> DEBU c4b GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:35.912 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:35.913 UTC [gossip.gossip] handleMessage -> DEBU c4d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:35.913 UTC [gossip.pull] SendRes -> DEBU c4e Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:36.764 UTC [gossip.election] waitForInterrupt -> DEBU c4f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:36.764 UTC [gossip.election] IsLeader -> DEBU c50 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:36.764 UTC [msp] GetDefaultSigningIdentity -> DEBU c51 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:36.765 UTC [msp.identity] Sign -> DEBU c52 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510031801 " +peer0.org1.example.com | "2019-09-24 01:04:36.766 UTC [msp.identity] Sign -> DEBU c53 Sign: digest: B3E6CFE82E06216C9C29B448C5AFB300A6718DDA59234FD65C4647954F4C8B5E " +peer0.org1.example.com | "2019-09-24 01:04:36.767 UTC [gossip.election] waitForInterrupt -> DEBU c54 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:36.774 UTC [msp] DeserializeIdentity -> DEBU c55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:36.774 UTC [msp] DeserializeIdentity -> DEBU c56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:36.775 UTC [gossip.comm] Send -> DEBU c57 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:36.775 UTC [msp] DeserializeIdentity -> DEBU c58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:36.775 UTC [msp] DeserializeIdentity -> DEBU c59 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU c5a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU c5b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.724 UTC [msp] DeserializeIdentity -> DEBU c5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.725 UTC [msp] DeserializeIdentity -> DEBU c5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.725 UTC [gossip.comm] Send -> DEBU c5e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c61 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.727 UTC [gossip.comm] sendToEndpoint -> DEBU c62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.727 UTC [gossip.comm] sendToEndpoint -> DEBU c63 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.728 UTC [gossip.comm] func1 -> DEBU c64 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.728 UTC [gossip.gossip] handleMessage -> DEBU c65 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.728 UTC [msp] DeserializeIdentity -> DEBU c66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.729 UTC [msp] DeserializeIdentity -> DEBU c67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.729 UTC [msp] DeserializeIdentity -> DEBU c68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c60 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.731 UTC [gossip.comm] sendToEndpoint -> DEBU c6a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.730 UTC [gossip.comm] func1 -> DEBU c69 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:37.733 UTC [gossip.comm] func1 -> DEBU c6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.734 UTC [policies] Evaluate -> DEBU c6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.734 UTC [policies] Evaluate -> DEBU c70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.735 UTC [policies] Evaluate -> DEBU c71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.735 UTC [cauthdsl] func1 -> DEBU c72 0xc003bf7070 gate 1569287077735338400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.735 UTC [cauthdsl] func2 -> DEBU c73 0xc003bf7070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.735 UTC [cauthdsl] func2 -> DEBU c74 0xc003bf7070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.736 UTC [cauthdsl] func2 -> DEBU c75 0xc003bf7070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.736 UTC [cauthdsl] func2 -> DEBU c76 0xc003bf7070 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.737 UTC [cauthdsl] func1 -> DEBU c77 0xc003bf7070 gate 1569287077735338400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.738 UTC [cauthdsl] func1 -> DEBU c7b 0xc003bf78b0 gate 1569287077738153600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.738 UTC [cauthdsl] func2 -> DEBU c7c 0xc003bf78b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.738 UTC [cauthdsl] func2 -> DEBU c7d 0xc003bf78b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.739 UTC [cauthdsl] func2 -> DEBU c7e 0xc003bf78b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.739 UTC [msp.identity] Verify -> DEBU c7f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:37.740 UTC [msp.identity] Verify -> DEBU c80 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:37.741 UTC [cauthdsl] func2 -> DEBU c81 0xc003bf78b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.741 UTC [cauthdsl] func1 -> DEBU c82 0xc003bf78b0 gate 1569287077738153600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.743 UTC [msp.identity] Verify -> DEBU c87 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:37.743 UTC [msp.identity] Verify -> DEBU c88 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:37.743 UTC [msp] DeserializeIdentity -> DEBU c89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.743 UTC [msp] DeserializeIdentity -> DEBU c8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c8c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c8d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.745 UTC [policies] Evaluate -> DEBU c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.745 UTC [policies] Evaluate -> DEBU c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.749 UTC [policies] Evaluate -> DEBU c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.750 UTC [cauthdsl] func1 -> DEBU c91 0xc003c117a0 gate 1569287077750443800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.750 UTC [cauthdsl] func2 -> DEBU c92 0xc003c117a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c52 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c53 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c54 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c60 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c61 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c62 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c63 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c64 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c81 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c82 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c83 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c84 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c85 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c86 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c87 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c88 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c89 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c8a As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c8b As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c8c Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8d Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8e Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8f Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c90 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c93 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c94 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.capabilities] Supported -> DEBU c95 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [common.capabilities] Supported -> DEBU c96 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.common.server] func1 -> DEBU c97 Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c98 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c99 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c9a adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c9b adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9c [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9d [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [msp] GetDefaultSigningIdentity -> DEBU c9e Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [msp] GetDefaultSigningIdentity -> DEBU c9f Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [msp.identity] Sign -> DEBU ca0 Sign: plaintext: 0A020802120B0A090A03010203100418...0137CCF2DEC1AFF60C42EBD8414D674A " +orderer0.example.com | "2019-09-24 01:04:33.368 UTC [msp.identity] Sign -> DEBU ca1 Sign: digest: 37D45CC290FEC396915587141648724A86B62CDA34A4852F589F0990A6236DE8 " +peer0.org1.example.com | "2019-09-24 01:04:37.750 UTC [cauthdsl] func2 -> DEBU c93 0xc003c117a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.751 UTC [cauthdsl] func2 -> DEBU c94 0xc003c117a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.751 UTC [cauthdsl] func2 -> DEBU c95 0xc003c117a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.751 UTC [cauthdsl] func1 -> DEBU c96 0xc003c117a0 gate 1569287077750443800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.751 UTC [policies] Evaluate -> DEBU c97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.751 UTC [policies] Evaluate -> DEBU c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.752 UTC [policies] Evaluate -> DEBU c99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.752 UTC [cauthdsl] func1 -> DEBU c9a 0xc003c11fe0 gate 1569287077752773200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.753 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.753 UTC [gossip.pull] Hello -> DEBU c9d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:37.753 UTC [cauthdsl] func2 -> DEBU c9b 0xc003c11fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.753 UTC [cauthdsl] func2 -> DEBU c9f 0xc003c11fe0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.753 UTC [msp] DeserializeIdentity -> DEBU c9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.754 UTC [gossip.comm] Send -> DEBU ca0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:37.755 UTC [gossip.comm] sendToEndpoint -> DEBU ca1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.755 UTC [gossip.comm] sendToEndpoint -> DEBU ca2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.756 UTC [gossip.comm] func1 -> DEBU ca3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.754 UTC [cauthdsl] func2 -> DEBU ca4 0xc003c11fe0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.757 UTC [msp.identity] Verify -> DEBU ca5 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:37.758 UTC [msp.identity] Verify -> DEBU ca6 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:37.758 UTC [cauthdsl] func2 -> DEBU ca7 0xc003c11fe0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.758 UTC [cauthdsl] func1 -> DEBU ca8 0xc003c11fe0 gate 1569287077752773200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU ca9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU cab Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.760 UTC [policies] Evaluate -> DEBU cac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.760 UTC [msp] DeserializeIdentity -> DEBU cad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cae Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU caf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.761 UTC [policies] Evaluate -> DEBU cb0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.762 UTC [policies] Evaluate -> DEBU cb1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.762 UTC [policies] Evaluate -> DEBU cb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.764 UTC [cauthdsl] func1 -> DEBU cb3 0xc003c270c0 gate 1569287077764958000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb4 0xc003c270c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb5 0xc003c270c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb6 0xc003c270c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb7 0xc003c270c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.765 UTC [cauthdsl] func1 -> DEBU cb8 0xc003c270c0 gate 1569287077764958000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cb9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.372 UTC [fsblkstorage] indexBlock -> DEBU ca2 Indexing block [blockNum=2, blockHash=[]byte{0xba, 0xc0, 0xcb, 0xf4, 0x59, 0xfa, 0xb5, 0xea, 0x84, 0x86, 0x4a, 0x57, 0xcd, 0xad, 0xb5, 0xc7, 0xd0, 0x5a, 0x7c, 0x6a, 0x8b, 0x61, 0x16, 0xcf, 0x6f, 0x9c, 0x46, 0xa0, 0xe3, 0x2b, 0x77, 0xe0} txOffsets= +orderer0.example.com | txId=b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e locPointer=offset=71, bytesLength=24474 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:04:33.375 UTC [fsblkstorage] updateCheckpoint -> DEBU ca3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76768], isChainEmpty=[false], lastBlockNumber=[2]" +orderer0.example.com | "2019-09-24 01:04:33.375 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ca4 [channel: businesschannel] Wrote block [2]" +orderer0.example.com | "2019-09-24 01:04:33.375 UTC [fsblkstorage] waitForBlock -> DEBU ca5 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-09-24 01:04:33.376 UTC [fsblkstorage] waitForBlock -> DEBU ca6 Came out of wait. maxAvailaBlockNumber=[2]" +orderer0.example.com | "2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca7 Remaining bytes=[25483], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca8 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca9 blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [msp] DeserializeIdentity -> DEBU caf Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.377 UTC [msp.identity] newIdentity -> DEBU cb0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +orderer0.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +orderer0.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +orderer0.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +orderer0.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.380 UTC [cauthdsl] func1 -> DEBU cb1 0xc00116ee00 gate 1569287073378308200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [cauthdsl] func1 -> DEBU cbc 0xc003c27900 gate 1569287077766575400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [cauthdsl] func2 -> DEBU cbd 0xc003c27900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.766 UTC [cauthdsl] func2 -> DEBU cbe 0xc003c27900 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.767 UTC [cauthdsl] func2 -> DEBU cbf 0xc003c27900 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.767 UTC [msp.identity] Verify -> DEBU cc0 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:37.767 UTC [msp.identity] Verify -> DEBU cc1 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:37.767 UTC [cauthdsl] func2 -> DEBU cc2 0xc003c27900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [cauthdsl] func1 -> DEBU cc3 0xc003c27900 gate 1569287077766575400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.768 UTC [gossip.gossip] handleMessage -> DEBU cc8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.769 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU cca Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU ccb Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU ccc Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:37.770 UTC [msp.identity] Verify -> DEBU ccd Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:37.770 UTC [msp] DeserializeIdentity -> DEBU cce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.770 UTC [msp] DeserializeIdentity -> DEBU ccf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.770 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:37.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func1 -> DEBU cd6 0xc003c56150 gate 1569287077771458800 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb2 0xc00116ee00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb3 0xc00116ee00 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb4 0xc00116ee00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cb5 0xc00116ee00 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [cauthdsl] func1 -> DEBU cb6 0xc00116ee00 gate 1569287073378308200 evaluation fails" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [cauthdsl] func1 -> DEBU cba 0xc0011a20f0 gate 1569287073382627400 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cbb 0xc0011a20f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cbc 0xc0011a20f0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.382 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cbd Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [msp] Validate -> DEBU cbe MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [msp] getCertificationChain -> DEBU cbf MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc0 Remaining bytes=[25483], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc1 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [cauthdsl] func2 -> DEBU cc2 0xc0011a20f0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [msp.identity] Verify -> DEBU cc3 Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +orderer0.example.com | 00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [msp.identity] Verify -> DEBU cc5 Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +orderer0.example.com | 00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +orderer0.example.com | 00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +orderer0.example.com | 00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +orderer0.example.com | 00000040 7d c0 9c 51 b2 3e |}..Q.>|" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [cauthdsl] func2 -> DEBU cc6 0xc0011a20f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [cauthdsl] func1 -> DEBU cc7 0xc0011a20f0 gate 1569287073382627400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cc8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cca Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.383 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc4 blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [msp] DeserializeIdentity -> DEBU cd1 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [msp.identity] newIdentity -> DEBU cd2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +orderer0.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +orderer0.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +orderer0.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [cauthdsl] func1 -> DEBU cd3 0xc0011cc1c0 gate 1569287073385547300 evaluation starts" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [cauthdsl] func2 -> DEBU cd4 0xc0011cc1c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [cauthdsl] func2 -> DEBU cd5 0xc0011cc1c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cd6 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [msp] Validate -> DEBU cd7 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:04:33.385 UTC [msp] getCertificationChain -> DEBU cd8 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cd9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.386 UTC [policies] Evaluate -> DEBU cda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.386 UTC [common.deliver] deliverBlocks -> DEBU cdb [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [fsblkstorage] waitForBlock -> DEBU cdc Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [cauthdsl] func2 -> DEBU cdd 0xc0011cc1c0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +orderer0.example.com | 00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd7 0xc003c56150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd8 0xc003c56150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd9 0xc003c56150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cda 0xc003c56150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.771 UTC [cauthdsl] func1 -> DEBU cdb 0xc003c56150 gate 1569287077771458800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cdc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cdd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func1 -> DEBU cdf 0xc003c56990 gate 1569287077772241200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce0 0xc003c56990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce1 0xc003c56990 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce2 0xc003c56990 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [msp.identity] Verify -> DEBU ce3 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [msp.identity] Verify -> DEBU ce4 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce5 0xc003c56990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.772 UTC [cauthdsl] func1 -> DEBU ce6 0xc003c56990 gate 1569287077772241200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU cea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [gossip.gossip] handleMessage -> DEBU ceb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [gossip.gossip] handleMessage -> DEBU cec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU ced Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU cee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU cef Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func1 -> DEBU cf6 0xc003c704a0 gate 1569287077774564200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf7 0xc003c704a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf8 0xc003c704a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf9 0xc003c704a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cfa 0xc003c704a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.774 UTC [cauthdsl] func1 -> DEBU cfb 0xc003c704a0 gate 1569287077774564200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func1 -> DEBU cff 0xc003c70ce0 gate 1569287077775197900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d00 0xc003c70ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d01 0xc003c70ce0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d02 0xc003c70ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [msp.identity] Verify -> DEBU d03 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [msp.identity] Verify -> DEBU d04 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d05 0xc003c70ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [cauthdsl] func1 -> DEBU d06 0xc003c70ce0 gate 1569287077775197900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d09 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0d Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0e Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:37.778 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.778 UTC [msp] DeserializeIdentity -> DEBU d10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:37.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d12 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:37.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d13 Got reader policy for channel [businesschannel] with flag [true]" +orderer0.example.com | 00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +orderer0.example.com | 00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +orderer0.example.com | 00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +orderer0.example.com | 00000040 8d 91 b7 ea 04 6f |.....o|" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [cauthdsl] func2 -> DEBU ce0 0xc0011cc1c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [cauthdsl] func1 -> DEBU ce1 0xc0011cc1c0 gate 1569287073385547300 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.387 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [common.deliver] deliverBlocks -> DEBU ce8 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:04:33.388 UTC [fsblkstorage] waitForBlock -> DEBU ce9 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +orderer0.example.com | "2019-09-24 01:04:33.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +orderer0.example.com | "2019-09-24 01:04:33.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 125.1µs" +orderer0.example.com | "2019-09-24 01:04:33.752 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +orderer0.example.com | "2019-09-24 01:04:33.753 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cef Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +orderer0.example.com | "2019-09-24 01:04:33.753 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf0 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:33.753 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +orderer0.example.com | "2019-09-24 01:04:33.755 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2028ms " +orderer0.example.com | "2019-09-24 01:04:33.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf4 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2019-09-24 01:04:34.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +orderer0.example.com | "2019-09-24 01:04:34.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 01:04:34.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +orderer0.example.com | "2019-09-24 01:04:34.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +orderer0.example.com | "2019-09-24 01:04:34.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.2µs " +orderer0.example.com | "2019-09-24 01:04:34.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfd Sending msg of 28 bytes to 3 on channel testchainid took 348µs" +orderer0.example.com | "2019-09-24 01:04:34.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.9µs " +orderer0.example.com | "2019-09-24 01:04:34.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 32.9µs" +orderer0.example.com | "2019-09-24 01:04:34.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d01 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2019-09-24 01:04:34.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +orderer0.example.com | "2019-09-24 01:04:34.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:34.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.85ms " +orderer0.example.com | "2019-09-24 01:04:35.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [cauthdsl] func1 -> DEBU d17 0xc003c8b2f0 gate 1569287077781763000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [cauthdsl] func2 -> DEBU d18 0xc003c8b2f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.781 UTC [cauthdsl] func2 -> DEBU d19 0xc003c8b2f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d1a 0xc003c8b2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d1b 0xc003c8b2f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func1 -> DEBU d1c 0xc003c8b2f0 gate 1569287077781763000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func1 -> DEBU d20 0xc003c8bb30 gate 1569287077782660200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d21 0xc003c8bb30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d22 0xc003c8bb30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [cauthdsl] func2 -> DEBU d23 0xc003c8bb30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [msp.identity] Verify -> DEBU d24 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [msp.identity] Verify -> DEBU d25 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [cauthdsl] func2 -> DEBU d26 0xc003c8bb30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [cauthdsl] func1 -> DEBU d27 0xc003c8bb30 gate 1569287077782660200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d2a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:37.783 UTC [gossip.gossip] handleMessage -> DEBU d2c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.784 UTC [gossip.gossip] handleMessage -> DEBU d2d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.784 UTC [gossip.pull] HandleMessage -> DEBU d2e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.784 UTC [gossip.gossip] handleMessage -> DEBU d2f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.908 UTC [gossip.comm] func1 -> DEBU d30 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.908 UTC [gossip.gossip] handleMessage -> DEBU d31 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.908 UTC [msp] DeserializeIdentity -> DEBU d32 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.908 UTC [msp] DeserializeIdentity -> DEBU d33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:37.912 UTC [gossip.gossip] handleMessage -> DEBU d34 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.911 UTC [gossip.comm] func1 -> DEBU d35 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.912 UTC [gossip.gossip] handleMessage -> DEBU d36 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.912 UTC [gossip.pull] HandleMessage -> DEBU d37 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:37.913 UTC [gossip.pull] SendDigest -> DEBU d38 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:37.913 UTC [gossip.gossip] handleMessage -> DEBU d39 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:37.939 UTC [endorser] ProcessProposal -> DEBU d3a Entering: request from 172.18.0.5:49880" +peer0.org1.example.com | "2019-09-24 01:04:37.940 UTC [protoutils] ValidateProposalMessage -> DEBU d3b ValidateProposalMessage starts for signed proposal 0xc003bd8fa0" +peer0.org1.example.com | "2019-09-24 01:04:37.940 UTC [protoutils] validateChannelHeader -> DEBU d3c validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:04:37.940 UTC [protoutils] checkSignatureFromCreator -> DEBU d3d begin" +peer0.org1.example.com | "2019-09-24 01:04:37.940 UTC [protoutils] checkSignatureFromCreator -> DEBU d3e creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:04:37.941 UTC [protoutils] checkSignatureFromCreator -> DEBU d3f creator is valid" +peer0.org1.example.com | "2019-09-24 01:04:37.941 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 b0 46 97 e2 65 cc 46 d3 04 af 46 68 c7 c6 e0 6f |.F..e.F...Fh...o| +peer0.org1.example.com | 00000010 30 08 9c 46 80 96 08 c4 49 77 99 45 21 aa bd a7 |0..F....Iw.E!...|" +orderer0.example.com | "2019-09-24 01:04:35.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d06 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +peer0.org1.example.com | "2019-09-24 01:04:37.941 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 45 02 21 00 ff 0f 01 b7 ee ca cd 1b a5 51 79 |0E.!..........Qy| +peer0.org1.example.com | 00000010 99 1a a7 1b 01 99 df 8b 32 8a 2b 44 c4 24 7b 97 |........2.+D.${.| +peer0.org1.example.com | 00000020 88 fa 86 5d 2b 02 20 4a b1 cd 65 8a 51 49 a7 b2 |...]+. J..e.QI..| +peer0.org1.example.com | 00000030 28 ba f6 9f c7 53 92 bf 3d c5 fc 16 b9 5c 7e 53 |(....S..=....\~S| +peer0.org1.example.com | 00000040 fd 92 39 0a c1 69 4b |..9..iK|" +peer0.org1.example.com | "2019-09-24 01:04:37.942 UTC [protoutils] checkSignatureFromCreator -> DEBU d42 exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:37.942 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d43 validateChaincodeProposalMessage starts for proposal 0xc003bcc700, header 0xc003bd93b0" +peer0.org1.example.com | "2019-09-24 01:04:37.942 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d44 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:37.943 UTC [endorser] preProcess -> DEBU d45 [][14f7764f] processing txid: 14f7764f7f26cd3d980daaa9a6de4a1c189c1979344ba5ae869ac07971004d20" +peer0.org1.example.com | "2019-09-24 01:04:37.943 UTC [endorser] SimulateProposal -> DEBU d46 [][14f7764f] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:37.944 UTC [endorser] callChaincode -> INFO d47 [][14f7764f] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:37.945 UTC [chaincode] Execute -> DEBU d48 Entry" +peer0.org1.example.com | "2019-09-24 01:04:37.946 UTC [msp.identity] Verify -> DEBU d49 Verify: digest = 00000000 b0 46 97 e2 65 cc 46 d3 04 af 46 68 c7 c6 e0 6f |.F..e.F...Fh...o| +peer0.org1.example.com | 00000010 30 08 9c 46 80 96 08 c4 49 77 99 45 21 aa bd a7 |0..F....Iw.E!...|" +peer0.org1.example.com | "2019-09-24 01:04:37.946 UTC [msp.identity] Verify -> DEBU d4a Verify: sig = 00000000 30 45 02 21 00 ff 0f 01 b7 ee ca cd 1b a5 51 79 |0E.!..........Qy| +peer0.org1.example.com | 00000010 99 1a a7 1b 01 99 df 8b 32 8a 2b 44 c4 24 7b 97 |........2.+D.${.| +peer0.org1.example.com | 00000020 88 fa 86 5d 2b 02 20 4a b1 cd 65 8a 51 49 a7 b2 |...]+. J..e.QI..| +peer0.org1.example.com | 00000030 28 ba f6 9f c7 53 92 bf 3d c5 fc 16 b9 5c 7e 53 |(....S..=....\~S| +peer0.org1.example.com | 00000040 fd 92 39 0a c1 69 4b |..9..iK|" +peer0.org1.example.com | "2019-09-24 01:04:37.947 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU d4b Created metadata tar" +peer0.org1.example.com | "2019-09-24 01:04:37.947 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d4c HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +peer0.org1.example.com | "2019-09-24 01:04:37.947 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d4d Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +peer0.org1.example.com | "2019-09-24 01:04:37.947 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU d4e constructing new query executor txid = [150c43ed-76f4-45f2-bb0e-6e30f5b2029a]" +peer0.org1.example.com | "2019-09-24 01:04:37.947 UTC [stateleveldb] GetState -> DEBU d4f GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [lockbasedtxmgr] Done -> DEBU d50 Done with transaction simulation / query execution [150c43ed-76f4-45f2-bb0e-6e30f5b2029a]" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d51 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [lscc] executeInstall -> INFO d52 Installed Chaincode [exp02] Version [1.0] to peer" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [chaincode] handleMessage -> DEBU d53 [14f7764f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [chaincode] Notify -> DEBU d54 [14f7764f] notifying Txid:14f7764f7f26cd3d980daaa9a6de4a1c189c1979344ba5ae869ac07971004d20, channelID:" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [chaincode] Execute -> DEBU d55 Exit" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [endorser] callChaincode -> INFO d56 [][14f7764f] Exit chaincode: name:"lscc" (4ms)" +peer0.org1.example.com | "2019-09-24 01:04:37.948 UTC [endorser] SimulateProposal -> DEBU d57 [][14f7764f] Exit" +peer0.org1.example.com | "2019-09-24 01:04:37.949 UTC [endorser] func1 -> DEBU d58 Exit: request from 172.18.0.5:49880" +peer0.org1.example.com | "2019-09-24 01:04:37.949 UTC [comm.grpc.server] 1 -> INFO d59 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49880 grpc.code=OK grpc.call_duration=9.6897ms +peer0.org1.example.com | "2019-09-24 01:04:37.953 UTC [grpc] infof -> DEBU d5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:37.953 UTC [grpc] infof -> DEBU d5b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:38.110 UTC [gossip.comm] func1 -> DEBU d5c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.111 UTC [gossip.gossip] handleMessage -> DEBU d5d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.112 UTC [gossip.gossip] handleMessage -> DEBU d61 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.309 UTC [gossip.comm] func1 -> DEBU d62 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.309 UTC [gossip.gossip] handleMessage -> DEBU d63 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.309 UTC [msp] DeserializeIdentity -> DEBU d64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.310 UTC [msp] DeserializeIdentity -> DEBU d65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.310 UTC [msp] DeserializeIdentity -> DEBU d66 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:35.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +orderer0.example.com | "2019-09-24 01:04:35.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d08 Sending msg of 28 bytes to 2 on channel businesschannel took 31.6µs" +orderer0.example.com | "2019-09-24 01:04:35.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 3 on channel businesschannel took 39.3µs" +orderer0.example.com | "2019-09-24 01:04:35.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 613.7µs " +orderer0.example.com | "2019-09-24 01:04:35.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.6µs " +orderer0.example.com | "2019-09-24 01:04:35.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:35.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:35.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:35.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0f Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" +orderer0.example.com | "2019-09-24 01:04:35.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +orderer0.example.com | "2019-09-24 01:04:35.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d11 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" +orderer0.example.com | "2019-09-24 01:04:35.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 01:04:35.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.7µs " +orderer0.example.com | "2019-09-24 01:04:35.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6534ms " +orderer0.example.com | "2019-09-24 01:04:35.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d15 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:35.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d18 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +orderer0.example.com | "2019-09-24 01:04:36.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257µs " +orderer0.example.com | "2019-09-24 01:04:36.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-09-24 01:04:36.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +orderer0.example.com | "2019-09-24 01:04:36.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 708µs " +orderer0.example.com | "2019-09-24 01:04:36.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0121ms " +orderer0.example.com | "2019-09-24 01:04:36.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d21 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2019-09-24 01:04:36.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " +orderer0.example.com | "2019-09-24 01:04:36.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 2 on channel businesschannel took 38.8µs" +orderer0.example.com | "2019-09-24 01:04:36.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 494.9µs " +orderer0.example.com | "2019-09-24 01:04:36.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d25 Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +orderer0.example.com | "2019-09-24 01:04:36.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +orderer0.example.com | "2019-09-24 01:04:36.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d27 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:36.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2a Sending msg of 28 bytes to 3 on channel testchainid took 1.2457ms" +orderer0.example.com | "2019-09-24 01:04:37.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 766.7µs " +orderer0.example.com | "2019-09-24 01:04:37.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2c Sending msg of 28 bytes to 2 on channel businesschannel took 45.9µs" +orderer0.example.com | "2019-09-24 01:04:37.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +peer0.org1.example.com | "2019-09-24 01:04:38.310 UTC [gossip.gossip] handleMessage -> DEBU d67 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.527 UTC [gossip.comm] func1 -> DEBU d68 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.527 UTC [gossip.gossip] handleMessage -> DEBU d69 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.527 UTC [gossip.pull] HandleMessage -> DEBU d6a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.528 UTC [gossip.pull] SendDigest -> DEBU d6b Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:38.528 UTC [gossip.gossip] handleMessage -> DEBU d6c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.533 UTC [gossip.comm] func1 -> DEBU d6d Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.533 UTC [gossip.gossip] handleMessage -> DEBU d6e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.533 UTC [gossip.gossip] handleMessage -> DEBU d6f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU d70 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.534 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d71 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.534 UTC [msp.identity] Verify -> DEBU d72 Verify: digest = 00000000 ea fd 83 71 96 fe 7d 48 cd 92 1b bc bc 53 0b 44 |...q..}H.....S.D| +peer0.org1.example.com | 00000010 fd 0d 30 ee 82 2d f1 75 b4 b5 35 4d e0 12 c3 4f |..0..-.u..5M...O|" +peer0.org1.example.com | "2019-09-24 01:04:38.534 UTC [msp.identity] Verify -> DEBU d73 Verify: sig = 00000000 30 45 02 21 00 d6 b9 3d d1 fc df bf 9b 25 d7 2e |0E.!...=.....%..| +peer0.org1.example.com | 00000010 89 40 34 a2 cf e8 7d 63 8d 42 4a 6c 4d cd b3 a5 |.@4...}c.BJlM...| +peer0.org1.example.com | 00000020 c1 52 55 7a bf 02 20 0d 1e 8c f5 e0 4f b3 cf 53 |.RUz.. .....O..S| +peer0.org1.example.com | 00000030 98 e0 9f 4b 6a c7 1f a2 84 59 5c 1d 3a 0a 48 3f |...Kj....Y\.:.H?| +peer0.org1.example.com | 00000040 73 82 75 95 bf ef 4e |s.u...N|" +peer0.org1.example.com | "2019-09-24 01:04:38.535 UTC [msp.identity] Verify -> DEBU d74 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:38.535 UTC [msp.identity] Verify -> DEBU d75 Verify: sig = 00000000 30 44 02 20 02 75 a8 28 9b 16 c2 6c 0f 01 3a 98 |0D. .u.(...l..:.| +peer0.org1.example.com | 00000010 06 37 1e 67 2e 4e 6e 4a 3d 02 98 4b 5b d3 a9 bc |.7.g.NnJ=..K[...| +peer0.org1.example.com | 00000020 7e 75 cd 1f 02 20 60 12 d0 bd eb 8e 82 86 ed 66 |~u... `........f| +peer0.org1.example.com | 00000030 d6 1b 57 81 75 54 41 e6 30 f4 24 0c 74 bb 8e a7 |..W.uTA.0.$.t...| +peer0.org1.example.com | 00000040 c2 4c f3 b0 2f e1 |.L../.|" +peer0.org1.example.com | "2019-09-24 01:04:38.536 UTC [gossip.discovery] handleAliveMessage -> DEBU d76 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d77 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d78 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d79 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.537 UTC [gossip.discovery] learnExistingMembers -> DEBU d7a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:38.537 UTC [gossip.discovery] learnExistingMembers -> DEBU d7b Exiting" +orderer0.example.com | "2019-09-24 01:04:37.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.4µs " +orderer0.example.com | "2019-09-24 01:04:37.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.9µs " +orderer0.example.com | "2019-09-24 01:04:37.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d33 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-09-24 01:04:37.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU d34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 580.4µs " +orderer0.example.com | "2019-09-24 01:04:37.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d35 Sending msg of 28 bytes to 2 on channel businesschannel took 98.9µs" +orderer0.example.com | "2019-09-24 01:04:37.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +orderer0.example.com | "2019-09-24 01:04:37.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.3µs " +orderer0.example.com | "2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d38 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d39 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 982.2µs " +orderer0.example.com | "2019-09-24 01:04:38.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +orderer0.example.com | "2019-09-24 01:04:38.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.2µs " +orderer0.example.com | "2019-09-24 01:04:38.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2019-09-24 01:04:38.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 01:04:38.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.7µs " +orderer0.example.com | "2019-09-24 01:04:38.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +orderer0.example.com | "2019-09-24 01:04:38.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d43 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-09-24 01:04:38.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.6µs " +orderer0.example.com | "2019-09-24 01:04:38.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d47 Sending msg of 28 bytes to 2 on channel businesschannel took 125.4µs" +orderer0.example.com | "2019-09-24 01:04:38.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 414.6µs " +orderer0.example.com | "2019-09-24 01:04:38.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-09-24 01:04:38.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:38.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5696ms " +orderer0.example.com | "2019-09-24 01:04:39.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:39.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 3 on channel testchainid took 40µs" +orderer0.example.com | "2019-09-24 01:04:39.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310.6µs " +orderer0.example.com | "2019-09-24 01:04:39.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 2 on channel businesschannel took 33.9µs" +orderer0.example.com | "2019-09-24 01:04:39.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d52 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-09-24 01:04:39.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " +orderer0.example.com | "2019-09-24 01:04:39.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " +orderer0.example.com | "2019-09-24 01:04:39.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:39.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d55 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:39.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU d56 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:39.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +orderer0.example.com | "2019-09-24 01:04:39.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +orderer0.example.com | "2019-09-24 01:04:39.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d59 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +orderer0.example.com | "2019-09-24 01:04:39.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +orderer0.example.com | "2019-09-24 01:04:39.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 250.5µs " +orderer0.example.com | "2019-09-24 01:04:39.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +orderer0.example.com | "2019-09-24 01:04:39.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:39.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d60 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-09-24 01:04:40.222 UTC [orderer.common.cluster.step] sendMessage -> DEBU d61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-09-24 01:04:40.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 42.4µs" +orderer0.example.com | "2019-09-24 01:04:40.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d63 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +orderer0.example.com | "2019-09-24 01:04:40.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +orderer0.example.com | "2019-09-24 01:04:40.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.7µs " +orderer0.example.com | "2019-09-24 01:04:40.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d66 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d67 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.369 UTC [orderer.common.server] Broadcast -> DEBU d68 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:04:40.369 UTC [orderer.common.broadcast] Handle -> DEBU d69 Starting new broadcast loop for 172.18.0.5:53754" +orderer0.example.com | "2019-09-24 01:04:40.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +orderer0.example.com | "2019-09-24 01:04:40.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +orderer0.example.com | "2019-09-24 01:04:40.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +orderer0.example.com | "2019-09-24 01:04:40.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +orderer0.example.com | "2019-09-24 01:04:40.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.7µs " +orderer0.example.com | "2019-09-24 01:04:40.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.3µs " +orderer0.example.com | "2019-09-24 01:04:40.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d71 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:40.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d72 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.240 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2019-09-24 01:04:41.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +orderer0.example.com | "2019-09-24 01:04:41.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-09-24 01:04:41.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-09-24 01:04:41.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +orderer0.example.com | "2019-09-24 01:04:41.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.5µs " +peer0.org1.example.com | "2019-09-24 01:04:38.537 UTC [gossip.discovery] handleAliveMessage -> DEBU d7c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU d7d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.537 UTC [gossip.discovery] sendMemResponse -> DEBU d7e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [msp] DeserializeIdentity -> DEBU d7f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [msp] DeserializeIdentity -> DEBU d80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [gossip.comm] Send -> DEBU d81 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [gossip.discovery] sendMemResponse -> DEBU d82 Exiting, replying with alive: > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [gossip.comm] sendToEndpoint -> DEBU d83 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.538 UTC [gossip.comm] sendToEndpoint -> DEBU d84 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.584 UTC [gossip.comm] func1 -> DEBU d85 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.584 UTC [gossip.gossip] handleMessage -> DEBU d86 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.584 UTC [gossip.gossip] handleMessage -> DEBU d87 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU d88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d89 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.585 UTC [msp.identity] Verify -> DEBU d8a Verify: digest = 00000000 57 57 9a 8d 89 30 22 bb 5d bb de d2 cb 0d 0e eb |WW...0".].......| +peer0.org1.example.com | 00000010 05 73 33 11 79 cb 1a 5e ad 42 ce 01 c7 21 db cc |.s3.y..^.B...!..|" +peer0.org1.example.com | "2019-09-24 01:04:38.585 UTC [msp.identity] Verify -> DEBU d8b Verify: sig = 00000000 30 45 02 21 00 ec 89 b0 dc df 28 55 d3 85 48 70 |0E.!......(U..Hp| +peer0.org1.example.com | 00000010 db 91 ea 38 49 cc 3c 63 75 e6 32 ba fc fd 87 05 |...8I. DEBU d8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.585 UTC [gossip.discovery] learnExistingMembers -> DEBU d8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d8e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d8f Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d91 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.587 UTC [gossip.discovery] handleAliveMessage -> DEBU d92 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU d93 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.593 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.594 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.595 UTC [msp] DeserializeIdentity -> DEBU d96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.595 UTC [gossip.comm] Send -> DEBU d97 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.596 UTC [msp] DeserializeIdentity -> DEBU d98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.596 UTC [gossip.comm] Send -> DEBU d99 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +orderer0.example.com | "2019-09-24 01:04:41.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2019-09-24 01:04:41.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 287.8µs " +orderer0.example.com | "2019-09-24 01:04:41.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-09-24 01:04:41.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2019-09-24 01:04:41.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +orderer0.example.com | "2019-09-24 01:04:41.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118µs " +orderer0.example.com | "2019-09-24 01:04:41.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:41.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d84 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel testchainid took 247.4µs" +orderer0.example.com | "2019-09-24 01:04:42.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +orderer0.example.com | "2019-09-24 01:04:42.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 2 on channel businesschannel took 494µs" +orderer0.example.com | "2019-09-24 01:04:42.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel businesschannel took 143.4µs" +orderer0.example.com | "2019-09-24 01:04:42.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +orderer0.example.com | "2019-09-24 01:04:42.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 159.6µs " +orderer0.example.com | "2019-09-24 01:04:42.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 01:04:42.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.5µs " +orderer0.example.com | "2019-09-24 01:04:42.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-09-24 01:04:42.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-09-24 01:04:42.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5279ms " +orderer0.example.com | "2019-09-24 01:04:42.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU d94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.8µs " +orderer0.example.com | "2019-09-24 01:04:42.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d95 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:42.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d96 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:43.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 606.5µs" +orderer0.example.com | "2019-09-24 01:04:43.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.2µs " +orderer0.example.com | "2019-09-24 01:04:43.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2019-09-24 01:04:43.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel businesschannel took 36.2µs" +orderer0.example.com | "2019-09-24 01:04:43.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " +orderer0.example.com | "2019-09-24 01:04:43.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.1µs " +orderer0.example.com | "2019-09-24 01:04:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:38.596 UTC [gossip.comm] sendToEndpoint -> DEBU d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.599 UTC [gossip.comm] func1 -> DEBU d9e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.600 UTC [gossip.gossip] handleMessage -> DEBU d9f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.600 UTC [gossip.gossip] handleMessage -> DEBU da0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU da1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU da2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.839 UTC [gossip.comm] func1 -> DEBU da3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [gossip.gossip] handleMessage -> DEBU da4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [gossip.pull] HandleMessage -> DEBU da5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.841 UTC [msp] DeserializeIdentity -> DEBU daa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.841 UTC [msp] DeserializeIdentity -> DEBU dab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.841 UTC [gossip.pull] SendDigest -> DEBU dac Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:38.841 UTC [gossip.gossip] handleMessage -> DEBU dad Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.848 UTC [gossip.comm] func1 -> DEBU dae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.848 UTC [gossip.gossip] handleMessage -> DEBU daf Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.848 UTC [gossip.gossip] handleMessage -> DEBU db0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU db1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU db2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [msp] DeserializeIdentity -> DEBU db3 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:43.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:43.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +orderer0.example.com | "2019-09-24 01:04:43.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.2µs " +orderer0.example.com | "2019-09-24 01:04:43.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-09-24 01:04:43.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 01:04:43.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.7µs " +orderer0.example.com | "2019-09-24 01:04:43.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU da6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 668.8µs " +orderer0.example.com | "2019-09-24 01:04:43.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:43.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel testchainid took 9.8µs" +orderer0.example.com | "2019-09-24 01:04:44.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +orderer0.example.com | "2019-09-24 01:04:44.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +orderer0.example.com | "2019-09-24 01:04:44.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dad Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-09-24 01:04:44.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +orderer0.example.com | "2019-09-24 01:04:44.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.3µs " +orderer0.example.com | "2019-09-24 01:04:44.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2019-09-24 01:04:44.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.6µs " +orderer0.example.com | "2019-09-24 01:04:44.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 01:04:44.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2019-09-24 01:04:44.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU db7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.9µs " +orderer0.example.com | "2019-09-24 01:04:44.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138µs " +orderer0.example.com | "2019-09-24 01:04:44.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU db9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:44.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2019-09-24 01:04:45.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +orderer0.example.com | "2019-09-24 01:04:45.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 01:04:45.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 01:04:45.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +orderer0.example.com | "2019-09-24 01:04:45.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +orderer0.example.com | "2019-09-24 01:04:45.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +orderer0.example.com | "2019-09-24 01:04:45.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7675ms " +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [policies] Evaluate -> DEBU db7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.849 UTC [policies] Evaluate -> DEBU db8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU db9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func1 -> DEBU dba 0xc003d527f0 gate 1569287078850125300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbb 0xc003d527f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbc 0xc003d527f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbd 0xc003d527f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbe 0xc003d527f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [cauthdsl] func1 -> DEBU dbf 0xc003d527f0 gate 1569287078850125300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU dc0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU dc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [policies] Evaluate -> DEBU dc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [cauthdsl] func1 -> DEBU dc3 0xc003d53030 gate 1569287078851317100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc4 0xc003d53030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc5 0xc003d53030 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc6 0xc003d53030 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.851 UTC [msp.identity] Verify -> DEBU dc7 Verify: digest = 00000000 cc 16 0e fb bf fd 8f 0f 57 d3 13 25 b3 cc 5f c6 |........W..%.._.| +peer0.org1.example.com | 00000010 70 20 a3 78 5b dc f8 49 ce a5 d5 fb d7 9e c9 34 |p .x[..I.......4|" +peer0.org1.example.com | "2019-09-24 01:04:38.852 UTC [msp.identity] Verify -> DEBU dc8 Verify: sig = 00000000 30 44 02 20 33 0e d1 75 da 4a 51 8f 70 d1 c2 be |0D. 3..u.JQ.p...| +peer0.org1.example.com | 00000010 e9 95 cc b1 d5 ac f6 72 a5 7f c6 11 52 f1 69 e2 |.......r....R.i.| +peer0.org1.example.com | 00000020 2f 70 a6 94 02 20 36 06 28 8f 8b c0 40 1d f7 e1 |/p... 6.(...@...| +peer0.org1.example.com | 00000030 54 50 6f c9 31 5b 39 f9 f3 5d 64 2c 97 43 0e d3 |TPo.1[9..]d,.C..| +peer0.org1.example.com | 00000040 9c 87 37 ca a4 2a |..7..*|" +peer0.org1.example.com | "2019-09-24 01:04:38.852 UTC [cauthdsl] func2 -> DEBU dc9 0xc003d53030 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.852 UTC [cauthdsl] func1 -> DEBU dca 0xc003d53030 gate 1569287078851317100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:38.852 UTC [policies] Evaluate -> DEBU dcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dcd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.853 UTC [gossip.discovery] handleAliveMessage -> DEBU dcf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.853 UTC [gossip.discovery] learnExistingMembers -> DEBU dd0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.854 UTC [gossip.discovery] handleAliveMessage -> DEBU dd5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.855 UTC [gossip.discovery] sendMemResponse -> DEBU dd7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:38.855 UTC [msp] DeserializeIdentity -> DEBU dd8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.855 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" +orderer0.example.com | "2019-09-24 01:04:45.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-09-24 01:04:45.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2019-09-24 01:04:45.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169µs " +orderer0.example.com | "2019-09-24 01:04:45.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 577.3µs " +orderer0.example.com | "2019-09-24 01:04:45.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:45.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.192 UTC [orderer.common.server] replicateDisabledChains -> DEBU dcd No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 01:04:46.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel testchainid took 195.6µs" +orderer0.example.com | "2019-09-24 01:04:46.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +orderer0.example.com | "2019-09-24 01:04:46.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +orderer0.example.com | "2019-09-24 01:04:46.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 01:04:46.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.1µs " +orderer0.example.com | "2019-09-24 01:04:46.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +orderer0.example.com | "2019-09-24 01:04:46.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd8 Sending msg of 28 bytes to 3 on channel testchainid took 492µs" +orderer0.example.com | "2019-09-24 01:04:46.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.2µs " +orderer0.example.com | "2019-09-24 01:04:46.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 01:04:46.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 278.9µs " +orderer0.example.com | "2019-09-24 01:04:46.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 01:04:46.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +orderer0.example.com | "2019-09-24 01:04:46.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:46.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de1 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +orderer0.example.com | "2019-09-24 01:04:47.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +orderer0.example.com | "2019-09-24 01:04:47.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +orderer0.example.com | "2019-09-24 01:04:47.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 01:04:47.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU de5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100µs " +orderer0.example.com | "2019-09-24 01:04:47.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.4µs " +orderer0.example.com | "2019-09-24 01:04:47.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dea Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +orderer0.example.com | "2019-09-24 01:04:47.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +orderer0.example.com | "2019-09-24 01:04:47.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +orderer0.example.com | "2019-09-24 01:04:47.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-09-24 01:04:47.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.7µs " +orderer0.example.com | "2019-09-24 01:04:47.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 270.5µs " +orderer0.example.com | "2019-09-24 01:04:47.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:47.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-09-24 01:04:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.3µs " +orderer0.example.com | "2019-09-24 01:04:48.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 01:04:48.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-09-24 01:04:48.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.2µs " +orderer0.example.com | "2019-09-24 01:04:48.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.7µs " +peer0.org1.example.com | "2019-09-24 01:04:38.856 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.856 UTC [gossip.comm] Send -> DEBU ddb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.856 UTC [gossip.comm] sendToEndpoint -> DEBU ddc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.856 UTC [gossip.comm] sendToEndpoint -> DEBU ddd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.856 UTC [gossip.discovery] sendMemResponse -> DEBU dde Exiting, replying with alive: alive:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:38.877 UTC [gossip.pull] Hello -> DEBU ddf Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:38.877 UTC [gossip.comm] Send -> DEBU de0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.877 UTC [gossip.pull] Hello -> DEBU de1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:38.877 UTC [gossip.comm] Send -> DEBU de2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.pull] Hello -> DEBU de3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] Send -> DEBU de6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.879 UTC [gossip.comm] func1 -> DEBU deb Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.879 UTC [gossip.gossip] handleMessage -> DEBU dec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.880 UTC [gossip.pull] HandleMessage -> DEBU ded GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.880 UTC [gossip.gossip] handleMessage -> DEBU dee Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU dea Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.880 UTC [gossip.comm] func1 -> DEBU def Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.881 UTC [gossip.gossip] handleMessage -> DEBU df0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.881 UTC [gossip.pull] HandleMessage -> DEBU df1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.881 UTC [gossip.gossip] handleMessage -> DEBU df2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.882 UTC [gossip.comm] func1 -> DEBU df3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.883 UTC [gossip.gossip] handleMessage -> DEBU df4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.883 UTC [gossip.pull] HandleMessage -> DEBU df5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.883 UTC [gossip.gossip] handleMessage -> DEBU df6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.887 UTC [msp] GetDefaultSigningIdentity -> DEBU df7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU df8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151012 " +peer0.org1.example.com | "2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU df9 Sign: digest: 32A86A9DA00543804FEA6003853AA13DDCBE775B70AEAC61BC9B0706E62B55D2 " +peer0.org1.example.com | "2019-09-24 01:04:38.888 UTC [msp] GetDefaultSigningIdentity -> DEBU dfa Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU dfb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU dfc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:38.889 UTC [msp] DeserializeIdentity -> DEBU dfd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.889 UTC [gossip.comm] Send -> DEBU dfe Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.889 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.889 UTC [gossip.comm] Send -> DEBU e00 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.889 UTC [gossip.comm] sendToEndpoint -> DEBU e01 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] Send -> DEBU e02 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e05 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e06 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e07 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e03 Exiting" +orderer0.example.com | "2019-09-24 01:04:48.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel testchainid took 7.9021ms" +orderer0.example.com | "2019-09-24 01:04:48.697 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.5µs " +orderer0.example.com | "2019-09-24 01:04:48.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 01:04:48.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2019-09-24 01:04:48.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 303.8µs " +orderer0.example.com | "2019-09-24 01:04:48.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +orderer0.example.com | "2019-09-24 01:04:48.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:48.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e05 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-09-24 01:04:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.1µs " +orderer0.example.com | "2019-09-24 01:04:49.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 384.1µs" +orderer0.example.com | "2019-09-24 01:04:49.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 3 on channel businesschannel took 390.9µs" +orderer0.example.com | "2019-09-24 01:04:49.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.1µs " +orderer0.example.com | "2019-09-24 01:04:49.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.5µs " +orderer0.example.com | "2019-09-24 01:04:49.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 01:04:49.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +orderer0.example.com | "2019-09-24 01:04:49.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +orderer0.example.com | "2019-09-24 01:04:49.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:04:49.713 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 49µs" +orderer0.example.com | "2019-09-24 01:04:49.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e13 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:49.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.6µs " +orderer0.example.com | "2019-09-24 01:04:49.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 01:04:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " +orderer0.example.com | "2019-09-24 01:04:50.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 01:04:50.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 01:04:50.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.6µs " +orderer0.example.com | "2019-09-24 01:04:50.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.6µs " +orderer0.example.com | "2019-09-24 01:04:50.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 91.2µs" +orderer0.example.com | "2019-09-24 01:04:50.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.5µs " +orderer0.example.com | "2019-09-24 01:04:50.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 01:04:50.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-09-24 01:04:50.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +orderer0.example.com | "2019-09-24 01:04:50.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.3µs " +orderer0.example.com | "2019-09-24 01:04:50.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:50.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:51.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:51.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 01:04:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.8µs " +orderer0.example.com | "2019-09-24 01:04:51.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 01:04:51.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 01:04:51.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.7µs " +orderer0.example.com | "2019-09-24 01:04:51.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 477.8µs " +orderer0.example.com | "2019-09-24 01:04:51.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:51.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:51.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +orderer0.example.com | "2019-09-24 01:04:51.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.7µs " +orderer0.example.com | "2019-09-24 01:04:51.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +orderer0.example.com | "2019-09-24 01:04:51.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +orderer0.example.com | "2019-09-24 01:04:51.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 386.5µs " +orderer0.example.com | "2019-09-24 01:04:51.714 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.9669ms " +orderer0.example.com | "2019-09-24 01:04:51.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:38.892 UTC [gossip.comm] func1 -> DEBU e08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.893 UTC [gossip.gossip] handleMessage -> DEBU e09 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.893 UTC [gossip.gossip] handleMessage -> DEBU e0a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU e0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e0c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.895 UTC [msp.identity] Verify -> DEBU e0d Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +peer0.org1.example.com | 00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +peer0.org1.example.com | "2019-09-24 01:04:38.895 UTC [msp.identity] Verify -> DEBU e0e Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +peer0.org1.example.com | 00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +peer0.org1.example.com | 00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +peer0.org1.example.com | 00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +peer0.org1.example.com | 00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +peer0.org1.example.com | "2019-09-24 01:04:38.896 UTC [gossip.discovery] handleAliveMessage -> DEBU e0f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.896 UTC [gossip.discovery] isSentByMe -> DEBU e10 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.896 UTC [gossip.discovery] handleAliveMessage -> DEBU e11 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e12 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.897 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e15 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e16 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.897 UTC [policies] Evaluate -> DEBU e17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [policies] Evaluate -> DEBU e18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [policies] Evaluate -> DEBU e19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [cauthdsl] func1 -> DEBU e1a 0xc003da2a60 gate 1569287078898504400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1b 0xc003da2a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1c 0xc003da2a60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1d 0xc003da2a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:38.899 UTC [cauthdsl] func2 -> DEBU e1e 0xc003da2a60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.899 UTC [cauthdsl] func1 -> DEBU e1f 0xc003da2a60 gate 1569287078898504400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.900 UTC [cauthdsl] func1 -> DEBU e23 0xc003da32a0 gate 1569287078900096500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e24 0xc003da32a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:04:51.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3b Sending msg of 28 bytes to 3 on channel testchainid took 273.7µs" +orderer0.example.com | "2019-09-24 01:04:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +orderer0.example.com | "2019-09-24 01:04:52.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +orderer0.example.com | "2019-09-24 01:04:52.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 2 on channel businesschannel took 8.5µs" +orderer0.example.com | "2019-09-24 01:04:52.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 403.1µs " +orderer0.example.com | "2019-09-24 01:04:52.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.7µs " +orderer0.example.com | "2019-09-24 01:04:52.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-09-24 01:04:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.7µs " +orderer0.example.com | "2019-09-24 01:04:52.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +orderer0.example.com | "2019-09-24 01:04:52.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.3µs " +orderer0.example.com | "2019-09-24 01:04:52.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +orderer0.example.com | "2019-09-24 01:04:52.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU e49 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:52.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 01:04:52.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 420.6µs" +orderer0.example.com | "2019-09-24 01:04:53.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +orderer0.example.com | "2019-09-24 01:04:53.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +orderer0.example.com | "2019-09-24 01:04:53.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +orderer0.example.com | "2019-09-24 01:04:53.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.3µs " +orderer0.example.com | "2019-09-24 01:04:53.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +orderer0.example.com | "2019-09-24 01:04:53.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e56 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 01:04:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.3µs " +orderer0.example.com | "2019-09-24 01:04:53.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +orderer0.example.com | "2019-09-24 01:04:53.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 01:04:53.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 260µs " +orderer0.example.com | "2019-09-24 01:04:53.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:53.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +orderer0.example.com | "2019-09-24 01:04:53.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5f Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +peer0.org1.example.com | "2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e25 0xc003da32a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e26 0xc003da32a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.901 UTC [msp.identity] Verify -> DEBU e28 Verify: digest = 00000000 fd 3e 8c 90 dc df 7e c8 5c 9d 06 db 15 ff 9c 5d |.>....~.\......]| +peer0.org1.example.com | 00000010 44 03 81 05 ef 82 91 79 72 df 45 b8 ab c2 0a 0c |D......yr.E.....|" +peer0.org1.example.com | "2019-09-24 01:04:38.901 UTC [msp.identity] Verify -> DEBU e29 Verify: sig = 00000000 30 45 02 21 00 de e4 df c5 fe d3 80 6e a5 19 e5 |0E.!........n...| +peer0.org1.example.com | 00000010 d4 db 09 b5 6b 31 ea 77 d1 af fc 9f 0a 60 d9 e5 |....k1.w.....`..| +peer0.org1.example.com | 00000020 92 ba e1 e5 22 02 20 72 a8 3e a2 b7 1a 09 97 96 |....". r.>......| +peer0.org1.example.com | 00000030 dc b1 83 96 78 5e 80 45 7b 32 ba a1 78 75 e2 d4 |....x^.E{2..xu..| +peer0.org1.example.com | 00000040 15 e8 af 3d fe 72 3e |...=.r>|" +peer0.org1.example.com | "2019-09-24 01:04:38.901 UTC [gossip.comm] func1 -> DEBU e2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.903 UTC [gossip.gossip] handleMessage -> DEBU e2c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.903 UTC [gossip.comm] func1 -> DEBU e2d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.901 UTC [cauthdsl] func2 -> DEBU e2b 0xc003da32a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.904 UTC [cauthdsl] func1 -> DEBU e2e 0xc003da32a0 gate 1569287078900096500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:38.900 UTC [gossip.comm] func1 -> DEBU e27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.904 UTC [policies] Evaluate -> DEBU e2f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.906 UTC [gossip.comm] func1 -> DEBU e31 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e32 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.906 UTC [gossip.discovery] handleAliveMessage -> DEBU e34 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.907 UTC [gossip.discovery] handleAliveMessage -> DEBU e35 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e36 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.907 UTC [msp] DeserializeIdentity -> DEBU e37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e39 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e3a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.908 UTC [policies] Evaluate -> DEBU e3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.908 UTC [policies] Evaluate -> DEBU e3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:38.909 UTC [policies] Evaluate -> DEBU e3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.909 UTC [cauthdsl] func1 -> DEBU e3e 0xc003d95840 gate 1569287078909426700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.909 UTC [cauthdsl] func2 -> DEBU e3f 0xc003d95840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.909 UTC [cauthdsl] func2 -> DEBU e40 0xc003d95840 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.910 UTC [cauthdsl] func2 -> DEBU e41 0xc003d95840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:38.910 UTC [cauthdsl] func2 -> DEBU e42 0xc003d95840 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.910 UTC [cauthdsl] func1 -> DEBU e43 0xc003d95840 gate 1569287078909426700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.910 UTC [policies] Evaluate -> DEBU e44 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.910 UTC [policies] Evaluate -> DEBU e45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.911 UTC [policies] Evaluate -> DEBU e46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.911 UTC [cauthdsl] func1 -> DEBU e47 0xc003dc6080 gate 1569287078911295300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e48 0xc003dc6080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e49 0xc003dc6080 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e4a 0xc003dc6080 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.912 UTC [msp.identity] Verify -> DEBU e4b Verify: digest = 00000000 06 7a 2f 87 d3 95 25 58 95 75 e3 3f 05 d8 f7 a3 |.z/...%X.u.?....| +peer0.org1.example.com | 00000010 33 ed b5 73 92 b8 ad 8c fe 5a 7b bf 65 f3 0f cb |3..s.....Z{.e...|" +peer0.org1.example.com | "2019-09-24 01:04:38.912 UTC [msp.identity] Verify -> DEBU e4c Verify: sig = 00000000 30 44 02 20 47 fd 9a b8 ed fd 59 09 74 b4 cf 67 |0D. G.....Y.t..g| +peer0.org1.example.com | 00000010 1a 0d 18 01 e2 7d 37 aa 04 a0 9e 73 31 3a 26 d9 |.....}7....s1:&.| +peer0.org1.example.com | 00000020 03 3f 37 33 02 20 58 cd 7a 0e ee f4 41 ef 51 54 |.?73. X.z...A.QT| +peer0.org1.example.com | 00000030 41 69 7e e2 74 be 4a b1 e2 55 48 5b 7a db eb a8 |Ai~.t.J..UH[z...| +peer0.org1.example.com | 00000040 e6 a2 0f e1 5c 24 |....\$|" +peer0.org1.example.com | "2019-09-24 01:04:38.912 UTC [cauthdsl] func2 -> DEBU e4d 0xc003dc6080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.912 UTC [cauthdsl] func1 -> DEBU e4e 0xc003dc6080 gate 1569287078911295300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e4f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e51 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.913 UTC [gossip.discovery] handleAliveMessage -> DEBU e53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1569287058832472100, 21 but got ts: inc_num:1569287058832472100 seq_num:19 " +peer0.org1.example.com | "2019-09-24 01:04:38.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e55 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e56 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.914 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [gossip.gossip] handleMessage -> DEBU e59 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [gossip.pull] HandleMessage -> DEBU e5a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.916 UTC [msp] DeserializeIdentity -> DEBU e5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.916 UTC [msp] DeserializeIdentity -> DEBU e60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.916 UTC [gossip.pull] SendDigest -> DEBU e61 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:38.916 UTC [gossip.gossip] handleMessage -> DEBU e62 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.916 UTC [gossip.gossip] handleMessage -> DEBU e63 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e64 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [msp.identity] Verify -> DEBU e65 Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +peer0.org1.example.com | 00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [msp.identity] Verify -> DEBU e66 Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +peer0.org1.example.com | 00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +peer0.org1.example.com | 00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +peer0.org1.example.com | 00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +peer0.org1.example.com | 00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU e67 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [gossip.discovery] isSentByMe -> DEBU e68 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-09-24 01:04:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " +orderer0.example.com | "2019-09-24 01:04:54.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +orderer0.example.com | "2019-09-24 01:04:54.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.2µs " +orderer0.example.com | "2019-09-24 01:04:54.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-09-24 01:04:54.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.3µs " +orderer0.example.com | "2019-09-24 01:04:54.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e68 Sending msg of 28 bytes to 3 on channel testchainid took 204.1µs" +orderer0.example.com | "2019-09-24 01:04:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.5µs " +orderer0.example.com | "2019-09-24 01:04:54.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 01:04:54.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2019-09-24 01:04:54.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.8µs " +orderer0.example.com | "2019-09-24 01:04:54.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.2µs " +orderer0.example.com | "2019-09-24 01:04:54.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:54.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e71 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-09-24 01:04:55.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 919.4µs " +orderer0.example.com | "2019-09-24 01:04:55.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +orderer0.example.com | "2019-09-24 01:04:55.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 01:04:55.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153µs " +orderer0.example.com | "2019-09-24 01:04:55.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 648.5µs " +orderer0.example.com | "2019-09-24 01:04:55.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 01:04:55.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.8µs " +orderer0.example.com | "2019-09-24 01:04:55.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +orderer0.example.com | "2019-09-24 01:04:55.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.4µs " +orderer0.example.com | "2019-09-24 01:04:55.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-09-24 01:04:55.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +orderer0.example.com | "2019-09-24 01:04:55.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:55.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 3 on channel testchainid took 10.8µs" +orderer0.example.com | "2019-09-24 01:04:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU e69 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e6a Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.917 UTC [msp] DeserializeIdentity -> DEBU e6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.918 UTC [cauthdsl] func1 -> DEBU e72 0xc003dec820 gate 1569287078918950000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e73 0xc003dec820 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e74 0xc003dec820 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e75 0xc003dec820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:04:56.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 01:04:56.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +orderer0.example.com | "2019-09-24 01:04:56.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +orderer0.example.com | "2019-09-24 01:04:56.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 307.8µs " +orderer0.example.com | "2019-09-24 01:04:56.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e89 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8c Sending msg of 28 bytes to 3 on channel testchainid took 607.1µs" +orderer0.example.com | "2019-09-24 01:04:56.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.8µs " +orderer0.example.com | "2019-09-24 01:04:56.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 01:04:56.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 01:04:56.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.4µs " +orderer0.example.com | "2019-09-24 01:04:56.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.1µs " +orderer0.example.com | "2019-09-24 01:04:56.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:56.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 01:04:57.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.3µs " +orderer0.example.com | "2019-09-24 01:04:57.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 01:04:57.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 01:04:57.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 357µs " +orderer0.example.com | "2019-09-24 01:04:57.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 762.2µs " +orderer0.example.com | "2019-09-24 01:04:57.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9e Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +orderer0.example.com | "2019-09-24 01:04:57.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7004ms " +orderer0.example.com | "2019-09-24 01:04:57.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +orderer0.example.com | "2019-09-24 01:04:57.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +orderer0.example.com | "2019-09-24 01:04:57.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.8µs " +orderer0.example.com | "2019-09-24 01:04:57.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2019-09-24 01:04:57.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:57.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 01:04:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0539ms " +orderer0.example.com | "2019-09-24 01:04:58.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +orderer0.example.com | "2019-09-24 01:04:58.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +orderer0.example.com | "2019-09-24 01:04:58.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.2µs " +orderer0.example.com | "2019-09-24 01:04:58.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " +orderer0.example.com | "2019-09-24 01:04:58.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb0 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2019-09-24 01:04:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 593.6µs " +orderer0.example.com | "2019-09-24 01:04:58.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +orderer0.example.com | "2019-09-24 01:04:58.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2019-09-24 01:04:58.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.5µs " +orderer0.example.com | "2019-09-24 01:04:58.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 904.8µs " +orderer0.example.com | "2019-09-24 01:04:58.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:58.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb9 Sending msg of 28 bytes to 3 on channel testchainid took 456.4µs" +orderer0.example.com | "2019-09-24 01:04:59.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +orderer0.example.com | "2019-09-24 01:04:59.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 01:04:59.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel businesschannel took 253.9µs" +orderer0.example.com | "2019-09-24 01:04:59.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.8µs " +orderer0.example.com | "2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2913ms " +orderer0.example.com | "2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel testchainid took 832.7µs" +orderer0.example.com | "2019-09-24 01:04:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.3µs " +orderer0.example.com | "2019-09-24 01:04:59.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 01:04:59.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel businesschannel took 9.7µs" +orderer0.example.com | "2019-09-24 01:04:59.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.6µs " +orderer0.example.com | "2019-09-24 01:04:59.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 368.5µs " +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e76 0xc003dec820 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func1 -> DEBU e77 0xc003dec820 gate 1569287078918950000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.919 UTC [cauthdsl] func1 -> DEBU e7b 0xc003ded060 gate 1569287078919947100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7c 0xc003ded060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7d 0xc003ded060 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7e 0xc003ded060 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [msp.identity] Verify -> DEBU e7f Verify: digest = 00000000 cc 16 0e fb bf fd 8f 0f 57 d3 13 25 b3 cc 5f c6 |........W..%.._.| +peer0.org1.example.com | 00000010 70 20 a3 78 5b dc f8 49 ce a5 d5 fb d7 9e c9 34 |p .x[..I.......4|" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [msp.identity] Verify -> DEBU e80 Verify: sig = 00000000 30 44 02 20 33 0e d1 75 da 4a 51 8f 70 d1 c2 be |0D. 3..u.JQ.p...| +peer0.org1.example.com | 00000010 e9 95 cc b1 d5 ac f6 72 a5 7f c6 11 52 f1 69 e2 |.......r....R.i.| +peer0.org1.example.com | 00000020 2f 70 a6 94 02 20 36 06 28 8f 8b c0 40 1d f7 e1 |/p... 6.(...@...| +peer0.org1.example.com | 00000030 54 50 6f c9 31 5b 39 f9 f3 5d 64 2c 97 43 0e d3 |TPo.1[9..]d,.C..| +peer0.org1.example.com | 00000040 9c 87 37 ca a4 2a |..7..*|" +peer0.org1.example.com | "2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e81 0xc003ded060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [cauthdsl] func1 -> DEBU e82 0xc003ded060 gate 1569287078919947100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e85 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU e89 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU e8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.922 UTC [gossip.gossip] handleMessage -> DEBU e8b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.922 UTC [gossip.gossip] handleMessage -> DEBU e8d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.922 UTC [msp.identity] Verify -> DEBU e8e Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +peer0.org1.example.com | 00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e8f Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +peer0.org1.example.com | 00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +peer0.org1.example.com | 00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +peer0.org1.example.com | 00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +peer0.org1.example.com | 00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e90 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e91 Verify: sig = 00000000 30 44 02 20 5a d3 92 08 c9 03 34 b4 e5 e8 2a a9 |0D. Z.....4...*.| +peer0.org1.example.com | 00000010 a4 59 e4 c6 ec f6 e7 cd ca 08 f9 d7 76 1e 8f b5 |.Y..........v...| +peer0.org1.example.com | 00000020 4a c8 83 ec 02 20 60 46 21 65 50 c2 e8 37 80 1e |J.... `F!eP..7..| +peer0.org1.example.com | 00000030 d0 1b 5f ce b1 f1 bb 5b d7 9f 6d aa 69 b4 e5 fe |.._....[..m.i...| +peer0.org1.example.com | 00000040 37 6e c2 57 6a 14 |7n.Wj.|" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU e92 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [gossip.discovery] isSentByMe -> DEBU e93 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU e94 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU e95 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.924 UTC [gossip.gossip] handleMessage -> DEBU e96 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU e97 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e98 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [msp] DeserializeIdentity -> DEBU e99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [policies] Evaluate -> DEBU e9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.925 UTC [policies] Evaluate -> DEBU e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func1 -> DEBU ea0 0xc003e10060 gate 1569287078926170200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea1 0xc003e10060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea2 0xc003e10060 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea3 0xc003e10060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea4 0xc003e10060 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [cauthdsl] func1 -> DEBU ea5 0xc003e10060 gate 1569287078926170200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU ea6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU ea7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [policies] Evaluate -> DEBU ea8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func1 -> DEBU ea9 0xc003e108a0 gate 1569287078927125300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eaa 0xc003e108a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eab 0xc003e108a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eac 0xc003e108a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [msp.identity] Verify -> DEBU ead Verify: digest = 00000000 f4 cb 4a 94 8b 08 20 82 12 5e 8a b7 7b 68 e3 85 |..J... ..^..{h..| +peer0.org1.example.com | 00000010 67 e7 ab f8 4d 8f 6e 26 ac ff d9 1d cb 96 1e a2 |g...M.n&........|" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [msp.identity] Verify -> DEBU eae Verify: sig = 00000000 30 45 02 21 00 b4 4b 4d f9 93 0f 42 20 e3 51 e7 |0E.!..KM...B .Q.| +peer0.org1.example.com | 00000010 66 c6 c9 d9 a0 af 39 a8 19 f5 c3 43 d5 0a d7 a1 |f.....9....C....| +peer0.org1.example.com | 00000020 73 22 98 3a a0 02 20 2b 15 42 9f b0 73 7c ca e5 |s".:.. +.B..s|..| +peer0.org1.example.com | 00000030 4a d2 6a 0c 80 c1 9e 74 8b 7e 45 e4 d3 53 27 8b |J.j....t.~E..S'.| +peer0.org1.example.com | 00000040 19 b9 29 54 5d 85 ca |..)T]..|" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eaf 0xc003e108a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:38.927 UTC [cauthdsl] func1 -> DEBU eb0 0xc003e108a0 gate 1569287078927125300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [gossip.discovery] handleAliveMessage -> DEBU eb5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 Updating aliveness data: membership: timestamp: " +orderer0.example.com | "2019-09-24 01:04:59.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:04:59.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecb Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2019-09-24 01:05:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.2µs " +orderer0.example.com | "2019-09-24 01:05:00.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 01:05:00.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.1µs " +orderer0.example.com | "2019-09-24 01:05:00.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-09-24 01:05:00.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 722.8µs" +orderer0.example.com | "2019-09-24 01:05:00.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2019-09-24 01:05:00.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.5µs " +orderer0.example.com | "2019-09-24 01:05:00.714 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 01:05:00.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-09-24 01:05:00.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49µs " +orderer0.example.com | "2019-09-24 01:05:00.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:00.714 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +orderer0.example.com | "2019-09-24 01:05:00.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +orderer0.example.com | "2019-09-24 01:05:01.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.5µs " +orderer0.example.com | "2019-09-24 01:05:01.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +orderer0.example.com | "2019-09-24 01:05:01.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-09-24 01:05:01.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " +orderer0.example.com | "2019-09-24 01:05:01.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +orderer0.example.com | "2019-09-24 01:05:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee6 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 01:05:01.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 403.3µs " +orderer0.example.com | "2019-09-24 01:05:01.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +orderer0.example.com | "2019-09-24 01:05:01.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 01:05:01.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.2µs " +orderer0.example.com | "2019-09-24 01:05:01.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63µs " +orderer0.example.com | "2019-09-24 01:05:01.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:01.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel testchainid took 7.6µs" +orderer0.example.com | "2019-09-24 01:05:02.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.7µs " +orderer0.example.com | "2019-09-24 01:05:02.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +orderer0.example.com | "2019-09-24 01:05:02.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.6µs " +orderer0.example.com | "2019-09-24 01:05:02.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.1µs " +orderer0.example.com | "2019-09-24 01:05:02.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +orderer0.example.com | "2019-09-24 01:05:02.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 3 on channel testchainid took 11µs" +orderer0.example.com | "2019-09-24 01:05:02.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +orderer0.example.com | "2019-09-24 01:05:02.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +orderer0.example.com | "2019-09-24 01:05:02.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 01:05:02.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +orderer0.example.com | "2019-09-24 01:05:02.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.8µs " +orderer0.example.com | "2019-09-24 01:05:02.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:02.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f01 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +orderer0.example.com | "2019-09-24 01:05:03.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +orderer0.example.com | "2019-09-24 01:05:03.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 01:05:03.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +orderer0.example.com | "2019-09-24 01:05:03.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +orderer0.example.com | "2019-09-24 01:05:03.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " +orderer0.example.com | "2019-09-24 01:05:03.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2019-09-24 01:05:03.688 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124µs " +orderer0.example.com | "2019-09-24 01:05:03.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 01:05:03.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 01:05:03.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " +orderer0.example.com | "2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 736.2µs " +orderer0.example.com | "2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f10 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 01:05:04.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2019-09-24 01:05:04.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f15 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:05:04.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 8.7µs" +orderer0.example.com | "2019-09-24 01:05:04.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.3µs " +orderer0.example.com | "2019-09-24 01:05:04.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.7µs " +orderer0.example.com | "2019-09-24 01:05:04.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f19 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1c Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +orderer0.example.com | "2019-09-24 01:05:04.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.5µs " +orderer0.example.com | "2019-09-24 01:05:04.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1e Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +orderer0.example.com | "2019-09-24 01:05:04.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-09-24 01:05:04.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " +orderer0.example.com | "2019-09-24 01:05:04.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 596µs " +orderer0.example.com | "2019-09-24 01:05:04.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU f22 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:04.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +orderer0.example.com | "2019-09-24 01:05:05.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155µs " +orderer0.example.com | "2019-09-24 01:05:05.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f27 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:05:05.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2019-09-24 01:05:05.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " +orderer0.example.com | "2019-09-24 01:05:05.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.5µs " +orderer0.example.com | "2019-09-24 01:05:05.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2e Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2019-09-24 01:05:05.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +orderer0.example.com | "2019-09-24 01:05:05.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-09-24 01:05:05.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-09-24 01:05:05.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.3µs " +orderer0.example.com | "2019-09-24 01:05:05.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 234.5µs " +orderer0.example.com | "2019-09-24 01:05:05.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f34 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:05.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f37 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2019-09-24 01:05:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.9µs " +orderer0.example.com | "2019-09-24 01:05:06.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f39 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" +orderer0.example.com | "2019-09-24 01:05:06.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +orderer0.example.com | "2019-09-24 01:05:06.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +orderer0.example.com | "2019-09-24 01:05:06.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 621.7µs " +orderer0.example.com | "2019-09-24 01:05:06.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.696 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2019-09-24 01:05:06.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2949ms " +orderer0.example.com | "2019-09-24 01:05:06.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f42 Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +orderer0.example.com | "2019-09-24 01:05:06.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-09-24 01:05:06.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.9µs " +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [gossip.discovery] handleAliveMessage -> DEBU ebb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [gossip.discovery] sendMemResponse -> DEBU ebd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:38.929 UTC [msp] DeserializeIdentity -> DEBU ebe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [msp] DeserializeIdentity -> DEBU ebf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [msp] DeserializeIdentity -> DEBU ec0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [gossip.comm] Send -> DEBU ec1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [gossip.comm] sendToEndpoint -> DEBU ec2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [gossip.comm] sendToEndpoint -> DEBU ec3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:38.930 UTC [gossip.discovery] sendMemResponse -> DEBU ec4 Exiting, replying with alive: alive: alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +peer0.org1.example.com | "2019-09-24 01:04:39.205 UTC [gossip.comm] func1 -> DEBU ec5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.206 UTC [gossip.gossip] handleMessage -> DEBU ec6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.206 UTC [gossip.gossip] handleMessage -> DEBU ec7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.207 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec9 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:39.207 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ecb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ecc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ecd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ece == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ecf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.208 UTC [cauthdsl] func1 -> DEBU ed1 0xc003e29130 gate 1569287079208782300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed2 0xc003e29130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed3 0xc003e29130 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed4 0xc003e29130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed5 0xc003e29130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:39.209 UTC [cauthdsl] func1 -> DEBU ed6 0xc003e29130 gate 1569287079208782300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.211 UTC [cauthdsl] func1 -> DEBU eda 0xc003e29970 gate 1569287079211003400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edb 0xc003e29970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edc 0xc003e29970 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edd 0xc003e29970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:39.212 UTC [msp.identity] Verify -> DEBU ede Verify: digest = 00000000 8e ec 8f e7 1a b5 53 25 b1 d3 8e e7 44 a4 b1 22 |......S%....D.."| +peer0.org1.example.com | 00000010 10 44 4c 04 f3 9b 83 2a 3f f3 c6 5f c8 9c 8b 03 |.DL....*?.._....|" +peer0.org1.example.com | "2019-09-24 01:04:39.212 UTC [msp.identity] Verify -> DEBU edf Verify: sig = 00000000 30 45 02 21 00 82 68 e0 9d c1 21 6b cf 69 70 fe |0E.!..h...!k.ip.| +peer0.org1.example.com | 00000010 91 7d b0 17 7c b2 fb 64 08 7a 05 a9 e7 15 8c a5 |.}..|..d.z......| +peer0.org1.example.com | 00000020 be f8 c3 8f 85 02 20 0d 04 e4 eb 24 14 a0 00 1e |...... ....$....| +peer0.org1.example.com | 00000030 d2 22 93 c0 97 40 a7 88 4e ae ac c9 13 96 d9 36 |."...@..N......6| +orderer0.example.com | "2019-09-24 01:05:06.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +orderer0.example.com | "2019-09-24 01:05:06.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:06.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f49 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +orderer0.example.com | "2019-09-24 01:05:07.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +orderer0.example.com | "2019-09-24 01:05:07.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4b Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-09-24 01:05:07.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-09-24 01:05:07.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +orderer0.example.com | "2019-09-24 01:05:07.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.4µs " +orderer0.example.com | "2019-09-24 01:05:07.218 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +orderer0.example.com | "2019-09-24 01:05:07.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.5µs " +orderer0.example.com | "2019-09-24 01:05:07.720 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f54 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-09-24 01:05:07.720 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +orderer0.example.com | "2019-09-24 01:05:07.721 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +orderer0.example.com | "2019-09-24 01:05:07.721 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.2µs " +orderer0.example.com | "2019-09-24 01:05:07.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:07.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2019-09-24 01:05:08.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 975µs " +orderer0.example.com | "2019-09-24 01:05:08.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5d Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +orderer0.example.com | "2019-09-24 01:05:08.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +orderer0.example.com | "2019-09-24 01:05:08.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.2µs " +orderer0.example.com | "2019-09-24 01:05:08.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +orderer0.example.com | "2019-09-24 01:05:08.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f64 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +orderer0.example.com | "2019-09-24 01:05:08.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +orderer0.example.com | "2019-09-24 01:05:08.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f66 Sending msg of 28 bytes to 3 on channel businesschannel took 102.6µs" +orderer0.example.com | "2019-09-24 01:05:08.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 11µs" +orderer0.example.com | "2019-09-24 01:05:08.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.1µs " +orderer0.example.com | "2019-09-24 01:05:08.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.5µs " +peer0.org1.example.com | 00000040 45 48 b2 07 4a f5 82 |EH..J..|" +peer0.org1.example.com | "2019-09-24 01:04:39.214 UTC [gossip.comm] func1 -> DEBU ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.214 UTC [cauthdsl] func2 -> DEBU ee2 0xc003e29970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:39.215 UTC [cauthdsl] func1 -> DEBU ee3 0xc003e29970 gate 1569287079211003400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:39.215 UTC [gossip.gossip] handleMessage -> DEBU ee4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.215 UTC [policies] Evaluate -> DEBU ee5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.213 UTC [gossip.comm] func1 -> DEBU ee0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.216 UTC [gossip.comm] func1 -> DEBU ee9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.216 UTC [gossip.discovery] handleAliveMessage -> DEBU eea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eeb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eec updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eed Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:39.218 UTC [gossip.discovery] learnExistingMembers -> DEBU eee Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:39.219 UTC [gossip.discovery] learnExistingMembers -> DEBU eef Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.219 UTC [gossip.discovery] handleAliveMessage -> DEBU ef0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.219 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.220 UTC [gossip.gossip] handleMessage -> DEBU ef2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.221 UTC [gossip.gossip] handleMessage -> DEBU ef5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.229 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU ef8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU ef9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.230 UTC [gossip.gossip] handleMessage -> DEBU efb Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.234 UTC [gossip.discovery] handleMsgFromComm -> DEBU efc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.234 UTC [gossip.discovery] handleMsgFromComm -> DEBU efd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.235 UTC [msp] DeserializeIdentity -> DEBU efe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.237 UTC [gossip.comm] func1 -> DEBU f01 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.238 UTC [gossip.comm] func1 -> DEBU f02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +orderer0.example.com | "2019-09-24 01:05:08.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:08.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6d Sending msg of 28 bytes to 3 on channel testchainid took 59.8µs" +orderer0.example.com | "2019-09-24 01:05:09.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 661.5µs " +orderer0.example.com | "2019-09-24 01:05:09.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6f Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +orderer0.example.com | "2019-09-24 01:05:09.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.7µs " +orderer0.example.com | "2019-09-24 01:05:09.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 01:05:09.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +orderer0.example.com | "2019-09-24 01:05:09.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f73 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f76 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +orderer0.example.com | "2019-09-24 01:05:09.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +orderer0.example.com | "2019-09-24 01:05:09.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +orderer0.example.com | "2019-09-24 01:05:09.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +orderer0.example.com | "2019-09-24 01:05:09.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +orderer0.example.com | "2019-09-24 01:05:09.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +orderer0.example.com | "2019-09-24 01:05:09.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:09.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 49.3µs" +orderer0.example.com | "2019-09-24 01:05:10.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +orderer0.example.com | "2019-09-24 01:05:10.219 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 2 on channel businesschannel took 84.3µs" +orderer0.example.com | "2019-09-24 01:05:10.219 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +orderer0.example.com | "2019-09-24 01:05:10.219 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.2µs " +orderer0.example.com | "2019-09-24 01:05:10.220 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238.4µs " +orderer0.example.com | "2019-09-24 01:05:10.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +orderer0.example.com | "2019-09-24 01:05:10.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.5µs " +orderer0.example.com | "2019-09-24 01:05:10.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:05:10.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +orderer0.example.com | "2019-09-24 01:05:10.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +orderer0.example.com | "2019-09-24 01:05:10.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 222.1µs " +orderer0.example.com | "2019-09-24 01:05:10.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:10.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU eff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.240 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f03 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:39.241 UTC [msp] DeserializeIdentity -> DEBU f04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f06 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f07 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.242 UTC [cauthdsl] func1 -> DEBU f0b 0xc003e623c0 gate 1569287079242801800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:39.243 UTC [cauthdsl] func2 -> DEBU f0d 0xc003e623c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:39.243 UTC [msp] DeserializeIdentity -> DEBU f0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.229 UTC [msp] GetDefaultSigningIdentity -> DEBU ef6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:39.244 UTC [msp.identity] Sign -> DEBU f10 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151013 " +peer0.org1.example.com | "2019-09-24 01:04:39.235 UTC [gossip.gossip] handleMessage -> DEBU f00 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.243 UTC [cauthdsl] func2 -> DEBU f0e 0xc003e623c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:39.243 UTC [msp] DeserializeIdentity -> DEBU f0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.244 UTC [msp.identity] Sign -> DEBU f11 Sign: digest: 51E0825872CE3CCEB622F03C4F6E9935E2296FE02ED366996F9D7FD2AEF15CE2 " +peer0.org1.example.com | "2019-09-24 01:04:39.251 UTC [gossip.gossip] handleMessage -> DEBU f12 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.252 UTC [cauthdsl] func2 -> DEBU f13 0xc003e623c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:39.252 UTC [msp] DeserializeIdentity -> DEBU f14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.253 UTC [msp] GetDefaultSigningIdentity -> DEBU f15 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:39.253 UTC [cauthdsl] func2 -> DEBU f16 0xc003e623c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:39.254 UTC [cauthdsl] func1 -> DEBU f19 0xc003e623c0 gate 1569287079242801800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:39.254 UTC [policies] Evaluate -> DEBU f1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.255 UTC [policies] Evaluate -> DEBU f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.255 UTC [policies] Evaluate -> DEBU f1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:39.254 UTC [gossip.comm] Send -> DEBU f17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.254 UTC [msp.identity] Sign -> DEBU f18 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:39.255 UTC [cauthdsl] func1 -> DEBU f1d 0xc003e63320 gate 1569287079255675000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:39.256 UTC [cauthdsl] func2 -> DEBU f21 0xc003e63320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:39.256 UTC [gossip.comm] sendToEndpoint -> DEBU f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.256 UTC [gossip.comm] sendToEndpoint -> DEBU f23 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.256 UTC [msp.identity] Sign -> DEBU f1f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:39.256 UTC [cauthdsl] func2 -> DEBU f22 0xc003e63320 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:39.257 UTC [cauthdsl] func2 -> DEBU f24 0xc003e63320 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:39.258 UTC [msp.identity] Verify -> DEBU f25 Verify: digest = 00000000 cd 08 77 81 7d 9b 55 4a b2 c7 d7 28 f9 81 08 1e |..w.}.UJ...(....| +peer0.org1.example.com | 00000010 0f 85 1d 5f 8e 66 c9 b5 40 4d 3f 19 9a a1 72 2b |..._.f..@M?...r+|" +peer0.org1.example.com | "2019-09-24 01:04:39.258 UTC [msp.identity] Verify -> DEBU f26 Verify: sig = 00000000 30 45 02 21 00 f7 1d 9d bb 4e a3 9c a5 94 45 5e |0E.!.....N....E^| +peer0.org1.example.com | 00000010 8e f0 7f d6 7e 45 40 13 23 95 38 a2 a6 c9 95 b5 |....~E@.#.8.....| +peer0.org1.example.com | 00000020 02 e3 09 ed 25 02 20 0c af 9a d8 b4 70 1e 44 65 |....%. .....p.De| +peer0.org1.example.com | 00000030 fc ec b7 e5 84 84 30 f2 c8 b6 df 3e a7 2a a9 ed |......0....>.*..| +peer0.org1.example.com | 00000040 70 85 dd 19 bd b5 75 |p.....u|" +peer0.org1.example.com | "2019-09-24 01:04:39.255 UTC [msp] DeserializeIdentity -> DEBU f1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.260 UTC [gossip.comm] Send -> DEBU f27 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU f28 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:39.261 UTC [gossip.comm] sendToEndpoint -> DEBU f29 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.261 UTC [gossip.comm] sendToEndpoint -> DEBU f2a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.262 UTC [cauthdsl] func2 -> DEBU f2b 0xc003e63320 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:39.262 UTC [cauthdsl] func1 -> DEBU f2c 0xc003e63320 gate 1569287079255675000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.263 UTC [policies] Evaluate -> DEBU f30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:39.263 UTC [gossip.discovery] handleAliveMessage -> DEBU f31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.263 UTC [gossip.discovery] learnExistingMembers -> DEBU f32 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f33 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f34 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f35 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.discovery] learnExistingMembers -> DEBU f36 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.discovery] handleAliveMessage -> DEBU f37 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f38 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.265 UTC [gossip.gossip] handleMessage -> DEBU f3b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.266 UTC [gossip.gossip] handleMessage -> DEBU f3c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.266 UTC [gossip.gossip] handleMessage -> DEBU f3d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.266 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.266 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.271 UTC [msp] DeserializeIdentity -> DEBU f40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.272 UTC [msp] DeserializeIdentity -> DEBU f41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.273 UTC [msp] DeserializeIdentity -> DEBU f42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.273 UTC [gossip.comm] Send -> DEBU f43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.274 UTC [msp] DeserializeIdentity -> DEBU f44 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:11.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f91 Sending msg of 28 bytes to 3 on channel testchainid took 81.1µs" +orderer0.example.com | "2019-09-24 01:05:11.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +orderer0.example.com | "2019-09-24 01:05:11.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.5µs " +orderer0.example.com | "2019-09-24 01:05:11.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-09-24 01:05:11.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.6µs " +orderer0.example.com | "2019-09-24 01:05:11.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU f96 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU f97 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 3 on channel businesschannel took 4.3494ms" +orderer0.example.com | "2019-09-24 01:05:11.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.695 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9a Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +orderer0.example.com | "2019-09-24 01:05:11.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +orderer0.example.com | "2019-09-24 01:05:11.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9c Sending msg of 28 bytes to 2 on channel businesschannel took 50.5µs" +orderer0.example.com | "2019-09-24 01:05:11.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2019-09-24 01:05:11.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.9µs " +orderer0.example.com | "2019-09-24 01:05:11.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +orderer0.example.com | "2019-09-24 01:05:11.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:11.965 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fa2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53754 with txid '920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:05:11.972 UTC [policies] Evaluate -> DEBU fa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:11.972 UTC [policies] Evaluate -> DEBU fa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:11.972 UTC [msp] DeserializeIdentity -> DEBU fa8 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:11.973 UTC [msp.identity] newIdentity -> DEBU fa9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +orderer0.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +orderer0.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +orderer0.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +orderer0.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [cauthdsl] func1 -> DEBU faa 0xc000b02450 gate 1569287111974162000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [cauthdsl] func2 -> DEBU fab 0xc000b02450 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [cauthdsl] func2 -> DEBU fac 0xc000b02450 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU fad Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [msp] Validate -> DEBU fae MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:11.974 UTC [msp] getCertificationChain -> DEBU faf MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [cauthdsl] func2 -> DEBU fb0 0xc000b02450 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [msp.identity] Verify -> DEBU fb1 Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +orderer0.example.com | 00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [msp.identity] Verify -> DEBU fb2 Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +orderer0.example.com | 00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +orderer0.example.com | 00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +orderer0.example.com | 00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +orderer0.example.com | 00000040 cf d1 1e e6 b1 d6 |......|" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [cauthdsl] func2 -> DEBU fb3 0xc000b02450 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [cauthdsl] func1 -> DEBU fb4 0xc000b02450 gate 1569287111974162000 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [policies] Evaluate -> DEBU fb5 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:11.975 UTC [policies] Evaluate -> DEBU fb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb7 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb9 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [orderer.common.blockcutter] Ordered -> DEBU fbb Enqueuing message into batch" +orderer0.example.com | "2019-09-24 01:05:11.976 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fbc [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53754" +orderer0.example.com | "2019-09-24 01:05:11.979 UTC [grpc] infof -> DEBU fbd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:11.979 UTC [orderer.common.broadcast] Handle -> WARN fbe Error reading from 172.18.0.5:53754: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:11.979 UTC [orderer.common.server] func1 -> DEBU fbf Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:05:11.979 UTC [comm.grpc.server] 1 -> INFO fc0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53754 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.6445302s +orderer0.example.com | "2019-09-24 01:05:12.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:12.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +orderer0.example.com | "2019-09-24 01:05:12.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +orderer0.example.com | "2019-09-24 01:05:12.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +orderer0.example.com | "2019-09-24 01:05:12.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +orderer0.example.com | "2019-09-24 01:05:12.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 570.5µs " +orderer0.example.com | "2019-09-24 01:05:12.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.8µs " +orderer0.example.com | "2019-09-24 01:05:12.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:12.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:12.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:12.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +orderer0.example.com | "2019-09-24 01:05:12.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 690.8µs " +orderer0.example.com | "2019-09-24 01:05:12.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " +orderer0.example.com | "2019-09-24 01:05:12.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 2 on channel businesschannel took 61.9µs" +orderer0.example.com | "2019-09-24 01:05:12.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +orderer0.example.com | "2019-09-24 01:05:12.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.1µs " +orderer0.example.com | "2019-09-24 01:05:12.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:12.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel testchainid took 1.705ms" +orderer0.example.com | "2019-09-24 01:05:13.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 935.8µs " +orderer0.example.com | "2019-09-24 01:05:13.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2019-09-24 01:05:13.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 3 on channel businesschannel took 41.1µs" +orderer0.example.com | "2019-09-24 01:05:13.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.9µs " +orderer0.example.com | "2019-09-24 01:05:13.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498.3µs " +orderer0.example.com | "2019-09-24 01:05:13.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +peer0.org1.example.com | "2019-09-24 01:04:39.274 UTC [gossip.comm] sendToEndpoint -> DEBU f45 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.275 UTC [gossip.comm] sendToEndpoint -> DEBU f46 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.275 UTC [gossip.comm] Send -> DEBU f47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.275 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.276 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.275 UTC [gossip.comm] Send -> DEBU f4a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.277 UTC [gossip.comm] sendToEndpoint -> DEBU f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.277 UTC [gossip.comm] sendToEndpoint -> DEBU f4c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.277 UTC [msp] DeserializeIdentity -> DEBU f4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f4e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.281 UTC [gossip.comm] Send -> DEBU f51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.281 UTC [msp] DeserializeIdentity -> DEBU f52 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.282 UTC [msp] DeserializeIdentity -> DEBU f53 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:39.282 UTC [gossip.comm] sendToEndpoint -> DEBU f54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.282 UTC [gossip.comm] sendToEndpoint -> DEBU f55 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.282 UTC [gossip.comm] Send -> DEBU f56 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:39.283 UTC [gossip.comm] sendToEndpoint -> DEBU f57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.283 UTC [gossip.comm] sendToEndpoint -> DEBU f58 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.527 UTC [gossip.comm] func1 -> DEBU f59 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.527 UTC [gossip.gossip] handleMessage -> DEBU f5a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.528 UTC [gossip.pull] HandleMessage -> DEBU f5b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:39.528 UTC [gossip.gossip] handleMessage -> DEBU f5c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:39.528 UTC [gossip.pull] SendRes -> DEBU f5d Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:40.372 UTC [endorser] ProcessProposal -> DEBU f5e Entering: request from 172.18.0.5:49898" +peer0.org1.example.com | "2019-09-24 01:04:40.372 UTC [protoutils] ValidateProposalMessage -> DEBU f5f ValidateProposalMessage starts for signed proposal 0xc003ee6050" +peer0.org1.example.com | "2019-09-24 01:04:40.372 UTC [protoutils] validateChannelHeader -> DEBU f60 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:04:40.373 UTC [protoutils] checkSignatureFromCreator -> DEBU f61 begin" +peer0.org1.example.com | "2019-09-24 01:04:40.373 UTC [msp] GetManagerForChain -> DEBU f62 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:04:40.373 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:40.374 UTC [msp.identity] newIdentity -> DEBU f64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:04:40.374 UTC [protoutils] checkSignatureFromCreator -> DEBU f65 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:04:40.374 UTC [msp] Validate -> DEBU f66 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:40.376 UTC [msp] getCertificationChain -> DEBU f67 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:40.376 UTC [protoutils] checkSignatureFromCreator -> DEBU f68 creator is valid" +orderer0.example.com | "2019-09-24 01:05:13.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.3µs " +orderer0.example.com | "2019-09-24 01:05:13.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdf Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" +orderer0.example.com | "2019-09-24 01:05:13.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-09-24 01:05:13.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125µs " +orderer0.example.com | "2019-09-24 01:05:13.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4867ms " +orderer0.example.com | "2019-09-24 01:05:13.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.979 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fe5 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:13.979 UTC [orderer.consensus.etcdraft] propose -> INFO fe6 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe7 Sending msg of 3644 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe8 Sending msg of 3644 bytes to 3 on channel businesschannel took 21.9µs" +orderer0.example.com | "2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] 2 -> DEBU fe9 Proposed block [3] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:13.981 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +orderer0.example.com | "2019-09-24 01:05:13.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU feb Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer1.example.com(orderer1.example.com:7050) took 2.704ms " +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU fec Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fef Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +orderer0.example.com | "2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.2µs " +orderer0.example.com | "2019-09-24 01:05:13.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.990 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ff4 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 01:05:13.990 UTC [msp] GetDefaultSigningIdentity -> DEBU ff5 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:13.991 UTC [msp] GetDefaultSigningIdentity -> DEBU ff6 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:13.991 UTC [msp.identity] Sign -> DEBU ff7 Sign: plaintext: 0A020802120B0A090A03010203100418...45973607989927ED32227DE5C26DEBF9 " +orderer0.example.com | "2019-09-24 01:05:13.991 UTC [msp.identity] Sign -> DEBU ff8 Sign: digest: 6EDF11BF536DCE34A864BEB5771B1B28301B6A119EF4A94A7FC1EE32A4336550 " +orderer0.example.com | "2019-09-24 01:05:13.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:13.995 UTC [fsblkstorage] indexBlock -> DEBU ffa Indexing block [blockNum=3, blockHash=[]byte{0x7b, 0xa8, 0x45, 0xce, 0x5d, 0x8d, 0x8, 0x76, 0x56, 0x78, 0x91, 0xdb, 0x7d, 0x1c, 0x31, 0x7b, 0xf2, 0x8, 0x34, 0xf4, 0xa9, 0x92, 0xfe, 0x49, 0x2f, 0x65, 0x4, 0x9f, 0x10, 0x2b, 0x3a, 0x80} txOffsets= +orderer0.example.com | txId=920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 locPointer=offset=70, bytesLength=3516 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:05:13.999 UTC [fsblkstorage] updateCheckpoint -> DEBU ffb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81292], isChainEmpty=[false], lastBlockNumber=[3]" +orderer0.example.com | "2019-09-24 01:05:13.999 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ffc [channel: businesschannel] Wrote block [3]" +orderer0.example.com | "2019-09-24 01:05:13.999 UTC [fsblkstorage] waitForBlock -> DEBU ffd Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-09-24 01:05:14.000 UTC [fsblkstorage] waitForBlock -> DEBU ffe Came out of wait. maxAvailaBlockNumber=[3]" +orderer0.example.com | "2019-09-24 01:05:13.999 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fff Remaining bytes=[4524], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1000 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +orderer0.example.com | "2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1001 blockbytes [4522] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:14.001 UTC [common.deliver] deliverBlocks -> DEBU 1002 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:05:14.001 UTC [fsblkstorage] waitForBlock -> DEBU 1003 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +orderer0.example.com | "2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1004 Remaining bytes=[4524], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:14.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1005 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +orderer0.example.com | "2019-09-24 01:05:14.006 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1006 blockbytes [4522] read from file [0]" +peer0.org1.example.com | "2019-09-24 01:04:40.377 UTC [msp.identity] Verify -> DEBU f69 Verify: digest = 00000000 c0 b3 7c 74 d5 e9 fe 9f 45 73 79 6c 54 9c 2c 3a |..|t....EsylT.,:| +peer0.org1.example.com | 00000010 79 73 4f 83 74 4a de 9b 5e 8d 5b 43 93 34 1e bd |ysO.tJ..^.[C.4..|" +peer0.org1.example.com | "2019-09-24 01:04:40.377 UTC [msp.identity] Verify -> DEBU f6a Verify: sig = 00000000 30 44 02 20 3f cf b9 b9 81 c7 4a 0a c3 d7 ac 83 |0D. ?.....J.....| +peer0.org1.example.com | 00000010 b2 93 66 91 59 89 86 a7 35 54 13 ef 24 f8 e8 c5 |..f.Y...5T..$...| +peer0.org1.example.com | 00000020 46 a3 a8 fc 02 20 55 bb 67 1d c6 fa a0 3e 70 69 |F.... U.g....>pi| +peer0.org1.example.com | 00000030 75 30 73 82 ec 69 e1 33 86 c7 5e 31 19 75 71 30 |u0s..i.3..^1.uq0| +peer0.org1.example.com | 00000040 83 13 f8 c5 6e 25 |....n%|" +peer0.org1.example.com | "2019-09-24 01:04:40.378 UTC [protoutils] checkSignatureFromCreator -> DEBU f6b exits successfully" +peer0.org1.example.com | "2019-09-24 01:04:40.378 UTC [protoutils] validateChaincodeProposalMessage -> DEBU f6c validateChaincodeProposalMessage starts for proposal 0xc003bcd880, header 0xc003ee6460" +peer0.org1.example.com | "2019-09-24 01:04:40.378 UTC [protoutils] validateChaincodeProposalMessage -> DEBU f6d validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:40.378 UTC [endorser] preProcess -> DEBU f6e [businesschannel][920b3a8e] processing txid: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640" +peer0.org1.example.com | "2019-09-24 01:04:40.378 UTC [fsblkstorage] retrieveTransactionByID -> DEBU f6f retrieveTransactionByID() - txId = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +peer0.org1.example.com | "2019-09-24 01:04:40.379 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU f70 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:04:40.379 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU f71 constructing new tx simulator txid = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +peer0.org1.example.com | "2019-09-24 01:04:40.380 UTC [endorser] SimulateProposal -> DEBU f72 [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:40.380 UTC [endorser] callChaincode -> INFO f73 [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:04:40.381 UTC [chaincode] Execute -> DEBU f74 Entry" +peer0.org1.example.com | "2019-09-24 01:04:40.382 UTC [chaincode] handleMessage -> DEBU f75 [920b3a8e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:04:40.382 UTC [chaincode] HandleTransaction -> DEBU f76 [920b3a8e] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:04:40.383 UTC [chaincode] HandleGetState -> DEBU f77 [920b3a8e] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:40.383 UTC [stateleveldb] GetState -> DEBU f78 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:04:40.383 UTC [chaincode] HandleGetState -> DEBU f79 [920b3a8e] No state associated with key: exp02. Sending RESPONSE with an empty payload" +peer0.org1.example.com | "2019-09-24 01:04:40.384 UTC [chaincode] HandleTransaction -> DEBU f7a [920b3a8e] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:04:40.384 UTC [msp] GetManagerForChain -> DEBU f7b Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:04:40.385 UTC [cauthdsl] func1 -> DEBU f7c 0xc003ef7d60 gate 1569287080385217000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:40.385 UTC [cauthdsl] func2 -> DEBU f7d 0xc003ef7d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:40.385 UTC [cauthdsl] func2 -> DEBU f7e 0xc003ef7d60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:40.386 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU f7f Checking if identity has been named explicitly as an admin for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:40.386 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU f80 Checking if identity carries the admin ou for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:40.386 UTC [msp] Validate -> DEBU f81 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:04:40.387 UTC [msp] getCertificationChain -> DEBU f82 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:40.388 UTC [msp] hasOURole -> DEBU f83 MSP Org1MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 01:04:40.388 UTC [msp] getCertificationChain -> DEBU f84 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:04:40.388 UTC [cauthdsl] func2 -> DEBU f85 0xc003ef7d60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:40.388 UTC [msp.identity] Verify -> DEBU f86 Verify: digest = 00000000 c0 b3 7c 74 d5 e9 fe 9f 45 73 79 6c 54 9c 2c 3a |..|t....EsylT.,:| +peer0.org1.example.com | 00000010 79 73 4f 83 74 4a de 9b 5e 8d 5b 43 93 34 1e bd |ysO.tJ..^.[C.4..|" +peer0.org1.example.com | "2019-09-24 01:04:40.388 UTC [msp.identity] Verify -> DEBU f87 Verify: sig = 00000000 30 44 02 20 3f cf b9 b9 81 c7 4a 0a c3 d7 ac 83 |0D. ?.....J.....| +peer0.org1.example.com | 00000010 b2 93 66 91 59 89 86 a7 35 54 13 ef 24 f8 e8 c5 |..f.Y...5T..$...| +peer0.org1.example.com | 00000020 46 a3 a8 fc 02 20 55 bb 67 1d c6 fa a0 3e 70 69 |F.... U.g....>pi| +peer0.org1.example.com | 00000030 75 30 73 82 ec 69 e1 33 86 c7 5e 31 19 75 71 30 |u0s..i.3..^1.uq0| +peer0.org1.example.com | 00000040 83 13 f8 c5 6e 25 |....n%|" +peer0.org1.example.com | "2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f88 0xc003ef7d60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f89 0xc003ef7d60 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f8a 0xc003ef7d60 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f8b 0xc003ef7d60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:40.390 UTC [cauthdsl] func1 -> DEBU f8c 0xc003ef7d60 gate 1569287080385217000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] handleMessage -> DEBU f8d [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] HandleTransaction -> DEBU f8e [920b3a8e] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] HandleTransaction -> DEBU f8f [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [lscc] putChaincodeCollectionData -> DEBU f90 No collection configuration specified" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] handleMessage -> DEBU f91 [920b3a8e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] Notify -> DEBU f92 [920b3a8e] notifying Txid:920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:04:40.391 UTC [chaincode] Execute -> DEBU f93 Exit" +peer0.org1.example.com | "2019-09-24 01:04:40.392 UTC [chaincode] LaunchConfig -> DEBU f94 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +peer0.org1.example.com | "2019-09-24 01:04:40.392 UTC [chaincode] Start -> DEBU f95 start container: exp02:1.0" +peer0.org1.example.com | "2019-09-24 01:04:40.392 UTC [chaincode] Start -> DEBU f96 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +orderer0.example.com | "2019-09-24 01:05:14.008 UTC [common.deliver] deliverBlocks -> DEBU 1007 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:05:14.017 UTC [fsblkstorage] waitForBlock -> DEBU 1008 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +peer0.org1.example.com | "2019-09-24 01:04:40.393 UTC [chaincode] Start -> DEBU f97 start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +peer0.org1.example.com | "2019-09-24 01:04:40.393 UTC [container] lockContainer -> DEBU f98 waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 01:04:40.393 UTC [container] lockContainer -> DEBU f99 got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 01:04:40.394 UTC [dockercontroller] stopInternal -> DEBU f9a stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:04:40.397 UTC [dockercontroller] stopInternal -> DEBU f9b stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 01:04:40.397 UTC [dockercontroller] stopInternal -> DEBU f9c killing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:04:40.400 UTC [dockercontroller] stopInternal -> DEBU f9d kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 01:04:40.400 UTC [dockercontroller] stopInternal -> DEBU f9e removing container" id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:04:40.401 UTC [dockercontroller] stopInternal -> DEBU f9f remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 01:04:40.402 UTC [dockercontroller] createContainer -> DEBU fa0 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:04:40.403 UTC [dockercontroller] getDockerHostConfig -> DEBU fa1 docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-09-24 01:04:40.409 UTC [chaincode.platform] GenerateDockerfile -> DEBU fa2 +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.15 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.3" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.15" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.3" +peer0.org1.example.com | "2019-09-24 01:04:40.417 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO fa3 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-09-24 01:04:40.418 UTC [chaincode.platform.util] DockerBuild -> DEBU fa4 Attempting build with image hyperledger/fabric-ccenv:latest" +peer0.org1.example.com | "2019-09-24 01:04:40.724 UTC [gossip.channel] reportMembershipChanges -> INFO fa5 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-09-24 01:04:41.723 UTC [msp] DeserializeIdentity -> DEBU fa6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.723 UTC [msp] DeserializeIdentity -> DEBU fa7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.724 UTC [gossip.comm] Send -> DEBU fa8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:04:41.726 UTC [gossip.comm] sendToEndpoint -> DEBU fa9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.726 UTC [gossip.comm] sendToEndpoint -> DEBU faa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.727 UTC [gossip.comm] sendToEndpoint -> DEBU fab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.727 UTC [gossip.comm] sendToEndpoint -> DEBU fac Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.728 UTC [gossip.comm] sendToEndpoint -> DEBU fad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.729 UTC [gossip.comm] func1 -> DEBU fae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.729 UTC [gossip.gossip] handleMessage -> DEBU faf Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.728 UTC [gossip.comm] sendToEndpoint -> DEBU fb0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.730 UTC [gossip.comm] func1 -> DEBU fb1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.730 UTC [msp] DeserializeIdentity -> DEBU fb2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.731 UTC [msp] DeserializeIdentity -> DEBU fb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.732 UTC [msp] DeserializeIdentity -> DEBU fb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fb5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.733 UTC [gossip.comm] func1 -> DEBU fb8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.733 UTC [policies] Evaluate -> DEBU fb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.734 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:41.734 UTC [policies] Evaluate -> DEBU fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.734 UTC [cauthdsl] func1 -> DEBU fbc 0xc0040e2bf0 gate 1569287081734548800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.734 UTC [cauthdsl] func2 -> DEBU fbd 0xc0040e2bf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.734 UTC [cauthdsl] func2 -> DEBU fbe 0xc0040e2bf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.735 UTC [cauthdsl] func2 -> DEBU fbf 0xc0040e2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:41.735 UTC [cauthdsl] func2 -> DEBU fc0 0xc0040e2bf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.735 UTC [cauthdsl] func1 -> DEBU fc1 0xc0040e2bf0 gate 1569287081734548800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.735 UTC [policies] Evaluate -> DEBU fc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.735 UTC [policies] Evaluate -> DEBU fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func1 -> DEBU fc5 0xc0040e3430 gate 1569287081736056100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc6 0xc0040e3430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc7 0xc0040e3430 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc8 0xc0040e3430 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [msp.identity] Verify -> DEBU fc9 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [msp.identity] Verify -> DEBU fca Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fcb 0xc0040e3430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [cauthdsl] func1 -> DEBU fcc 0xc0040e3430 gate 1569287081736056100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fcd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.737 UTC [policies] Evaluate -> DEBU fcf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.737 UTC [policies] Evaluate -> DEBU fd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.738 UTC [msp.identity] Verify -> DEBU fd1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:41.738 UTC [msp.identity] Verify -> DEBU fd2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:41.740 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:41.740 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:41.741 UTC [msp] DeserializeIdentity -> DEBU fd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.742 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fd8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fd9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.748 UTC [policies] Evaluate -> DEBU fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.749 UTC [policies] Evaluate -> DEBU fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:41.749 UTC [policies] Evaluate -> DEBU fdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.750 UTC [cauthdsl] func1 -> DEBU fdd 0xc0040fda40 gate 1569287081750491400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fde 0xc0040fda40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fdf 0xc0040fda40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fe0 0xc0040fda40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fe1 0xc0040fda40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.751 UTC [cauthdsl] func1 -> DEBU fe2 0xc0040fda40 gate 1569287081750491400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.751 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.752 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.752 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.752 UTC [cauthdsl] func1 -> DEBU fe6 0xc004114280 gate 1569287081752186000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.753 UTC [cauthdsl] func2 -> DEBU fe7 0xc004114280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.754 UTC [cauthdsl] func2 -> DEBU fe8 0xc004114280 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.754 UTC [cauthdsl] func2 -> DEBU fe9 0xc004114280 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.754 UTC [msp.identity] Verify -> DEBU fea Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:41.755 UTC [msp] DeserializeIdentity -> DEBU feb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.756 UTC [msp] DeserializeIdentity -> DEBU fec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.757 UTC [gossip.pull] Hello -> DEBU fed Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:41.757 UTC [msp] DeserializeIdentity -> DEBU fee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.758 UTC [msp] DeserializeIdentity -> DEBU fef Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.758 UTC [gossip.comm] Send -> DEBU ff0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:41.759 UTC [gossip.comm] sendToEndpoint -> DEBU ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.759 UTC [gossip.comm] sendToEndpoint -> DEBU ff2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.761 UTC [gossip.comm] func1 -> DEBU ff3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.755 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:41.763 UTC [cauthdsl] func2 -> DEBU ff5 0xc004114280 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.763 UTC [cauthdsl] func1 -> DEBU ff6 0xc004114280 gate 1569287081752186000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:41.764 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.765 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.766 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.767 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.768 UTC [gossip.election] waitForInterrupt -> DEBU ffb d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.768 UTC [gossip.election] IsLeader -> DEBU ffc d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:41.768 UTC [msp] GetDefaultSigningIdentity -> DEBU ffd Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:41.768 UTC [msp.identity] Sign -> DEBU ffe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510041801 " +orderer0.example.com | "2019-09-24 01:05:14.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 64.1µs" +orderer0.example.com | "2019-09-24 01:05:14.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1712ms " +orderer0.example.com | "2019-09-24 01:05:14.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +orderer0.example.com | "2019-09-24 01:05:14.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 3 on channel businesschannel took 649.5µs" +orderer0.example.com | "2019-09-24 01:05:14.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.8122ms " +orderer0.example.com | "2019-09-24 01:05:14.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 540.9µs " +orderer0.example.com | "2019-09-24 01:05:14.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 3 on channel testchainid took 58.8µs" +orderer0.example.com | "2019-09-24 01:05:14.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 601.5µs " +orderer0.example.com | "2019-09-24 01:05:14.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 2 on channel businesschannel took 90.9µs" +orderer0.example.com | "2019-09-24 01:05:14.713 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +orderer0.example.com | "2019-09-24 01:05:14.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 425.2µs " +orderer0.example.com | "2019-09-24 01:05:14.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +orderer0.example.com | "2019-09-24 01:05:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:14.857 UTC [orderer.common.server] Broadcast -> DEBU 101b Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:05:14.857 UTC [orderer.common.broadcast] Handle -> DEBU 101c Starting new broadcast loop for 172.18.0.5:53770" +orderer0.example.com | "2019-09-24 01:05:14.898 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 101d [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53770 with txid '716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 01:05:14.899 UTC [policies] Evaluate -> DEBU 101e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:05:14.899 UTC [policies] Evaluate -> DEBU 101f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1021 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1022 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:14.900 UTC [cauthdsl] func1 -> DEBU 1023 0xc00136f400 gate 1569287114900788200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:14.901 UTC [cauthdsl] func2 -> DEBU 1024 0xc00136f400 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:14.901 UTC [cauthdsl] func2 -> DEBU 1025 0xc00136f400 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:14.902 UTC [cauthdsl] func2 -> DEBU 1026 0xc00136f400 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:14.903 UTC [msp.identity] Verify -> DEBU 1027 Verify: digest = 00000000 e0 f8 35 ad 30 51 bb 43 c2 4a 4f 91 93 18 65 36 |..5.0Q.C.JO...e6| +orderer0.example.com | 00000010 82 ac 95 13 d5 cc b4 10 07 64 48 79 81 43 d0 07 |.........dHy.C..|" +orderer0.example.com | "2019-09-24 01:05:14.903 UTC [msp.identity] Verify -> DEBU 1028 Verify: sig = 00000000 30 45 02 21 00 f0 75 11 1d c1 3c 4c 4e df 7f cd |0E.!..u... DEBU 1029 0xc00136f400 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:14.910 UTC [cauthdsl] func1 -> DEBU 102a 0xc00136f400 gate 1569287114900788200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:14.910 UTC [policies] Evaluate -> DEBU 102b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:14.910 UTC [policies] Evaluate -> DEBU 102c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:14.912 UTC [policies] Evaluate -> DEBU 102d Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 102e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:14.914 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1031 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53770" +orderer0.example.com | "2019-09-24 01:05:14.914 UTC [orderer.common.blockcutter] Ordered -> DEBU 1032 Enqueuing message into batch" +orderer0.example.com | "2019-09-24 01:05:14.921 UTC [grpc] warningf -> DEBU 1033 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53770: read: connection reset by peer" +orderer0.example.com | "2019-09-24 01:05:14.921 UTC [orderer.common.broadcast] Handle -> WARN 1034 Error reading from 172.18.0.5:53770: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:14.921 UTC [orderer.common.server] func1 -> DEBU 1035 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:05:14.922 UTC [comm.grpc.server] 1 -> INFO 1036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53770 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.1745ms +orderer0.example.com | "2019-09-24 01:05:14.923 UTC [grpc] infof -> DEBU 1037 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:15.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1038 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:15.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1039 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.2µs " +orderer0.example.com | "2019-09-24 01:05:15.194 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 3 on channel testchainid took 37.5µs" +orderer0.example.com | "2019-09-24 01:05:15.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103b Sending msg of 28 bytes to 2 on channel businesschannel took 87.1µs" +orderer0.example.com | "2019-09-24 01:05:15.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +orderer0.example.com | "2019-09-24 01:05:15.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +orderer0.example.com | "2019-09-24 01:05:15.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.549ms " +orderer0.example.com | "2019-09-24 01:05:15.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:15.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1040 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:15.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1041 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +orderer0.example.com | "2019-09-24 01:05:15.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1043 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 264.7µs " +orderer0.example.com | "2019-09-24 01:05:15.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-09-24 01:05:15.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +orderer0.example.com | "2019-09-24 01:05:15.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 205.7µs " +orderer0.example.com | "2019-09-24 01:05:15.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 889.1µs " +orderer0.example.com | "2019-09-24 01:05:15.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:15.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 3 on channel testchainid took 710.9µs" +orderer0.example.com | "2019-09-24 01:05:16.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +orderer0.example.com | "2019-09-24 01:05:16.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +orderer0.example.com | "2019-09-24 01:05:16.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +orderer0.example.com | "2019-09-24 01:05:16.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " +orderer0.example.com | "2019-09-24 01:05:16.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.6µs " +orderer0.example.com | "2019-09-24 01:05:16.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1052 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 3 on channel testchainid took 37.8µs" +orderer0.example.com | "2019-09-24 01:05:16.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 968.2µs " +orderer0.example.com | "2019-09-24 01:05:16.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1056 Sending msg of 28 bytes to 3 on channel businesschannel took 45.1µs" +orderer0.example.com | "2019-09-24 01:05:16.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +orderer0.example.com | "2019-09-24 01:05:16.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 235.2µs " +orderer0.example.com | "2019-09-24 01:05:16.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1059 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:41.769 UTC [msp.identity] Sign -> DEBU fff Sign: digest: 08A084D966F01604E67A7E9EF85F0142651267FE7FDB4C1DD055FE1349B1A37F " +peer0.org1.example.com | "2019-09-24 01:04:41.769 UTC [gossip.election] waitForInterrupt -> DEBU 1000 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:41.767 UTC [gossip.gossip] handleMessage -> DEBU 1001 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.770 UTC [msp] DeserializeIdentity -> DEBU 1002 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.771 UTC [msp] DeserializeIdentity -> DEBU 1003 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.771 UTC [msp] DeserializeIdentity -> DEBU 1004 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.772 UTC [msp] DeserializeIdentity -> DEBU 1005 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.772 UTC [gossip.comm] Send -> DEBU 1006 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:41.774 UTC [msp] DeserializeIdentity -> DEBU 1007 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.774 UTC [msp] DeserializeIdentity -> DEBU 1008 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.775 UTC [gossip.comm] sendToEndpoint -> DEBU 1009 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.775 UTC [gossip.comm] sendToEndpoint -> DEBU 100a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.777 UTC [gossip.gossip] handleMessage -> DEBU 100b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.778 UTC [msp.identity] Verify -> DEBU 100c Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:41.778 UTC [msp.identity] Verify -> DEBU 100d Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:41.780 UTC [msp.identity] Verify -> DEBU 100e Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:41.781 UTC [msp.identity] Verify -> DEBU 100f Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:41.781 UTC [msp] DeserializeIdentity -> DEBU 1010 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.782 UTC [msp] DeserializeIdentity -> DEBU 1011 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1012 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:41.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1013 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1014 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.784 UTC [policies] Evaluate -> DEBU 1015 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.784 UTC [policies] Evaluate -> DEBU 1016 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:41.785 UTC [policies] Evaluate -> DEBU 1017 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.786 UTC [cauthdsl] func1 -> DEBU 1018 0xc004142ad0 gate 1569287081786102600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.786 UTC [cauthdsl] func2 -> DEBU 1019 0xc004142ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.786 UTC [cauthdsl] func2 -> DEBU 101a 0xc004142ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [cauthdsl] func2 -> DEBU 101b 0xc004142ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [cauthdsl] func2 -> DEBU 101c 0xc004142ad0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:16.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.3418ms " +orderer0.example.com | "2019-09-24 01:05:16.881 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 105c Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:16.881 UTC [orderer.consensus.etcdraft] propose -> INFO 105d Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:16.883 UTC [orderer.consensus.etcdraft] 2 -> DEBU 105e Proposed block [4] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:16.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 3105 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 01:05:16.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 3105 bytes to 3 on channel businesschannel took 16.2µs" +orderer0.example.com | "2019-09-24 01:05:16.887 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1061 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " +orderer0.example.com | "2019-09-24 01:05:16.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1062 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1063 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +orderer0.example.com | "2019-09-24 01:05:16.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 01:05:16.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1065 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 274.6µs " +orderer0.example.com | "2019-09-24 01:05:16.893 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1066 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:16.893 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1067 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 01:05:16.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 1068 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:16.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 1069 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:16.894 UTC [msp.identity] Sign -> DEBU 106a Sign: plaintext: 0A020802120B0A090A03010203100418...ED82461E37C493DE73E3F63D45A32047 " +orderer0.example.com | "2019-09-24 01:05:16.894 UTC [msp.identity] Sign -> DEBU 106b Sign: digest: 60C72952D5A6FA993A3F208C1D4ECD665ED3DD4606CB162F9DDD263D52FCA565 " +orderer0.example.com | "2019-09-24 01:05:16.896 UTC [fsblkstorage] indexBlock -> DEBU 106c Indexing block [blockNum=4, blockHash=[]byte{0xd5, 0x57, 0x9e, 0x19, 0x63, 0x67, 0xd5, 0xdc, 0x86, 0xc, 0xd2, 0x55, 0xe5, 0x72, 0x46, 0xfe, 0x75, 0x52, 0x23, 0xda, 0x1f, 0xf6, 0x6, 0xd2, 0x79, 0xa1, 0xba, 0xeb, 0x15, 0x73, 0xde, 0xe2} txOffsets= +orderer0.example.com | txId=716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b locPointer=offset=70, bytesLength=2977 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:05:16.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 2.2519ms " +orderer0.example.com | "2019-09-24 01:05:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs " +orderer0.example.com | "2019-09-24 01:05:16.899 UTC [fsblkstorage] updateCheckpoint -> DEBU 1070 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85276], isChainEmpty=[false], lastBlockNumber=[4]" +orderer0.example.com | "2019-09-24 01:05:16.899 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1071 [channel: businesschannel] Wrote block [4]" +orderer0.example.com | "2019-09-24 01:05:16.900 UTC [fsblkstorage] waitForBlock -> DEBU 1072 Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1073 Remaining bytes=[3984], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1074 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +orderer0.example.com | "2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1075 blockbytes [3982] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:16.900 UTC [common.deliver] deliverBlocks -> DEBU 1076 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [fsblkstorage] waitForBlock -> DEBU 1077 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [fsblkstorage] waitForBlock -> DEBU 1078 Came out of wait. maxAvailaBlockNumber=[4]" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1079 Remaining bytes=[3984], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 107a Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 107b blockbytes [3982] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:16.902 UTC [common.deliver] deliverBlocks -> DEBU 107c [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:05:16.902 UTC [fsblkstorage] waitForBlock -> DEBU 107d Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +orderer0.example.com | "2019-09-24 01:05:16.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:16.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1080 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 3 on channel testchainid took 55µs" +orderer0.example.com | "2019-09-24 01:05:17.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " +orderer0.example.com | "2019-09-24 01:05:17.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-09-24 01:05:17.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-09-24 01:05:17.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 310.1µs " +orderer0.example.com | "2019-09-24 01:05:17.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1113ms " +orderer0.example.com | "2019-09-24 01:05:17.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.442 UTC [orderer.common.server] Broadcast -> DEBU 1089 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:05:17.442 UTC [orderer.common.broadcast] Handle -> DEBU 108a Starting new broadcast loop for 172.18.0.5:53784" +orderer0.example.com | "2019-09-24 01:05:17.468 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 108b [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53784 with txid '074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5' of type ENDORSER_TRANSACTION" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 1090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [msp] DeserializeIdentity -> DEBU 1091 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [msp.identity] newIdentity -> DEBU 1092 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +orderer0.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +orderer0.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +orderer0.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +orderer0.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func1 -> DEBU 1093 0xc0011bc790 gate 1569287117469740900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1094 0xc0011bc790 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1095 0xc0011bc790 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1096 0xc0011bc790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1097 0xc0011bc790 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [cauthdsl] func1 -> DEBU 1098 0xc0011bc790 gate 1569287117469740900 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 1099 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 109a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 109b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func1 -> DEBU 109c 0xc0011bd920 gate 1569287117470048000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 109d 0xc0011bd920 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 109e 0xc0011bd920 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 109f Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [msp] Validate -> DEBU 10a0 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [msp] getCertificationChain -> DEBU 10a1 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 10a2 0xc0011bd920 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [msp.identity] Verify -> DEBU 10a3 Verify: digest = 00000000 3b bb 85 c9 b1 26 4d ef 06 5d 74 71 84 51 0c ba |;....&M..]tq.Q..| +orderer0.example.com | 00000010 f4 ff 97 a0 9a 74 75 1a ed 57 e9 f4 fa ce 55 e2 |.....tu..W....U.|" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [msp.identity] Verify -> DEBU 10a4 Verify: sig = 00000000 30 45 02 21 00 fd a1 0a 41 10 34 78 b2 35 ea a0 |0E.!....A.4x.5..| +orderer0.example.com | 00000010 60 94 c5 01 ae e7 b2 c3 4c 4b 69 d7 03 98 bc 0b |`.......LKi.....| +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [cauthdsl] func1 -> DEBU 101d 0xc004142ad0 gate 1569287081786102600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 101e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 101f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.788 UTC [cauthdsl] func1 -> DEBU 1021 0xc004143310 gate 1569287081788503000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.788 UTC [cauthdsl] func2 -> DEBU 1022 0xc004143310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.789 UTC [cauthdsl] func2 -> DEBU 1023 0xc004143310 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.789 UTC [cauthdsl] func2 -> DEBU 1024 0xc004143310 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.790 UTC [msp.identity] Verify -> DEBU 1025 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:41.790 UTC [msp.identity] Verify -> DEBU 1026 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:41.792 UTC [cauthdsl] func2 -> DEBU 1027 0xc004143310 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.793 UTC [cauthdsl] func1 -> DEBU 1028 0xc004143310 gate 1569287081788503000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 1029 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.794 UTC [gossip.gossip] handleMessage -> DEBU 102d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.794 UTC [gossip.gossip] handleMessage -> DEBU 102e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.795 UTC [msp] DeserializeIdentity -> DEBU 102f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.796 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.796 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1032 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:41.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1033 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1034 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.809 UTC [policies] Evaluate -> DEBU 1035 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.810 UTC [policies] Evaluate -> DEBU 1036 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:41.810 UTC [policies] Evaluate -> DEBU 1037 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.811 UTC [cauthdsl] func1 -> DEBU 1038 0xc004154250 gate 1569287081811192100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 1039 0xc004154250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103a 0xc004154250 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103b 0xc004154250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103c 0xc004154250 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.814 UTC [cauthdsl] func1 -> DEBU 103d 0xc004154250 gate 1569287081811192100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 103e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 103f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 1040 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.815 UTC [cauthdsl] func1 -> DEBU 1041 0xc004155380 gate 1569287081815752200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1042 0xc004155380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1043 0xc004155380 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1044 0xc004155380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.817 UTC [msp.identity] Verify -> DEBU 1045 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:41.818 UTC [msp.identity] Verify -> DEBU 1046 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:41.818 UTC [cauthdsl] func2 -> DEBU 1047 0xc004155380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.824 UTC [cauthdsl] func1 -> DEBU 1048 0xc004155380 gate 1569287081815752200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 1049 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.825 UTC [msp.identity] Verify -> DEBU 104d Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:41.825 UTC [msp.identity] Verify -> DEBU 104e Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:41.825 UTC [msp] DeserializeIdentity -> DEBU 104f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.825 UTC [msp] DeserializeIdentity -> DEBU 1050 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.825 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1051 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1052 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1053 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1054 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1055 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1056 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 1057 0xc003ba1280 gate 1569287081826431400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1058 0xc003ba1280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1059 0xc003ba1280 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 105a 0xc003ba1280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 105b 0xc003ba1280 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 105c 0xc003ba1280 gate 1569287081826431400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 1060 0xc003ba1ad0 gate 1569287081826924600 evaluation starts" +orderer0.example.com | 00000020 7e c4 d0 f1 d9 02 20 7f 1b dd 4e f3 da c9 03 62 |~..... ...N....b| +orderer0.example.com | 00000030 53 08 49 fd d9 f2 bf 57 e1 37 ab 5a 24 b4 00 f2 |S.I....W.7.Z$...| +orderer0.example.com | 00000040 c0 bb be fd e2 be ad |.......|" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 10a5 0xc0011bd920 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [cauthdsl] func1 -> DEBU 10a6 0xc0011bd920 gate 1569287117470048000 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a9 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10ab Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:17.471 UTC [orderer.common.blockcutter] Ordered -> DEBU 10ad Enqueuing message into batch" +orderer0.example.com | "2019-09-24 01:05:17.471 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10ae [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53784" +peer0.org1.example.com | "2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1061 0xc003ba1ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1062 0xc003ba1ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1063 0xc003ba1ad0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [msp.identity] Verify -> DEBU 1064 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [msp.identity] Verify -> DEBU 1065 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1066 0xc003ba1ad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [cauthdsl] func1 -> DEBU 1067 0xc003ba1ad0 gate 1569287081826924600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 1068 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 1069 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 106a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 106b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [gossip.gossip] handleMessage -> DEBU 106c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.827 UTC [gossip.gossip] handleMessage -> DEBU 106d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.828 UTC [gossip.pull] HandleMessage -> DEBU 106e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.828 UTC [gossip.gossip] handleMessage -> DEBU 106f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.913 UTC [gossip.comm] func1 -> DEBU 1070 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.913 UTC [gossip.comm] func1 -> DEBU 1071 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.914 UTC [gossip.gossip] handleMessage -> DEBU 1072 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.915 UTC [msp] DeserializeIdentity -> DEBU 1073 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.915 UTC [msp] DeserializeIdentity -> DEBU 1074 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:41.916 UTC [gossip.gossip] handleMessage -> DEBU 1075 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:41.916 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.917 UTC [gossip.pull] HandleMessage -> DEBU 1077 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:41.917 UTC [gossip.pull] SendDigest -> DEBU 1078 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:41.917 UTC [gossip.gossip] handleMessage -> DEBU 1079 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.112 UTC [gossip.comm] func1 -> DEBU 107a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.112 UTC [gossip.gossip] handleMessage -> DEBU 107b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.112 UTC [msp] DeserializeIdentity -> DEBU 107c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.113 UTC [msp] DeserializeIdentity -> DEBU 107d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.113 UTC [msp] DeserializeIdentity -> DEBU 107e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.113 UTC [gossip.gossip] handleMessage -> DEBU 107f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.309 UTC [gossip.comm] func1 -> DEBU 1080 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.309 UTC [gossip.gossip] handleMessage -> DEBU 1081 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1082 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1083 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1084 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.310 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.527 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.527 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.528 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:17.474 UTC [grpc] infof -> DEBU 10af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:17.474 UTC [orderer.common.broadcast] Handle -> WARN 10b0 Error reading from 172.18.0.5:53784: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:17.475 UTC [orderer.common.server] func1 -> DEBU 10b1 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:05:17.475 UTC [comm.grpc.server] 1 -> INFO 10b2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53784 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.4874ms +orderer0.example.com | "2019-09-24 01:05:17.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b4 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-09-24 01:05:17.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " +orderer0.example.com | "2019-09-24 01:05:17.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-09-24 01:05:17.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 01:05:17.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +orderer0.example.com | "2019-09-24 01:05:17.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.2µs " +orderer0.example.com | "2019-09-24 01:05:17.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:17.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bd Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +orderer0.example.com | "2019-09-24 01:05:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5969ms " +orderer0.example.com | "2019-09-24 01:05:18.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +orderer0.example.com | "2019-09-24 01:05:18.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 01:05:18.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +orderer0.example.com | "2019-09-24 01:05:18.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1718ms " +orderer0.example.com | "2019-09-24 01:05:18.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c6 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2019-09-24 01:05:18.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.3µs " +orderer0.example.com | "2019-09-24 01:05:18.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +orderer0.example.com | "2019-09-24 01:05:18.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167µs " +orderer0.example.com | "2019-09-24 01:05:18.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ca Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:18.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel businesschannel took 135.9µs" +orderer0.example.com | "2019-09-24 01:05:18.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 634.5µs " +orderer0.example.com | "2019-09-24 01:05:18.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ce Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 01:05:19.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +orderer0.example.com | "2019-09-24 01:05:19.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2019-09-24 01:05:19.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d2 Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +orderer0.example.com | "2019-09-24 01:05:19.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 463.2µs " +orderer0.example.com | "2019-09-24 01:05:19.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 332.3µs " +orderer0.example.com | "2019-09-24 01:05:19.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:42.530 UTC [gossip.pull] SendDigest -> DEBU 1089 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:42.530 UTC [gossip.gossip] handleMessage -> DEBU 108a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.534 UTC [gossip.comm] func1 -> DEBU 108b Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.534 UTC [gossip.gossip] handleMessage -> DEBU 108c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.534 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 108e Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.534 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 108f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1090 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +peer0.org1.example.com | 00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1091 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +peer0.org1.example.com | 00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +peer0.org1.example.com | 00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +peer0.org1.example.com | 00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +peer0.org1.example.com | 00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1092 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1093 Verify: sig = 00000000 30 45 02 21 00 f4 80 68 84 6e 8c 48 71 ac 3d 62 |0E.!...h.n.Hq.=b| +peer0.org1.example.com | 00000010 df 9f 13 bd 5a 17 d3 cf f6 b6 42 c8 2e f4 5d 09 |....Z.....B...].| +peer0.org1.example.com | 00000020 4c ff 2e f6 b7 02 20 3b 1b a6 76 be f4 0d cb 4f |L..... ;..v....O| +peer0.org1.example.com | 00000030 41 b6 8b 62 5c 79 ca 2b 7c d4 df a8 f9 42 47 90 |A..b\y.+|....BG.| +peer0.org1.example.com | 00000040 1c d2 42 b8 ee b1 98 |..B....|" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 1094 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 1095 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1096 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1097 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1098 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1099 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 109a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 109b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.536 UTC [gossip.discovery] sendMemResponse -> DEBU 109c Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:42.537 UTC [msp] DeserializeIdentity -> DEBU 109d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.537 UTC [msp] DeserializeIdentity -> DEBU 109e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.537 UTC [gossip.comm] Send -> DEBU 109f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 01:05:19.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.472 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10d7 Batch timer expired, creating block" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:19.472 UTC [orderer.consensus.etcdraft] propose -> INFO 10d8 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:19.475 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10d9 Proposed block [5] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:19.478 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10da Sending msg of 3106 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 01:05:19.478 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 3106 bytes to 3 on channel businesschannel took 9µs" +orderer0.example.com | "2019-09-24 01:05:19.478 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dc Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer1.example.com(orderer1.example.com:7050) took 132.8µs " +orderer0.example.com | "2019-09-24 01:05:19.482 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dd Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10de Sending msg of 28 bytes to 2 on channel businesschannel took 850.2µs" +orderer0.example.com | "2019-09-24 01:05:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 3 on channel businesschannel took 38.8µs" +orderer0.example.com | "2019-09-24 01:05:19.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 264.4µs " +orderer0.example.com | "2019-09-24 01:05:19.485 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10e1 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:19.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10e2 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +orderer0.example.com | "2019-09-24 01:05:19.485 UTC [msp] GetDefaultSigningIdentity -> DEBU 10e3 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:19.486 UTC [msp] GetDefaultSigningIdentity -> DEBU 10e4 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:19.486 UTC [msp.identity] Sign -> DEBU 10e5 Sign: plaintext: 0A020802120B0A090A03010203100418...1111CD6184348A3E6FBF7B9C04EFCEEF " +orderer0.example.com | "2019-09-24 01:05:19.486 UTC [msp.identity] Sign -> DEBU 10e6 Sign: digest: D37104C73DC3260B7090176E4A7ED54C01F96EF5B4D527EA70974D21496BA318 " +orderer0.example.com | "2019-09-24 01:05:19.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e8 Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer2.example.com(orderer2.example.com:7050) took 9.1596ms " +orderer0.example.com | "2019-09-24 01:05:19.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.4µs " +orderer0.example.com | "2019-09-24 01:05:19.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10eb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.498 UTC [fsblkstorage] indexBlock -> DEBU 10ec Indexing block [blockNum=5, blockHash=[]byte{0x2, 0x38, 0x9e, 0x59, 0xf8, 0xbb, 0xfc, 0xc, 0x7e, 0x52, 0x39, 0x78, 0x2b, 0xad, 0x5f, 0x4b, 0x3f, 0x3f, 0x8b, 0x94, 0xc6, 0x52, 0x18, 0x85, 0x20, 0x20, 0xfd, 0x31, 0xe0, 0x3f, 0x7c, 0xb2} txOffsets= +orderer0.example.com | txId=074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 locPointer=offset=70, bytesLength=2978 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:05:19.500 UTC [fsblkstorage] updateCheckpoint -> DEBU 10ed Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89262], isChainEmpty=[false], lastBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:19.501 UTC [fsblkstorage] waitForBlock -> DEBU 10ee Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:19.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ef Remaining bytes=[3986], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:19.501 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10f0 [channel: businesschannel] Wrote block [5]" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [fsblkstorage] waitForBlock -> DEBU 10f1 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f3 Remaining bytes=[3986], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f4 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f5 blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [common.deliver] deliverBlocks -> DEBU 10f6 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:05:19.502 UTC [fsblkstorage] waitForBlock -> DEBU 10f7 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:19.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f2 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:19.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f8 blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:19.510 UTC [common.deliver] deliverBlocks -> DEBU 10f9 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:05:19.512 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:19.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fc Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +orderer0.example.com | "2019-09-24 01:05:19.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +orderer0.example.com | "2019-09-24 01:05:19.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fe Sending msg of 28 bytes to 3 on channel businesschannel took 37µs" +orderer0.example.com | "2019-09-24 01:05:19.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ff Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-09-24 01:05:19.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1100 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 925.1µs " +orderer0.example.com | "2019-09-24 01:05:19.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1101 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569µs " +orderer0.example.com | "2019-09-24 01:05:19.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1102 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:19.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1103 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1105 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2019-09-24 01:05:20.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1106 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1299ms " +orderer0.example.com | "2019-09-24 01:05:20.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +orderer0.example.com | "2019-09-24 01:05:20.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1108 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +orderer0.example.com | "2019-09-24 01:05:20.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1109 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +orderer0.example.com | "2019-09-24 01:05:20.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8104ms " +orderer0.example.com | "2019-09-24 01:05:20.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2019-09-24 01:05:20.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +orderer0.example.com | "2019-09-24 01:05:20.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +orderer0.example.com | "2019-09-24 01:05:20.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1111 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 01:05:20.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1112 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 656µs " +orderer0.example.com | "2019-09-24 01:05:20.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1113 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 355.1µs " +orderer0.example.com | "2019-09-24 01:05:20.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:20.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.155 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.156 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +orderer0.example.com | "2019-09-24 01:05:21.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " +orderer0.example.com | "2019-09-24 01:05:21.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +orderer0.example.com | "2019-09-24 01:05:21.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111a Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2019-09-24 01:05:21.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +orderer0.example.com | "2019-09-24 01:05:21.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.8µs " +orderer0.example.com | "2019-09-24 01:05:21.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +orderer0.example.com | "2019-09-24 01:05:21.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 497.1µs " +orderer0.example.com | "2019-09-24 01:05:21.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-09-24 01:05:21.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1124 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-09-24 01:05:21.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 390.3µs " +orderer0.example.com | "2019-09-24 01:05:21.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 213.5µs " +orderer0.example.com | "2019-09-24 01:05:21.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:21.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50µs" +orderer0.example.com | "2019-09-24 01:05:22.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.6µs " +orderer0.example.com | "2019-09-24 01:05:22.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +orderer0.example.com | "2019-09-24 01:05:22.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112c Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +orderer0.example.com | "2019-09-24 01:05:22.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.4µs " +orderer0.example.com | "2019-09-24 01:05:22.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " +orderer0.example.com | "2019-09-24 01:05:22.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +orderer0.example.com | "2019-09-24 01:05:22.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 712.3µs " +orderer0.example.com | "2019-09-24 01:05:22.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 2 on channel businesschannel took 137.6µs" +orderer0.example.com | "2019-09-24 01:05:22.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +orderer0.example.com | "2019-09-24 01:05:22.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.7µs " +orderer0.example.com | "2019-09-24 01:05:22.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.7µs " +orderer0.example.com | "2019-09-24 01:05:22.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:22.728 UTC [orderer.common.server] Deliver -> DEBU 113a Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:22.728 UTC [common.deliver] Handle -> DEBU 113b Starting new deliver loop for 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.728 UTC [common.deliver] Handle -> DEBU 113c Attempting to read seek info message from 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 1140 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 1141 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.733 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:22.734 UTC [msp.identity] newIdentity -> DEBU 1143 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func1 -> DEBU 1144 0xc000201e90 gate 1569287122735014900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1145 0xc000201e90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1146 0xc000201e90 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1147 0xc000201e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1148 0xc000201e90 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:22.735 UTC [cauthdsl] func1 -> DEBU 1149 0xc000201e90 gate 1569287122735014900 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.736 UTC [cauthdsl] func1 -> DEBU 114d 0xc00036ba60 gate 1569287122736787000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.537 UTC [gossip.discovery] sendMemResponse -> DEBU 10a0 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:04:42.538 UTC [gossip.comm] sendToEndpoint -> DEBU 10a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.538 UTC [gossip.comm] sendToEndpoint -> DEBU 10a2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.840 UTC [gossip.comm] func1 -> DEBU 10a3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.840 UTC [gossip.gossip] handleMessage -> DEBU 10a4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.840 UTC [gossip.pull] HandleMessage -> DEBU 10a5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.840 UTC [msp] DeserializeIdentity -> DEBU 10a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.842 UTC [msp] DeserializeIdentity -> DEBU 10ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.842 UTC [gossip.pull] SendDigest -> DEBU 10ac Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:42.842 UTC [gossip.gossip] handleMessage -> DEBU 10ad Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [gossip.comm] func1 -> DEBU 10ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [gossip.gossip] handleMessage -> DEBU 10af Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [gossip.gossip] handleMessage -> DEBU 10b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.846 UTC [msp] DeserializeIdentity -> DEBU 10b3 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 114e 0xc00036ba60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 114f 0xc00036ba60 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 1150 0xc00036ba60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 1151 0xc00036ba60 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:22.737 UTC [cauthdsl] func1 -> DEBU 1152 0xc00036ba60 gate 1569287122736787000 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1153 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1154 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] func1 -> DEBU 1155 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1156 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1157 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1158 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [policies] Evaluate -> DEBU 1159 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [policies] Evaluate -> DEBU 115a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [cauthdsl] func1 -> DEBU 115b 0xc000178d90 gate 1569287122739317500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [cauthdsl] func2 -> DEBU 115c 0xc000178d90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [cauthdsl] func2 -> DEBU 115d 0xc000178d90 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:22.739 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 115e Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:22.740 UTC [msp] Validate -> DEBU 115f MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:22.740 UTC [cauthdsl] func2 -> DEBU 1160 0xc000178d90 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:22.740 UTC [msp.identity] Verify -> DEBU 1161 Verify: digest = 00000000 59 6d 0d 79 67 7f d8 a6 b7 40 9a 8d 0a 9b 0a 2d |Ym.yg....@.....-| +orderer0.example.com | 00000010 8d ca 86 7b 53 41 60 a9 2b a6 46 cb c4 2f 9b e9 |...{SA`.+.F../..|" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [msp.identity] Verify -> DEBU 1162 Verify: sig = 00000000 30 45 02 21 00 d0 41 1f 00 3f ec 3d 56 2d 2b 5f |0E.!..A..?.=V-+_| +orderer0.example.com | 00000010 fb 24 99 5c e8 98 38 2e c4 cc 49 a4 60 69 d8 4e |.$.\..8...I.`i.N| +orderer0.example.com | 00000020 07 41 c3 e3 89 02 20 53 a2 fa 8b 49 b1 fe 3a 0a |.A.... S...I..:.| +orderer0.example.com | 00000030 5b 66 d2 57 e2 7f 1d ee c2 ef 09 db 5b 07 c4 17 |[f.W........[...| +orderer0.example.com | 00000040 b2 74 72 77 48 6e 93 |.trwHn.|" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [cauthdsl] func2 -> DEBU 1163 0xc000178d90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [cauthdsl] func1 -> DEBU 1164 0xc000178d90 gate 1569287122739317500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1165 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1166 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1167 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 1168 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 1169 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 116a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:22.742 UTC [common.deliver] deliverBlocks -> DEBU 116b [channel: businesschannel] Received seekInfo (0xc0008ef240) start: > stop: > from 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.742 UTC [fsblkstorage] Next -> DEBU 116c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [fsblkstorage] newBlockfileStream -> DEBU 116d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 116e Remaining bytes=[3986], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 116f Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1170 blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [common.deliver] deliverBlocks -> DEBU 1171 [channel: businesschannel] Delivering block for (0xc0008ef240) for 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.743 UTC [common.deliver] deliverBlocks -> DEBU 1172 [channel: businesschannel] Done delivering to 172.18.0.5:53830 for (0xc0008ef240)" +orderer0.example.com | "2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1173 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1174 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:22.744 UTC [common.deliver] Handle -> DEBU 1175 Waiting for new SeekInfo from 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.744 UTC [common.deliver] Handle -> DEBU 1176 Attempting to read seek info message from 172.18.0.5:53830" +orderer0.example.com | "2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1177 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:22.745 UTC [fsblkstorage] waitForBlock -> DEBU 1178 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:22.748 UTC [common.deliver] Handle -> WARN 1179 Error reading from 172.18.0.5:53830: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:22.748 UTC [orderer.common.server] func1 -> DEBU 117a Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:22.748 UTC [grpc] infof -> DEBU 117c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:22.748 UTC [comm.grpc.server] 1 -> INFO 117b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53830 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6727ms +orderer0.example.com | "2019-09-24 01:05:23.008 UTC [orderer.common.server] Deliver -> DEBU 117d Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.008 UTC [common.deliver] Handle -> DEBU 117e Starting new deliver loop for 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.008 UTC [common.deliver] Handle -> DEBU 117f Attempting to read seek info message from 172.18.0.5:53832" +peer0.org1.example.com | "2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.847 UTC [policies] Evaluate -> DEBU 10b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.847 UTC [policies] Evaluate -> DEBU 10b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [policies] Evaluate -> DEBU 10b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func1 -> DEBU 10ba 0xc0029f30b0 gate 1569287082848236800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bb 0xc0029f30b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bc 0xc0029f30b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bd 0xc0029f30b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10be 0xc0029f30b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.848 UTC [cauthdsl] func1 -> DEBU 10bf 0xc0029f30b0 gate 1569287082848236800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [cauthdsl] func1 -> DEBU 10c3 0xc0029f3950 gate 1569287082849415400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c4 0xc0029f3950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c5 0xc0029f3950 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0029f3950 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.849 UTC [msp.identity] Verify -> DEBU 10c7 Verify: digest = 00000000 91 d6 5e cb 4a 9f 34 25 b9 bf 7c 1a 02 f7 89 62 |..^.J.4%..|....b| +peer0.org1.example.com | 00000010 31 f8 7a 1a 35 35 95 84 46 50 fb d1 66 97 61 2c |1.z.55..FP..f.a,|" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [msp.identity] Verify -> DEBU 10c8 Verify: sig = 00000000 30 45 02 21 00 87 57 ae 0d 02 5f 43 29 46 c6 f9 |0E.!..W..._C)F..| +peer0.org1.example.com | 00000010 c2 8a 9a 19 ed 7d 5b cc a7 a4 e8 cc ed 44 5b c4 |.....}[......D[.| +peer0.org1.example.com | 00000020 d3 c4 9d 21 d8 02 20 02 97 76 37 27 51 03 fb 02 |...!.. ..v7'Q...| +peer0.org1.example.com | 00000030 36 e8 c7 9c 4d 44 f0 75 2a 7c 2e 7f 7d e4 ea 38 |6...MD.u*|..}..8| +peer0.org1.example.com | 00000040 90 57 bf cb c4 b7 75 |.W....u|" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0029f3950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0029f3950 gate 1569287082849415400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.851 UTC [policies] Evaluate -> DEBU 10ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 10cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 10d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10d6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [gossip.discovery] sendMemResponse -> DEBU 10d7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10da Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.853 UTC [gossip.comm] Send -> DEBU 10db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.853 UTC [gossip.discovery] sendMemResponse -> DEBU 10dc Exiting, replying with alive: alive:\247*\251\355p\205\335\031\275\265u" > alive: alive: " +peer0.org1.example.com | "2019-09-24 01:04:42.853 UTC [gossip.comm] sendToEndpoint -> DEBU 10dd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.853 UTC [gossip.comm] sendToEndpoint -> DEBU 10de Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.878 UTC [gossip.pull] Hello -> DEBU 10df Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:42.878 UTC [gossip.comm] Send -> DEBU 10e0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.pull] Hello -> DEBU 10e1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] Send -> DEBU 10e2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.pull] Hello -> DEBU 10e3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] Send -> DEBU 10e5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10ea Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.880 UTC [gossip.comm] func1 -> DEBU 10eb Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.880 UTC [gossip.gossip] handleMessage -> DEBU 10ec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.880 UTC [gossip.pull] HandleMessage -> DEBU 10ed GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.880 UTC [gossip.gossip] handleMessage -> DEBU 10ee Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.881 UTC [gossip.comm] func1 -> DEBU 10ef Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.881 UTC [gossip.gossip] handleMessage -> DEBU 10f0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.881 UTC [gossip.pull] HandleMessage -> DEBU 10f1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.881 UTC [gossip.gossip] handleMessage -> DEBU 10f2 Exiting" +orderer0.example.com | "2019-09-24 01:05:23.010 UTC [policies] Evaluate -> DEBU 1180 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1181 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1182 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1183 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1184 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func1 -> DEBU 1185 0xc0002b7a50 gate 1569287123012040000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1186 0xc0002b7a50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1187 0xc0002b7a50 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1188 0xc0002b7a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1189 0xc0002b7a50 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [cauthdsl] func1 -> DEBU 118a 0xc0002b7a50 gate 1569287123012040000 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.013 UTC [cauthdsl] func1 -> DEBU 118e 0xc00044a2a0 gate 1569287123013446300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.013 UTC [cauthdsl] func2 -> DEBU 118f 0xc00044a2a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.013 UTC [cauthdsl] func2 -> DEBU 1190 0xc00044a2a0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.014 UTC [cauthdsl] func2 -> DEBU 1191 0xc00044a2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.014 UTC [cauthdsl] func2 -> DEBU 1192 0xc00044a2a0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.014 UTC [cauthdsl] func1 -> DEBU 1193 0xc00044a2a0 gate 1569287123013446300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.014 UTC [policies] Evaluate -> DEBU 1194 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.014 UTC [policies] Evaluate -> DEBU 1195 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.015 UTC [policies] func1 -> DEBU 1196 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1197 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1198 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 119a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.016 UTC [policies] Evaluate -> DEBU 119b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.016 UTC [cauthdsl] func1 -> DEBU 119c 0xc00044af90 gate 1569287123016672400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.016 UTC [cauthdsl] func2 -> DEBU 119d 0xc00044af90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.016 UTC [cauthdsl] func2 -> DEBU 119e 0xc00044af90 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [cauthdsl] func2 -> DEBU 119f 0xc00044af90 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [msp.identity] Verify -> DEBU 11a0 Verify: digest = 00000000 11 51 4b 7a 59 e4 ee 59 3a 4e e8 c3 7f fe 2c d4 |.QKzY..Y:N....,.| +orderer0.example.com | 00000010 a1 0c 34 f3 c3 c0 81 f9 64 95 67 e9 03 ef 43 26 |..4.....d.g...C&|" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [msp.identity] Verify -> DEBU 11a1 Verify: sig = 00000000 30 44 02 20 1e 0e 44 b6 da 69 07 14 91 76 d2 bb |0D. ..D..i...v..| +orderer0.example.com | 00000010 35 81 d2 6c 7f 68 a1 fe 86 a5 df c7 23 21 a8 75 |5..l.h......#!.u| +orderer0.example.com | 00000020 05 31 1b c2 02 20 0d f8 5f 2d 7a 69 ab 7e 3d b1 |.1... .._-zi.~=.| +orderer0.example.com | 00000030 fa 97 57 d4 99 d3 90 59 d5 e8 22 15 96 03 e6 95 |..W....Y..".....| +orderer0.example.com | 00000040 7d 20 6f 7d f4 42 |} o}.B|" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [cauthdsl] func2 -> DEBU 11a2 0xc00044af90 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00044af90 gate 1569287123016672400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [policies] Evaluate -> DEBU 11a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.017 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a6 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a8 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.018 UTC [common.deliver] deliverBlocks -> DEBU 11aa [channel: businesschannel] Received seekInfo (0xc0008efb80) start: > stop: > from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.019 UTC [fsblkstorage] Next -> DEBU 11ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:23.019 UTC [fsblkstorage] newBlockfileStream -> DEBU 11ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +orderer0.example.com | "2019-09-24 01:05:23.019 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11ad Remaining bytes=[3986], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.020 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11ae Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:23.020 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11af blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.020 UTC [common.deliver] deliverBlocks -> DEBU 11b0 [channel: businesschannel] Delivering block for (0xc0008efb80) for 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.020 UTC [common.deliver] deliverBlocks -> DEBU 11b1 [channel: businesschannel] Done delivering to 172.18.0.5:53832 for (0xc0008efb80)" +orderer0.example.com | "2019-09-24 01:05:23.021 UTC [fsblkstorage] waitForBlock -> DEBU 11b2 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.021 UTC [fsblkstorage] waitForBlock -> DEBU 11b3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.023 UTC [fsblkstorage] waitForBlock -> DEBU 11b4 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.023 UTC [fsblkstorage] waitForBlock -> DEBU 11b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.021 UTC [common.deliver] Handle -> DEBU 11b6 Waiting for new SeekInfo from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.023 UTC [common.deliver] Handle -> DEBU 11b7 Attempting to read seek info message from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11bd 0xc0001d0c40 gate 1569287123024573800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11be 0xc0001d0c40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11bf 0xc0001d0c40 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c0 0xc0001d0c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c1 0xc0001d0c40 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11c2 0xc0001d0c40 gate 1569287123024573800 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0001d1480 gate 1569287123024856200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0001d1480 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0001d1480 processing identity 0 with bytes of fd4750" +peer0.org1.example.com | "2019-09-24 01:04:42.883 UTC [gossip.comm] func1 -> DEBU 10f3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.883 UTC [gossip.gossip] handleMessage -> DEBU 10f4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.884 UTC [gossip.pull] HandleMessage -> DEBU 10f5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.884 UTC [gossip.gossip] handleMessage -> DEBU 10f6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.890 UTC [msp] GetDefaultSigningIdentity -> DEBU 10f7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:42.890 UTC [msp.identity] Sign -> DEBU 10f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151014 " +peer0.org1.example.com | "2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10f9 Sign: digest: 7CDC33BF059C1B26C908E49DA1828635F92D04856F2AFA1A12D4F9938B1C97A4 " +peer0.org1.example.com | "2019-09-24 01:04:42.891 UTC [msp] GetDefaultSigningIdentity -> DEBU 10fa Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:42.892 UTC [gossip.comm] Send -> DEBU 10fd Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.892 UTC [msp] DeserializeIdentity -> DEBU 10fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.892 UTC [gossip.comm] Send -> DEBU 10ff Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.892 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.893 UTC [gossip.comm] Send -> DEBU 1101 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1102 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1103 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1104 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1106 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1105 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.901 UTC [gossip.comm] sendToEndpoint -> DEBU 1107 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.914 UTC [gossip.comm] func1 -> DEBU 1108 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.914 UTC [gossip.gossip] handleMessage -> DEBU 1109 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.914 UTC [gossip.gossip] handleMessage -> DEBU 110a Exiting" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0001d1480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0001d1480 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0001d1480 gate 1569287123024856200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] func1 -> DEBU 11ce Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cf Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11d4 0xc0009461a0 gate 1569287123025334600 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0009461a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d6 0xc0009461a0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d7 0xc0009461a0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [msp.identity] Verify -> DEBU 11d8 Verify: digest = 00000000 f4 82 a7 c7 02 19 6d 03 39 db 43 c5 aa 56 4a ed |......m.9.C..VJ.| +orderer0.example.com | 00000010 61 85 e1 20 b2 a4 40 77 5d 92 02 03 71 bc bd c1 |a.. ..@w]...q...|" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [msp.identity] Verify -> DEBU 11d9 Verify: sig = 00000000 30 44 02 20 09 cf fe 87 1c d8 0f 08 aa 52 0e 36 |0D. .........R.6| +orderer0.example.com | 00000010 02 2d 2f 54 a6 b4 dd c5 85 4d 9b bb 99 37 2d c1 |.-/T.....M...7-.| +orderer0.example.com | 00000020 ec 51 77 60 02 20 0b e0 e8 dc 8b c6 12 21 7d 19 |.Qw`. .......!}.| +orderer0.example.com | 00000030 75 c7 e1 11 b6 cf bc 23 bd 32 33 9a 40 60 b0 ed |u......#.23.@`..| +orderer0.example.com | 00000040 d0 ed 8d 4c 6b 7f |...Lk.|" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11da 0xc0009461a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11db 0xc0009461a0 gate 1569287123025334600 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11de Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11e0 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.025 UTC [common.deliver] deliverBlocks -> DEBU 11e2 [channel: businesschannel] Received seekInfo (0xc0008efe40) start: > stop: > from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] Next -> DEBU 11e3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org1.example.com | "2019-09-24 01:04:42.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 110b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 110c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.915 UTC [msp.identity] Verify -> DEBU 110d Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +peer0.org1.example.com | 00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +peer0.org1.example.com | "2019-09-24 01:04:42.915 UTC [msp.identity] Verify -> DEBU 110e Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +peer0.org1.example.com | 00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +peer0.org1.example.com | 00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +peer0.org1.example.com | 00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +peer0.org1.example.com | 00000040 98 8c 58 2b 40 8a |..X+@.|" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 110f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [gossip.discovery] isSentByMe -> DEBU 1110 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 1111 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1112 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [msp.identity] Verify -> DEBU 1113 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +peer0.org1.example.com | 00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +peer0.org1.example.com | "2019-09-24 01:04:42.916 UTC [msp.identity] Verify -> DEBU 1114 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +peer0.org1.example.com | 00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +peer0.org1.example.com | 00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +peer0.org1.example.com | 00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +peer0.org1.example.com | 00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 1115 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 1116 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1117 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 1118 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 1119 Got message: GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 111a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.918 UTC [gossip.gossip] handleMessage -> DEBU 111b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.918 UTC [gossip.pull] HandleMessage -> DEBU 111c GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.918 UTC [msp] DeserializeIdentity -> DEBU 111d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.918 UTC [msp] DeserializeIdentity -> DEBU 111e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 111f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1120 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [gossip.pull] SendDigest -> DEBU 1123 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:42.919 UTC [gossip.gossip] handleMessage -> DEBU 1124 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1125 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1126 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1127 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1128 Got message: GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Remaining bytes=[37977], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e7 blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Delivering block for (0xc0008efe40) for 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [common.deliver] deliverBlocks -> DEBU 11e9 [channel: businesschannel] Done delivering to 172.18.0.5:53832 for (0xc0008efe40)" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [common.deliver] Handle -> DEBU 11ea Waiting for new SeekInfo from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [common.deliver] Handle -> DEBU 11eb Attempting to read seek info message from 172.18.0.5:53832" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] waitForBlock -> DEBU 11ec Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.026 UTC [fsblkstorage] waitForBlock -> DEBU 11ed Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.028 UTC [fsblkstorage] waitForBlock -> DEBU 11ee Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.028 UTC [fsblkstorage] waitForBlock -> DEBU 11ef Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.037 UTC [grpc] infof -> DEBU 11f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.039 UTC [common.deliver] Handle -> WARN 11f1 Error reading from 172.18.0.5:53832: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:23.039 UTC [orderer.common.server] func1 -> DEBU 11f2 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.039 UTC [comm.grpc.server] 1 -> INFO 11f3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53832 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.9535ms +orderer0.example.com | "2019-09-24 01:05:23.156 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f5 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2019-09-24 01:05:23.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +orderer0.example.com | "2019-09-24 01:05:23.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2019-09-24 01:05:23.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f8 Sending msg of 28 bytes to 3 on channel businesschannel took 138.8µs" +orderer0.example.com | "2019-09-24 01:05:23.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.6µs " +orderer0.example.com | "2019-09-24 01:05:23.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.5µs " +orderer0.example.com | "2019-09-24 01:05:23.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [orderer.common.server] Deliver -> DEBU 11fd Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [common.deliver] Handle -> DEBU 11fe Starting new deliver loop for 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [common.deliver] Handle -> DEBU 11ff Attempting to read seek info message from 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1200 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1201 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1202 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.188 UTC [policies] Evaluate -> DEBU 1203 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.188 UTC [policies] Evaluate -> DEBU 1204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.188 UTC [cauthdsl] func1 -> DEBU 1205 0xc0009672b0 gate 1569287123188550800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.188 UTC [cauthdsl] func2 -> DEBU 1206 0xc0009672b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1207 0xc0009672b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1208 0xc0009672b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1209 0xc0009672b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.190 UTC [cauthdsl] func1 -> DEBU 120a 0xc0009672b0 gate 1569287123188550800 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.191 UTC [cauthdsl] func1 -> DEBU 120e 0xc000967ba0 gate 1569287123191168500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 120f 0xc000967ba0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 1210 0xc000967ba0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 1211 0xc000967ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.192 UTC [cauthdsl] func2 -> DEBU 1212 0xc000967ba0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.192 UTC [cauthdsl] func1 -> DEBU 1213 0xc000967ba0 gate 1569287123191168500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1214 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1129 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.920 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 112b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 112c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 112d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 112e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 112f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 1130 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.922 UTC [cauthdsl] func1 -> DEBU 1131 0xc002854230 gate 1569287082922082300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1132 0xc002854230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1133 0xc002854230 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1134 0xc002854230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1135 0xc002854230 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [cauthdsl] func1 -> DEBU 1136 0xc002854230 gate 1569287082922082300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1137 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [cauthdsl] func1 -> DEBU 113a 0xc002854ad0 gate 1569287082923534100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.923 UTC [cauthdsl] func2 -> DEBU 113b 0xc002854ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.924 UTC [cauthdsl] func2 -> DEBU 113c 0xc002854ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.924 UTC [cauthdsl] func2 -> DEBU 113d 0xc002854ad0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.925 UTC [msp.identity] Verify -> DEBU 113e Verify: digest = 00000000 1a db 6a d3 41 62 be a5 56 75 3e c6 44 3e 12 a2 |..j.Ab..Vu>.D>..| +peer0.org1.example.com | 00000010 fb 08 a9 9c 4f d9 c3 7f f0 f8 fc a0 7f 17 42 9c |....O.........B.|" +peer0.org1.example.com | "2019-09-24 01:04:42.925 UTC [msp.identity] Verify -> DEBU 113f Verify: sig = 00000000 30 44 02 20 75 04 e8 d9 12 04 bf 2b 43 f1 8e 45 |0D. u......+C..E| +peer0.org1.example.com | 00000010 52 db 3e 9e f2 99 70 5d e7 d7 32 d2 4e 73 b7 42 |R.>...p]..2.Ns.B| +peer0.org1.example.com | 00000020 15 24 e9 8f 02 20 5c 04 8e 49 18 d8 9d bc 29 e1 |.$... \..I....).| +peer0.org1.example.com | 00000030 66 0c 71 b1 fe de 9c 91 e0 a1 a3 6e c6 a8 fb 26 |f.q........n...&| +peer0.org1.example.com | 00000040 3d 22 56 b6 df ad |="V...|" +peer0.org1.example.com | "2019-09-24 01:04:42.925 UTC [cauthdsl] func2 -> DEBU 1140 0xc002854ad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.925 UTC [cauthdsl] func1 -> DEBU 1141 0xc002854ad0 gate 1569287082923534100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1143 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1144 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1145 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1146 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 1147 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 1148 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1215 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] func1 -> DEBU 1216 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1217 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1218 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.194 UTC [policies] Evaluate -> DEBU 121a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.194 UTC [policies] Evaluate -> DEBU 121b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.194 UTC [cauthdsl] func1 -> DEBU 121c 0xc0003b3f50 gate 1569287123194272400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.194 UTC [cauthdsl] func2 -> DEBU 121d 0xc0003b3f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.194 UTC [cauthdsl] func2 -> DEBU 121e 0xc0003b3f50 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.195 UTC [cauthdsl] func2 -> DEBU 121f 0xc0003b3f50 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.195 UTC [msp.identity] Verify -> DEBU 1220 Verify: digest = 00000000 ab f6 6d 11 a8 27 5f 87 f8 61 72 ce 0e 61 90 d1 |..m..'_..ar..a..| +orderer0.example.com | 00000010 2d e5 2e ec 3e 0b 30 e4 99 1b e9 f8 b0 f1 c6 a2 |-...>.0.........|" +orderer0.example.com | "2019-09-24 01:05:23.195 UTC [msp.identity] Verify -> DEBU 1221 Verify: sig = 00000000 30 45 02 21 00 bd d2 05 39 bb 04 aa a0 cc 5d bb |0E.!....9.....].| +orderer0.example.com | 00000010 67 68 23 f1 6f 18 71 27 d2 de 28 82 21 1d 08 f1 |gh#.o.q'..(.!...| +orderer0.example.com | 00000020 0c 1d c5 2b 9a 02 20 2b 3d 14 74 d0 be 1a ee 07 |...+.. +=.t.....| +orderer0.example.com | 00000030 f7 14 a8 23 7c 39 23 56 86 4b ea 34 f9 3b 38 6c |...#|9#V.K.4.;8l| +orderer0.example.com | 00000040 21 51 d7 f4 a2 35 c5 |!Q...5.|" +orderer0.example.com | "2019-09-24 01:05:23.196 UTC [cauthdsl] func2 -> DEBU 1222 0xc0003b3f50 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.196 UTC [cauthdsl] func1 -> DEBU 1223 0xc0003b3f50 gate 1569287123194272400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1224 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1225 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1227 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1228 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.198 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.198 UTC [common.deliver] deliverBlocks -> DEBU 122a [channel: businesschannel] Received seekInfo (0xc0000891c0) start: > stop: > from 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.198 UTC [fsblkstorage] Next -> DEBU 122b Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:23.198 UTC [fsblkstorage] newBlockfileStream -> DEBU 122c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Remaining bytes=[89262], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122f blockbytes [25804] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.200 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Delivering block for (0xc0000891c0) for 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.200 UTC [common.deliver] deliverBlocks -> DEBU 1231 [channel: businesschannel] Done delivering to 172.18.0.5:53834 for (0xc0000891c0)" +orderer0.example.com | "2019-09-24 01:05:23.201 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.202 UTC [fsblkstorage] waitForBlock -> DEBU 1233 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.202 UTC [fsblkstorage] waitForBlock -> DEBU 1234 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 1235 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.202 UTC [common.deliver] Handle -> DEBU 1236 Waiting for new SeekInfo from 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.204 UTC [common.deliver] Handle -> DEBU 1237 Attempting to read seek info message from 172.18.0.5:53834" +orderer0.example.com | "2019-09-24 01:05:23.208 UTC [common.deliver] Handle -> WARN 1238 Error reading from 172.18.0.5:53834: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:23.209 UTC [orderer.common.server] func1 -> DEBU 1239 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.209 UTC [comm.grpc.server] 1 -> INFO 123a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53834 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.4976ms +orderer0.example.com | "2019-09-24 01:05:23.211 UTC [grpc] infof -> DEBU 123b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.361 UTC [orderer.common.server] Deliver -> DEBU 123c Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.361 UTC [common.deliver] Handle -> DEBU 123d Starting new deliver loop for 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.362 UTC [common.deliver] Handle -> DEBU 123e Attempting to read seek info message from 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 123f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 1240 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 1241 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.365 UTC [policies] Evaluate -> DEBU 1242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.365 UTC [policies] Evaluate -> DEBU 1243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.366 UTC [cauthdsl] func1 -> DEBU 1244 0xc00097fbb0 gate 1569287123366372400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1245 0xc00097fbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 1149 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 114a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 114b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 114c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 114d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1150 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.925 UTC [gossip.comm] func1 -> DEBU 1142 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.discovery] sendMemResponse -> DEBU 1151 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [msp] DeserializeIdentity -> DEBU 1154 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [msp] DeserializeIdentity -> DEBU 1155 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [msp] DeserializeIdentity -> DEBU 1156 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [gossip.comm] Send -> DEBU 1157 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [gossip.discovery] sendMemResponse -> DEBU 1158 Exiting, replying with alive: alive: alive:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > alive: " +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [gossip.comm] sendToEndpoint -> DEBU 1159 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [gossip.comm] sendToEndpoint -> DEBU 115a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [gossip.gossip] handleMessage -> DEBU 1152 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [gossip.gossip] handleMessage -> DEBU 115b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.927 UTC [msp.identity] Verify -> DEBU 1153 Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +peer0.org1.example.com | 00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +peer0.org1.example.com | "2019-09-24 01:04:42.928 UTC [msp.identity] Verify -> DEBU 115c Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +peer0.org1.example.com | 00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +peer0.org1.example.com | 00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +peer0.org1.example.com | 00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +peer0.org1.example.com | 00000040 98 8c 58 2b 40 8a |..X+@.|" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [msp.identity] Verify -> DEBU 115d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [msp.identity] Verify -> DEBU 115e Verify: sig = 00000000 30 45 02 21 00 d3 33 ba 27 aa f8 d6 67 d9 14 11 |0E.!..3.'...g...| +peer0.org1.example.com | 00000010 6d 56 26 b2 99 0a d8 68 09 61 94 3a 00 af a4 bc |mV&....h.a.:....| +peer0.org1.example.com | 00000020 93 9a 2c 1f f0 02 20 2c 82 b4 f9 78 f6 20 0e ea |..,... ,...x. ..| +peer0.org1.example.com | 00000030 66 1a 35 97 79 66 5c c4 8c 62 d4 59 27 17 ce fc |f.5.yf\..b.Y'...| +peer0.org1.example.com | 00000040 a9 d9 19 08 14 c5 3a |......:|" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 115f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.discovery] isSentByMe -> DEBU 1160 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 1161 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1162 Exiting" +orderer0.example.com | "2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1246 0xc00097fbb0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1247 0xc00097fbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.367 UTC [cauthdsl] func2 -> DEBU 1248 0xc00097fbb0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [cauthdsl] func1 -> DEBU 1249 0xc00097fbb0 gate 1569287123366372400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [cauthdsl] func1 -> DEBU 124d 0xc000d0e3f0 gate 1569287123368854300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [cauthdsl] func2 -> DEBU 124e 0xc000d0e3f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.368 UTC [cauthdsl] func2 -> DEBU 124f 0xc000d0e3f0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.369 UTC [cauthdsl] func2 -> DEBU 1250 0xc000d0e3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.369 UTC [cauthdsl] func2 -> DEBU 1251 0xc000d0e3f0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.369 UTC [cauthdsl] func1 -> DEBU 1252 0xc000d0e3f0 gate 1569287123368854300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.369 UTC [policies] Evaluate -> DEBU 1253 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] func1 -> DEBU 1255 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1256 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.371 UTC [policies] Evaluate -> DEBU 125a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.371 UTC [cauthdsl] func1 -> DEBU 125b 0xc000d0f0e0 gate 1569287123371529500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.371 UTC [cauthdsl] func2 -> DEBU 125c 0xc000d0f0e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.372 UTC [cauthdsl] func2 -> DEBU 125d 0xc000d0f0e0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.372 UTC [cauthdsl] func2 -> DEBU 125e 0xc000d0f0e0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.372 UTC [msp.identity] Verify -> DEBU 125f Verify: digest = 00000000 30 0c 55 c4 23 3f 94 8e da 0c 61 83 2b 95 a4 52 |0.U.#?....a.+..R| +orderer0.example.com | 00000010 26 fb 4f 1b 1b 95 fb b5 f2 3b 64 11 82 96 f6 43 |&.O......;d....C|" +orderer0.example.com | "2019-09-24 01:05:23.373 UTC [msp.identity] Verify -> DEBU 1260 Verify: sig = 00000000 30 44 02 20 24 10 9c 0f 02 33 a8 b5 4b 44 a1 66 |0D. $....3..KD.f| +orderer0.example.com | 00000010 bb 1b 05 db c4 f7 95 ab 27 49 1e e2 68 a8 1d d3 |........'I..h...| +orderer0.example.com | 00000020 ca 70 ff 7a 02 20 49 0c 5c 7b cc 72 3a 20 d4 21 |.p.z. I.\{.r: .!| +orderer0.example.com | 00000030 57 7d 5d d8 4b 0d 49 2d ee f8 1d 49 5f 13 e3 e3 |W}].K.I-...I_...| +orderer0.example.com | 00000040 85 1d 72 d6 99 49 |..r..I|" +orderer0.example.com | "2019-09-24 01:05:23.373 UTC [cauthdsl] func2 -> DEBU 1261 0xc000d0f0e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.374 UTC [cauthdsl] func1 -> DEBU 1262 0xc000d0f0e0 gate 1569287123371529500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1263 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1264 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1265 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1267 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [common.deliver] deliverBlocks -> DEBU 1269 [channel: businesschannel] Received seekInfo (0xc000089e00) start: > stop: > from 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [fsblkstorage] Next -> DEBU 126a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [fsblkstorage] newBlockfileStream -> DEBU 126b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +orderer0.example.com | "2019-09-24 01:05:23.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126c Remaining bytes=[63455], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126d Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +orderer0.example.com | "2019-09-24 01:05:23.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126e blockbytes [25475] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.378 UTC [common.deliver] deliverBlocks -> DEBU 126f [channel: businesschannel] Delivering block for (0xc000089e00) for 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.379 UTC [common.deliver] deliverBlocks -> DEBU 1270 [channel: businesschannel] Done delivering to 172.18.0.5:53836 for (0xc000089e00)" +orderer0.example.com | "2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1271 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1272 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1273 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1274 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.380 UTC [common.deliver] Handle -> DEBU 1275 Waiting for new SeekInfo from 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.380 UTC [common.deliver] Handle -> DEBU 1276 Attempting to read seek info message from 172.18.0.5:53836" +orderer0.example.com | "2019-09-24 01:05:23.387 UTC [common.deliver] Handle -> WARN 1278 Error reading from 172.18.0.5:53836: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1163 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1164 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.930 UTC [msp.identity] Verify -> DEBU 1165 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +peer0.org1.example.com | 00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +peer0.org1.example.com | "2019-09-24 01:04:42.930 UTC [msp.identity] Verify -> DEBU 1166 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +peer0.org1.example.com | 00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +peer0.org1.example.com | 00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +peer0.org1.example.com | 00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +peer0.org1.example.com | 00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +peer0.org1.example.com | "2019-09-24 01:04:42.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 1167 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1169 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.930 UTC [gossip.gossip] handleMessage -> DEBU 1168 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 116a Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.932 UTC [msp.identity] Verify -> DEBU 116b Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +peer0.org1.example.com | 00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +peer0.org1.example.com | "2019-09-24 01:04:42.932 UTC [msp.identity] Verify -> DEBU 116c Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +peer0.org1.example.com | 00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +peer0.org1.example.com | 00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +peer0.org1.example.com | 00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +peer0.org1.example.com | 00000040 98 8c 58 2b 40 8a |..X+@.|" +peer0.org1.example.com | "2019-09-24 01:04:42.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 116d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.932 UTC [gossip.discovery] isSentByMe -> DEBU 116e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 116f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1170 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:42.933 UTC [msp] DeserializeIdentity -> DEBU 1171 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1172 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1174 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1175 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1176 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1177 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func1 -> DEBU 1178 0xc0027f5f50 gate 1569287082935147600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 1179 0xc0027f5f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117a 0xc0027f5f50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117b 0xc0027f5f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117c 0xc0027f5f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.935 UTC [cauthdsl] func1 -> DEBU 117d 0xc0027f5f50 gate 1569287082935147600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 117e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 117f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 1180 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [cauthdsl] func1 -> DEBU 1181 0xc00278c7e0 gate 1569287082936623300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [cauthdsl] func2 -> DEBU 1182 0xc00278c7e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:42.936 UTC [cauthdsl] func2 -> DEBU 1183 0xc00278c7e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [cauthdsl] func2 -> DEBU 1184 0xc00278c7e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [msp.identity] Verify -> DEBU 1185 Verify: digest = 00000000 91 d6 5e cb 4a 9f 34 25 b9 bf 7c 1a 02 f7 89 62 |..^.J.4%..|....b| +peer0.org1.example.com | 00000010 31 f8 7a 1a 35 35 95 84 46 50 fb d1 66 97 61 2c |1.z.55..FP..f.a,|" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [msp.identity] Verify -> DEBU 1186 Verify: sig = 00000000 30 45 02 21 00 87 57 ae 0d 02 5f 43 29 46 c6 f9 |0E.!..W..._C)F..| +peer0.org1.example.com | 00000010 c2 8a 9a 19 ed 7d 5b cc a7 a4 e8 cc ed 44 5b c4 |.....}[......D[.| +peer0.org1.example.com | 00000020 d3 c4 9d 21 d8 02 20 02 97 76 37 27 51 03 fb 02 |...!.. ..v7'Q...| +peer0.org1.example.com | 00000030 36 e8 c7 9c 4d 44 f0 75 2a 7c 2e 7f 7d e4 ea 38 |6...MD.u*|..}..8| +peer0.org1.example.com | 00000040 90 57 bf cb c4 b7 75 |.W....u|" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [cauthdsl] func2 -> DEBU 1187 0xc00278c7e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [cauthdsl] func1 -> DEBU 1188 0xc00278c7e0 gate 1569287082936623300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [policies] Evaluate -> DEBU 1189 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.937 UTC [policies] Evaluate -> DEBU 118a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.938 UTC [policies] Evaluate -> DEBU 118b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.938 UTC [policies] Evaluate -> DEBU 118c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:42.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 118d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:42.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 118e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:42.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.584 UTC [gossip.comm] func1 -> DEBU 1190 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.585 UTC [gossip.gossip] handleMessage -> DEBU 1191 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.585 UTC [gossip.gossip] handleMessage -> DEBU 1192 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1193 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1194 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:43.587 UTC [msp.identity] Verify -> DEBU 1195 Verify: digest = 00000000 09 d8 73 e6 5e a2 4b 91 17 f8 30 a9 59 83 ac 5b |..s.^.K...0.Y..[| +peer0.org1.example.com | 00000010 15 f6 c5 27 71 8b 48 30 ac fb 5a 23 ec 6c 90 e0 |...'q.H0..Z#.l..|" +peer0.org1.example.com | "2019-09-24 01:04:43.587 UTC [msp.identity] Verify -> DEBU 1196 Verify: sig = 00000000 30 44 02 20 5f 92 80 a6 a7 01 ed be 21 cd cc 70 |0D. _.......!..p| +peer0.org1.example.com | 00000010 71 dd 39 6a d3 ee a4 6f 92 af 70 d1 dd 8b 80 cc |q.9j...o..p.....| +peer0.org1.example.com | 00000020 3c 27 45 1a 02 20 17 db fc 89 f0 41 fe 80 03 c6 |<'E.. .....A....| +peer0.org1.example.com | 00000030 73 98 b1 03 d1 69 87 a1 95 71 7f 38 a2 ae af 22 |s....i...q.8..."| +peer0.org1.example.com | 00000040 bf f4 29 62 bf 8a |..)b..|" +peer0.org1.example.com | "2019-09-24 01:04:43.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 1197 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 1198 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:43.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 1199 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:43.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 119a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:43.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 119b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:43.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 119c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 119d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 119e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.592 UTC [msp] DeserializeIdentity -> DEBU 119f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:43.593 UTC [msp] DeserializeIdentity -> DEBU 11a0 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:23.388 UTC [orderer.common.server] func1 -> DEBU 1279 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.388 UTC [comm.grpc.server] 1 -> INFO 127a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1382ms +orderer0.example.com | "2019-09-24 01:05:23.387 UTC [grpc] infof -> DEBU 1277 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.559 UTC [orderer.common.server] Deliver -> DEBU 127b Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.559 UTC [common.deliver] Handle -> DEBU 127c Starting new deliver loop for 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.560 UTC [common.deliver] Handle -> DEBU 127d Attempting to read seek info message from 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 127e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 127f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 1280 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.563 UTC [policies] Evaluate -> DEBU 1281 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.563 UTC [policies] Evaluate -> DEBU 1282 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.563 UTC [cauthdsl] func1 -> DEBU 1283 0xc000d714c0 gate 1569287123563597300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.564 UTC [cauthdsl] func2 -> DEBU 1284 0xc000d714c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.564 UTC [cauthdsl] func2 -> DEBU 1285 0xc000d714c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.565 UTC [cauthdsl] func2 -> DEBU 1286 0xc000d714c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.566 UTC [cauthdsl] func2 -> DEBU 1287 0xc000d714c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.566 UTC [cauthdsl] func1 -> DEBU 1288 0xc000d714c0 gate 1569287123563597300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.566 UTC [policies] Evaluate -> DEBU 1289 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.566 UTC [policies] Evaluate -> DEBU 128a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.567 UTC [policies] Evaluate -> DEBU 128b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.567 UTC [cauthdsl] func1 -> DEBU 128c 0xc000c569d0 gate 1569287123567839700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128d 0xc000c569d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128e 0xc000c569d0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128f 0xc000c569d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.569 UTC [cauthdsl] func2 -> DEBU 1290 0xc000c569d0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.569 UTC [cauthdsl] func1 -> DEBU 1291 0xc000c569d0 gate 1569287123567839700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.569 UTC [policies] Evaluate -> DEBU 1292 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.570 UTC [policies] Evaluate -> DEBU 1293 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.570 UTC [policies] func1 -> DEBU 1294 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1295 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1296 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1298 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.573 UTC [policies] Evaluate -> DEBU 1299 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.573 UTC [cauthdsl] func1 -> DEBU 129a 0xc000c57830 gate 1569287123573263800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.573 UTC [cauthdsl] func2 -> DEBU 129b 0xc000c57830 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.574 UTC [cauthdsl] func2 -> DEBU 129c 0xc000c57830 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.574 UTC [cauthdsl] func2 -> DEBU 129d 0xc000c57830 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.575 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 1d 45 42 46 a9 b9 89 43 fe b2 ec d7 b2 56 ba fc |.EBF...C.....V..| +orderer0.example.com | 00000010 1a 9a 09 90 0d 1a d5 3a ea f8 a5 7a b7 66 ec 66 |.......:...z.f.f|" +orderer0.example.com | "2019-09-24 01:05:23.575 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 c8 b7 40 d1 a5 9f b5 2d f8 fb f4 |0E.!...@....-...| +orderer0.example.com | 00000010 9e 38 5d e6 af 74 5d 99 0b fe d4 46 48 f7 b7 8e |.8]..t]....FH...| +orderer0.example.com | 00000020 1a f2 12 3c 87 02 20 6b 6d af 69 9d 78 b5 2f 6b |...<.. km.i.x./k| +orderer0.example.com | 00000030 93 16 53 b6 65 de 97 81 2f 10 b3 7f b1 cb d3 8c |..S.e.../.......| +orderer0.example.com | 00000040 0b 0d c5 f6 37 70 6b |....7pk|" +orderer0.example.com | "2019-09-24 01:05:23.576 UTC [cauthdsl] func2 -> DEBU 12a0 0xc000c57830 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.577 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000c57830 gate 1569287123573263800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.577 UTC [policies] Evaluate -> DEBU 12a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a4 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.579 UTC [policies] Evaluate -> DEBU 12a6 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.579 UTC [policies] Evaluate -> DEBU 12a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.580 UTC [common.deliver] deliverBlocks -> DEBU 12a8 [channel: businesschannel] Received seekInfo (0xc0008d2b80) start: > stop: > from 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.580 UTC [fsblkstorage] Next -> DEBU 12a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org1.example.com | "2019-09-24 01:04:43.594 UTC [msp] DeserializeIdentity -> DEBU 11a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:43.596 UTC [gossip.comm] Send -> DEBU 11a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:43.596 UTC [msp] DeserializeIdentity -> DEBU 11a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:43.594 UTC [gossip.comm] func1 -> DEBU 11a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.595 UTC [gossip.comm] func1 -> DEBU 11a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.596 UTC [gossip.comm] Send -> DEBU 11a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:43.596 UTC [gossip.comm] sendToEndpoint -> DEBU 11a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.597 UTC [gossip.comm] sendToEndpoint -> DEBU 11a9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.596 UTC [gossip.gossip] handleMessage -> DEBU 11a8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.597 UTC [gossip.gossip] handleMessage -> DEBU 11aa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.598 UTC [gossip.gossip] handleMessage -> DEBU 11ab Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ac Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.597 UTC [gossip.comm] sendToEndpoint -> DEBU 11ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ae Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:43.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 11af Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.599 UTC [gossip.gossip] handleMessage -> DEBU 11b2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:43.864 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 11b3 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 01:04:44.199 UTC [gossip.comm] func1 -> DEBU 11b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.201 UTC [gossip.gossip] handleMessage -> DEBU 11b5 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.201 UTC [gossip.gossip] handleMessage -> DEBU 11b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.202 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11b8 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:44.202 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:44.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:44.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.204 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0026d9de0 gate 1569287084204060500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:44.204 UTC [gossip.comm] func1 -> DEBU 11c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.204 UTC [cauthdsl] func2 -> DEBU 11c3 0xc0026d9de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:44.205 UTC [cauthdsl] func2 -> DEBU 11c4 0xc0026d9de0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:44.204 UTC [gossip.gossip] handleMessage -> DEBU 11c2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.207 UTC [cauthdsl] func2 -> DEBU 11c5 0xc0026d9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:44.207 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0026d9de0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:44.207 UTC [gossip.comm] func1 -> DEBU 11c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.208 UTC [gossip.comm] func1 -> DEBU 11c8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.207 UTC [cauthdsl] func1 -> DEBU 11c9 0xc0026d9de0 gate 1569287084204060500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [cauthdsl] func1 -> DEBU 11cd 0xc002763670 gate 1569287084209673200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11ce 0xc002763670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11cf 0xc002763670 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11d0 0xc002763670 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [gossip.comm] func1 -> DEBU 11d1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.210 UTC [msp.identity] Verify -> DEBU 11d2 Verify: digest = 00000000 8d ab cb 81 88 a2 5c d6 d9 ce 5b 30 38 10 d3 32 |......\...[08..2| +peer0.org1.example.com | 00000010 25 c8 56 6d ac 01 1e 70 b3 c5 cb 5b 1b bd 91 cf |%.Vm...p...[....|" +peer0.org1.example.com | "2019-09-24 01:04:44.211 UTC [msp.identity] Verify -> DEBU 11d3 Verify: sig = 00000000 30 44 02 20 59 8e 78 e9 5a 3b 64 6b d4 32 d2 9d |0D. Y.x.Z;dk.2..| +peer0.org1.example.com | 00000010 f7 e6 49 6e 2b ee f6 20 7e c1 d9 de 78 04 7d 6e |..In+.. ~...x.}n| +peer0.org1.example.com | 00000020 87 b6 ae c3 02 20 2a 1c 53 bb f4 ce 7a b3 ff 1e |..... *.S...z...| +peer0.org1.example.com | 00000030 bd c4 37 b3 de 57 81 4f 28 f0 b2 21 00 09 f8 dc |..7..W.O(..!....| +peer0.org1.example.com | 00000040 fe f9 f3 8e c8 80 |......|" +peer0.org1.example.com | "2019-09-24 01:04:44.211 UTC [cauthdsl] func2 -> DEBU 11d4 0xc002763670 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:44.211 UTC [cauthdsl] func1 -> DEBU 11d5 0xc002763670 gate 1569287084209673200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 11da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 11db Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11dc updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11dd Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11de Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11df Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.214 UTC [gossip.discovery] handleAliveMessage -> DEBU 11e0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.214 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.215 UTC [gossip.gossip] handleMessage -> DEBU 11e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.216 UTC [gossip.gossip] handleMessage -> DEBU 11e4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.215 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.216 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11e7 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:44.217 UTC [msp] DeserializeIdentity -> DEBU 11e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:44.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11ea Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11eb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [cauthdsl] func1 -> DEBU 11ef 0xc002675070 gate 1569287084218478400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [cauthdsl] func2 -> DEBU 11f0 0xc002675070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:44.218 UTC [cauthdsl] func2 -> DEBU 11f1 0xc002675070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [cauthdsl] func2 -> DEBU 11f2 0xc002675070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [cauthdsl] func2 -> DEBU 11f3 0xc002675070 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [cauthdsl] func1 -> DEBU 11f4 0xc002675070 gate 1569287084218478400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:44.220 UTC [cauthdsl] func1 -> DEBU 11f8 0xc0026758b0 gate 1569287084220287400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.581 UTC [fsblkstorage] newBlockfileStream -> DEBU 12aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +orderer0.example.com | "2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ab Remaining bytes=[37977], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ac Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +orderer0.example.com | "2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.582 UTC [common.deliver] deliverBlocks -> DEBU 12ae [channel: businesschannel] Delivering block for (0xc0008d2b80) for 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.583 UTC [common.deliver] deliverBlocks -> DEBU 12af [channel: businesschannel] Done delivering to 172.18.0.5:53838 for (0xc0008d2b80)" +orderer0.example.com | "2019-09-24 01:05:23.584 UTC [fsblkstorage] waitForBlock -> DEBU 12b0 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.584 UTC [fsblkstorage] waitForBlock -> DEBU 12b1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.585 UTC [fsblkstorage] waitForBlock -> DEBU 12b2 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.585 UTC [fsblkstorage] waitForBlock -> DEBU 12b3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.585 UTC [common.deliver] Handle -> DEBU 12b4 Waiting for new SeekInfo from 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.587 UTC [common.deliver] Handle -> DEBU 12b5 Attempting to read seek info message from 172.18.0.5:53838" +orderer0.example.com | "2019-09-24 01:05:23.593 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.5:53838: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:23.593 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.593 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.595 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53838 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.1422ms +orderer0.example.com | "2019-09-24 01:05:23.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ba Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bb Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-09-24 01:05:23.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.7µs " +orderer0.example.com | "2019-09-24 01:05:23.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bd Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2019-09-24 01:05:23.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12be Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +orderer0.example.com | "2019-09-24 01:05:23.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 570.3µs " +orderer0.example.com | "2019-09-24 01:05:23.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 459.8µs " +orderer0.example.com | "2019-09-24 01:05:23.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:23.785 UTC [orderer.common.server] Deliver -> DEBU 12c3 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.786 UTC [common.deliver] Handle -> DEBU 12c4 Starting new deliver loop for 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.786 UTC [common.deliver] Handle -> DEBU 12c5 Attempting to read seek info message from 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.786 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.788 UTC [policies] Evaluate -> DEBU 12ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.788 UTC [cauthdsl] func1 -> DEBU 12cb 0xc00111d2c0 gate 1569287123788635400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.788 UTC [cauthdsl] func2 -> DEBU 12cc 0xc00111d2c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12cd 0xc00111d2c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12ce 0xc00111d2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12cf 0xc00111d2c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.790 UTC [cauthdsl] func1 -> DEBU 12d0 0xc00111d2c0 gate 1569287123788635400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.790 UTC [cauthdsl] func1 -> DEBU 12d4 0xc00111db00 gate 1569287123790871200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d5 0xc00111db00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d6 0xc00111db00 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d7 0xc00111db00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00111db00 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [cauthdsl] func1 -> DEBU 12d9 0xc00111db00 gate 1569287123790871200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [policies] Evaluate -> DEBU 12da Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.791 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.792 UTC [policies] func1 -> DEBU 12dc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12dd Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [policies] Evaluate -> DEBU 12e1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [cauthdsl] func1 -> DEBU 12e2 0xc0011cc910 gate 1569287123793092100 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e3 0xc0011cc910 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0011cc910 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0011cc910 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [msp.identity] Verify -> DEBU 12e6 Verify: digest = 00000000 67 f6 b2 de 24 4d 74 a8 20 d0 b7 03 b5 ed 97 94 |g...$Mt. .......| +orderer0.example.com | 00000010 1b 11 92 f4 80 2e 8c 09 98 a9 a5 59 26 c1 93 bc |...........Y&...|" +orderer0.example.com | "2019-09-24 01:05:23.793 UTC [msp.identity] Verify -> DEBU 12e7 Verify: sig = 00000000 30 44 02 20 13 10 ed 64 61 f3 b7 1b 70 89 e1 a0 |0D. ...da...p...| +orderer0.example.com | 00000010 7c 71 0c a2 67 bc dc 21 0a dc 06 f8 ea 3c f7 30 ||q..g..!.....<.0| +orderer0.example.com | 00000020 5a 00 74 34 02 20 05 aa 7d 6a 27 27 e6 99 97 8a |Z.t4. ..}j''....| +orderer0.example.com | 00000030 bf 1c 62 a6 26 58 2b 0c 8c a7 a3 23 78 1d cf 7f |..b.&X+....#x...| +orderer0.example.com | 00000040 90 87 3c de 88 81 |..<...|" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [cauthdsl] func2 -> DEBU 12e8 0xc0011cc910 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [cauthdsl] func1 -> DEBU 12e9 0xc0011cc910 gate 1569287123793092100 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ea Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12eb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ec Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.795 UTC [policies] Evaluate -> DEBU 12ee Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.795 UTC [policies] Evaluate -> DEBU 12ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.795 UTC [common.deliver] deliverBlocks -> DEBU 12f0 [channel: businesschannel] Received seekInfo (0xc0008d33c0) start: > stop: > from 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.795 UTC [fsblkstorage] Next -> DEBU 12f1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:23.796 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76768]" +orderer0.example.com | "2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f3 Remaining bytes=[12494], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f4 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +orderer0.example.com | "2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f5 blockbytes [4522] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.797 UTC [common.deliver] deliverBlocks -> DEBU 12f6 [channel: businesschannel] Delivering block for (0xc0008d33c0) for 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.798 UTC [common.deliver] deliverBlocks -> DEBU 12f7 [channel: businesschannel] Done delivering to 172.18.0.5:53840 for (0xc0008d33c0)" +orderer0.example.com | "2019-09-24 01:05:23.798 UTC [common.deliver] Handle -> DEBU 12f8 Waiting for new SeekInfo from 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.798 UTC [common.deliver] Handle -> DEBU 12f9 Attempting to read seek info message from 172.18.0.5:53840" +orderer0.example.com | "2019-09-24 01:05:23.798 UTC [fsblkstorage] waitForBlock -> DEBU 12fa Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fb Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fc Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fd Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.805 UTC [common.deliver] Handle -> WARN 12fe Error reading from 172.18.0.5:53840: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:23.805 UTC [orderer.common.server] func1 -> DEBU 12ff Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.807 UTC [comm.grpc.server] 1 -> INFO 1300 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53840 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.3402ms +peer0.org1.example.com | "2019-09-24 01:04:44.220 UTC [cauthdsl] func2 -> DEBU 11f9 0xc0026758b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:44.224 UTC [cauthdsl] func2 -> DEBU 11fa 0xc0026758b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:44.224 UTC [cauthdsl] func2 -> DEBU 11fb 0xc0026758b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:44.224 UTC [msp.identity] Verify -> DEBU 11fc Verify: digest = 00000000 8c 5a b0 51 67 93 fe bf 74 19 4c 02 f5 98 0f 31 |.Z.Qg...t.L....1| +peer0.org1.example.com | 00000010 02 45 1b ed 7c 66 95 13 5c 1f 58 49 74 e5 2f 9e |.E..|f..\.XIt./.|" +peer0.org1.example.com | "2019-09-24 01:04:44.225 UTC [msp.identity] Verify -> DEBU 11fd Verify: sig = 00000000 30 44 02 20 45 02 38 7e 48 91 94 b6 65 b2 63 11 |0D. E.8~H...e.c.| +peer0.org1.example.com | 00000010 a9 43 1c 41 60 e6 ae 74 db ef 3b 6f 72 4f 73 60 |.C.A`..t..;orOs`| +peer0.org1.example.com | 00000020 be 08 b4 4a 02 20 7e 3c d1 2c 40 31 64 87 f2 8e |...J. ~<.,@1d...| +peer0.org1.example.com | 00000030 d3 91 9c fd 42 11 4b bf 22 82 5b 89 cb 4b ab bc |....B.K.".[..K..| +peer0.org1.example.com | 00000040 67 a2 64 4c 8d 11 |g.dL..|" +peer0.org1.example.com | "2019-09-24 01:04:44.225 UTC [cauthdsl] func2 -> DEBU 11fe 0xc0026758b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:44.228 UTC [cauthdsl] func1 -> DEBU 11ff 0xc0026758b0 gate 1569287084220287400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:44.228 UTC [gossip.gossip] handleMessage -> DEBU 1200 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.228 UTC [gossip.comm] func1 -> DEBU 1202 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.228 UTC [policies] Evaluate -> DEBU 1201 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1204 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1205 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:44.229 UTC [gossip.discovery] handleAliveMessage -> DEBU 1206 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.229 UTC [gossip.discovery] learnExistingMembers -> DEBU 1207 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 1208 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 1209 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 120a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 120b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 120c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.231 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.231 UTC [gossip.gossip] handleMessage -> DEBU 120e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.231 UTC [gossip.gossip] handleMessage -> DEBU 120f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1210 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1212 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.232 UTC [gossip.gossip] handleMessage -> DEBU 1211 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.232 UTC [gossip.gossip] handleMessage -> DEBU 1213 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1214 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1215 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.233 UTC [gossip.gossip] handleMessage -> DEBU 1216 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.233 UTC [gossip.gossip] handleMessage -> DEBU 1217 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1218 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1219 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121b Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:23.809 UTC [grpc] infof -> DEBU 1301 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.968 UTC [orderer.common.server] Deliver -> DEBU 1302 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:23.968 UTC [common.deliver] Handle -> DEBU 1303 Starting new deliver loop for 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.969 UTC [common.deliver] Handle -> DEBU 1304 Attempting to read seek info message from 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1305 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1306 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.971 UTC [cauthdsl] func1 -> DEBU 130a 0xc000c7cf70 gate 1569287123971921700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130b 0xc000c7cf70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 121e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 1220 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.236 UTC [gossip.comm] Send -> DEBU 1221 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.236 UTC [gossip.comm] sendToEndpoint -> DEBU 1222 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.236 UTC [gossip.comm] sendToEndpoint -> DEBU 1223 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.236 UTC [msp] DeserializeIdentity -> DEBU 1224 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.238 UTC [msp] DeserializeIdentity -> DEBU 1225 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.238 UTC [gossip.comm] Send -> DEBU 1226 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.239 UTC [msp] DeserializeIdentity -> DEBU 1227 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1229 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.241 UTC [msp] DeserializeIdentity -> DEBU 122a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.243 UTC [gossip.comm] Send -> DEBU 122e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.243 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1230 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.244 UTC [gossip.comm] sendToEndpoint -> DEBU 1231 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.244 UTC [gossip.comm] Send -> DEBU 1232 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1233 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1234 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 1235 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:44.261 UTC [msp.identity] Sign -> DEBU 1236 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151015 " +peer0.org1.example.com | "2019-09-24 01:04:44.261 UTC [msp.identity] Sign -> DEBU 1237 Sign: digest: 6F189EBB11B9A7676DDBEB21A38816044BED9CB4C6E9F04FA98D2126B52B7197 " +peer0.org1.example.com | "2019-09-24 01:04:44.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 1238 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:44.262 UTC [msp.identity] Sign -> DEBU 1239 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:44.262 UTC [msp.identity] Sign -> DEBU 123a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:44.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 123b Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:44.265 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.265 UTC [msp] DeserializeIdentity -> DEBU 123d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.265 UTC [gossip.comm] Send -> DEBU 123e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [msp] DeserializeIdentity -> DEBU 123f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] Send -> DEBU 1240 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [msp] DeserializeIdentity -> DEBU 1241 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] Send -> DEBU 1242 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1243 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1244 Exiting" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130c 0xc000c7cf70 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130d 0xc000c7cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130e 0xc000c7cf70 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [cauthdsl] func1 -> DEBU 130f 0xc000c7cf70 gate 1569287123971921700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1310 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1311 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.973 UTC [cauthdsl] func1 -> DEBU 1313 0xc000c7d7c0 gate 1569287123973093700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.973 UTC [cauthdsl] func2 -> DEBU 1314 0xc000c7d7c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.973 UTC [cauthdsl] func2 -> DEBU 1315 0xc000c7d7c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.974 UTC [cauthdsl] func2 -> DEBU 1316 0xc000c7d7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:23.974 UTC [cauthdsl] func2 -> DEBU 1317 0xc000c7d7c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.974 UTC [cauthdsl] func1 -> DEBU 1318 0xc000c7d7c0 gate 1569287123973093700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:23.974 UTC [policies] Evaluate -> DEBU 1319 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.974 UTC [policies] Evaluate -> DEBU 131a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] func1 -> DEBU 131b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131c Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 1320 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:23.975 UTC [cauthdsl] func1 -> DEBU 1321 0xc000b024b0 gate 1569287123975962700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1322 0xc000b024b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1323 0xc000b024b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1324 0xc000b024b0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:23.976 UTC [msp.identity] Verify -> DEBU 1325 Verify: digest = 00000000 14 da db b2 43 f2 ae 79 aa 4a a2 e3 8b 40 e8 0d |....C..y.J...@..| +orderer0.example.com | 00000010 7b ee e2 1c e3 67 69 92 66 cd 39 9e 91 50 67 92 |{....gi.f.9..Pg.|" +orderer0.example.com | "2019-09-24 01:05:23.976 UTC [msp.identity] Verify -> DEBU 1326 Verify: sig = 00000000 30 45 02 21 00 84 b0 2c e7 c9 ad b6 bb 37 5c ba |0E.!...,.....7\.| +orderer0.example.com | 00000010 ff 86 12 50 cf b3 ab 9b 86 71 93 30 20 a0 1d 13 |...P.....q.0 ...| +orderer0.example.com | 00000020 ce b8 ef 5f d9 02 20 4c fb 40 fc 9a 74 94 ff 12 |..._.. L.@..t...| +orderer0.example.com | 00000030 5c 3a b7 8a 0c 9b 35 d3 79 a3 bb 8c 2b 84 83 c0 |\:....5.y...+...| +orderer0.example.com | 00000040 b6 5c 6b cf 6b a5 f7 |.\k.k..|" +orderer0.example.com | "2019-09-24 01:05:23.977 UTC [cauthdsl] func2 -> DEBU 1327 0xc000b024b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:23.977 UTC [cauthdsl] func1 -> DEBU 1328 0xc000b024b0 gate 1569287123975962700 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:23.977 UTC [policies] Evaluate -> DEBU 1329 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.977 UTC [policies] Evaluate -> DEBU 132a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132b Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132d Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: businesschannel] Received seekInfo (0xc0008d38c0) start: > stop: > from 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [fsblkstorage] Next -> DEBU 1330 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [fsblkstorage] newBlockfileStream -> DEBU 1331 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81292]" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1332 Remaining bytes=[7970], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1333 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1334 blockbytes [3982] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 1335 [channel: businesschannel] Delivering block for (0xc0008d38c0) for 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 1336 [channel: businesschannel] Done delivering to 172.18.0.5:53842 for (0xc0008d38c0)" +orderer0.example.com | "2019-09-24 01:05:23.978 UTC [common.deliver] Handle -> DEBU 1337 Waiting for new SeekInfo from 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.979 UTC [common.deliver] Handle -> DEBU 1338 Attempting to read seek info message from 172.18.0.5:53842" +orderer0.example.com | "2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 1339 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133a Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133b Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133c Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:23.985 UTC [grpc] infof -> DEBU 133d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:23.989 UTC [common.deliver] Handle -> WARN 133e Error reading from 172.18.0.5:53842: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:23.989 UTC [orderer.common.server] func1 -> DEBU 133f Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:23.990 UTC [comm.grpc.server] 1 -> INFO 1340 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53842 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1934ms +orderer0.example.com | "2019-09-24 01:05:24.130 UTC [orderer.common.server] Deliver -> DEBU 1341 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:24.130 UTC [common.deliver] Handle -> DEBU 1342 Starting new deliver loop for 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.130 UTC [common.deliver] Handle -> DEBU 1343 Attempting to read seek info message from 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.131 UTC [policies] Evaluate -> DEBU 1344 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.131 UTC [policies] Evaluate -> DEBU 1345 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.132 UTC [policies] Evaluate -> DEBU 1346 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.132 UTC [policies] Evaluate -> DEBU 1347 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.133 UTC [policies] Evaluate -> DEBU 1348 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.133 UTC [cauthdsl] func1 -> DEBU 1349 0xc0010a4a10 gate 1569287124133474200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.133 UTC [cauthdsl] func2 -> DEBU 134a 0xc0010a4a10 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.134 UTC [cauthdsl] func2 -> DEBU 134b 0xc0010a4a10 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.134 UTC [cauthdsl] func2 -> DEBU 134c 0xc0010a4a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:24.135 UTC [cauthdsl] func2 -> DEBU 134d 0xc0010a4a10 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:24.151 UTC [cauthdsl] func1 -> DEBU 134e 0xc0010a4a10 gate 1569287124133474200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:24.151 UTC [policies] Evaluate -> DEBU 134f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:24.151 UTC [policies] Evaluate -> DEBU 1350 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:24.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1351 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.156 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1352 Sending msg of 28 bytes to 3 on channel testchainid took 47µs" +orderer0.example.com | "2019-09-24 01:05:24.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.3µs " +orderer0.example.com | "2019-09-24 01:05:24.152 UTC [policies] Evaluate -> DEBU 1354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.160 UTC [cauthdsl] func1 -> DEBU 1355 0xc0010a5250 gate 1569287124160173200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.162 UTC [cauthdsl] func2 -> DEBU 1356 0xc0010a5250 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.162 UTC [cauthdsl] func2 -> DEBU 1357 0xc0010a5250 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.163 UTC [cauthdsl] func2 -> DEBU 1358 0xc0010a5250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:24.163 UTC [cauthdsl] func2 -> DEBU 1359 0xc0010a5250 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:24.165 UTC [cauthdsl] func1 -> DEBU 135a 0xc0010a5250 gate 1569287124160173200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:24.166 UTC [policies] Evaluate -> DEBU 135b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:24.167 UTC [policies] Evaluate -> DEBU 135c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:24.168 UTC [policies] func1 -> DEBU 135d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:24.168 UTC [policies] Evaluate -> DEBU 135e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:24.168 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1361 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1362 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.171 UTC [cauthdsl] func1 -> DEBU 1363 0xc000d92430 gate 1569287124170983900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.171 UTC [cauthdsl] func2 -> DEBU 1364 0xc000d92430 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.171 UTC [cauthdsl] func2 -> DEBU 1365 0xc000d92430 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.172 UTC [cauthdsl] func2 -> DEBU 1366 0xc000d92430 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.173 UTC [msp.identity] Verify -> DEBU 1367 Verify: digest = 00000000 f3 08 90 53 f3 a9 ec 67 42 21 34 72 d5 b5 2b 74 |...S...gB!4r..+t| +orderer0.example.com | 00000010 ca 7d 0b 95 ee 0b f5 07 2e 90 06 a8 d8 92 f7 6a |.}.............j|" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1245 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1246 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1247 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1248 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.723 UTC [msp] DeserializeIdentity -> DEBU 1249 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.724 UTC [msp] DeserializeIdentity -> DEBU 124a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.725 UTC [gossip.comm] Send -> DEBU 124b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.726 UTC [gossip.comm] sendToEndpoint -> DEBU 124e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1250 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.727 UTC [gossip.comm] sendToEndpoint -> DEBU 1252 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.727 UTC [gossip.comm] func1 -> DEBU 1251 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.728 UTC [gossip.gossip] handleMessage -> DEBU 1253 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.728 UTC [gossip.comm] func1 -> DEBU 1254 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.728 UTC [msp] DeserializeIdentity -> DEBU 1255 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.730 UTC [gossip.comm] func1 -> DEBU 1256 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.730 UTC [msp] DeserializeIdentity -> DEBU 1257 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.731 UTC [msp] DeserializeIdentity -> DEBU 1258 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1259 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 125a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 125b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [cauthdsl] func1 -> DEBU 125f 0xc002612660 gate 1569287085732817600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [cauthdsl] func2 -> DEBU 1260 0xc002612660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.732 UTC [cauthdsl] func2 -> DEBU 1261 0xc002612660 processing identity 0 with bytes of 1150090" +orderer0.example.com | "2019-09-24 01:05:24.173 UTC [msp.identity] Verify -> DEBU 1368 Verify: sig = 00000000 30 45 02 21 00 91 d2 f4 55 96 70 0a 7d fa ec 51 |0E.!....U.p.}..Q| +orderer0.example.com | 00000010 18 91 b1 15 3c 66 98 d9 da e4 93 68 07 36 16 ee |......kq....| +orderer0.example.com | 00000040 2a 12 0c 95 81 eb a7 |*......|" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [cauthdsl] func2 -> DEBU 1369 0xc000d92430 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [cauthdsl] func1 -> DEBU 136a 0xc000d92430 gate 1569287124170983900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.175 UTC [policies] Evaluate -> DEBU 136f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.175 UTC [policies] Evaluate -> DEBU 1370 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1371 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [common.deliver] deliverBlocks -> DEBU 1372 [channel: businesschannel] Received seekInfo (0xc00115dd80) start: > stop: > from 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1373 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [fsblkstorage] Next -> DEBU 1374 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [fsblkstorage] newBlockfileStream -> DEBU 1375 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1376 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1377 Remaining bytes=[3986], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1378 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1379 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137a blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.185 UTC [common.deliver] deliverBlocks -> DEBU 137d [channel: businesschannel] Delivering block for (0xc00115dd80) for 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.186 UTC [common.deliver] deliverBlocks -> DEBU 137e [channel: businesschannel] Done delivering to 172.18.0.5:53844 for (0xc00115dd80)" +orderer0.example.com | "2019-09-24 01:05:24.186 UTC [common.deliver] Handle -> DEBU 137f Waiting for new SeekInfo from 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.186 UTC [common.deliver] Handle -> DEBU 1380 Attempting to read seek info message from 172.18.0.5:53844" +orderer0.example.com | "2019-09-24 01:05:24.187 UTC [fsblkstorage] waitForBlock -> DEBU 1381 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:24.187 UTC [fsblkstorage] waitForBlock -> DEBU 1382 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:24.191 UTC [fsblkstorage] waitForBlock -> DEBU 1383 Came out of wait. maxAvailaBlockNumber=[5]" +orderer0.example.com | "2019-09-24 01:05:24.194 UTC [fsblkstorage] waitForBlock -> DEBU 1384 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +orderer0.example.com | "2019-09-24 01:05:24.199 UTC [common.deliver] Handle -> WARN 1385 Error reading from 172.18.0.5:53844: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:24.199 UTC [orderer.common.server] func1 -> DEBU 1386 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:24.201 UTC [comm.grpc.server] 1 -> INFO 1387 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53844 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=71.5964ms +orderer0.example.com | "2019-09-24 01:05:24.203 UTC [grpc] infof -> DEBU 1388 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:24.467 UTC [orderer.common.server] Deliver -> DEBU 1389 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:24.467 UTC [common.deliver] Handle -> DEBU 138a Starting new deliver loop for 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.468 UTC [common.deliver] Handle -> DEBU 138b Attempting to read seek info message from 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.470 UTC [policies] Evaluate -> DEBU 138f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.470 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.470 UTC [msp] DeserializeIdentity -> DEBU 1391 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:24.470 UTC [msp.identity] newIdentity -> DEBU 1392 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:24.471 UTC [cauthdsl] func1 -> DEBU 1393 0xc001124250 gate 1569287124471723900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.472 UTC [cauthdsl] func2 -> DEBU 1394 0xc001124250 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.472 UTC [cauthdsl] func2 -> DEBU 1395 0xc001124250 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1396 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:24.472 UTC [msp] Validate -> DEBU 1397 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:24.473 UTC [cauthdsl] func2 -> DEBU 1398 0xc001124250 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.473 UTC [msp.identity] Verify -> DEBU 1399 Verify: digest = 00000000 bf 8a 55 a4 cc 72 a8 1d 83 6c e1 a1 ce 81 2c d1 |..U..r...l....,.| +orderer0.example.com | 00000010 63 bb 33 cf e9 e3 b1 c4 fc 29 33 03 76 a3 66 e5 |c.3......)3.v.f.|" +orderer0.example.com | "2019-09-24 01:05:24.474 UTC [msp.identity] Verify -> DEBU 139a Verify: sig = 00000000 30 44 02 20 07 43 a8 46 25 51 25 32 d3 7b 4b 9b |0D. .C.F%Q%2.{K.| +orderer0.example.com | 00000010 4f 28 52 04 2e b9 1f eb 78 d0 70 66 25 4c 82 0c |O(R.....x.pf%L..| +orderer0.example.com | 00000020 3b 4f f4 ac 02 20 08 64 6d c5 10 a9 af c0 5d 75 |;O... .dm.....]u| +orderer0.example.com | 00000030 98 f8 f2 54 3f 04 ac 82 8f 27 bf 05 5d b3 23 4f |...T?....'..].#O| +orderer0.example.com | 00000040 81 67 e5 a9 99 67 |.g...g|" +orderer0.example.com | "2019-09-24 01:05:24.475 UTC [cauthdsl] func2 -> DEBU 139b 0xc001124250 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.475 UTC [cauthdsl] func1 -> DEBU 139c 0xc001124250 gate 1569287124471723900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:24.475 UTC [policies] Evaluate -> DEBU 139d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.475 UTC [policies] Evaluate -> DEBU 139e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 139f Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 13a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 13a1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.477 UTC [policies] Evaluate -> DEBU 13a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.477 UTC [common.deliver] deliverBlocks -> DEBU 13a3 [channel: testchainid] Received seekInfo (0xc000403240) start: > stop: > from 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.478 UTC [fsblkstorage] Next -> DEBU 13a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:24.478 UTC [fsblkstorage] newBlockfileStream -> DEBU 13a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:24.478 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a6 Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.479 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a7 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:24.479 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a8 blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.479 UTC [common.deliver] deliverBlocks -> DEBU 13a9 [channel: testchainid] Delivering block for (0xc000403240) for 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.480 UTC [common.deliver] deliverBlocks -> DEBU 13aa [channel: testchainid] Done delivering to 172.18.0.5:53846 for (0xc000403240)" +orderer0.example.com | "2019-09-24 01:05:24.482 UTC [common.deliver] Handle -> DEBU 13ab Waiting for new SeekInfo from 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.483 UTC [common.deliver] Handle -> DEBU 13ac Attempting to read seek info message from 172.18.0.5:53846" +orderer0.example.com | "2019-09-24 01:05:24.487 UTC [common.deliver] Handle -> WARN 13ad Error reading from 172.18.0.5:53846: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:24.488 UTC [orderer.common.server] func1 -> DEBU 13ae Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:24.488 UTC [comm.grpc.server] 1 -> INFO 13b0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53846 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.7987ms +orderer0.example.com | "2019-09-24 01:05:24.488 UTC [grpc] infof -> DEBU 13af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:45.733 UTC [cauthdsl] func2 -> DEBU 1262 0xc002612660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.733 UTC [cauthdsl] func2 -> DEBU 1263 0xc002612660 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.734 UTC [cauthdsl] func1 -> DEBU 1264 0xc002612660 gate 1569287085732817600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1265 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1267 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.734 UTC [cauthdsl] func1 -> DEBU 1268 0xc002612f90 gate 1569287085734816500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 1269 0xc002612f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 126a 0xc002612f90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 126b 0xc002612f90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.735 UTC [msp.identity] Verify -> DEBU 126c Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:45.736 UTC [msp.identity] Verify -> DEBU 126d Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:45.736 UTC [cauthdsl] func2 -> DEBU 126e 0xc002612f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.736 UTC [cauthdsl] func1 -> DEBU 126f 0xc002612f90 gate 1569287085734816500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1270 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1272 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.738 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:45.738 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:45.739 UTC [msp] DeserializeIdentity -> DEBU 1276 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.739 UTC [msp] DeserializeIdentity -> DEBU 1277 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1278 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1279 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 127a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.741 UTC [policies] Evaluate -> DEBU 127b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.742 UTC [policies] Evaluate -> DEBU 127c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.744 UTC [policies] Evaluate -> DEBU 127d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.750 UTC [cauthdsl] func1 -> DEBU 127e 0xc0025f6f40 gate 1569287085745085500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.750 UTC [cauthdsl] func2 -> DEBU 127f 0xc0025f6f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1280 0xc0025f6f40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1281 0xc0025f6f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1282 0xc0025f6f40 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:24.623 UTC [orderer.common.server] Deliver -> DEBU 13b1 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:24.623 UTC [common.deliver] Handle -> DEBU 13b2 Starting new deliver loop for 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.624 UTC [common.deliver] Handle -> DEBU 13b3 Attempting to read seek info message from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.626 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.626 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.626 UTC [cauthdsl] func1 -> DEBU 13b9 0xc0012d8ec0 gate 1569287124626780800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.626 UTC [cauthdsl] func2 -> DEBU 13ba 0xc0012d8ec0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.627 UTC [cauthdsl] func2 -> DEBU 13bb 0xc0012d8ec0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.628 UTC [cauthdsl] func2 -> DEBU 13bc 0xc0012d8ec0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.628 UTC [msp.identity] Verify -> DEBU 13bd Verify: digest = 00000000 90 ce 60 ca 2e d4 1e 66 4c 23 50 47 8a a9 b8 30 |..`....fL#PG...0| +orderer0.example.com | 00000010 a2 31 84 55 16 7a 21 21 ce 95 8a 31 18 dc 66 e8 |.1.U.z!!...1..f.|" +orderer0.example.com | "2019-09-24 01:05:24.628 UTC [msp.identity] Verify -> DEBU 13be Verify: sig = 00000000 30 44 02 20 63 77 77 7e 3c dc c7 72 bf 8d 34 09 |0D. cww~<..r..4.| +orderer0.example.com | 00000010 79 76 26 7b c4 40 df 3c b2 cb be 69 1c 93 49 ef |yv&{.@.<...i..I.| +orderer0.example.com | 00000020 ed 47 9f aa 02 20 33 f5 22 c6 70 67 09 33 94 09 |.G... 3.".pg.3..| +orderer0.example.com | 00000030 26 2b 47 fe f4 de 66 94 8b e8 b3 18 90 49 cf 4f |&+G...f......I.O| +orderer0.example.com | 00000040 8e e6 40 f8 51 2a |..@.Q*|" +orderer0.example.com | "2019-09-24 01:05:24.628 UTC [cauthdsl] func2 -> DEBU 13bf 0xc0012d8ec0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.629 UTC [cauthdsl] func1 -> DEBU 13c0 0xc0012d8ec0 gate 1569287124626780800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.752 UTC [cauthdsl] func1 -> DEBU 1283 0xc0025f6f40 gate 1569287085745085500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.752 UTC [policies] Evaluate -> DEBU 1284 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.753 UTC [policies] Evaluate -> DEBU 1285 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.754 UTC [policies] Evaluate -> DEBU 1286 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.755 UTC [cauthdsl] func1 -> DEBU 1287 0xc0025f7780 gate 1569287085754997400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.755 UTC [cauthdsl] func2 -> DEBU 1288 0xc0025f7780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.755 UTC [cauthdsl] func2 -> DEBU 1289 0xc0025f7780 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.756 UTC [cauthdsl] func2 -> DEBU 128a 0xc0025f7780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.756 UTC [msp.identity] Verify -> DEBU 128b Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:45.757 UTC [msp.identity] Verify -> DEBU 128c Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:45.757 UTC [cauthdsl] func2 -> DEBU 128d 0xc0025f7780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.757 UTC [cauthdsl] func1 -> DEBU 128e 0xc0025f7780 gate 1569287085754997400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.757 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.758 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.758 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.759 UTC [msp] DeserializeIdentity -> DEBU 1292 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.759 UTC [msp] DeserializeIdentity -> DEBU 1293 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.760 UTC [gossip.pull] Hello -> DEBU 1294 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:45.760 UTC [msp] DeserializeIdentity -> DEBU 1295 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.761 UTC [msp] DeserializeIdentity -> DEBU 1296 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.761 UTC [gossip.comm] Send -> DEBU 1297 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:45.762 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.762 UTC [gossip.comm] sendToEndpoint -> DEBU 1299 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.763 UTC [policies] Evaluate -> DEBU 129a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.763 UTC [gossip.comm] func1 -> DEBU 129b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.764 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:45.764 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:45.765 UTC [gossip.gossip] handleMessage -> DEBU 129e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.765 UTC [gossip.gossip] handleMessage -> DEBU 129f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.765 UTC [msp.identity] Verify -> DEBU 12a0 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:45.766 UTC [msp.identity] Verify -> DEBU 12a1 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:45.767 UTC [msp.identity] Verify -> DEBU 12a2 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:45.767 UTC [msp.identity] Verify -> DEBU 12a3 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:45.768 UTC [msp] DeserializeIdentity -> DEBU 12a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.774 UTC [msp] DeserializeIdentity -> DEBU 12a5 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c3 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c5 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.630 UTC [common.deliver] deliverBlocks -> DEBU 13c7 [channel: testchainid] Received seekInfo (0xc000362680) start: > stop: > from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.631 UTC [fsblkstorage] Next -> DEBU 13c8 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:24.632 UTC [fsblkstorage] newBlockfileStream -> DEBU 13c9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:24.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13ca Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cb Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:24.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cc blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.634 UTC [common.deliver] deliverBlocks -> DEBU 13cd [channel: testchainid] Delivering block for (0xc000362680) for 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.635 UTC [common.deliver] deliverBlocks -> DEBU 13ce [channel: testchainid] Done delivering to 172.18.0.5:53848 for (0xc000362680)" +orderer0.example.com | "2019-09-24 01:05:24.636 UTC [common.deliver] Handle -> DEBU 13cf Waiting for new SeekInfo from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.636 UTC [common.deliver] Handle -> DEBU 13d0 Attempting to read seek info message from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.640 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.640 UTC [cauthdsl] func1 -> DEBU 13d6 0xc000b3eef0 gate 1569287124640685200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.640 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000b3eef0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.642 UTC [cauthdsl] func2 -> DEBU 13d8 0xc000b3eef0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.642 UTC [cauthdsl] func2 -> DEBU 13d9 0xc000b3eef0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.643 UTC [msp.identity] Verify -> DEBU 13da Verify: digest = 00000000 3e 1d b3 4d 35 05 f3 28 11 0c 88 ea 0d c6 aa 0d |>..M5..(........| +orderer0.example.com | 00000010 3b 08 b8 6e aa 78 8d 93 a9 a3 df 29 3f 1c 78 00 |;..n.x.....)?.x.|" +orderer0.example.com | "2019-09-24 01:05:24.643 UTC [msp.identity] Verify -> DEBU 13db Verify: sig = 00000000 30 45 02 21 00 de fc 2c e1 86 c6 bf c3 2a e6 83 |0E.!...,.....*..| +orderer0.example.com | 00000010 d1 ef 72 30 ec c7 aa 1b 64 96 76 1a 15 bd bf 69 |..r0....d.v....i| +orderer0.example.com | 00000020 5b 74 72 9e 79 02 20 59 dc a7 2f 77 d9 c6 d2 69 |[tr.y. Y../w...i| +orderer0.example.com | 00000030 2c 38 84 28 f8 fc 9c b1 4d 7a 71 37 89 23 a3 b9 |,8.(....Mzq7.#..| +orderer0.example.com | 00000040 39 61 30 b0 0d 5e f0 |9a0..^.|" +orderer0.example.com | "2019-09-24 01:05:24.643 UTC [cauthdsl] func2 -> DEBU 13dc 0xc000b3eef0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.644 UTC [cauthdsl] func1 -> DEBU 13dd 0xc000b3eef0 gate 1569287124640685200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13de Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13e0 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.645 UTC [policies] Evaluate -> DEBU 13e2 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.645 UTC [policies] Evaluate -> DEBU 13e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.645 UTC [common.deliver] deliverBlocks -> DEBU 13e4 [channel: testchainid] Received seekInfo (0xc000363480) start: > stop: > from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.646 UTC [fsblkstorage] Next -> DEBU 13e5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:24.646 UTC [fsblkstorage] newBlockfileStream -> DEBU 13e6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e7 Remaining bytes=[47980], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e8 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e9 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.647 UTC [common.deliver] deliverBlocks -> DEBU 13ea [channel: testchainid] Delivering block for (0xc000363480) for 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.649 UTC [common.deliver] deliverBlocks -> DEBU 13eb [channel: testchainid] Done delivering to 172.18.0.5:53848 for (0xc000363480)" +orderer0.example.com | "2019-09-24 01:05:24.649 UTC [common.deliver] Handle -> DEBU 13ec Waiting for new SeekInfo from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.650 UTC [common.deliver] Handle -> DEBU 13ed Attempting to read seek info message from 172.18.0.5:53848" +orderer0.example.com | "2019-09-24 01:05:24.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ef Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2019-09-24 01:05:24.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.3µs " +peer0.org1.example.com | "2019-09-24 01:04:45.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12a7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12a8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.776 UTC [policies] Evaluate -> DEBU 12a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.776 UTC [policies] Evaluate -> DEBU 12aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.777 UTC [policies] Evaluate -> DEBU 12ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.777 UTC [cauthdsl] func1 -> DEBU 12ac 0xc0025928b0 gate 1569287085777317300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12ad 0xc0025928b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12ae 0xc0025928b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12af 0xc0025928b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.778 UTC [cauthdsl] func2 -> DEBU 12b0 0xc0025928b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.779 UTC [cauthdsl] func1 -> DEBU 12b1 0xc0025928b0 gate 1569287085777317300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [cauthdsl] func1 -> DEBU 12b5 0xc002593120 gate 1569287085779813000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b6 0xc002593120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b7 0xc002593120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b8 0xc002593120 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [msp.identity] Verify -> DEBU 12b9 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:45.780 UTC [msp.identity] Verify -> DEBU 12ba Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:45.781 UTC [cauthdsl] func2 -> DEBU 12bb 0xc002593120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.781 UTC [cauthdsl] func1 -> DEBU 12bc 0xc002593120 gate 1569287085779813000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12bf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.782 UTC [policies] Evaluate -> DEBU 12c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.782 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.782 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:24.656 UTC [common.deliver] Handle -> WARN 13f1 Error reading from 172.18.0.5:53848: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:24.659 UTC [orderer.common.server] func1 -> DEBU 13f3 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:24.659 UTC [comm.grpc.server] 1 -> INFO 13f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53848 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1986ms +orderer0.example.com | "2019-09-24 01:05:24.658 UTC [grpc] infof -> DEBU 13f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:24.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f5 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-09-24 01:05:24.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-09-24 01:05:24.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.7µs " +orderer0.example.com | "2019-09-24 01:05:24.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 290.8µs " +orderer0.example.com | "2019-09-24 01:05:24.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fa Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:24.775 UTC [orderer.common.server] Deliver -> DEBU 13fb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:24.776 UTC [common.deliver] Handle -> DEBU 13fc Starting new deliver loop for 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.776 UTC [common.deliver] Handle -> DEBU 13fd Attempting to read seek info message from 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 13fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 13ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 1400 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 1401 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.778 UTC [policies] Evaluate -> DEBU 1402 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.778 UTC [cauthdsl] func1 -> DEBU 1403 0xc001307120 gate 1569287124778314800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1404 0xc001307120 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1405 0xc001307120 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1406 0xc001307120 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.779 UTC [msp.identity] Verify -> DEBU 1407 Verify: digest = 00000000 67 c0 ac 2c 7b 49 37 85 69 9b 2a 19 d7 76 0f 07 |g..,{I7.i.*..v..| +orderer0.example.com | 00000010 0f 9a 92 f0 2f 9a 72 dc 1a 96 ae 0f 62 a8 c9 64 |..../.r.....b..d|" +orderer0.example.com | "2019-09-24 01:05:24.779 UTC [msp.identity] Verify -> DEBU 1408 Verify: sig = 00000000 30 44 02 20 6c 46 c8 68 6a 1d d5 1d e8 8f 99 31 |0D. lF.hj......1| +orderer0.example.com | 00000010 64 24 d9 44 85 74 e4 63 29 61 24 cf ce b2 31 f3 |d$.D.t.c)a$...1.| +orderer0.example.com | 00000020 b9 3e 9e fd 02 20 39 ad 38 59 cc 80 57 9c 2c 39 |.>... 9.8Y..W.,9| +orderer0.example.com | 00000030 c0 5f 3e 70 81 94 d6 01 f5 9e 20 2a 02 46 c5 f2 |._>p...... *.F..| +orderer0.example.com | 00000040 5e 75 87 b0 ff 23 |^u...#|" +orderer0.example.com | "2019-09-24 01:05:24.780 UTC [cauthdsl] func2 -> DEBU 1409 0xc001307120 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.780 UTC [cauthdsl] func1 -> DEBU 140a 0xc001307120 gate 1569287124778314800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:24.780 UTC [policies] Evaluate -> DEBU 140b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.780 UTC [policies] Evaluate -> DEBU 140c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.781 UTC [common.deliver] deliverBlocks -> DEBU 1411 [channel: testchainid] Received seekInfo (0xc000b72100) start: > stop: > from 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.782 UTC [fsblkstorage] Next -> DEBU 1412 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:24.782 UTC [fsblkstorage] newBlockfileStream -> DEBU 1413 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:24.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1414 Remaining bytes=[47980], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.783 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1415 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:24.783 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1416 blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.783 UTC [common.deliver] deliverBlocks -> DEBU 1417 [channel: testchainid] Delivering block for (0xc000b72100) for 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.784 UTC [common.deliver] deliverBlocks -> DEBU 1418 [channel: testchainid] Done delivering to 172.18.0.5:53850 for (0xc000b72100)" +orderer0.example.com | "2019-09-24 01:05:24.785 UTC [common.deliver] Handle -> DEBU 1419 Waiting for new SeekInfo from 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.785 UTC [common.deliver] Handle -> DEBU 141a Attempting to read seek info message from 172.18.0.5:53850" +orderer0.example.com | "2019-09-24 01:05:24.793 UTC [common.deliver] Handle -> WARN 141b Error reading from 172.18.0.5:53850: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:24.793 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:24.793 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53850 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.864ms +orderer0.example.com | "2019-09-24 01:05:24.794 UTC [grpc] infof -> DEBU 141e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func1 -> DEBU 12c9 0xc00257ebc0 gate 1569287085783842000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12ca 0xc00257ebc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cb 0xc00257ebc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cc 0xc00257ebc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cd 0xc00257ebc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.784 UTC [cauthdsl] func1 -> DEBU 12ce 0xc00257ebc0 gate 1569287085783842000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.786 UTC [cauthdsl] func1 -> DEBU 12d2 0xc00257f7b0 gate 1569287085786024100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d3 0xc00257f7b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d4 0xc00257f7b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d5 0xc00257f7b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.786 UTC [msp.identity] Verify -> DEBU 12d6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:45.787 UTC [msp.identity] Verify -> DEBU 12d7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:45.787 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00257f7b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.787 UTC [cauthdsl] func1 -> DEBU 12d9 0xc00257f7b0 gate 1569287085786024100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.787 UTC [policies] Evaluate -> DEBU 12da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12dc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.788 UTC [gossip.gossip] handleMessage -> DEBU 12de Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.789 UTC [gossip.gossip] handleMessage -> DEBU 12df Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.789 UTC [msp] DeserializeIdentity -> DEBU 12e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.790 UTC [msp] DeserializeIdentity -> DEBU 12e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.790 UTC [msp] DeserializeIdentity -> DEBU 12e2 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:24.960 UTC [orderer.common.server] Deliver -> DEBU 141f Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:24.960 UTC [common.deliver] Handle -> DEBU 1420 Starting new deliver loop for 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.961 UTC [common.deliver] Handle -> DEBU 1421 Attempting to read seek info message from 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1422 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1423 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1424 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1425 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:24.963 UTC [policies] Evaluate -> DEBU 1426 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:24.963 UTC [cauthdsl] func1 -> DEBU 1427 0xc0010f93a0 gate 1569287124963348800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 1428 0xc0010f93a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 1429 0xc0010f93a0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 142a 0xc0010f93a0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:24.964 UTC [msp.identity] Verify -> DEBU 142b Verify: digest = 00000000 a7 41 08 7e 65 7b 20 fe 82 7b 3b 69 80 62 51 f7 |.A.~e{ ..{;i.bQ.| +orderer0.example.com | 00000010 7e 88 a7 5b 04 43 87 0f aa c7 36 33 f2 c9 a9 f8 |~..[.C....63....|" +orderer0.example.com | "2019-09-24 01:05:24.965 UTC [msp.identity] Verify -> DEBU 142c Verify: sig = 00000000 30 44 02 20 1a 7e dc 05 e6 28 2f e9 40 e7 f1 46 |0D. .~...(/.@..F| +orderer0.example.com | 00000010 3f 88 dc 61 dd 69 6c 1f 30 88 92 46 00 52 bf d6 |?..a.il.0..F.R..| +orderer0.example.com | 00000020 46 1e 98 8a 02 20 05 c8 40 a1 de 78 e7 7d b3 10 |F.... ..@..x.}..| +orderer0.example.com | 00000030 4e 05 fc 7c 5d 0b 22 56 e3 b2 99 ec 5b 60 27 48 |N..|]."V....[`'H| +orderer0.example.com | 00000040 d6 b4 ae 22 24 52 |..."$R|" +orderer0.example.com | "2019-09-24 01:05:24.965 UTC [cauthdsl] func2 -> DEBU 142d 0xc0010f93a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:24.966 UTC [cauthdsl] func1 -> DEBU 142e 0xc0010f93a0 gate 1569287124963348800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 142f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1430 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1431 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1432 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:24.967 UTC [policies] Evaluate -> DEBU 1433 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.967 UTC [policies] Evaluate -> DEBU 1434 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:24.967 UTC [common.deliver] deliverBlocks -> DEBU 1435 [channel: testchainid] Received seekInfo (0xc000b72880) start: > stop: > from 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.967 UTC [fsblkstorage] Next -> DEBU 1436 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 1437 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1438 Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1439 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143a blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:24.969 UTC [common.deliver] deliverBlocks -> DEBU 143b [channel: testchainid] Delivering block for (0xc000b72880) for 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.969 UTC [common.deliver] deliverBlocks -> DEBU 143c [channel: testchainid] Done delivering to 172.18.0.5:53852 for (0xc000b72880)" +orderer0.example.com | "2019-09-24 01:05:24.970 UTC [common.deliver] Handle -> DEBU 143d Waiting for new SeekInfo from 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.970 UTC [common.deliver] Handle -> DEBU 143e Attempting to read seek info message from 172.18.0.5:53852" +orderer0.example.com | "2019-09-24 01:05:24.977 UTC [common.deliver] Handle -> WARN 143f Error reading from 172.18.0.5:53852: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:24.977 UTC [orderer.common.server] func1 -> DEBU 1440 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:24.977 UTC [comm.grpc.server] 1 -> INFO 1441 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53852 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.4715ms +orderer0.example.com | "2019-09-24 01:05:24.980 UTC [grpc] infof -> DEBU 1442 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:25.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1443 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:25.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1444 Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +orderer0.example.com | "2019-09-24 01:05:25.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.7µs " +orderer0.example.com | "2019-09-24 01:05:25.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1446 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2019-09-24 01:05:25.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1447 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 01:05:25.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1448 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.4µs " +orderer0.example.com | "2019-09-24 01:05:25.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1449 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.7µs " +orderer0.example.com | "2019-09-24 01:05:25.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:25.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:45.791 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.792 UTC [cauthdsl] func1 -> DEBU 12e9 0xc00256f330 gate 1569287085792297300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12ea 0xc00256f330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12eb 0xc00256f330 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12ec 0xc00256f330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.794 UTC [cauthdsl] func2 -> DEBU 12ed 0xc00256f330 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.794 UTC [cauthdsl] func1 -> DEBU 12ee 0xc00256f330 gate 1569287085792297300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.794 UTC [policies] Evaluate -> DEBU 12ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.795 UTC [policies] Evaluate -> DEBU 12f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.795 UTC [policies] Evaluate -> DEBU 12f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.796 UTC [cauthdsl] func1 -> DEBU 12f2 0xc00256fb80 gate 1569287085796528500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.796 UTC [cauthdsl] func2 -> DEBU 12f3 0xc00256fb80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.797 UTC [cauthdsl] func2 -> DEBU 12f4 0xc00256fb80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.797 UTC [cauthdsl] func2 -> DEBU 12f5 0xc00256fb80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.798 UTC [msp.identity] Verify -> DEBU 12f6 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:45.798 UTC [msp.identity] Verify -> DEBU 12f7 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:45.799 UTC [cauthdsl] func2 -> DEBU 12f8 0xc00256fb80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.799 UTC [cauthdsl] func1 -> DEBU 12f9 0xc00256fb80 gate 1569287085796528500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.799 UTC [policies] Evaluate -> DEBU 12fa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.800 UTC [policies] Evaluate -> DEBU 12fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.800 UTC [policies] Evaluate -> DEBU 12fc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.801 UTC [policies] Evaluate -> DEBU 12fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.802 UTC [msp.identity] Verify -> DEBU 12fe Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:45.802 UTC [msp.identity] Verify -> DEBU 12ff Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:45.803 UTC [msp.identity] Verify -> DEBU 1300 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:45.803 UTC [msp.identity] Verify -> DEBU 1301 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:45.804 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.805 UTC [msp] DeserializeIdentity -> DEBU 1303 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:25.656 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144d Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +orderer0.example.com | "2019-09-24 01:05:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +orderer0.example.com | "2019-09-24 01:05:25.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +orderer0.example.com | "2019-09-24 01:05:25.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1450 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92µs " +orderer0.example.com | "2019-09-24 01:05:25.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1451 Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +orderer0.example.com | "2019-09-24 01:05:25.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1452 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.0839ms " +orderer0.example.com | "2019-09-24 01:05:25.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1453 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:25.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.123 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1455 No inactive chains to try to replicate" +orderer0.example.com | "2019-09-24 01:05:26.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1456 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1457 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +orderer0.example.com | "2019-09-24 01:05:26.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1458 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +orderer0.example.com | "2019-09-24 01:05:26.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1459 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2019-09-24 01:05:26.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145a Sending msg of 28 bytes to 3 on channel businesschannel took 96.8µs" +orderer0.example.com | "2019-09-24 01:05:26.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.7µs " +orderer0.example.com | "2019-09-24 01:05:26.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.5µs " +orderer0.example.com | "2019-09-24 01:05:26.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1460 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +orderer0.example.com | "2019-09-24 01:05:26.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1461 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.1µs " +orderer0.example.com | "2019-09-24 01:05:26.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1462 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.3µs " +orderer0.example.com | "2019-09-24 01:05:26.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:26.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 2 on channel businesschannel took 689.2µs" +orderer0.example.com | "2019-09-24 01:05:26.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1465 Sending msg of 28 bytes to 3 on channel businesschannel took 24.3µs" +orderer0.example.com | "2019-09-24 01:05:26.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1466 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +orderer0.example.com | "2019-09-24 01:05:26.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1467 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:27.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1468 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:27.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1469 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +orderer0.example.com | "2019-09-24 01:05:27.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +orderer0.example.com | "2019-09-24 01:05:27.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.9µs " +orderer0.example.com | "2019-09-24 01:05:27.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:27.184 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146d Sending msg of 28 bytes to 2 on channel businesschannel took 2.6923ms" +orderer0.example.com | "2019-09-24 01:05:27.184 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " +orderer0.example.com | "2019-09-24 01:05:27.186 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:27.184 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1470 Sending msg of 28 bytes to 3 on channel businesschannel took 31.7µs" +orderer0.example.com | "2019-09-24 01:05:27.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1471 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:45.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1304 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:45.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1306 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.807 UTC [cauthdsl] func1 -> DEBU 130a 0xc0024de240 gate 1569287085807903800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130b 0xc0024de240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130c 0xc0024de240 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130d 0xc0024de240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130e 0xc0024de240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.808 UTC [cauthdsl] func1 -> DEBU 130f 0xc0024de240 gate 1569287085807903800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1310 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1311 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:45.809 UTC [cauthdsl] func1 -> DEBU 1313 0xc0024dea80 gate 1569287085809946700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:45.810 UTC [cauthdsl] func2 -> DEBU 1314 0xc0024dea80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:45.810 UTC [cauthdsl] func2 -> DEBU 1315 0xc0024dea80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:45.811 UTC [cauthdsl] func2 -> DEBU 1316 0xc0024dea80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.811 UTC [msp.identity] Verify -> DEBU 1317 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:45.812 UTC [msp.identity] Verify -> DEBU 1318 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:45.812 UTC [cauthdsl] func2 -> DEBU 1319 0xc0024dea80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:45.812 UTC [cauthdsl] func1 -> DEBU 131a 0xc0024dea80 gate 1569287085809946700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:45.812 UTC [policies] Evaluate -> DEBU 131b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.812 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.813 UTC [policies] Evaluate -> DEBU 131d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.813 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:45.813 UTC [gossip.gossip] handleMessage -> DEBU 131f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.813 UTC [gossip.gossip] handleMessage -> DEBU 1320 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.815 UTC [gossip.pull] HandleMessage -> DEBU 1321 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.816 UTC [gossip.gossip] handleMessage -> DEBU 1322 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.908 UTC [gossip.comm] func1 -> DEBU 1323 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.908 UTC [gossip.gossip] handleMessage -> DEBU 1324 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.909 UTC [msp] DeserializeIdentity -> DEBU 1325 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.912 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:45.912 UTC [gossip.gossip] handleMessage -> DEBU 1327 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:45.915 UTC [gossip.comm] func1 -> DEBU 1328 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.915 UTC [gossip.gossip] handleMessage -> DEBU 1329 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.916 UTC [gossip.pull] HandleMessage -> DEBU 132a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:45.917 UTC [gossip.pull] SendDigest -> DEBU 132b Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:45.917 UTC [gossip.gossip] handleMessage -> DEBU 132c Exiting" +orderer0.example.com | "2019-09-24 01:05:27.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1472 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2019-09-24 01:05:27.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2019-09-24 01:05:27.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1474 Sending msg of 28 bytes to 2 on channel businesschannel took 811.3µs" +orderer0.example.com | "2019-09-24 01:05:27.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1475 Sending msg of 28 bytes to 3 on channel businesschannel took 38.8µs" +orderer0.example.com | "2019-09-24 01:05:27.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1476 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.5µs " +orderer0.example.com | "2019-09-24 01:05:27.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1477 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3234ms " +orderer0.example.com | "2019-09-24 01:05:27.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1478 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:27.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1479 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2019-09-24 01:05:28.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.7µs " +orderer0.example.com | "2019-09-24 01:05:28.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147d Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2019-09-24 01:05:28.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147e Sending msg of 28 bytes to 3 on channel businesschannel took 130.8µs" +orderer0.example.com | "2019-09-24 01:05:28.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.1µs " +orderer0.example.com | "2019-09-24 01:05:28.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " +orderer0.example.com | "2019-09-24 01:05:28.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1482 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.656 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1483 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +orderer0.example.com | "2019-09-24 01:05:28.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1485 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +orderer0.example.com | "2019-09-24 01:05:28.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1486 Sending msg of 28 bytes to 2 on channel businesschannel took 83.1µs" +orderer0.example.com | "2019-09-24 01:05:28.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1487 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +orderer0.example.com | "2019-09-24 01:05:28.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1488 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.3µs " +orderer0.example.com | "2019-09-24 01:05:28.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.2µs " +orderer0.example.com | "2019-09-24 01:05:28.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:28.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.160 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +orderer0.example.com | "2019-09-24 01:05:29.160 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2019-09-24 01:05:29.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148f Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +orderer0.example.com | "2019-09-24 01:05:29.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1490 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2019-09-24 01:05:29.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1491 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +orderer0.example.com | "2019-09-24 01:05:29.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 35.3µs " +orderer0.example.com | "2019-09-24 01:05:29.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1494 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1495 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +orderer0.example.com | "2019-09-24 01:05:29.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1497 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.8µs " +orderer0.example.com | "2019-09-24 01:05:29.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1498 Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +peer0.org1.example.com | "2019-09-24 01:04:46.112 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.113 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.113 UTC [msp] DeserializeIdentity -> DEBU 132f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.113 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.114 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.114 UTC [gossip.gossip] handleMessage -> DEBU 1332 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.311 UTC [gossip.comm] func1 -> DEBU 1333 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.311 UTC [gossip.gossip] handleMessage -> DEBU 1334 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1336 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1337 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.313 UTC [gossip.gossip] handleMessage -> DEBU 1338 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.528 UTC [gossip.comm] func1 -> DEBU 1339 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.529 UTC [gossip.gossip] handleMessage -> DEBU 133a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.530 UTC [gossip.pull] HandleMessage -> DEBU 133b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.530 UTC [gossip.pull] SendDigest -> DEBU 133c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:46.531 UTC [gossip.gossip] handleMessage -> DEBU 133d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.535 UTC [gossip.comm] func1 -> DEBU 133e Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.535 UTC [gossip.gossip] handleMessage -> DEBU 133f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.536 UTC [gossip.gossip] handleMessage -> DEBU 1340 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1341 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.536 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1342 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.537 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +peer0.org1.example.com | 00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +peer0.org1.example.com | "2019-09-24 01:04:46.538 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +peer0.org1.example.com | 00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +peer0.org1.example.com | 00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +peer0.org1.example.com | 00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +peer0.org1.example.com | 00000040 4d 18 6c e0 bf e8 ab |M.l....|" +peer0.org1.example.com | "2019-09-24 01:04:46.539 UTC [msp.identity] Verify -> DEBU 1345 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:46.539 UTC [msp.identity] Verify -> DEBU 1346 Verify: sig = 00000000 30 45 02 21 00 df 13 9b 17 87 f4 a2 b1 71 bb 24 |0E.!.........q.$| +peer0.org1.example.com | 00000010 db 0d 61 2a ab 41 4e 8f d8 0e 48 29 bf 61 db e6 |..a*.AN...H).a..| +peer0.org1.example.com | 00000020 53 ca af c0 1f 02 20 6f 5d 35 55 8d 9f dc fd 2b |S..... o]5U....+| +peer0.org1.example.com | 00000030 23 4c fd 05 eb db 87 ec 9b 10 4e 7d 53 ca 1d 01 |#L........N}S...| +peer0.org1.example.com | 00000040 00 70 81 0c ba b3 e4 |.p.....|" +peer0.org1.example.com | "2019-09-24 01:04:46.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 1347 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 1348 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:46.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 1349 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 134a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.541 UTC [gossip.discovery] learnExistingMembers -> DEBU 134b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:46.541 UTC [gossip.discovery] learnExistingMembers -> DEBU 134c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.541 UTC [gossip.discovery] handleAliveMessage -> DEBU 134d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 134e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.542 UTC [gossip.discovery] sendMemResponse -> DEBU 134f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:46.542 UTC [msp] DeserializeIdentity -> DEBU 1350 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.542 UTC [msp] DeserializeIdentity -> DEBU 1351 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.543 UTC [gossip.comm] Send -> DEBU 1352 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.543 UTC [gossip.discovery] sendMemResponse -> DEBU 1353 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:04:46.544 UTC [gossip.comm] sendToEndpoint -> DEBU 1354 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.544 UTC [gossip.comm] sendToEndpoint -> DEBU 1355 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.770 UTC [gossip.election] waitForInterrupt -> DEBU 1356 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.770 UTC [gossip.election] IsLeader -> DEBU 1357 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:46.770 UTC [msp] GetDefaultSigningIdentity -> DEBU 1358 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:46.770 UTC [msp.identity] Sign -> DEBU 1359 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510051801 " +peer0.org1.example.com | "2019-09-24 01:04:46.770 UTC [msp.identity] Sign -> DEBU 135a Sign: digest: 0A12D848E96CA50EB7968A63B88F5D80B744732BD6332037DB617024831E1D04 " +peer0.org1.example.com | "2019-09-24 01:04:46.771 UTC [gossip.election] waitForInterrupt -> DEBU 135b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:46.777 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.777 UTC [msp] DeserializeIdentity -> DEBU 135d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.778 UTC [msp] DeserializeIdentity -> DEBU 135e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.778 UTC [msp] DeserializeIdentity -> DEBU 135f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.779 UTC [gossip.comm] Send -> DEBU 1360 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.779 UTC [msp] DeserializeIdentity -> DEBU 1361 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.779 UTC [gossip.comm] sendToEndpoint -> DEBU 1362 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.779 UTC [msp] DeserializeIdentity -> DEBU 1363 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.779 UTC [gossip.comm] sendToEndpoint -> DEBU 1364 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.840 UTC [gossip.comm] func1 -> DEBU 1365 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.840 UTC [gossip.gossip] handleMessage -> DEBU 1366 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.840 UTC [gossip.pull] HandleMessage -> DEBU 1367 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:29.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1499 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +orderer0.example.com | "2019-09-24 01:05:29.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.2µs " +orderer0.example.com | "2019-09-24 01:05:29.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:29.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5316ms " +orderer0.example.com | "2019-09-24 01:05:29.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-09-24 01:05:30.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.6µs " +orderer0.example.com | "2019-09-24 01:05:30.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +orderer0.example.com | "2019-09-24 01:05:30.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a3 Sending msg of 28 bytes to 3 on channel businesschannel took 110.2µs" +orderer0.example.com | "2019-09-24 01:05:30.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211µs " +orderer0.example.com | "2019-09-24 01:05:30.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.5µs " +orderer0.example.com | "2019-09-24 01:05:30.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2019-09-24 01:05:30.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +orderer0.example.com | "2019-09-24 01:05:30.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14aa Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 01:05:30.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ab Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2019-09-24 01:05:30.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +orderer0.example.com | "2019-09-24 01:05:30.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45µs " +orderer0.example.com | "2019-09-24 01:05:30.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:30.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14af Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.156 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +orderer0.example.com | "2019-09-24 01:05:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 3 on channel testchainid took 124.7µs" +orderer0.example.com | "2019-09-24 01:05:31.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b3 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +orderer0.example.com | "2019-09-24 01:05:31.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b4 Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +orderer0.example.com | "2019-09-24 01:05:31.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +orderer0.example.com | "2019-09-24 01:05:31.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.6µs " +orderer0.example.com | "2019-09-24 01:05:31.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +orderer0.example.com | "2019-09-24 01:05:31.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.9µs " +orderer0.example.com | "2019-09-24 01:05:31.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bc Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +orderer0.example.com | "2019-09-24 01:05:31.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +orderer0.example.com | "2019-09-24 01:05:31.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.8µs " +peer0.org1.example.com | "2019-09-24 01:04:46.841 UTC [msp] DeserializeIdentity -> DEBU 1368 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 1369 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 136a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 136b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.843 UTC [msp] DeserializeIdentity -> DEBU 136c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.843 UTC [msp] DeserializeIdentity -> DEBU 136d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.843 UTC [gossip.pull] SendDigest -> DEBU 136e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:46.844 UTC [gossip.gossip] handleMessage -> DEBU 136f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.846 UTC [gossip.comm] func1 -> DEBU 1370 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.846 UTC [gossip.gossip] handleMessage -> DEBU 1371 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.847 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1373 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1374 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.848 UTC [msp] DeserializeIdentity -> DEBU 1375 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1376 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1377 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1378 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 137a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 137b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.851 UTC [cauthdsl] func1 -> DEBU 137c 0xc0024757c0 gate 1569287086851031600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137d 0xc0024757c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137e 0xc0024757c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137f 0xc0024757c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:46.852 UTC [cauthdsl] func2 -> DEBU 1380 0xc0024757c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.852 UTC [cauthdsl] func1 -> DEBU 1381 0xc0024757c0 gate 1569287086851031600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.852 UTC [policies] Evaluate -> DEBU 1382 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.853 UTC [policies] Evaluate -> DEBU 1383 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.853 UTC [policies] Evaluate -> DEBU 1384 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.853 UTC [cauthdsl] func1 -> DEBU 1385 0xc0003e6070 gate 1569287086853871100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003e6070 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:31.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.6µs " +orderer0.example.com | "2019-09-24 01:05:31.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:31.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +orderer0.example.com | "2019-09-24 01:05:32.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.3µs " +orderer0.example.com | "2019-09-24 01:05:32.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c5 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 01:05:32.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c6 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +orderer0.example.com | "2019-09-24 01:05:32.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.7µs " +orderer0.example.com | "2019-09-24 01:05:32.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +orderer0.example.com | "2019-09-24 01:05:32.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.652 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.652 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2019-09-24 01:05:32.652 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +orderer0.example.com | "2019-09-24 01:05:32.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ce Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +orderer0.example.com | "2019-09-24 01:05:32.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cf Sending msg of 28 bytes to 3 on channel businesschannel took 25.5µs" +orderer0.example.com | "2019-09-24 01:05:32.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +orderer0.example.com | "2019-09-24 01:05:32.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.7µs " +orderer0.example.com | "2019-09-24 01:05:32.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:32.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +orderer0.example.com | "2019-09-24 01:05:33.159 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d6 Sending msg of 28 bytes to 3 on channel testchainid took 131.2µs" +orderer0.example.com | "2019-09-24 01:05:33.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d7 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +orderer0.example.com | "2019-09-24 01:05:33.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +orderer0.example.com | "2019-09-24 01:05:33.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.9µs " +orderer0.example.com | "2019-09-24 01:05:33.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.6µs " +orderer0.example.com | "2019-09-24 01:05:33.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dc Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.663 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2019-09-24 01:05:33.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.0074ms " +orderer0.example.com | "2019-09-24 01:05:33.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2019-09-24 01:05:33.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e1 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 01:05:33.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.3µs " +orderer0.example.com | "2019-09-24 01:05:33.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +peer0.org1.example.com | "2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1387 0xc0003e6070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1388 0xc0003e6070 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.855 UTC [msp.identity] Verify -> DEBU 1389 Verify: digest = 00000000 e5 fb c8 53 8e 61 60 37 39 1d f8 f3 08 12 6f 33 |...S.a`79.....o3| +peer0.org1.example.com | 00000010 18 a0 36 b2 51 3f 90 49 b6 41 ba 2f e2 e5 7e 2a |..6.Q?.I.A./..~*|" +peer0.org1.example.com | "2019-09-24 01:04:46.855 UTC [msp.identity] Verify -> DEBU 138a Verify: sig = 00000000 30 44 02 20 76 58 ae eb 68 d1 e0 f6 a1 cf 46 d1 |0D. vX..h.....F.| +peer0.org1.example.com | 00000010 73 bc c5 c9 1c 4d a2 7a a6 66 37 a4 c5 3d fa b7 |s....M.z.f7..=..| +peer0.org1.example.com | 00000020 1f 7f 3f 0f 02 20 3c d0 b7 eb 72 96 23 08 ae a3 |..?.. <...r.#...| +peer0.org1.example.com | 00000030 04 fb f9 98 1c 47 05 81 49 f8 29 25 1a 8d 32 6c |.....G..I.)%..2l| +peer0.org1.example.com | 00000040 b9 09 70 44 d1 fb |..pD..|" +peer0.org1.example.com | "2019-09-24 01:04:46.856 UTC [cauthdsl] func2 -> DEBU 138b 0xc0003e6070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.856 UTC [cauthdsl] func1 -> DEBU 138c 0xc0003e6070 gate 1569287086853871100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.857 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 1391 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 1392 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1393 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1394 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1395 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1396 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.859 UTC [gossip.discovery] sendMemResponse -> DEBU 1399 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:46.859 UTC [msp] DeserializeIdentity -> DEBU 139a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.860 UTC [msp] DeserializeIdentity -> DEBU 139b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.861 UTC [msp] DeserializeIdentity -> DEBU 139c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.861 UTC [gossip.comm] Send -> DEBU 139d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.862 UTC [gossip.discovery] sendMemResponse -> DEBU 139e Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:04:46.862 UTC [gossip.comm] sendToEndpoint -> DEBU 139f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.862 UTC [gossip.comm] sendToEndpoint -> DEBU 13a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.879 UTC [gossip.pull] Hello -> DEBU 13a1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.pull] Hello -> DEBU 13a3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.pull] Hello -> DEBU 13a5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +orderer0.example.com | "2019-09-24 01:05:33.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:33.912 UTC [orderer.common.server] Deliver -> DEBU 14e6 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:33.913 UTC [common.deliver] Handle -> DEBU 14e7 Starting new deliver loop for 172.18.0.5:53854" +orderer0.example.com | "2019-09-24 01:05:33.913 UTC [common.deliver] Handle -> DEBU 14e8 Attempting to read seek info message from 172.18.0.5:53854" +orderer0.example.com | "2019-09-24 01:05:33.934 UTC [orderer.common.server] Broadcast -> DEBU 14e9 Starting new Broadcast handler" +orderer0.example.com | "2019-09-24 01:05:33.934 UTC [orderer.common.broadcast] Handle -> DEBU 14ea Starting new broadcast loop for 172.18.0.5:53856" +orderer0.example.com | "2019-09-24 01:05:33.936 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14eb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53856" +orderer0.example.com | "2019-09-24 01:05:33.939 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 14ec Processing config update message for channel businesschannel" +orderer0.example.com | "2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:05:33.942 UTC [policies] Evaluate -> DEBU 14f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:33.943 UTC [policies] Evaluate -> DEBU 14f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:33.943 UTC [cauthdsl] func1 -> DEBU 14f2 0xc000de6d40 gate 1569287133943695700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:33.944 UTC [cauthdsl] func2 -> DEBU 14f3 0xc000de6d40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:33.945 UTC [cauthdsl] func2 -> DEBU 14f4 0xc000de6d40 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:33.945 UTC [cauthdsl] func2 -> DEBU 14f5 0xc000de6d40 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:33.946 UTC [msp.identity] Verify -> DEBU 14f6 Verify: digest = 00000000 49 b6 9f ef 30 f2 3a 76 13 a8 b7 19 b8 2e f8 ed |I...0.:v........| +orderer0.example.com | 00000010 cb 90 0b 66 ce 8d d3 28 b4 40 5c 57 de 98 26 ec |...f...(.@\W..&.|" +orderer0.example.com | "2019-09-24 01:05:33.950 UTC [msp.identity] Verify -> DEBU 14f7 Verify: sig = 00000000 30 45 02 21 00 b7 68 f2 8d 10 b4 d6 12 c0 ef 61 |0E.!..h........a| +orderer0.example.com | 00000010 93 d8 5d 40 ea f1 8d 2c de d7 03 7f b3 5f b5 c7 |..]@...,....._..| +orderer0.example.com | 00000020 b5 17 31 19 32 02 20 2b 5a 34 e4 4a 33 5a a4 f2 |..1.2. +Z4.J3Z..| +orderer0.example.com | 00000030 9a d9 d3 5d b9 01 e0 45 16 60 f0 57 45 ec 4c ff |...]...E.`.WE.L.| +orderer0.example.com | 00000040 bc 77 24 c4 7f 82 c1 |.w$....|" +orderer0.example.com | "2019-09-24 01:05:33.951 UTC [cauthdsl] func2 -> DEBU 14f8 0xc000de6d40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:33.951 UTC [cauthdsl] func1 -> DEBU 14f9 0xc000de6d40 gate 1569287133943695700 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fc Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14fe Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:33.957 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:33.957 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150b Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150c Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150d Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.959 UTC [common.configtx] addToMap -> DEBU 150e Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.959 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:33.960 UTC [common.configtx] addToMap -> DEBU 1510 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.960 UTC [common.configtx] addToMap -> DEBU 1511 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1512 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1513 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1514 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.962 UTC [common.configtx] addToMap -> DEBU 1515 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:33.962 UTC [common.configtx] addToMap -> DEBU 1516 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1517 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1518 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1519 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:33.964 UTC [common.configtx] addToMap -> DEBU 151a Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:33.964 UTC [common.configtx] addToMap -> DEBU 151b Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151d Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151e Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.966 UTC [common.configtx] policyForItem -> DEBU 151f Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:05:33.966 UTC [policies] Manager -> DEBU 1520 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 01:05:33.966 UTC [policies] Manager -> DEBU 1521 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1522 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1523 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1524 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1525 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1526 Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1527 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1528 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.969 UTC [policies] Evaluate -> DEBU 1529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-09-24 01:05:33.969 UTC [policies] Evaluate -> DEBU 152a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:33.970 UTC [policies] Evaluate -> DEBU 152b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:05:33.970 UTC [cauthdsl] deduplicate -> WARN 152c De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-09-24 01:05:33.970 UTC [cauthdsl] func1 -> DEBU 152d 0xc001053b00 gate 1569287133970817200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:33.971 UTC [cauthdsl] func2 -> DEBU 152e 0xc001053b00 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 01:05:33.971 UTC [cauthdsl] func2 -> DEBU 152f 0xc001053b00 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:33.972 UTC [cauthdsl] func2 -> DEBU 1530 0xc001053b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 01:05:33.972 UTC [cauthdsl] func2 -> DEBU 1531 0xc001053b00 processing identity 1 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:33.972 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1532 Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.972 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1533 Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.972 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:33.973 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:33.974 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:05:33.974 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:33.974 UTC [cauthdsl] func2 -> DEBU 1538 0xc001053b00 principal matched by identity 1" +orderer0.example.com | "2019-09-24 01:05:33.974 UTC [msp.identity] Verify -> DEBU 1539 Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 153a Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +orderer0.example.com | 00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +orderer0.example.com | 00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +orderer0.example.com | 00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +orderer0.example.com | 00000040 c9 eb 2b ab e2 96 |..+...|" +orderer0.example.com | "2019-09-24 01:05:33.975 UTC [cauthdsl] func2 -> DEBU 153b 0xc001053b00 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-09-24 01:05:33.975 UTC [cauthdsl] func1 -> DEBU 153c 0xc001053b00 gate 1569287133970817200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153d Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [cauthdsl] deduplicate -> WARN 1540 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [cauthdsl] func1 -> DEBU 1541 0xc00108a840 gate 1569287133976803400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [cauthdsl] func2 -> DEBU 1542 0xc00108a840 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [cauthdsl] func2 -> DEBU 1543 0xc00108a840 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1544 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1545 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.976 UTC [msp] Validate -> DEBU 1546 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [msp] getCertificationChain -> DEBU 1547 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [msp] hasOURole -> DEBU 1548 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [msp] getCertificationChain -> DEBU 1549 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [cauthdsl] func2 -> DEBU 154a 0xc00108a840 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [msp.identity] Verify -> DEBU 154b Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +orderer0.example.com | 00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [msp.identity] Verify -> DEBU 154c Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.comm] sendToEndpoint -> DEBU 13a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.881 UTC [gossip.comm] sendToEndpoint -> DEBU 13a9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.880 UTC [gossip.comm] sendToEndpoint -> DEBU 13a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.881 UTC [gossip.comm] sendToEndpoint -> DEBU 13aa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.882 UTC [gossip.comm] sendToEndpoint -> DEBU 13ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.882 UTC [gossip.comm] sendToEndpoint -> DEBU 13ac Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.883 UTC [gossip.comm] func1 -> DEBU 13ad Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.883 UTC [gossip.comm] func1 -> DEBU 13ae Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.884 UTC [gossip.comm] func1 -> DEBU 13af Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.883 UTC [gossip.gossip] handleMessage -> DEBU 13b0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.884 UTC [gossip.pull] HandleMessage -> DEBU 13b1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.885 UTC [gossip.gossip] handleMessage -> DEBU 13b2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.885 UTC [gossip.gossip] handleMessage -> DEBU 13b3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.886 UTC [gossip.pull] HandleMessage -> DEBU 13b4 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.886 UTC [gossip.pull] HandleMessage -> DEBU 13b7 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 13b9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13ba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151016 " +peer0.org1.example.com | "2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13bb Sign: digest: 86CC861171BCA47DDF52E5B1C5EB3BF3FE919D25B0D5C2C25FF7F5A18C1BC881 " +peer0.org1.example.com | "2019-09-24 01:04:46.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 13bc Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13bd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13be Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +orderer0.example.com | 00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +orderer0.example.com | 00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +orderer0.example.com | 00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +orderer0.example.com | 00000040 31 77 20 8d 0c 60 |1w ..`|" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [cauthdsl] func2 -> DEBU 154d 0xc00108a840 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [cauthdsl] func1 -> DEBU 154e 0xc00108a840 gate 1569287133976803400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 154f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1550 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1551 Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1552 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1553 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1554 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1555 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1556 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155c Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1560 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1561 Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1562 Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1563 Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1564 Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1565 Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1566 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1567 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1568 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1569 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 156a Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 156b Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.980 UTC [common.configtx] recurseConfigMap -> DEBU 156c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.980 UTC [common.configtx] recurseConfigMap -> DEBU 156d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.981 UTC [common.configtx] recurseConfigMap -> DEBU 156e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.981 UTC [common.configtx] recurseConfigMap -> DEBU 156f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:33.981 UTC [common.channelconfig] NewStandardValues -> DEBU 1570 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1571 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1572 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1573 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1575 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 1576 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:04:46.895 UTC [gossip.comm] Send -> DEBU 13bf Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.895 UTC [msp] DeserializeIdentity -> DEBU 13c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [gossip.comm] sendToEndpoint -> DEBU 13c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [gossip.comm] sendToEndpoint -> DEBU 13c2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [gossip.comm] Send -> DEBU 13c3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.comm] Send -> DEBU 13c5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [gossip.gossip] handleMessage -> DEBU 13cb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ce Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13cf Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +peer0.org1.example.com | 00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d0 Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +peer0.org1.example.com | 00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +peer0.org1.example.com | 00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +peer0.org1.example.com | 00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +peer0.org1.example.com | 00000040 35 45 33 bc c3 e3 ae |5E3....|" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d2 Verify: sig = 00000000 30 44 02 20 54 d0 0b e1 58 03 58 77 7b 48 1e 6d |0D. T...X.Xw{H.m| +peer0.org1.example.com | 00000010 c4 dd 2c ff 14 0f 32 cf ea 7b b9 c9 e5 17 bd 52 |..,...2..{.....R| +peer0.org1.example.com | 00000020 ec 5f c7 17 02 20 7a d9 ab 37 54 2d e5 25 ef 1f |._... z..7T-.%..| +peer0.org1.example.com | 00000030 3c 85 bd 86 42 af e6 68 6d e3 1f 3d 57 fa 48 00 |<...B..hm..=W.H.| +peer0.org1.example.com | 00000040 a6 dc 8d 46 bd 50 |...F.P|" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 13d3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1577 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1578 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 1579 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 157b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157c Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] Validate -> DEBU 157d Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [common.channelconfig] validateMSP -> DEBU 157e Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [msp] newBccspMsp -> DEBU 157f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [msp] New -> DEBU 1580 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.983 UTC [msp] Setup -> DEBU 1581 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [msp.identity] newIdentity -> DEBU 1582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 1585 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1586 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] Validate -> DEBU 1587 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] validateMSP -> DEBU 1588 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [msp] newBccspMsp -> DEBU 1589 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [msp] New -> DEBU 158a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [msp] Setup -> DEBU 158b Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [msp.identity] newIdentity -> DEBU 158c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 158d Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158e Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:33.985 UTC [common.channelconfig] NewStandardValues -> DEBU 158f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:33.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1590 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:33.985 UTC [common.channelconfig] Validate -> DEBU 1591 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:33.988 UTC [common.channelconfig] validateMSP -> DEBU 1592 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.988 UTC [msp] newBccspMsp -> DEBU 1593 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.988 UTC [msp] New -> DEBU 1594 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.988 UTC [msp] Setup -> DEBU 1595 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.988 UTC [msp.identity] newIdentity -> DEBU 1596 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] NewStandardValues -> DEBU 1597 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1598 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1599 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159a Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159b Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159c Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159d Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] NewStandardValues -> DEBU 159e Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [gossip.discovery] isSentByMe -> DEBU 13d4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 13d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13d6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.906 UTC [gossip.comm] func1 -> DEBU 13d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.906 UTC [gossip.comm] func1 -> DEBU 13d8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.906 UTC [gossip.gossip] handleMessage -> DEBU 13d9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.907 UTC [gossip.gossip] handleMessage -> DEBU 13da Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.907 UTC [gossip.gossip] handleMessage -> DEBU 13db Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.907 UTC [gossip.pull] HandleMessage -> DEBU 13dc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.907 UTC [msp] DeserializeIdentity -> DEBU 13dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13de Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13df Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [msp] DeserializeIdentity -> DEBU 13e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [msp] DeserializeIdentity -> DEBU 13e3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13e4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +peer0.org1.example.com | 00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [gossip.pull] SendDigest -> DEBU 13e7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +peer0.org1.example.com | 00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +peer0.org1.example.com | 00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +peer0.org1.example.com | 00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +peer0.org1.example.com | 00000040 4d 18 6c e0 bf e8 ab |M.l....|" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.gossip] handleMessage -> DEBU 13e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 13e9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ea Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13eb Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [msp.identity] Verify -> DEBU 13ec Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +peer0.org1.example.com | 00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [msp.identity] Verify -> DEBU 13ed Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +peer0.org1.example.com | 00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +peer0.org1.example.com | 00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +peer0.org1.example.com | 00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +peer0.org1.example.com | 00000040 35 45 33 bc c3 e3 ae |5E3....|" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.comm] func1 -> DEBU 13ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [gossip.discovery] isSentByMe -> DEBU 13f1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13f3 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 13f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [cauthdsl] func1 -> DEBU 13fb 0xc0001871d0 gate 1569287086913745000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [cauthdsl] func2 -> DEBU 13fc 0xc0001871d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13fd 0xc0001871d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13fe 0xc0001871d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13ff 0xc0001871d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.914 UTC [cauthdsl] func1 -> DEBU 1400 0xc0001871d0 gate 1569287086913745000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.914 UTC [policies] Evaluate -> DEBU 1401 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.915 UTC [policies] Evaluate -> DEBU 1402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.915 UTC [policies] Evaluate -> DEBU 1403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.915 UTC [cauthdsl] func1 -> DEBU 1404 0xc000187a90 gate 1569287086915540200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.915 UTC [cauthdsl] func2 -> DEBU 1405 0xc000187a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:46.916 UTC [cauthdsl] func2 -> DEBU 1406 0xc000187a90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.916 UTC [cauthdsl] func2 -> DEBU 1407 0xc000187a90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.916 UTC [msp.identity] Verify -> DEBU 1408 Verify: digest = 00000000 e5 fb c8 53 8e 61 60 37 39 1d f8 f3 08 12 6f 33 |...S.a`79.....o3| +peer0.org1.example.com | 00000010 18 a0 36 b2 51 3f 90 49 b6 41 ba 2f e2 e5 7e 2a |..6.Q?.I.A./..~*|" +peer0.org1.example.com | "2019-09-24 01:04:46.916 UTC [msp.identity] Verify -> DEBU 1409 Verify: sig = 00000000 30 44 02 20 76 58 ae eb 68 d1 e0 f6 a1 cf 46 d1 |0D. vX..h.....F.| +peer0.org1.example.com | 00000010 73 bc c5 c9 1c 4d a2 7a a6 66 37 a4 c5 3d fa b7 |s....M.z.f7..=..| +peer0.org1.example.com | 00000020 1f 7f 3f 0f 02 20 3c d0 b7 eb 72 96 23 08 ae a3 |..?.. <...r.#...| +peer0.org1.example.com | 00000030 04 fb f9 98 1c 47 05 81 49 f8 29 25 1a 8d 32 6c |.....G..I.)%..2l| +peer0.org1.example.com | 00000040 b9 09 70 44 d1 fb |..pD..|" +peer0.org1.example.com | "2019-09-24 01:04:46.917 UTC [cauthdsl] func2 -> DEBU 140a 0xc000187a90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.gossip] handleMessage -> DEBU 13ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.919 UTC [cauthdsl] func1 -> DEBU 140b 0xc000187a90 gate 1569287086915540200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:46.919 UTC [policies] Evaluate -> DEBU 140c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.920 UTC [policies] Evaluate -> DEBU 140d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.920 UTC [policies] Evaluate -> DEBU 140e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.922 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.920 UTC [gossip.comm] func1 -> DEBU 140f Got message: GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1411 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1412 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1413 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1414 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1415 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.924 UTC [msp.identity] Verify -> DEBU 1416 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +orderer0.example.com | "2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159f Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:05:33.991 UTC [common.channelconfig] NewStandardValues -> DEBU 15a0 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:33.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a1 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:33.992 UTC [common.channelconfig] validateMSP -> DEBU 15a2 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:33.992 UTC [msp] newBccspMsp -> DEBU 15a3 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.992 UTC [msp] New -> DEBU 15a4 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:33.992 UTC [msp] Setup -> DEBU 15a5 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:33.993 UTC [msp.identity] newIdentity -> DEBU 15a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:33.994 UTC [msp.identity] newIdentity -> DEBU 15a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:33.995 UTC [msp] Validate -> DEBU 15a8 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:33.995 UTC [msp] Setup -> DEBU 15a9 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [msp] Setup -> DEBU 15aa MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ab Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ac Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ad Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ae Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15af Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15b0 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b1 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b2 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:33.997 UTC [policies] GetPolicy -> DEBU 15b5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] GetPolicy -> DEBU 15b6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.998 UTC [policies] GetPolicy -> DEBU 15bb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] GetPolicy -> DEBU 15bc Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c5 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.001 UTC [policies] NewManagerImpl -> DEBU 15c6 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.001 UTC [policies] NewManagerImpl -> DEBU 15c7 Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:05:34.001 UTC [common.configtx] addToMap -> DEBU 15c8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:34.001 UTC [common.configtx] addToMap -> DEBU 15c9 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15ca Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cb Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | 00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +peer0.org1.example.com | "2019-09-24 01:04:46.925 UTC [msp.identity] Verify -> DEBU 1417 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +peer0.org1.example.com | 00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +peer0.org1.example.com | 00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +peer0.org1.example.com | 00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +peer0.org1.example.com | 00000040 4d 18 6c e0 bf e8 ab |M.l....|" +peer0.org1.example.com | "2019-09-24 01:04:46.925 UTC [gossip.gossip] handleMessage -> DEBU 1418 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1419 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 141a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 141b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.892 UTC [msp.identity] Verify -> DEBU 141c Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +peer0.org1.example.com | 00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [msp.identity] Verify -> DEBU 141d Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +peer0.org1.example.com | 00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +peer0.org1.example.com | 00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +peer0.org1.example.com | 00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +peer0.org1.example.com | 00000040 35 45 33 bc c3 e3 ae |5E3....|" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 141e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.896 UTC [gossip.discovery] isSentByMe -> DEBU 141f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 1420 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1421 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.891 UTC [gossip.gossip] handleMessage -> DEBU 1422 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.897 UTC [gossip.gossip] handleMessage -> DEBU 1423 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1424 Got message: GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1425 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [msp] DeserializeIdentity -> DEBU 1426 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1427 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1428 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1429 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.900 UTC [cauthdsl] func1 -> DEBU 142d 0xc0003f95a0 gate 1569287086900868800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 142e 0xc0003f95a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 142f 0xc0003f95a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 1430 0xc0003f95a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 1431 0xc0003f95a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.901 UTC [cauthdsl] func1 -> DEBU 1432 0xc0003f95a0 gate 1569287086900868800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1433 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1435 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [cauthdsl] func1 -> DEBU 1436 0xc0003f9de0 gate 1569287086902486300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [cauthdsl] func2 -> DEBU 1437 0xc0003f9de0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:46.902 UTC [cauthdsl] func2 -> DEBU 1438 0xc0003f9de0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:46.903 UTC [cauthdsl] func2 -> DEBU 1439 0xc0003f9de0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.903 UTC [msp.identity] Verify -> DEBU 143a Verify: digest = 00000000 aa 7b 37 3a 35 a6 f2 b8 5f 05 43 3d cd 41 0c cb |.{7:5..._.C=.A..| +peer0.org1.example.com | 00000010 9e 97 6e 18 69 97 f5 b6 0e 89 d7 4e 8c 5f 8b da |..n.i......N._..|" +peer0.org1.example.com | "2019-09-24 01:04:46.903 UTC [msp.identity] Verify -> DEBU 143b Verify: sig = 00000000 30 45 02 21 00 b5 ab 0c 58 e4 ab 95 5d ba 6a 98 |0E.!....X...].j.| +peer0.org1.example.com | 00000010 36 04 68 bf 6e e9 83 f2 58 66 42 59 c1 bd 21 a7 |6.h.n...XfBY..!.| +peer0.org1.example.com | 00000020 6a ff 61 b9 23 02 20 75 ac a0 3e 2f 0d a1 21 94 |j.a.#. u..>/..!.| +peer0.org1.example.com | 00000030 8a 16 12 5c 1c 0b db db fe 5a 52 45 fa 13 4f f5 |...\.....ZRE..O.| +peer0.org1.example.com | 00000040 eb d5 88 9c 99 99 38 |......8|" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [cauthdsl] func2 -> DEBU 143c 0xc0003f9de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [cauthdsl] func1 -> DEBU 143d 0xc0003f9de0 gate 1569287086902486300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [policies] Evaluate -> DEBU 143e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.908 UTC [policies] Evaluate -> DEBU 143f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [policies] Evaluate -> DEBU 1440 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.909 UTC [policies] Evaluate -> DEBU 1441 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 1442 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1443 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1444 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1445 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 1446 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 1447 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 1448 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [gossip.discovery] sendMemResponse -> DEBU 1449 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 144b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 144c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [msp] DeserializeIdentity -> DEBU 144d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [gossip.comm] Send -> DEBU 144e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:46.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 144a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1450 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1451 Exiting" +orderer0.example.com | "2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.010 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:34.010 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:05:34.010 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fa As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:05:34.010 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fb As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.010 UTC [policies] Manager -> DEBU 15fc Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:05:34.011 UTC [policies] Manager -> DEBU 15fd Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.011 UTC [policies] Manager -> DEBU 15fe Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 15ff Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 1600 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 1601 Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.013 UTC [policies] Manager -> DEBU 1602 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 01:04:46.913 UTC [gossip.discovery] sendMemResponse -> DEBU 144f Exiting, replying with alive: alive:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > alive: alive: " +peer0.org1.example.com | "2019-09-24 01:04:48.545 UTC [gossip.comm] func1 -> DEBU 1452 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.545 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.546 UTC [gossip.gossip] handleMessage -> DEBU 1454 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1455 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1456 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:48.547 UTC [msp.identity] Verify -> DEBU 1457 Verify: digest = 00000000 8f e6 97 0a 64 21 37 0f 43 3c df 95 b4 9a 25 69 |....d!7.C<....%i| +peer0.org1.example.com | 00000010 7a 2a 18 a1 bd a4 08 da 61 69 3d 54 c5 b3 d8 e9 |z*......ai=T....|" +peer0.org1.example.com | "2019-09-24 01:04:48.547 UTC [msp.identity] Verify -> DEBU 1458 Verify: sig = 00000000 30 44 02 20 63 0d 9b 89 5b 55 31 30 03 32 38 59 |0D. c...[U10.28Y| +peer0.org1.example.com | 00000010 54 5e a5 f8 24 d5 5b b5 49 0c 63 d1 60 6c d6 ca |T^..$.[.I.c.`l..| +peer0.org1.example.com | 00000020 a8 f3 b2 65 02 20 06 26 b1 c6 92 3b bc f3 73 a3 |...e. .&...;..s.| +peer0.org1.example.com | 00000030 d4 b6 a2 d7 a2 ab 3a 47 2b 20 60 5e 9e 94 ec a2 |......:G+ `^....| +peer0.org1.example.com | 00000040 c7 2c 3e b4 09 e9 |.,>...|" +peer0.org1.example.com | "2019-09-24 01:04:48.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1459 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:48.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 145d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:48.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 145e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 145f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1460 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.555 UTC [gossip.comm] func1 -> DEBU 1461 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.555 UTC [gossip.gossip] handleMessage -> DEBU 1462 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.555 UTC [gossip.gossip] handleMessage -> DEBU 1463 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1464 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1465 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.556 UTC [gossip.comm] func1 -> DEBU 1466 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.556 UTC [gossip.gossip] handleMessage -> DEBU 1467 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.556 UTC [gossip.gossip] handleMessage -> DEBU 1468 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.557 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1469 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.558 UTC [msp] DeserializeIdentity -> DEBU 146b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:48.558 UTC [msp] DeserializeIdentity -> DEBU 146c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:48.560 UTC [msp] DeserializeIdentity -> DEBU 146d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:48.561 UTC [gossip.comm] Send -> DEBU 146e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:48.561 UTC [gossip.comm] sendToEndpoint -> DEBU 146f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.561 UTC [gossip.comm] sendToEndpoint -> DEBU 1470 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:48.561 UTC [msp] DeserializeIdentity -> DEBU 1471 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:48.562 UTC [gossip.comm] Send -> DEBU 1472 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:48.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1473 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:48.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1474 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.163 UTC [gossip.comm] func1 -> DEBU 1475 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.163 UTC [gossip.gossip] handleMessage -> DEBU 1476 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.163 UTC [gossip.gossip] handleMessage -> DEBU 1477 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1478 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1479 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:49.164 UTC [msp] DeserializeIdentity -> DEBU 147a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 147b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 147c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 147d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.165 UTC [policies] Evaluate -> DEBU 147e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.166 UTC [policies] Evaluate -> DEBU 147f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.166 UTC [policies] Evaluate -> DEBU 1480 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.166 UTC [cauthdsl] func1 -> DEBU 1481 0xc00030ce20 gate 1569287089166684300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.166 UTC [cauthdsl] func2 -> DEBU 1482 0xc00030ce20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1483 0xc00030ce20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1484 0xc00030ce20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1485 0xc00030ce20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1604 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1605 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:05:34.013 UTC [policies] Manager -> DEBU 1606 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1607 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1608 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1609 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:05:34.015 UTC [policies] Manager -> DEBU 160a Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160c As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160d As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160e As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:05:34.016 UTC [common.capabilities] Supported -> DEBU 160f Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:05:34.016 UTC [common.capabilities] Supported -> DEBU 1610 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:05:34.016 UTC [msp] GetDefaultSigningIdentity -> DEBU 1611 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:34.017 UTC [msp] GetDefaultSigningIdentity -> DEBU 1612 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:34.017 UTC [msp.identity] Sign -> DEBU 1613 Sign: plaintext: 0AD2060A1B08011A0608DED7A5EC0522...451660F05745EC4CFFBC7724C47F82C1 " +orderer0.example.com | "2019-09-24 01:05:34.017 UTC [msp.identity] Sign -> DEBU 1614 Sign: digest: E83B6CB0CB64331C602EDC169A72C77EB57C913FF29C89149EAF224BD7B41D39 " +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1615 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1616 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1617 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1618 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1619 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.018 UTC [msp] DeserializeIdentity -> DEBU 161a Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:34.019 UTC [msp.identity] newIdentity -> DEBU 161b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +orderer0.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +orderer0.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +orderer0.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +orderer0.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +orderer0.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +orderer0.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +orderer0.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +orderer0.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +orderer0.example.com | fQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.019 UTC [cauthdsl] func1 -> DEBU 161c 0xc0001d1240 gate 1569287134019658800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161d 0xc0001d1240 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161e 0xc0001d1240 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161f 0xc0001d1240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [cauthdsl] func2 -> DEBU 1620 0xc0001d1240 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [cauthdsl] func1 -> DEBU 1621 0xc0001d1240 gate 1569287134019658800 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [cauthdsl] func1 -> DEBU 1625 0xc00044a3b0 gate 1569287134020644100 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.020 UTC [cauthdsl] func2 -> DEBU 1626 0xc00044a3b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1627 0xc00044a3b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1628 0xc00044a3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1629 0xc00044a3b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [cauthdsl] func1 -> DEBU 162a 0xc00044a3b0 gate 1569287134020644100 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [policies] Evaluate -> DEBU 162b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [policies] Evaluate -> DEBU 162c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.021 UTC [policies] func1 -> DEBU 162d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +orderer0.example.com | "2019-09-24 01:05:34.022 UTC [policies] Evaluate -> DEBU 162e Signature set did not satisfy policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 162f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2019-09-24 01:05:34.024 UTC [cauthdsl] func1 -> DEBU 1633 0xc00044b0c0 gate 1569287134023946200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.024 UTC [cauthdsl] func2 -> DEBU 1634 0xc00044b0c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.024 UTC [cauthdsl] func2 -> DEBU 1635 0xc00044b0c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.024 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1636 Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:34.024 UTC [msp] Validate -> DEBU 1637 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:34.025 UTC [cauthdsl] func2 -> DEBU 1638 0xc00044b0c0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:34.025 UTC [msp.identity] Verify -> DEBU 1639 Verify: digest = 00000000 e8 3b 6c b0 cb 64 33 1c 60 2e dc 16 9a 72 c7 7e |.;l..d3.`....r.~| +orderer0.example.com | 00000010 b5 7c 91 3f f2 9c 89 14 9e af 22 4b d7 b4 1d 39 |.|.?......"K...9|" +orderer0.example.com | "2019-09-24 01:05:34.025 UTC [msp.identity] Verify -> DEBU 163a Verify: sig = 00000000 30 45 02 21 00 c2 c4 e5 1d c9 50 29 43 06 ff 62 |0E.!......P)C..b| +orderer0.example.com | 00000010 a2 4d 31 63 8f d4 19 45 73 28 e7 aa 84 be 07 cb |.M1c...Es(......| +orderer0.example.com | 00000020 7a 8b 70 c7 0d 02 20 43 38 d8 58 1a 1f 12 97 1d |z.p... C8.X.....| +orderer0.example.com | 00000030 b9 9a 26 76 46 99 eb a4 61 0a f0 b7 be bc b1 cb |..&vF...a.......| +orderer0.example.com | 00000040 18 c1 b7 68 5e f4 30 |...h^.0|" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [cauthdsl] func2 -> DEBU 163b 0xc00044b0c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [cauthdsl] func1 -> DEBU 163c 0xc00044b0c0 gate 1569287134023946200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163f Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 1640 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 1641 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [policies] Evaluate -> DEBU 1642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [orderer.common.msgprocessor] Apply -> DEBU 1643 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] NewStandardValues -> DEBU 1644 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1645 Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1646 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1647 Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1648 Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1649 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.028 UTC [common.channelconfig] NewStandardValues -> DEBU 164a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164b Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164c Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164d Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164e Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164f Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1650 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] NewStandardValues -> DEBU 1651 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1652 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] NewStandardValues -> DEBU 1653 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1654 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.030 UTC [common.channelconfig] validateMSP -> DEBU 1655 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.030 UTC [msp] newBccspMsp -> DEBU 1656 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.030 UTC [msp] New -> DEBU 1657 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.030 UTC [msp] Setup -> DEBU 1658 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:34.031 UTC [msp.identity] newIdentity -> DEBU 1659 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | "2019-09-24 01:04:49.167 UTC [cauthdsl] func1 -> DEBU 1486 0xc00030ce20 gate 1569287089166684300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.168 UTC [policies] Evaluate -> DEBU 1487 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.168 UTC [policies] Evaluate -> DEBU 1488 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.169 UTC [policies] Evaluate -> DEBU 1489 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.170 UTC [cauthdsl] func1 -> DEBU 148a 0xc00030dc90 gate 1569287089170580100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.170 UTC [cauthdsl] func2 -> DEBU 148b 0xc00030dc90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.170 UTC [cauthdsl] func2 -> DEBU 148c 0xc00030dc90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.171 UTC [cauthdsl] func2 -> DEBU 148d 0xc00030dc90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.171 UTC [msp.identity] Verify -> DEBU 148e Verify: digest = 00000000 bb fd 90 e3 6b 22 0d 01 1e 67 d1 91 d4 95 bc ce |....k"...g......| +peer0.org1.example.com | 00000010 f9 d2 cc fb 41 f7 f9 e9 88 f6 4c 0a 76 b4 5a d6 |....A.....L.v.Z.|" +peer0.org1.example.com | "2019-09-24 01:04:49.171 UTC [msp.identity] Verify -> DEBU 148f Verify: sig = 00000000 30 45 02 21 00 a6 80 d2 af ec f7 78 68 59 2b 01 |0E.!.......xhY+.| +peer0.org1.example.com | 00000010 6a 39 02 29 b5 ad e2 15 bd fb dc 3d 86 22 d8 13 |j9.).......=."..| +peer0.org1.example.com | 00000020 9e 40 11 1a d6 02 20 32 8d 39 ad 04 ec d8 a0 df |.@.... 2.9......| +peer0.org1.example.com | 00000030 d8 ec 69 60 70 cd 1e 65 8b d2 41 55 d6 bd 98 c8 |..i`p..e..AU....| +peer0.org1.example.com | 00000040 e1 f1 97 b9 e1 4c 49 |.....LI|" +peer0.org1.example.com | "2019-09-24 01:04:49.171 UTC [cauthdsl] func2 -> DEBU 1490 0xc00030dc90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.171 UTC [cauthdsl] func1 -> DEBU 1491 0xc00030dc90 gate 1569287089170580100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1492 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1493 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1494 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.174 UTC [policies] Evaluate -> DEBU 1495 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 1496 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1497 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:49.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 1498 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:49.177 UTC [gossip.comm] func1 -> DEBU 1499 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 149a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:49.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 149b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:49.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 149c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 149d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.178 UTC [gossip.discovery] handleMsgFromComm -> DEBU 149e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.179 UTC [gossip.gossip] handleMessage -> DEBU 149f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.179 UTC [gossip.gossip] handleMessage -> DEBU 14a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.187 UTC [gossip.comm] func1 -> DEBU 14a1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.188 UTC [msp] DeserializeIdentity -> DEBU 14a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.187 UTC [gossip.comm] func1 -> DEBU 14a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14a9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14ab Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.200 UTC [msp] DeserializeIdentity -> DEBU 14aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14ac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.201 UTC [msp] DeserializeIdentity -> DEBU 14ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14af Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.201 UTC [msp] DeserializeIdentity -> DEBU 14b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.203 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b3 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:49.203 UTC [msp] DeserializeIdentity -> DEBU 14b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.203 UTC [gossip.comm] func1 -> DEBU 14b5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.209 UTC [gossip.comm] func1 -> DEBU 14b6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.210 UTC [gossip.gossip] handleMessage -> DEBU 14b7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.210 UTC [gossip.gossip] handleMessage -> DEBU 14b9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.202 UTC [gossip.comm] Send -> DEBU 14b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.211 UTC [msp] DeserializeIdentity -> DEBU 14bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.211 UTC [gossip.comm] Send -> DEBU 14bc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.211 UTC [gossip.comm] sendToEndpoint -> DEBU 14bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.211 UTC [gossip.comm] sendToEndpoint -> DEBU 14be Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.212 UTC [gossip.comm] sendToEndpoint -> DEBU 14bf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.212 UTC [gossip.comm] sendToEndpoint -> DEBU 14c0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.211 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func1 -> DEBU 14c5 0xc002a92750 gate 1569287089222203300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c6 0xc002a92750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c7 0xc002a92750 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c8 0xc002a92750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c9 0xc002a92750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [cauthdsl] func1 -> DEBU 14ca 0xc002a92750 gate 1569287089222203300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.222 UTC [policies] Evaluate -> DEBU 14cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.223 UTC [policies] Evaluate -> DEBU 14cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.223 UTC [policies] Evaluate -> DEBU 14cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.223 UTC [cauthdsl] func1 -> DEBU 14ce 0xc002a93020 gate 1569287089223612800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.223 UTC [cauthdsl] func2 -> DEBU 14cf 0xc002a93020 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.229 UTC [msp] GetDefaultSigningIdentity -> DEBU 14d0 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:49.229 UTC [msp.identity] Sign -> DEBU 14d2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151017 " +peer0.org1.example.com | "2019-09-24 01:04:49.229 UTC [msp.identity] Sign -> DEBU 14d3 Sign: digest: D8A48B08EB9185A28F2572A9660C88B8EABCB1646D9C4F83350BDD1AC8F9D30B " +peer0.org1.example.com | "2019-09-24 01:04:49.229 UTC [cauthdsl] func2 -> DEBU 14d1 0xc002a93020 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.230 UTC [cauthdsl] func2 -> DEBU 14d4 0xc002a93020 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.230 UTC [msp.identity] Verify -> DEBU 14d5 Verify: digest = 00000000 a0 c6 0b 00 e8 49 91 34 f9 47 5d 38 22 86 08 32 |.....I.4.G]8"..2| +peer0.org1.example.com | 00000010 49 09 1d e0 be dd 98 a3 7a 5b 62 3b c1 6c 8c 2c |I.......z[b;.l.,|" +peer0.org1.example.com | "2019-09-24 01:04:49.230 UTC [msp.identity] Verify -> DEBU 14d7 Verify: sig = 00000000 30 45 02 21 00 ae ce 1a 43 66 d9 f1 68 2b 50 d3 |0E.!....Cf..h+P.| +peer0.org1.example.com | 00000010 96 6f af 85 82 1f af 90 3c a4 cc 0a 4c a8 d4 8b |.o......<...L...| +peer0.org1.example.com | 00000020 c0 79 a1 dd e1 02 20 3d f7 b0 5d 7c 39 83 e6 8d |.y.... =..]|9...| +peer0.org1.example.com | 00000030 18 43 09 30 16 7c 3d 3d 15 c2 28 d1 93 cf 16 45 |.C.0.|==..(....E| +peer0.org1.example.com | 00000040 db 1a b2 40 6e 8d 3d |...@n.=|" +peer0.org1.example.com | "2019-09-24 01:04:49.230 UTC [msp] GetDefaultSigningIdentity -> DEBU 14d6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:49.230 UTC [msp.identity] Sign -> DEBU 14d8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:49.231 UTC [msp.identity] Sign -> DEBU 14d9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:49.231 UTC [gossip.discovery] periodicalSendAlive -> DEBU 14da Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:49.231 UTC [cauthdsl] func2 -> DEBU 14db 0xc002a93020 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.231 UTC [cauthdsl] func1 -> DEBU 14dc 0xc002a93020 gate 1569287089223612800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.232 UTC [msp] DeserializeIdentity -> DEBU 14dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [msp] DeserializeIdentity -> DEBU 14df Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [msp] DeserializeIdentity -> DEBU 14e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [gossip.comm] Send -> DEBU 14e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] Send -> DEBU 14e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] Send -> DEBU 14e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14ea Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.235 UTC [gossip.comm] sendToEndpoint -> DEBU 14eb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.235 UTC [gossip.comm] sendToEndpoint -> DEBU 14ec Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14e9 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.032 UTC [msp.identity] newIdentity -> DEBU 165a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.033 UTC [msp] Validate -> DEBU 165b MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 165c Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165d Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165e Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 165f Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1660 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 1661 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1662 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.035 UTC [common.channelconfig] Validate -> DEBU 1663 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 01:05:34.035 UTC [common.channelconfig] validateMSP -> DEBU 1664 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.035 UTC [msp] newBccspMsp -> DEBU 1665 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.035 UTC [msp] New -> DEBU 1666 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.035 UTC [msp] Setup -> DEBU 1667 Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.036 UTC [msp.identity] newIdentity -> DEBU 1668 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | "2019-09-24 01:04:49.238 UTC [policies] Evaluate -> DEBU 14ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.252 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ee Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14ef Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.253 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14f7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14f9 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14fb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.255 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14fc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.255 UTC [msp] DeserializeIdentity -> DEBU 14fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.255 UTC [msp] DeserializeIdentity -> DEBU 14fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 14ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1500 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1502 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1503 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.257 UTC [gossip.comm] Send -> DEBU 1504 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.257 UTC [msp] DeserializeIdentity -> DEBU 1505 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.258 UTC [gossip.comm] Send -> DEBU 1506 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1508 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1509 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.259 UTC [gossip.comm] sendToEndpoint -> DEBU 150a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.689 UTC [msp] DeserializeIdentity -> DEBU 150b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.691 UTC [msp] DeserializeIdentity -> DEBU 150c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.691 UTC [gossip.comm] Send -> DEBU 150d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.692 UTC [gossip.comm] sendToEndpoint -> DEBU 150e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.692 UTC [gossip.comm] sendToEndpoint -> DEBU 150f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1510 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1511 Exiting" +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.036 UTC [common.channelconfig] NewStandardValues -> DEBU 1669 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166a Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 166b Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166c Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] Validate -> DEBU 166d Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] validateMSP -> DEBU 166e Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] newBccspMsp -> DEBU 166f Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] New -> DEBU 1670 Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] Setup -> DEBU 1671 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp.identity] newIdentity -> DEBU 1672 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 1673 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1674 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 1675 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1676 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] Validate -> DEBU 1677 Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [common.channelconfig] validateMSP -> DEBU 1678 Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] newBccspMsp -> DEBU 1679 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] New -> DEBU 167a Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.037 UTC [msp] Setup -> DEBU 167b Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [msp.identity] newIdentity -> DEBU 167c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [msp] Setup -> DEBU 167d Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [msp] Setup -> DEBU 167e MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 167f Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1680 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1681 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1682 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1683 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1684 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1685 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1512 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1513 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.694 UTC [gossip.comm] func1 -> DEBU 1514 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.695 UTC [gossip.gossip] handleMessage -> DEBU 1515 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.695 UTC [msp.identity] Verify -> DEBU 1516 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:49.695 UTC [msp.identity] Verify -> DEBU 1517 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:49.695 UTC [gossip.comm] func1 -> DEBU 1518 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.696 UTC [msp.identity] Verify -> DEBU 1519 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:49.696 UTC [gossip.comm] func1 -> DEBU 151a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.696 UTC [msp.identity] Verify -> DEBU 151b Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:49.696 UTC [msp] DeserializeIdentity -> DEBU 151c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.696 UTC [msp] DeserializeIdentity -> DEBU 151d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 151e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 151f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1520 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.697 UTC [policies] Evaluate -> DEBU 1521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.697 UTC [policies] Evaluate -> DEBU 1522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [policies] Evaluate -> DEBU 1523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [cauthdsl] func1 -> DEBU 1524 0xc00303b0e0 gate 1569287089698370400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1525 0xc00303b0e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1526 0xc00303b0e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1527 0xc00303b0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1528 0xc00303b0e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [cauthdsl] func1 -> DEBU 1529 0xc00303b0e0 gate 1569287089698370400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [cauthdsl] func1 -> DEBU 152d 0xc00303b920 gate 1569287089699632700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [cauthdsl] func2 -> DEBU 152e 0xc00303b920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.699 UTC [cauthdsl] func2 -> DEBU 152f 0xc00303b920 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [cauthdsl] func2 -> DEBU 1530 0xc00303b920 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [msp.identity] Verify -> DEBU 1531 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [msp.identity] Verify -> DEBU 1532 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [cauthdsl] func2 -> DEBU 1533 0xc00303b920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [cauthdsl] func1 -> DEBU 1534 0xc00303b920 gate 1569287089699632700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1535 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1537 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [policies] Evaluate -> DEBU 1538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [msp] DeserializeIdentity -> DEBU 1539 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [msp] DeserializeIdentity -> DEBU 153a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 153b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 153c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 153d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.701 UTC [policies] Evaluate -> DEBU 153e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 153f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func1 -> DEBU 1541 0xc00304d120 gate 1569287089702294900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1542 0xc00304d120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1543 0xc00304d120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1544 0xc00304d120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1545 0xc00304d120 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [cauthdsl] func1 -> DEBU 1546 0xc00304d120 gate 1569287089702294900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1547 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [cauthdsl] func1 -> DEBU 154a 0xc00304d960 gate 1569287089703142000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154b 0xc00304d960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154c 0xc00304d960 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154d 0xc00304d960 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [msp.identity] Verify -> DEBU 154e Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [msp.identity] Verify -> DEBU 154f Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1686 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1687 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1688 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1689 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168a Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168b Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168e Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 1690 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1691 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1692 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1693 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1694 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1695 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1696 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.039 UTC [policies] NewManagerImpl -> DEBU 1697 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 1698 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 1699 Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 169a Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 169b Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:05:34.041 UTC [common.configtx] addToMap -> DEBU 169c Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169e Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169f Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a5 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16aa Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ab Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:34.054 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.054 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b3 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b4 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b6 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b7 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16b8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16b9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16ba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16bb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 1550 0xc00304d960 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.704 UTC [cauthdsl] func1 -> DEBU 1551 0xc00304d960 gate 1569287089703142000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1552 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1554 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1555 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [gossip.gossip] handleMessage -> DEBU 1556 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [gossip.gossip] handleMessage -> DEBU 1557 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.707 UTC [msp] DeserializeIdentity -> DEBU 1558 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [msp] DeserializeIdentity -> DEBU 1559 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [msp] DeserializeIdentity -> DEBU 155a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 155b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 155c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 155d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.708 UTC [policies] Evaluate -> DEBU 155e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.709 UTC [policies] Evaluate -> DEBU 155f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.709 UTC [policies] Evaluate -> DEBU 1560 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.709 UTC [cauthdsl] func1 -> DEBU 1561 0xc0030d34a0 gate 1569287089709554700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.709 UTC [cauthdsl] func2 -> DEBU 1562 0xc0030d34a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.710 UTC [cauthdsl] func2 -> DEBU 1563 0xc0030d34a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.711 UTC [cauthdsl] func2 -> DEBU 1564 0xc0030d34a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.711 UTC [cauthdsl] func2 -> DEBU 1565 0xc0030d34a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.714 UTC [cauthdsl] func1 -> DEBU 1566 0xc0030d34a0 gate 1569287089709554700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1567 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1568 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1569 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.715 UTC [cauthdsl] func1 -> DEBU 156a 0xc0030d3ce0 gate 1569287089715705600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.715 UTC [cauthdsl] func2 -> DEBU 156b 0xc0030d3ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 156c 0xc0030d3ce0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 156d 0xc0030d3ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.716 UTC [msp.identity] Verify -> DEBU 156e Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:49.716 UTC [msp.identity] Verify -> DEBU 156f Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 1570 0xc0030d3ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.717 UTC [cauthdsl] func1 -> DEBU 1571 0xc0030d3ce0 gate 1569287089715705600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1572 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16bd Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16be Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16bf Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c3 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c4 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c5 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c6 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:34.061 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16ce [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53856" +orderer0.example.com | "2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] propose -> INFO 16cf Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 16d0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16d1 Proposed block [6] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:34.069 UTC [common.deliver] Handle -> WARN 16d2 Error reading from 172.18.0.5:53854: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:34.073 UTC [orderer.common.server] func1 -> DEBU 16d3 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:34.074 UTC [comm.grpc.server] 1 -> INFO 16d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53854 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=162.7584ms +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [grpc] infof -> DEBU 16d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [grpc] warningf -> DEBU 16d6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53856: read: connection reset by peer" +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [orderer.common.broadcast] Handle -> WARN 16d7 Error reading from 172.18.0.5:53856: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [orderer.common.server] func1 -> DEBU 16d8 Closing Broadcast stream" +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [comm.grpc.server] 1 -> INFO 16d9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53856 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=141.5818ms +orderer0.example.com | "2019-09-24 01:05:34.075 UTC [grpc] infof -> DEBU 16da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:34.116 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16db Sending msg of 37611 bytes to 2 on channel businesschannel took 20.5µs" +orderer0.example.com | "2019-09-24 01:05:34.116 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dc Sending msg of 37611 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2019-09-24 01:05:34.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16dd Send of ConsensusRequest for channel businesschannel with payload of size 37611 to orderer2.example.com(orderer2.example.com:7050) took 88.2µs " +orderer0.example.com | "2019-09-24 01:05:34.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16de Send of ConsensusRequest for channel businesschannel with payload of size 37611 to orderer1.example.com(orderer1.example.com:7050) took 55.8µs " +orderer0.example.com | "2019-09-24 01:05:34.122 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16df Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e0 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +orderer0.example.com | "2019-09-24 01:05:34.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e1 Sending msg of 28 bytes to 3 on channel businesschannel took 140.5µs" +orderer0.example.com | "2019-09-24 01:05:34.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.5µs " +orderer0.example.com | "2019-09-24 01:05:34.124 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16e3 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2019-09-24 01:05:34.125 UTC [common.configtx] addToMap -> DEBU 16e4 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:34.125 UTC [common.configtx] addToMap -> DEBU 16e5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e7 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e8 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e9 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ea Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16eb Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ed Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1573 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1574 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1575 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.718 UTC [msp.identity] Verify -> DEBU 1576 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:49.718 UTC [msp.identity] Verify -> DEBU 1577 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:49.720 UTC [msp] DeserializeIdentity -> DEBU 1578 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.720 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [cauthdsl] func1 -> DEBU 1580 0xc003193be0 gate 1569287089722508400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [cauthdsl] func2 -> DEBU 1581 0xc003193be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.722 UTC [cauthdsl] func2 -> DEBU 1582 0xc003193be0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [cauthdsl] func2 -> DEBU 1583 0xc003193be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [cauthdsl] func2 -> DEBU 1584 0xc003193be0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [cauthdsl] func1 -> DEBU 1585 0xc003193be0 gate 1569287089722508400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [cauthdsl] func1 -> DEBU 1589 0xc0031de420 gate 1569287089724073100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158a 0xc0031de420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158b 0xc0031de420 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158c 0xc0031de420 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158f 0xc0031de420 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.725 UTC [cauthdsl] func1 -> DEBU 1590 0xc0031de420 gate 1569287089724073100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1701 Processing change to key: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1702 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1703 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.132 UTC [common.configtx] verifyDeltaSet -> DEBU 1704 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.132 UTC [common.configtx] verifyDeltaSet -> DEBU 1705 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.132 UTC [common.configtx] policyForItem -> DEBU 1706 Getting policy for item Application with mod_policy Admins" +orderer0.example.com | "2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1707 Manager Channel looking up path []" +orderer0.example.com | "2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1708 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1709 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 170a Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:05:34.134 UTC [policies] Manager -> DEBU 170b Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.134 UTC [policies] Manager -> DEBU 170c Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.135 UTC [policies] Manager -> DEBU 170d Manager Channel/Application looking up path []" +orderer0.example.com | "2019-09-24 01:05:34.135 UTC [policies] Manager -> DEBU 170e Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.136 UTC [policies] Manager -> DEBU 170f Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +orderer0.example.com | "2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:05:34.137 UTC [cauthdsl] deduplicate -> WARN 1713 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-09-24 01:05:34.138 UTC [cauthdsl] func1 -> DEBU 1714 0xc000291d70 gate 1569287134138151300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1715 0xc000291d70 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1716 0xc000291d70 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1717 0xc000291d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 01:05:34.139 UTC [cauthdsl] func2 -> DEBU 1718 0xc000291d70 processing identity 1 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.139 UTC [cauthdsl] func2 -> DEBU 1719 0xc000291d70 principal matched by identity 1" +orderer0.example.com | "2019-09-24 01:05:34.139 UTC [msp.identity] Verify -> DEBU 171a Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 171b Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +orderer0.example.com | 00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +orderer0.example.com | 00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +orderer0.example.com | 00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +orderer0.example.com | 00000040 c9 eb 2b ab e2 96 |..+...|" +orderer0.example.com | "2019-09-24 01:05:34.140 UTC [cauthdsl] func2 -> DEBU 171c 0xc000291d70 principal evaluation succeeds for identity 1" +orderer0.example.com | "2019-09-24 01:05:34.140 UTC [cauthdsl] func1 -> DEBU 171d 0xc000291d70 gate 1569287134138151300 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:34.140 UTC [policies] Evaluate -> DEBU 171e Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.141 UTC [policies] Evaluate -> DEBU 171f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.141 UTC [policies] Evaluate -> DEBU 1720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2019-09-24 01:05:34.141 UTC [cauthdsl] deduplicate -> WARN 1721 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +orderer0.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 1722 0xc000b7c4b0 gate 1569287134143627600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.727 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.727 UTC [msp.identity] Verify -> DEBU 1595 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [msp.identity] Verify -> DEBU 1597 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 1596 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 1598 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [gossip.pull] Hello -> DEBU 1599 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 159a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 159b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.729 UTC [gossip.comm] Send -> DEBU 159c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:49.729 UTC [gossip.comm] sendToEndpoint -> DEBU 159d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.729 UTC [gossip.comm] sendToEndpoint -> DEBU 159e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.730 UTC [gossip.gossip] handleMessage -> DEBU 159f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.730 UTC [gossip.gossip] handleMessage -> DEBU 15a0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15a4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [cauthdsl] func1 -> DEBU 15aa 0xc0032be680 gate 1569287089731693000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ab 0xc0032be680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ac 0xc0032be680 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ad 0xc0032be680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.732 UTC [cauthdsl] func2 -> DEBU 15ae 0xc0032be680 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.732 UTC [cauthdsl] func1 -> DEBU 15af 0xc0032be680 gate 1569287089731693000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.733 UTC [cauthdsl] func1 -> DEBU 15b3 0xc0032beec0 gate 1569287089733076300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b4 0xc0032beec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b5 0xc0032beec0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b6 0xc0032beec0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 1723 0xc000b7c4b0 signed by 0 principal evaluation starts (used [false false false])" +orderer0.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 1724 0xc000b7c4b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.144 UTC [cauthdsl] func2 -> DEBU 1725 0xc000b7c4b0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:34.145 UTC [msp.identity] Verify -> DEBU 1726 Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +orderer0.example.com | 00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +orderer0.example.com | "2019-09-24 01:05:34.146 UTC [msp.identity] Verify -> DEBU 1727 Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +orderer0.example.com | 00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +orderer0.example.com | 00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +orderer0.example.com | 00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +orderer0.example.com | 00000040 31 77 20 8d 0c 60 |1w ..`|" +orderer0.example.com | "2019-09-24 01:05:34.146 UTC [cauthdsl] func2 -> DEBU 1728 0xc000b7c4b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:34.146 UTC [cauthdsl] func1 -> DEBU 1729 0xc000b7c4b0 gate 1569287134143627600 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:34.146 UTC [policies] Evaluate -> DEBU 172a Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.146 UTC [policies] Evaluate -> DEBU 172b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.147 UTC [policies] Evaluate -> DEBU 172c Signature set satisfies policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.148 UTC [policies] Evaluate -> DEBU 172d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.148 UTC [common.configtx] verifyDeltaSet -> DEBU 172e Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.148 UTC [common.configtx] verifyDeltaSet -> DEBU 172f Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.149 UTC [common.configtx] recurseConfigMap -> DEBU 1730 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1731 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1732 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1733 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1734 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1735 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1736 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1737 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1738 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 1739 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173a Setting policy for key Admins to " +orderer0.example.com | "2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173b Setting policy for key Endorsement to " +orderer0.example.com | "2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173c Setting policy for key LifecycleEndorsement to " +orderer0.example.com | "2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173d Setting policy for key Readers to " +orderer0.example.com | "2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 173e Setting policy for key Writers to " +orderer0.example.com | "2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 173f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1740 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1741 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1742 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1743 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1744 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1745 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1746 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1747 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1748 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] NewStandardValues -> DEBU 1749 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174a Processing field: HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174b Processing field: BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174c Processing field: OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174d Processing field: Consortium" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174e Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] NewStandardValues -> DEBU 174f Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1750 Processing field: ConsensusType" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1751 Processing field: BatchSize" +orderer0.example.com | "2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1752 Processing field: BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1753 Processing field: KafkaBrokers" +orderer0.example.com | "2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1754 Processing field: ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [common.channelconfig] NewStandardValues -> DEBU 1756 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: Endpoints" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [common.channelconfig] NewStandardValues -> DEBU 1758 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1759 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [common.channelconfig] validateMSP -> DEBU 175a Setting up MSP for org OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [msp] newBccspMsp -> DEBU 175b Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [msp] New -> DEBU 175c Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.158 UTC [msp] Setup -> DEBU 175d Setting up MSP instance OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [msp.identity] newIdentity -> DEBU 175e Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +orderer0.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +orderer0.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +orderer0.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +orderer0.example.com | 1g== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [msp.identity] newIdentity -> DEBU 175f Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | "2019-09-24 01:04:49.734 UTC [msp.identity] Verify -> DEBU 15b7 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:49.734 UTC [msp.identity] Verify -> DEBU 15b8 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:49.734 UTC [cauthdsl] func2 -> DEBU 15b9 0xc0032beec0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.734 UTC [cauthdsl] func1 -> DEBU 15ba 0xc0032beec0 gate 1569287089733076300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.736 UTC [msp.identity] Verify -> DEBU 15c0 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:49.736 UTC [msp.identity] Verify -> DEBU 15c1 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:49.735 UTC [gossip.comm] func1 -> DEBU 15bd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.737 UTC [msp.identity] Verify -> DEBU 15c2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:49.737 UTC [msp.identity] Verify -> DEBU 15c3 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [msp] DeserializeIdentity -> DEBU 15c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [msp] DeserializeIdentity -> DEBU 15c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15c7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15c8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:49.738 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [policies] Evaluate -> DEBU 15ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [msp] Validate -> DEBU 1760 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1761 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: ACLs" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1763 Processing field: Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1764 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1765 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] NewStandardValues -> DEBU 1766 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1767 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] Validate -> DEBU 1768 Anchor peers for org Org3MSP are " +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] validateMSP -> DEBU 1769 Setting up MSP for org Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [msp] newBccspMsp -> DEBU 176a Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [msp] New -> DEBU 176b Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [msp] Setup -> DEBU 176c Setting up MSP instance Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [msp.identity] newIdentity -> DEBU 176d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +orderer0.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +orderer0.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +orderer0.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] NewStandardValues -> DEBU 176e Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176f Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [common.channelconfig] NewStandardValues -> DEBU 1770 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1771 Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [common.channelconfig] Validate -> DEBU 1772 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [common.channelconfig] validateMSP -> DEBU 1773 Setting up MSP for org Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [msp] newBccspMsp -> DEBU 1774 Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [msp] New -> DEBU 1775 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [policies] Evaluate -> DEBU 15cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [cauthdsl] func1 -> DEBU 15cc 0xc0032b3780 gate 1569287089739419100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0032b3780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15ce 0xc0032b3780 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15cf 0xc0032b3780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:49.740 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0032b3780 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.740 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0032b3780 gate 1569287089739419100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [msp] Setup -> DEBU 1776 Setting up MSP instance Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.161 UTC [msp.identity] newIdentity -> DEBU 1777 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +orderer0.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +orderer0.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +orderer0.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.162 UTC [common.channelconfig] NewStandardValues -> DEBU 1778 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2019-09-24 01:05:34.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1779 Processing field: AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.162 UTC [common.channelconfig] NewStandardValues -> DEBU 177a Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2019-09-24 01:05:34.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177b Processing field: MSP" +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [common.channelconfig] Validate -> DEBU 177c Anchor peers for org Org2MSP are anchor_peers: " +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [common.channelconfig] validateMSP -> DEBU 177d Setting up MSP for org Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [msp] newBccspMsp -> DEBU 177e Creating BCCSP-based MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [msp] New -> DEBU 177f Creating Cache-MSP instance" +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [msp] Setup -> DEBU 1780 Setting up MSP instance Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.163 UTC [msp.identity] newIdentity -> DEBU 1781 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +orderer0.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +orderer0.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +orderer0.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [msp] Setup -> DEBU 1782 Setting up the MSP manager (4 msps)" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [msp] Setup -> DEBU 1783 MSP manager setup complete, setup 4 msps" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1784 Proposed new policy Endorsement for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1785 Proposed new policy Readers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1786 Proposed new policy Writers for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1787 Proposed new policy Admins for Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1788 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1789 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178a Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178d Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178e Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178f Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1790 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1791 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1792 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1793 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1794 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1795 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1796 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1797 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1798 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1799 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179e Proposed new policy Admins for Channel" +orderer0.example.com | "2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179f Proposed new policy Readers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [policies] NewManagerImpl -> DEBU 17a0 Proposed new policy Writers for Channel" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a1 Adding to config map: [Group] /Channel" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a2 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a3 Adding to config map: [Group] /Channel/Application/Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a4 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:49.741 UTC [cauthdsl] func1 -> DEBU 15d5 0xc00333c0d0 gate 1569287089741157000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d6 0xc00333c0d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d7 0xc00333c0d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d8 0xc00333c0d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.741 UTC [msp.identity] Verify -> DEBU 15d9 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:49.742 UTC [msp.identity] Verify -> DEBU 15da Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:49.742 UTC [cauthdsl] func2 -> DEBU 15db 0xc00333c0d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:49.742 UTC [cauthdsl] func1 -> DEBU 15dc 0xc00333c0d0 gate 1569287089741157000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:49.742 UTC [policies] Evaluate -> DEBU 15dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.743 UTC [policies] Evaluate -> DEBU 15de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.743 UTC [policies] Evaluate -> DEBU 15df Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.744 UTC [policies] Evaluate -> DEBU 15e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:49.744 UTC [gossip.gossip] handleMessage -> DEBU 15e1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.744 UTC [gossip.gossip] handleMessage -> DEBU 15e2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.744 UTC [gossip.pull] HandleMessage -> DEBU 15e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.745 UTC [gossip.gossip] handleMessage -> DEBU 15e4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.873 UTC [gossip.comm] func1 -> DEBU 15e5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.873 UTC [gossip.gossip] handleMessage -> DEBU 15e6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.876 UTC [msp] DeserializeIdentity -> DEBU 15e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.876 UTC [msp] DeserializeIdentity -> DEBU 15e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:49.877 UTC [gossip.gossip] handleMessage -> DEBU 15e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:49.882 UTC [gossip.comm] func1 -> DEBU 15ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.882 UTC [gossip.gossip] handleMessage -> DEBU 15eb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.882 UTC [gossip.pull] HandleMessage -> DEBU 15ec GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:49.882 UTC [gossip.pull] SendDigest -> DEBU 15ed Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:49.882 UTC [gossip.gossip] handleMessage -> DEBU 15ee Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.077 UTC [gossip.comm] func1 -> DEBU 15ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.077 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.077 UTC [msp] DeserializeIdentity -> DEBU 15f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.078 UTC [msp] DeserializeIdentity -> DEBU 15f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.078 UTC [msp] DeserializeIdentity -> DEBU 15f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.078 UTC [gossip.gossip] handleMessage -> DEBU 15f4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.275 UTC [gossip.comm] func1 -> DEBU 15f5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.275 UTC [gossip.gossip] handleMessage -> DEBU 15f6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.276 UTC [msp] DeserializeIdentity -> DEBU 15f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.276 UTC [msp] DeserializeIdentity -> DEBU 15f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.277 UTC [msp] DeserializeIdentity -> DEBU 15f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.277 UTC [gossip.gossip] handleMessage -> DEBU 15fa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.495 UTC [gossip.comm] func1 -> DEBU 15fb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.495 UTC [gossip.gossip] handleMessage -> DEBU 15fc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c7 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c8 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17c9 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17ca Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cc Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cd Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17ce Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cf Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d0 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d1 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d2 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d3 As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d4 As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d5 Manager Channel looking up path [Application]" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d6 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d7 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d8 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:04:50.496 UTC [gossip.pull] HandleMessage -> DEBU 15fd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.496 UTC [gossip.pull] SendDigest -> DEBU 15fe Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:50.496 UTC [gossip.gossip] handleMessage -> DEBU 15ff Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.502 UTC [gossip.comm] func1 -> DEBU 1600 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.502 UTC [gossip.gossip] handleMessage -> DEBU 1601 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.503 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.504 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1603 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.504 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1604 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.505 UTC [msp.identity] Verify -> DEBU 1605 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +peer0.org1.example.com | 00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +peer0.org1.example.com | "2019-09-24 01:04:50.505 UTC [msp.identity] Verify -> DEBU 1606 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +peer0.org1.example.com | 00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +peer0.org1.example.com | 00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +peer0.org1.example.com | 00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +peer0.org1.example.com | 00000040 20 c8 18 ce 88 1a 31 | .....1|" +peer0.org1.example.com | "2019-09-24 01:04:50.506 UTC [msp.identity] Verify -> DEBU 1607 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:50.506 UTC [msp.identity] Verify -> DEBU 1608 Verify: sig = 00000000 30 45 02 21 00 d0 6c 8e 19 15 9f 37 57 df bc ea |0E.!..l....7W...| +peer0.org1.example.com | 00000010 9d 1d 2b 29 b7 f3 1c 46 b6 da b5 bf e6 09 98 de |..+)...F........| +peer0.org1.example.com | 00000020 82 65 85 10 a3 02 20 5e 50 5b 36 55 d1 f0 ad 03 |.e.... ^P[6U....| +peer0.org1.example.com | 00000030 c2 d4 f3 e2 d0 d9 b6 4a 18 42 6a d7 8f 2e bc b6 |.......J.Bj.....| +peer0.org1.example.com | 00000040 ab 7d 34 a8 ff ad ce |.}4....|" +peer0.org1.example.com | "2019-09-24 01:04:50.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 1609 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 160a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 160f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1610 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [gossip.discovery] sendMemResponse -> DEBU 1611 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [msp] DeserializeIdentity -> DEBU 1613 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17d9 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17da Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17db Manager Channel/Application has managers Org3MSP" +orderer0.example.com | "2019-09-24 01:05:34.178 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dc As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2019-09-24 01:05:34.178 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dd As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.179 UTC [common.channelconfig] LogSanityChecks -> DEBU 17de As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17df Manager Channel looking up path [Orderer]" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e0 Manager Channel has managers Application" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e1 Manager Channel has managers Orderer" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e2 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e3 Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2019-09-24 01:05:34.180 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e4 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e5 As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e6 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e7 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2019-09-24 01:05:34.182 UTC [common.capabilities] Supported -> DEBU 17e8 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:05:34.182 UTC [common.capabilities] Supported -> DEBU 17e9 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2019-09-24 01:05:34.182 UTC [orderer.common.server] func1 -> DEBU 17ea Executing callback to update root CAs" +orderer0.example.com | "2019-09-24 01:05:34.182 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17eb updating root CAs for channel [businesschannel]" +orderer0.example.com | "2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ec adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ed adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ee adding app root CAs for MSP [Org3MSP]" +orderer0.example.com | "2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ef adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2019-09-24 01:05:34.183 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17f0 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +orderer0.example.com | "2019-09-24 01:05:34.184 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17f1 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +orderer0.example.com | "2019-09-24 01:05:34.184 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f2 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:34.184 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f3 Obtaining default signing identity" +orderer0.example.com | "2019-09-24 01:05:34.184 UTC [msp.identity] Sign -> DEBU 17f4 Sign: plaintext: 0A020806120B0A090A03010203100418...7753DF7643369D922ACFE698672C5C72 " +orderer0.example.com | "2019-09-24 01:05:34.184 UTC [msp.identity] Sign -> DEBU 17f5 Sign: digest: 1B37C09E55ED9D029821E575F2C20E5076EC4EE09A1A73F9D448AA9EDE158720 " +orderer0.example.com | "2019-09-24 01:05:34.188 UTC [fsblkstorage] indexBlock -> DEBU 17f6 Indexing block [blockNum=6, blockHash=[]byte{0x46, 0x52, 0x27, 0x1b, 0xc, 0xf, 0xee, 0x5b, 0x83, 0xd9, 0x75, 0x78, 0x16, 0xfe, 0x4a, 0x8a, 0xe, 0x49, 0x25, 0x33, 0x16, 0xa2, 0x38, 0x7a, 0x1c, 0x12, 0xa6, 0x93, 0x54, 0xce, 0xb5, 0x65} txOffsets= +orderer0.example.com | txId=ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085 locPointer=offset=71, bytesLength=37480 +orderer0.example.com | ]" +orderer0.example.com | "2019-09-24 01:05:34.191 UTC [fsblkstorage] updateCheckpoint -> DEBU 17f7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127751], isChainEmpty=[false], lastBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:34.194 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17f8 [channel: businesschannel] Wrote block [6]" +orderer0.example.com | "2019-09-24 01:05:34.194 UTC [fsblkstorage] waitForBlock -> DEBU 17f9 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:34.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fa Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:34.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fb Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:34.196 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fc blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.197 UTC [policies] Evaluate -> DEBU 1800 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.197 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.197 UTC [msp] DeserializeIdentity -> DEBU 1802 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:34.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67µs " +orderer0.example.com | "2019-09-24 01:05:34.200 UTC [fsblkstorage] waitForBlock -> DEBU 1803 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:34.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1806 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.205 UTC [msp.identity] newIdentity -> DEBU 1807 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [gossip.comm] Send -> DEBU 1614 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [gossip.discovery] sendMemResponse -> DEBU 1615 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:04:50.508 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.509 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.806 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.808 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.808 UTC [gossip.pull] HandleMessage -> DEBU 161a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.808 UTC [msp] DeserializeIdentity -> DEBU 161b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.808 UTC [msp] DeserializeIdentity -> DEBU 161c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.810 UTC [msp] DeserializeIdentity -> DEBU 1620 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.810 UTC [gossip.pull] SendDigest -> DEBU 1621 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:50.810 UTC [gossip.gossip] handleMessage -> DEBU 1622 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.814 UTC [gossip.comm] func1 -> DEBU 1623 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [gossip.gossip] handleMessage -> DEBU 1624 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [gossip.gossip] handleMessage -> DEBU 1625 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1626 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1627 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [msp] DeserializeIdentity -> DEBU 1628 Obtaining identity" +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +orderer0.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +orderer0.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +orderer0.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +orderer0.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.209 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1808 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:34.210 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1809 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +orderer0.example.com | "2019-09-24 01:05:34.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +orderer0.example.com | "2019-09-24 01:05:34.212 UTC [cauthdsl] func1 -> DEBU 180c 0xc001055970 gate 1569287134212604500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +orderer0.example.com | "2019-09-24 01:05:34.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1810 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +orderer0.example.com | "2019-09-24 01:05:34.213 UTC [cauthdsl] func2 -> DEBU 180e 0xc001055970 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1811 0xc001055970 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1812 0xc001055970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:05:34.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1813 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.8µs " +orderer0.example.com | "2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1814 0xc001055970 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.214 UTC [cauthdsl] func1 -> DEBU 1815 0xc001055970 gate 1569287134212604500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1816 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 591.7µs " +orderer0.example.com | "2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1817 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1819 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func1 -> DEBU 181a 0xc0011374c0 gate 1569287134216034300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181b 0xc0011374c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181c 0xc0011374c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181d 0xc0011374c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181e 0xc0011374c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [cauthdsl] func1 -> DEBU 181f 0xc0011374c0 gate 1569287134216034300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.216 UTC [policies] Evaluate -> DEBU 1820 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.217 UTC [policies] Evaluate -> DEBU 1821 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.217 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.217 UTC [cauthdsl] func1 -> DEBU 1823 0xc001137d20 gate 1569287134217406700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.217 UTC [cauthdsl] func2 -> DEBU 1824 0xc001137d20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.217 UTC [cauthdsl] func2 -> DEBU 1825 0xc001137d20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.218 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1826 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2019-09-24 01:05:34.218 UTC [msp] Validate -> DEBU 1827 MSP Org2MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:34.219 UTC [msp] getCertificationChain -> DEBU 1828 MSP Org2MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:34.219 UTC [cauthdsl] func2 -> DEBU 1829 0xc001137d20 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:34.219 UTC [msp.identity] Verify -> DEBU 182a Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +orderer0.example.com | 00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +orderer0.example.com | "2019-09-24 01:05:34.219 UTC [msp.identity] Verify -> DEBU 182b Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +orderer0.example.com | 00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +orderer0.example.com | 00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +orderer0.example.com | 00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +orderer0.example.com | 00000040 7d c0 9c 51 b2 3e |}..Q.>|" +orderer0.example.com | "2019-09-24 01:05:34.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.212 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180d Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:34.220 UTC [cauthdsl] func2 -> DEBU 182d 0xc001137d20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:34.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.221 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 182f blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1831 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1832 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1833 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1629 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 162a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 162b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.816 UTC [policies] Evaluate -> DEBU 162c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 162d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 162e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func1 -> DEBU 162f 0xc003402290 gate 1569287090817058100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1630 0xc003402290 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1631 0xc003402290 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1632 0xc003402290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1633 0xc003402290 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [cauthdsl] func1 -> DEBU 1634 0xc003402290 gate 1569287090817058100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 1635 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 1636 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.818 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.818 UTC [cauthdsl] func1 -> DEBU 1638 0xc003402be0 gate 1569287090818351600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 1639 0xc003402be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 163a 0xc003402be0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 163b 0xc003402be0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.819 UTC [msp.identity] Verify -> DEBU 163c Verify: digest = 00000000 f5 5e ab 55 0b 38 8f 11 e2 dd bd f3 6c 98 f2 15 |.^.U.8......l...| +peer0.org1.example.com | 00000010 b9 00 12 f1 a3 f5 f9 73 90 66 8b 37 da be 03 15 |.......s.f.7....|" +peer0.org1.example.com | "2019-09-24 01:04:50.819 UTC [msp.identity] Verify -> DEBU 163d Verify: sig = 00000000 30 45 02 21 00 e1 f0 65 2b 9e 9f 7d bc 68 89 88 |0E.!...e+..}.h..| +peer0.org1.example.com | 00000010 9a 78 77 d5 8c 43 9a 62 b9 f5 40 e9 e5 64 63 3d |.xw..C.b..@..dc=| +peer0.org1.example.com | 00000020 2b 0b 42 8a ef 02 20 63 3f 2e da 50 89 56 9a b8 |+.B... c?..P.V..| +peer0.org1.example.com | 00000030 a1 7a f3 16 94 f1 db 2b 91 76 53 d6 89 3a 17 ea |.z.....+.vS..:..| +peer0.org1.example.com | 00000040 04 e3 81 9e 37 1b 91 |....7..|" +peer0.org1.example.com | "2019-09-24 01:04:50.819 UTC [cauthdsl] func2 -> DEBU 163e 0xc003402be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.819 UTC [cauthdsl] func1 -> DEBU 163f 0xc003402be0 gate 1569287090818351600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:50.819 UTC [policies] Evaluate -> DEBU 1640 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1642 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.820 UTC [gossip.discovery] handleAliveMessage -> DEBU 1644 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1645 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1646 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1647 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1648 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1649 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 164a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.822 UTC [gossip.discovery] sendMemResponse -> DEBU 164c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.823 UTC [gossip.comm] Send -> DEBU 1650 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1651 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1653 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.823 UTC [gossip.discovery] sendMemResponse -> DEBU 1652 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1654 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:50.849 UTC [gossip.comm] Send -> DEBU 1655 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1656 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:50.849 UTC [gossip.comm] Send -> DEBU 1657 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1658 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:50.850 UTC [gossip.comm] Send -> DEBU 1659 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.851 UTC [gossip.comm] sendToEndpoint -> DEBU 165e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.851 UTC [gossip.comm] sendToEndpoint -> DEBU 165f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.852 UTC [gossip.comm] func1 -> DEBU 1660 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.852 UTC [gossip.gossip] handleMessage -> DEBU 1661 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.853 UTC [gossip.pull] HandleMessage -> DEBU 1662 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.853 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.853 UTC [gossip.comm] func1 -> DEBU 1664 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.854 UTC [gossip.gossip] handleMessage -> DEBU 1665 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.854 UTC [gossip.pull] HandleMessage -> DEBU 1666 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1834 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.223 UTC [msp] DeserializeIdentity -> DEBU 1836 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:34.223 UTC [msp.identity] newIdentity -> DEBU 1837 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +orderer0.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +orderer0.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +orderer0.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +orderer0.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +orderer0.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:34.224 UTC [cauthdsl] func1 -> DEBU 1838 0xc001184de0 gate 1569287134224431900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 1839 0xc001184de0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183a 0xc001184de0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183b 0xc001184de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183c 0xc001184de0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func1 -> DEBU 183d 0xc001184de0 gate 1569287134224431900 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:34.225 UTC [cauthdsl] func1 -> DEBU 1841 0xc001185f60 gate 1569287134225880800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:34.226 UTC [cauthdsl] func2 -> DEBU 1842 0xc001185f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:34.226 UTC [cauthdsl] func2 -> DEBU 1843 0xc001185f60 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:34.226 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2019-09-24 01:05:34.226 UTC [msp] Validate -> DEBU 1845 MSP Org1MSP validating identity" +orderer0.example.com | "2019-09-24 01:05:34.227 UTC [msp] getCertificationChain -> DEBU 1846 MSP Org1MSP getting certification chain" +orderer0.example.com | "2019-09-24 01:05:34.227 UTC [cauthdsl] func2 -> DEBU 1847 0xc001185f60 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:34.227 UTC [msp.identity] Verify -> DEBU 1848 Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +orderer0.example.com | 00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +orderer0.example.com | "2019-09-24 01:05:34.228 UTC [msp.identity] Verify -> DEBU 1849 Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +orderer0.example.com | 00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +orderer0.example.com | 00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +orderer0.example.com | 00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +orderer0.example.com | 00000040 8d 91 b7 ea 04 6f |.....o|" +orderer0.example.com | "2019-09-24 01:05:34.222 UTC [cauthdsl] func1 -> DEBU 1830 0xc001137d20 gate 1569287134217406700 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:34.229 UTC [cauthdsl] func2 -> DEBU 184a 0xc001185f60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:34.231 UTC [cauthdsl] func1 -> DEBU 184c 0xc001185f60 gate 1569287134225880800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1851 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1852 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.233 UTC [common.deliver] deliverBlocks -> DEBU 1853 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +orderer0.example.com | "2019-09-24 01:05:34.233 UTC [fsblkstorage] waitForBlock -> DEBU 1854 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:34.230 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1855 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1856 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1857 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1858 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.235 UTC [policies] Evaluate -> DEBU 1859 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:34.235 UTC [common.deliver] deliverBlocks -> DEBU 185a [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +orderer0.example.com | "2019-09-24 01:05:34.236 UTC [fsblkstorage] waitForBlock -> DEBU 185b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:34.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 185c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185d Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +orderer0.example.com | "2019-09-24 01:05:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 613.6µs " +orderer0.example.com | "2019-09-24 01:05:34.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185f Sending msg of 28 bytes to 2 on channel businesschannel took 58.5µs" +orderer0.example.com | "2019-09-24 01:05:34.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1860 Sending msg of 28 bytes to 3 on channel businesschannel took 350.8µs" +orderer0.example.com | "2019-09-24 01:05:34.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1861 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4485ms " +orderer0.example.com | "2019-09-24 01:05:34.686 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1862 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:34.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1863 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.3149ms " +orderer0.example.com | "2019-09-24 01:05:34.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1864 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1865 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1866 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2019-09-24 01:05:35.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1867 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.2µs " +orderer0.example.com | "2019-09-24 01:05:35.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1868 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.8µs " +orderer0.example.com | "2019-09-24 01:05:35.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1869 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +orderer0.example.com | "2019-09-24 01:05:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186a Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +orderer0.example.com | "2019-09-24 01:05:35.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.2µs " +orderer0.example.com | "2019-09-24 01:05:35.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186f Sending msg of 28 bytes to 3 on channel testchainid took 779.4µs" +orderer0.example.com | "2019-09-24 01:05:35.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1870 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 386.1µs " +orderer0.example.com | "2019-09-24 01:05:35.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1871 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +orderer0.example.com | "2019-09-24 01:05:35.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1872 Sending msg of 28 bytes to 3 on channel businesschannel took 48.6µs" +orderer0.example.com | "2019-09-24 01:05:35.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1873 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 655.8µs " +orderer0.example.com | "2019-09-24 01:05:35.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1874 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.7µs " +orderer0.example.com | "2019-09-24 01:05:35.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1875 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:35.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1876 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1877 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1878 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 01:05:36.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1879 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +orderer0.example.com | "2019-09-24 01:05:36.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187a Sending msg of 28 bytes to 2 on channel businesschannel took 57µs" +orderer0.example.com | "2019-09-24 01:05:36.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187b Sending msg of 28 bytes to 3 on channel businesschannel took 63.7µs" +orderer0.example.com | "2019-09-24 01:05:36.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 187c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " +orderer0.example.com | "2019-09-24 01:05:36.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU 187f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.9838ms " +orderer0.example.com | "2019-09-24 01:05:36.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1880 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1881 Sending msg of 28 bytes to 3 on channel testchainid took 118.9µs" +orderer0.example.com | "2019-09-24 01:05:36.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1882 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " +orderer0.example.com | "2019-09-24 01:05:36.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1883 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-09-24 01:05:36.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1884 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +orderer0.example.com | "2019-09-24 01:05:36.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1885 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.5µs " +orderer0.example.com | "2019-09-24 01:05:36.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1886 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:36.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1887 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.8291ms " +orderer0.example.com | "2019-09-24 01:05:36.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1888 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1889 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188a Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +orderer0.example.com | "2019-09-24 01:05:37.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +orderer0.example.com | "2019-09-24 01:05:37.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 469.8µs " +orderer0.example.com | "2019-09-24 01:05:37.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 2 on channel businesschannel took 155.7µs" +orderer0.example.com | "2019-09-24 01:05:37.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188f Sending msg of 28 bytes to 3 on channel businesschannel took 3.0392ms" +orderer0.example.com | "2019-09-24 01:05:37.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1890 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.8µs " +orderer0.example.com | "2019-09-24 01:05:37.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1891 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.218 UTC [orderer.common.server] Deliver -> DEBU 1892 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:37.218 UTC [common.deliver] Handle -> DEBU 1893 Starting new deliver loop for 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.219 UTC [common.deliver] Handle -> DEBU 1894 Attempting to read seek info message from 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1895 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1896 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.221 UTC [policies] Evaluate -> DEBU 1898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.221 UTC [policies] Evaluate -> DEBU 1899 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.222 UTC [msp] DeserializeIdentity -> DEBU 189a Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:37.223 UTC [msp.identity] newIdentity -> DEBU 189b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +orderer0.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +orderer0.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +orderer0.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +orderer0.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +orderer0.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2019-09-24 01:05:37.223 UTC [cauthdsl] func1 -> DEBU 189c 0xc000c24100 gate 1569287137223612500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.223 UTC [cauthdsl] func2 -> DEBU 189d 0xc000c24100 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 189e 0xc000c24100 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 189f 0xc000c24100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 18a0 0xc000c24100 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.225 UTC [cauthdsl] func1 -> DEBU 18a1 0xc000c24100 gate 1569287137223612500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.227 UTC [cauthdsl] func1 -> DEBU 18a5 0xc000c25240 gate 1569287137226618500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.227 UTC [cauthdsl] func2 -> DEBU 18a6 0xc000c25240 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.227 UTC [cauthdsl] func2 -> DEBU 18a7 0xc000c25240 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.228 UTC [cauthdsl] func2 -> DEBU 18a8 0xc000c25240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.228 UTC [cauthdsl] func2 -> DEBU 18a9 0xc000c25240 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.228 UTC [cauthdsl] func1 -> DEBU 18aa 0xc000c25240 gate 1569287137226618500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.229 UTC [policies] Evaluate -> DEBU 18ab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.229 UTC [policies] Evaluate -> DEBU 18ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.230 UTC [policies] Evaluate -> DEBU 18ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.230 UTC [cauthdsl] func1 -> DEBU 18ae 0xc000c25aa0 gate 1569287137230096500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.230 UTC [cauthdsl] func2 -> DEBU 18af 0xc000c25aa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.230 UTC [cauthdsl] func2 -> DEBU 18b0 0xc000c25aa0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.231 UTC [cauthdsl] func2 -> DEBU 18b1 0xc000c25aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | "2019-09-24 01:04:50.854 UTC [gossip.gossip] handleMessage -> DEBU 1667 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.855 UTC [gossip.comm] func1 -> DEBU 1668 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.855 UTC [gossip.gossip] handleMessage -> DEBU 1669 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.856 UTC [gossip.pull] HandleMessage -> DEBU 166a GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.856 UTC [gossip.gossip] handleMessage -> DEBU 166b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 166c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:50.864 UTC [msp.identity] Sign -> DEBU 166d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151018 " +peer0.org1.example.com | "2019-09-24 01:04:50.864 UTC [msp.identity] Sign -> DEBU 166e Sign: digest: 919B604828F14752258EA1CEB98D3ADD173D6414808094C61EB3603F196D5AB8 " +peer0.org1.example.com | "2019-09-24 01:04:50.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 166f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:50.865 UTC [msp.identity] Sign -> DEBU 1670 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:50.865 UTC [msp.identity] Sign -> DEBU 1671 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:50.866 UTC [msp] DeserializeIdentity -> DEBU 1672 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.866 UTC [gossip.comm] Send -> DEBU 1673 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.866 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.867 UTC [gossip.comm] Send -> DEBU 1676 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.867 UTC [gossip.comm] sendToEndpoint -> DEBU 1675 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.868 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.868 UTC [gossip.comm] Send -> DEBU 1678 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:50.868 UTC [gossip.comm] sendToEndpoint -> DEBU 1679 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.869 UTC [gossip.comm] sendToEndpoint -> DEBU 167a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.873 UTC [gossip.comm] sendToEndpoint -> DEBU 167b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.874 UTC [gossip.comm] sendToEndpoint -> DEBU 167c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.874 UTC [gossip.comm] func1 -> DEBU 167d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:37.232 UTC [cauthdsl] func2 -> DEBU 18b2 0xc000c25aa0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.232 UTC [cauthdsl] func1 -> DEBU 18b3 0xc000c25aa0 gate 1569287137230096500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.232 UTC [policies] Evaluate -> DEBU 18b4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.232 UTC [policies] Evaluate -> DEBU 18b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.233 UTC [policies] func1 -> DEBU 18b6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b7 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.234 UTC [policies] Evaluate -> DEBU 18bb == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.234 UTC [cauthdsl] func1 -> DEBU 18bc 0xc0010207b0 gate 1569287137234520500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.234 UTC [cauthdsl] func2 -> DEBU 18bd 0xc0010207b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.234 UTC [cauthdsl] func2 -> DEBU 18be 0xc0010207b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.235 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18bf Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2019-09-24 01:05:37.235 UTC [msp] Validate -> DEBU 18c0 MSP OrdererMSP validating identity" +orderer0.example.com | "2019-09-24 01:05:37.236 UTC [cauthdsl] func2 -> DEBU 18c1 0xc0010207b0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:37.236 UTC [msp.identity] Verify -> DEBU 18c2 Verify: digest = 00000000 af 06 5d 55 26 1b fa 36 18 3c 15 47 32 e7 5f 9f |..]U&..6.<.G2._.| +orderer0.example.com | 00000010 05 c5 39 d1 a7 35 f0 b1 74 f5 75 18 d6 5d dd c3 |..9..5..t.u..]..|" +orderer0.example.com | "2019-09-24 01:05:37.236 UTC [msp.identity] Verify -> DEBU 18c3 Verify: sig = 00000000 30 45 02 21 00 a7 a1 1a bf 53 9e b1 89 58 03 ef |0E.!.....S...X..| +orderer0.example.com | 00000010 32 94 21 f3 df a1 28 ba 2e 44 d0 3f f3 f1 f4 f9 |2.!...(..D.?....| +orderer0.example.com | 00000020 dd a6 44 4c 91 02 20 34 ba 00 ef fb 07 3f 1e 26 |..DL.. 4.....?.&| +orderer0.example.com | 00000030 06 6f 2c 54 7c c9 f5 af e4 56 db b8 d4 f1 9a 3a |.o,T|....V.....:| +orderer0.example.com | 00000040 56 0b 00 0c ab 04 b8 |V......|" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [cauthdsl] func2 -> DEBU 18c4 0xc0010207b0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [cauthdsl] func1 -> DEBU 18c5 0xc0010207b0 gate 1569287137234520500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18ca Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.238 UTC [common.deliver] deliverBlocks -> DEBU 18cc [channel: businesschannel] Received seekInfo (0xc0011f5e80) start: > stop: > from 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.238 UTC [fsblkstorage] Next -> DEBU 18cd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:37.238 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ce newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:37.238 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18cf Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:37.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d0 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:37.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d1 blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:37.239 UTC [common.deliver] deliverBlocks -> DEBU 18d2 [channel: businesschannel] Delivering block for (0xc0011f5e80) for 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [common.deliver] deliverBlocks -> DEBU 18d3 [channel: businesschannel] Done delivering to 172.18.0.5:53882 for (0xc0011f5e80)" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d4 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d5 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d6 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:37.240 UTC [common.deliver] Handle -> DEBU 18d8 Waiting for new SeekInfo from 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.242 UTC [common.deliver] Handle -> DEBU 18d9 Attempting to read seek info message from 172.18.0.5:53882" +orderer0.example.com | "2019-09-24 01:05:37.247 UTC [common.deliver] Handle -> WARN 18da Error reading from 172.18.0.5:53882: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:37.248 UTC [orderer.common.server] func1 -> DEBU 18dc Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:37.249 UTC [comm.grpc.server] 1 -> INFO 18dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53882 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.9501ms +orderer0.example.com | "2019-09-24 01:05:37.248 UTC [grpc] infof -> DEBU 18db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:37.381 UTC [orderer.common.server] Deliver -> DEBU 18de Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:37.382 UTC [common.deliver] Handle -> DEBU 18df Starting new deliver loop for 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.382 UTC [common.deliver] Handle -> DEBU 18e0 Attempting to read seek info message from 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.383 UTC [policies] Evaluate -> DEBU 18e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.384 UTC [policies] Evaluate -> DEBU 18e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:50.874 UTC [gossip.comm] func1 -> DEBU 167e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.874 UTC [gossip.gossip] handleMessage -> DEBU 167f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.875 UTC [gossip.pull] HandleMessage -> DEBU 1680 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1682 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1683 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.877 UTC [msp] DeserializeIdentity -> DEBU 1684 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.878 UTC [gossip.comm] func1 -> DEBU 1685 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.877 UTC [msp] DeserializeIdentity -> DEBU 1686 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.879 UTC [msp] DeserializeIdentity -> DEBU 1687 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.pull] SendDigest -> DEBU 1688 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 1689 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 168a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 168b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 168c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [msp.identity] Verify -> DEBU 168d Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +peer0.org1.example.com | 00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [msp.identity] Verify -> DEBU 168e Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +peer0.org1.example.com | 00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +peer0.org1.example.com | 00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +peer0.org1.example.com | 00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +peer0.org1.example.com | 00000040 c2 02 36 31 a0 d2 38 |..61..8|" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 168f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [gossip.discovery] isSentByMe -> DEBU 1690 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 1691 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1692 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.885 UTC [msp.identity] Verify -> DEBU 1693 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +peer0.org1.example.com | 00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +peer0.org1.example.com | "2019-09-24 01:04:50.885 UTC [msp.identity] Verify -> DEBU 1694 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +peer0.org1.example.com | 00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +peer0.org1.example.com | 00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +peer0.org1.example.com | 00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +peer0.org1.example.com | 00000040 20 c8 18 ce 88 1a 31 | .....1|" +peer0.org1.example.com | "2019-09-24 01:04:50.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 1695 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 1696 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1697 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.887 UTC [gossip.comm] func1 -> DEBU 1698 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.889 UTC [gossip.comm] func1 -> DEBU 1699 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 169a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 169f Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [msp.identity] Verify -> DEBU 16a0 Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +peer0.org1.example.com | 00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [msp.identity] Verify -> DEBU 16a1 Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +peer0.org1.example.com | 00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +peer0.org1.example.com | 00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +peer0.org1.example.com | 00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +peer0.org1.example.com | 00000040 c2 02 36 31 a0 d2 38 |..61..8|" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [gossip.discovery] isSentByMe -> DEBU 16a3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16a5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.892 UTC [msp] DeserializeIdentity -> DEBU 16a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.893 UTC [cauthdsl] func1 -> DEBU 16ad 0xc0034a71d0 gate 1569287090893629600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.893 UTC [cauthdsl] func2 -> DEBU 16ae 0xc0034a71d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16af 0xc0034a71d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16b0 0xc0034a71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16b1 0xc0034a71d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [cauthdsl] func1 -> DEBU 16b2 0xc0034a71d0 gate 1569287090893629600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [policies] Evaluate -> DEBU 16b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.894 UTC [policies] Evaluate -> DEBU 16b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.895 UTC [policies] Evaluate -> DEBU 16b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.895 UTC [cauthdsl] func1 -> DEBU 16b6 0xc0034a7a10 gate 1569287090895216600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.896 UTC [cauthdsl] func2 -> DEBU 16b7 0xc0034a7a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.896 UTC [cauthdsl] func2 -> DEBU 16b8 0xc0034a7a10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.900 UTC [cauthdsl] func2 -> DEBU 16b9 0xc0034a7a10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.900 UTC [msp.identity] Verify -> DEBU 16ba Verify: digest = 00000000 f5 5e ab 55 0b 38 8f 11 e2 dd bd f3 6c 98 f2 15 |.^.U.8......l...| +peer0.org1.example.com | 00000010 b9 00 12 f1 a3 f5 f9 73 90 66 8b 37 da be 03 15 |.......s.f.7....|" +peer0.org1.example.com | "2019-09-24 01:04:50.900 UTC [msp.identity] Verify -> DEBU 16bb Verify: sig = 00000000 30 45 02 21 00 e1 f0 65 2b 9e 9f 7d bc 68 89 88 |0E.!...e+..}.h..| +peer0.org1.example.com | 00000010 9a 78 77 d5 8c 43 9a 62 b9 f5 40 e9 e5 64 63 3d |.xw..C.b..@..dc=| +peer0.org1.example.com | 00000020 2b 0b 42 8a ef 02 20 63 3f 2e da 50 89 56 9a b8 |+.B... c?..P.V..| +peer0.org1.example.com | 00000030 a1 7a f3 16 94 f1 db 2b 91 76 53 d6 89 3a 17 ea |.z.....+.vS..:..| +peer0.org1.example.com | 00000040 04 e3 81 9e 37 1b 91 |....7..|" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [cauthdsl] func2 -> DEBU 16bc 0xc0034a7a10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [cauthdsl] func1 -> DEBU 16bd 0xc0034a7a10 gate 1569287090895216600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16c4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.903 UTC [msp.identity] Verify -> DEBU 16c5 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +peer0.org1.example.com | 00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +peer0.org1.example.com | "2019-09-24 01:04:50.903 UTC [msp.identity] Verify -> DEBU 16c6 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +peer0.org1.example.com | 00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +peer0.org1.example.com | 00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +peer0.org1.example.com | 00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +peer0.org1.example.com | 00000040 20 c8 18 ce 88 1a 31 | .....1|" +peer0.org1.example.com | "2019-09-24 01:04:50.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.904 UTC [gossip.gossip] handleMessage -> DEBU 16ca Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16cb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16cd Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.905 UTC [msp] DeserializeIdentity -> DEBU 16ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.904 UTC [gossip.gossip] handleMessage -> DEBU 16cc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:37.385 UTC [policies] Evaluate -> DEBU 18e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.386 UTC [policies] Evaluate -> DEBU 18e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.386 UTC [policies] Evaluate -> DEBU 18e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func1 -> DEBU 18e6 0xc000bf3c20 gate 1569287137386994200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e7 0xc000bf3c20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e8 0xc000bf3c20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e9 0xc000bf3c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18ea 0xc000bf3c20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.387 UTC [cauthdsl] func1 -> DEBU 18eb 0xc000bf3c20 gate 1569287137386994200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ec Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.389 UTC [cauthdsl] func1 -> DEBU 18ef 0xc001292460 gate 1569287137388971200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f0 0xc001292460 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f1 0xc001292460 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f2 0xc001292460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f3 0xc001292460 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.390 UTC [cauthdsl] func1 -> DEBU 18f4 0xc001292460 gate 1569287137388971200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.390 UTC [policies] Evaluate -> DEBU 18f5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.391 UTC [policies] Evaluate -> DEBU 18f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.391 UTC [policies] Evaluate -> DEBU 18f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.391 UTC [cauthdsl] func1 -> DEBU 18f8 0xc001292cb0 gate 1569287137391462600 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18f9 0xc001292cb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fa 0xc001292cb0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fb 0xc001292cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fc 0xc001292cb0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.392 UTC [cauthdsl] func1 -> DEBU 18fd 0xc001292cb0 gate 1569287137391462600 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 18fe Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 18ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] func1 -> DEBU 1900 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1901 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1902 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1903 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.394 UTC [policies] Evaluate -> DEBU 1904 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.394 UTC [policies] Evaluate -> DEBU 1905 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.394 UTC [cauthdsl] func1 -> DEBU 1906 0xc0012939a0 gate 1569287137394705700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.394 UTC [cauthdsl] func2 -> DEBU 1907 0xc0012939a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.394 UTC [cauthdsl] func2 -> DEBU 1908 0xc0012939a0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.395 UTC [cauthdsl] func2 -> DEBU 1909 0xc0012939a0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:37.396 UTC [msp.identity] Verify -> DEBU 190a Verify: digest = 00000000 e0 1d ee 34 5e 6d 4d 94 17 f2 e1 18 66 10 aa ef |...4^mM.....f...| +orderer0.example.com | 00000010 19 35 69 6f 16 82 cb 9a 6a a5 e1 e9 25 48 73 5e |.5io....j...%Hs^|" +orderer0.example.com | "2019-09-24 01:05:37.396 UTC [msp.identity] Verify -> DEBU 190b Verify: sig = 00000000 30 45 02 21 00 fa 58 1b 92 ff 1f 2e 50 0b 13 92 |0E.!..X.....P...| +orderer0.example.com | 00000010 99 c8 4c 4f 1c 4c 49 4e 2b 13 eb 11 48 57 a7 db |..LO.LIN+...HW..| +orderer0.example.com | 00000020 37 a6 f5 ac aa 02 20 7d ce ec 3a 22 c1 6b c1 9b |7..... }..:".k..| +orderer0.example.com | 00000030 39 1a 5b eb 87 a5 96 c6 72 37 fc 28 6b 81 09 09 |9.[.....r7.(k...| +orderer0.example.com | 00000040 c1 55 47 0e 1a 44 e9 |.UG..D.|" +orderer0.example.com | "2019-09-24 01:05:37.397 UTC [cauthdsl] func2 -> DEBU 190c 0xc0012939a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:37.397 UTC [cauthdsl] func1 -> DEBU 190d 0xc0012939a0 gate 1569287137394705700 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 190e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 190f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 1910 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.399 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.399 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.399 UTC [common.deliver] deliverBlocks -> DEBU 1914 [channel: businesschannel] Received seekInfo (0xc00100e340) start: > stop: > from 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.399 UTC [fsblkstorage] Next -> DEBU 1915 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:37.400 UTC [fsblkstorage] newBlockfileStream -> DEBU 1916 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:37.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1917 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:37.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1918 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:37.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1919 blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:37.402 UTC [common.deliver] deliverBlocks -> DEBU 191a [channel: businesschannel] Delivering block for (0xc00100e340) for 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.402 UTC [common.deliver] deliverBlocks -> DEBU 191b [channel: businesschannel] Done delivering to 172.18.0.5:53884 for (0xc00100e340)" +orderer0.example.com | "2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191c Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191e Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191f Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:37.403 UTC [common.deliver] Handle -> DEBU 1920 Waiting for new SeekInfo from 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.404 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 172.18.0.5:53884" +orderer0.example.com | "2019-09-24 01:05:37.408 UTC [grpc] warningf -> DEBU 1922 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53884: read: connection reset by peer" +orderer0.example.com | "2019-09-24 01:05:37.409 UTC [common.deliver] Handle -> WARN 1923 Error reading from 172.18.0.5:53884: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:37.410 UTC [orderer.common.server] func1 -> DEBU 1924 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:37.410 UTC [comm.grpc.server] 1 -> INFO 1925 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53884 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8282ms +orderer0.example.com | "2019-09-24 01:05:37.412 UTC [grpc] infof -> DEBU 1926 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:37.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1927 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1928 Sending msg of 28 bytes to 3 on channel testchainid took 108µs" +orderer0.example.com | "2019-09-24 01:05:37.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1929 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475µs " +orderer0.example.com | "2019-09-24 01:05:37.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 192a Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +orderer0.example.com | "2019-09-24 01:05:37.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 192b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5552ms " +orderer0.example.com | "2019-09-24 01:05:37.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU 192c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 192d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +orderer0.example.com | "2019-09-24 01:05:37.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 192e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:37.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 192f Sending msg of 28 bytes to 3 on channel businesschannel took 12.2533ms" +orderer0.example.com | "2019-09-24 01:05:37.873 UTC [orderer.common.server] Deliver -> DEBU 1930 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:37.873 UTC [common.deliver] Handle -> DEBU 1931 Starting new deliver loop for 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.873 UTC [common.deliver] Handle -> DEBU 1932 Attempting to read seek info message from 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1935 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1936 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.875 UTC [policies] Evaluate -> DEBU 1937 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.875 UTC [cauthdsl] func1 -> DEBU 1938 0xc000d91ba0 gate 1569287137875248000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.875 UTC [cauthdsl] func2 -> DEBU 1939 0xc000d91ba0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193a 0xc000d91ba0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193b 0xc000d91ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193c 0xc000d91ba0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.877 UTC [cauthdsl] func1 -> DEBU 193d 0xc000d91ba0 gate 1569287137875248000 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 193e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 193f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func1 -> DEBU 1941 0xc000e563e0 gate 1569287137877981700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1942 0xc000e563e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1943 0xc000e563e0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1944 0xc000e563e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1945 0xc000e563e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [cauthdsl] func1 -> DEBU 1946 0xc000e563e0 gate 1569287137877981700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.878 UTC [policies] Evaluate -> DEBU 1947 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1949 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func1 -> DEBU 194a 0xc000e56c20 gate 1569287137879176500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194b 0xc000e56c20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194c 0xc000e56c20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194d 0xc000e56c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194e 0xc000e56c20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [cauthdsl] func1 -> DEBU 194f 0xc000e56c20 gate 1569287137879176500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1950 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:37.880 UTC [policies] func1 -> DEBU 1952 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1953 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1954 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1955 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.881 UTC [policies] Evaluate -> DEBU 1956 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:37.881 UTC [policies] Evaluate -> DEBU 1957 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:37.881 UTC [cauthdsl] func1 -> DEBU 1958 0xc000e57910 gate 1569287137881527900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:37.881 UTC [cauthdsl] func2 -> DEBU 1959 0xc000e57910 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:37.882 UTC [cauthdsl] func2 -> DEBU 195a 0xc000e57910 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:37.882 UTC [cauthdsl] func2 -> DEBU 195b 0xc000e57910 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:37.883 UTC [msp.identity] Verify -> DEBU 195c Verify: digest = 00000000 85 5c 02 f4 e2 ae 22 57 9d d6 34 20 d9 22 7c bf |.\...."W..4 ."|.| +orderer0.example.com | 00000010 ec a8 d1 98 51 8d 66 b2 90 fe 67 b8 2a f5 26 8f |....Q.f...g.*.&.|" +orderer0.example.com | "2019-09-24 01:05:37.883 UTC [msp.identity] Verify -> DEBU 195d Verify: sig = 00000000 30 45 02 21 00 c4 e0 d2 6f 87 bc 63 b0 e1 9f 42 |0E.!....o..c...B| +orderer0.example.com | 00000010 cc de 7b 46 73 d6 7f a8 00 0f 4a 8a 2a 36 a0 30 |..{Fs.....J.*6.0| +orderer0.example.com | 00000020 46 d0 7c b9 4e 02 20 23 72 df db 2a e9 6f c6 23 |F.|.N. #r..*.o.#| +orderer0.example.com | 00000030 24 38 09 a1 1b 1d 1c c4 52 b5 48 7c 24 ae 6f 6a |$8......R.H|$.oj| +orderer0.example.com | 00000040 3b f9 79 b6 40 f8 b9 |;.y.@..|" +orderer0.example.com | "2019-09-24 01:05:37.883 UTC [cauthdsl] func2 -> DEBU 195e 0xc000e57910 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:37.883 UTC [cauthdsl] func1 -> DEBU 195f 0xc000e57910 gate 1569287137881527900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1960 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1961 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1962 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1963 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1964 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.885 UTC [policies] Evaluate -> DEBU 1965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:37.885 UTC [common.deliver] deliverBlocks -> DEBU 1966 [channel: businesschannel] Received seekInfo (0xc000e50780) start: > stop: > from 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.885 UTC [fsblkstorage] Next -> DEBU 1967 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:37.885 UTC [fsblkstorage] newBlockfileStream -> DEBU 1968 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:37.886 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1969 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:37.886 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196a Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:37.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196b blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:37.889 UTC [common.deliver] deliverBlocks -> DEBU 196c [channel: businesschannel] Delivering block for (0xc000e50780) for 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.890 UTC [common.deliver] deliverBlocks -> DEBU 196d [channel: businesschannel] Done delivering to 172.18.0.5:53886 for (0xc000e50780)" +orderer0.example.com | "2019-09-24 01:05:37.890 UTC [common.deliver] Handle -> DEBU 196e Waiting for new SeekInfo from 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.890 UTC [common.deliver] Handle -> DEBU 196f Attempting to read seek info message from 172.18.0.5:53886" +orderer0.example.com | "2019-09-24 01:05:37.891 UTC [fsblkstorage] waitForBlock -> DEBU 1970 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.891 UTC [fsblkstorage] waitForBlock -> DEBU 1971 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org1.example.com | "2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16d0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16d1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [cauthdsl] func1 -> DEBU 16d5 0xc0034da220 gate 1569287090906271000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0034da220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0034da220 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d8 0xc0034da220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16d9 0xc0034da220 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func1 -> DEBU 16da 0xc0034da220 gate 1569287090906271000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func1 -> DEBU 16de 0xc0034dabb0 gate 1569287090907604700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16df 0xc0034dabb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16e0 0xc0034dabb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16e1 0xc0034dabb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.907 UTC [msp.identity] Verify -> DEBU 16e2 Verify: digest = 00000000 a8 58 bc 3b 59 b2 0c 80 f4 3c 71 30 6f 17 15 75 |.X.;Y.... DEBU 16e3 Verify: sig = 00000000 30 45 02 21 00 87 a7 83 10 13 7e 43 96 c2 80 b7 |0E.!......~C....| +peer0.org1.example.com | 00000010 ae 5c e5 27 15 77 4c bd cd ed 40 b7 95 26 7b 49 |.\.'.wL...@..&{I| +peer0.org1.example.com | 00000020 4d 97 d1 0e 84 02 20 38 58 53 47 e1 03 75 96 f9 |M..... 8XSG..u..| +peer0.org1.example.com | 00000030 d1 de 52 44 20 85 a1 a9 3d 5d 31 90 1a 87 04 02 |..RD ...=]1.....| +peer0.org1.example.com | 00000040 0e 7d a7 6d ac 9b e7 |.}.m...|" +peer0.org1.example.com | "2019-09-24 01:04:50.908 UTC [cauthdsl] func2 -> DEBU 16e4 0xc0034dabb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:50.908 UTC [cauthdsl] func1 -> DEBU 16e5 0xc0034dabb0 gate 1569287090907604700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.909 UTC [policies] Evaluate -> DEBU 16e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:50.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 16eb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:50.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ec updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ed Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:50.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ee Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:50.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ef Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 16f0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.911 UTC [gossip.discovery] sendMemResponse -> DEBU 16f1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:50.911 UTC [msp] DeserializeIdentity -> DEBU 16f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [msp] DeserializeIdentity -> DEBU 16f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [msp] DeserializeIdentity -> DEBU 16f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [gossip.comm] Send -> DEBU 16f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +orderer0.example.com | "2019-09-24 01:05:37.892 UTC [fsblkstorage] waitForBlock -> DEBU 1972 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:37.892 UTC [fsblkstorage] waitForBlock -> DEBU 1973 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:37.901 UTC [grpc] infof -> DEBU 1974 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:37.902 UTC [common.deliver] Handle -> WARN 1975 Error reading from 172.18.0.5:53886: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:37.902 UTC [orderer.common.server] func1 -> DEBU 1976 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:37.902 UTC [comm.grpc.server] 1 -> INFO 1977 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53886 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.153ms +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [gossip.discovery] sendMemResponse -> DEBU 16f6 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [gossip.comm] sendToEndpoint -> DEBU 16f7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.912 UTC [gossip.comm] sendToEndpoint -> DEBU 16f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16f9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.917 UTC [gossip.gossip] handleMessage -> DEBU 16fb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16fc Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:50.917 UTC [msp.identity] Verify -> DEBU 16fd Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +peer0.org1.example.com | 00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +peer0.org1.example.com | "2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 16fe Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +peer0.org1.example.com | 00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +peer0.org1.example.com | 00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +peer0.org1.example.com | 00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +peer0.org1.example.com | 00000040 c2 02 36 31 a0 d2 38 |..61..8|" +peer0.org1.example.com | "2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 16ff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 1700 Verify: sig = 00000000 30 45 02 21 00 83 e5 74 cd af d8 8c 2c a0 5a 8c |0E.!...t....,.Z.| +peer0.org1.example.com | 00000010 29 44 ac fd b5 36 b4 47 87 e5 12 23 09 7a dc 47 |)D...6.G...#.z.G| +peer0.org1.example.com | 00000020 c8 8d 74 19 68 02 20 3b 9c 11 4e 96 56 04 c8 78 |..t.h. ;..N.V..x| +peer0.org1.example.com | 00000030 c3 38 19 20 36 7a 5e 4a 74 7b 6f f1 6d 89 09 0a |.8. 6z^Jt{o.m...| +peer0.org1.example.com | 00000040 6f c6 6a bd c7 ac 58 |o.j...X|" +peer0.org1.example.com | "2019-09-24 01:04:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1701 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.919 UTC [gossip.discovery] isSentByMe -> DEBU 1702 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1703 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1704 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:51.737 UTC [gossip.election] waitForInterrupt -> DEBU 1705 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:51.737 UTC [gossip.election] IsLeader -> DEBU 1706 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:51.738 UTC [msp] GetDefaultSigningIdentity -> DEBU 1707 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:51.738 UTC [msp.identity] Sign -> DEBU 1708 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510061801 " +peer0.org1.example.com | "2019-09-24 01:04:51.738 UTC [msp.identity] Sign -> DEBU 1709 Sign: digest: 55220C6A2CB7B5E11635943595CC1BB21B3917046147261DCD74B5FD419651E0 " +peer0.org1.example.com | "2019-09-24 01:04:51.739 UTC [gossip.election] waitForInterrupt -> DEBU 170a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:51.747 UTC [msp] DeserializeIdentity -> DEBU 170b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:51.747 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:51.748 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:51.748 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:51.749 UTC [gossip.comm] Send -> DEBU 170f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:51.749 UTC [msp] DeserializeIdentity -> DEBU 1710 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:51.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1711 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:51.750 UTC [gossip.comm] sendToEndpoint -> DEBU 1712 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:51.750 UTC [msp] DeserializeIdentity -> DEBU 1713 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.552 UTC [gossip.comm] func1 -> DEBU 1714 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.552 UTC [gossip.gossip] handleMessage -> DEBU 1715 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.552 UTC [gossip.gossip] handleMessage -> DEBU 1716 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1717 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1718 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:53.553 UTC [msp.identity] Verify -> DEBU 1719 Verify: digest = 00000000 0f 30 32 fc 75 25 c0 07 ca 34 2b 54 e9 5a b8 12 |.02.u%...4+T.Z..| +peer0.org1.example.com | 00000010 93 4c d2 62 5c bc 99 92 1b 4b a6 ba 47 7c 09 eb |.L.b\....K..G|..|" +peer0.org1.example.com | "2019-09-24 01:04:53.553 UTC [msp.identity] Verify -> DEBU 171a Verify: sig = 00000000 30 45 02 21 00 f7 10 57 ec 72 a9 5a d0 ba 09 7c |0E.!...W.r.Z...|| +peer0.org1.example.com | 00000010 21 34 bb ee 20 62 e6 36 11 bb e5 31 01 8d d7 65 |!4.. b.6...1...e| +peer0.org1.example.com | 00000020 b0 b9 99 6e 69 02 20 1c 84 6c 2e f9 1c 80 5d c1 |...ni. ..l....].| +peer0.org1.example.com | 00000030 95 ea 8b 91 a1 0f 3d ee e7 47 12 c7 f9 1c a9 66 |......=..G.....f| +peer0.org1.example.com | 00000040 9b ea cd 44 5e 7f 90 |...D^..|" +peer0.org1.example.com | "2019-09-24 01:04:53.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 171b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 171c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171e Updating aliveness data: membership: timestamp: " +orderer0.example.com | "2019-09-24 01:05:38.068 UTC [orderer.common.server] Deliver -> DEBU 1978 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:38.069 UTC [common.deliver] Handle -> DEBU 1979 Starting new deliver loop for 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.069 UTC [common.deliver] Handle -> DEBU 197a Attempting to read seek info message from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.070 UTC [policies] Evaluate -> DEBU 197b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.070 UTC [policies] Evaluate -> DEBU 197c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.071 UTC [cauthdsl] func1 -> DEBU 1980 0xc001364fa0 gate 1569287138071814100 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.071 UTC [cauthdsl] func2 -> DEBU 1981 0xc001364fa0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1982 0xc001364fa0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1983 0xc001364fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1984 0xc001364fa0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.072 UTC [cauthdsl] func1 -> DEBU 1985 0xc001364fa0 gate 1569287138071814100 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.072 UTC [policies] Evaluate -> DEBU 1986 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.073 UTC [policies] Evaluate -> DEBU 1987 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.073 UTC [policies] Evaluate -> DEBU 1988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.073 UTC [cauthdsl] func1 -> DEBU 1989 0xc001365850 gate 1569287138073715400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.073 UTC [cauthdsl] func2 -> DEBU 198a 0xc001365850 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198b 0xc001365850 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198c 0xc001365850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198d 0xc001365850 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.075 UTC [cauthdsl] func1 -> DEBU 198e 0xc001365850 gate 1569287138073715400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.075 UTC [policies] Evaluate -> DEBU 198f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.075 UTC [policies] Evaluate -> DEBU 1990 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.076 UTC [policies] Evaluate -> DEBU 1991 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.076 UTC [cauthdsl] func1 -> DEBU 1992 0xc001124150 gate 1569287138076554500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.077 UTC [cauthdsl] func2 -> DEBU 1993 0xc001124150 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.077 UTC [cauthdsl] func2 -> DEBU 1994 0xc001124150 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.078 UTC [cauthdsl] func2 -> DEBU 1995 0xc001124150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.078 UTC [cauthdsl] func2 -> DEBU 1996 0xc001124150 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.078 UTC [cauthdsl] func1 -> DEBU 1997 0xc001124150 gate 1569287138076554500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 1998 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 1999 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.079 UTC [policies] func1 -> DEBU 199a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [cauthdsl] func1 -> DEBU 19a0 0xc001124f40 gate 1569287138080588400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.080 UTC [cauthdsl] func2 -> DEBU 19a1 0xc001124f40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.081 UTC [cauthdsl] func2 -> DEBU 19a2 0xc001124f40 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.081 UTC [cauthdsl] func2 -> DEBU 19a3 0xc001124f40 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.081 UTC [msp.identity] Verify -> DEBU 19a4 Verify: digest = 00000000 53 62 b1 55 12 0b bc 07 b7 cf 25 c2 93 87 ae 8c |Sb.U......%.....| +orderer0.example.com | 00000010 bc 42 79 5a f0 8a 33 0a 86 3c e4 8d 45 63 f6 f5 |.ByZ..3..<..Ec..|" +orderer0.example.com | "2019-09-24 01:05:38.081 UTC [msp.identity] Verify -> DEBU 19a5 Verify: sig = 00000000 30 45 02 21 00 fe 8e 33 cb b8 fb 63 1e d7 67 2d |0E.!...3...c..g-| +orderer0.example.com | 00000010 a9 59 2b 2d 8a 71 4e 18 48 98 15 43 2f e4 8d 1a |.Y+-.qN.H..C/...| +orderer0.example.com | 00000020 3c e4 8b 3d 0f 02 20 5c 72 85 cc 92 98 08 d1 82 |<..=.. \r.......| +orderer0.example.com | 00000030 81 e1 61 4e 25 46 50 4a b9 6f 39 90 89 32 37 dd |..aN%FPJ.o9..27.| +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1720 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 1721 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1722 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.561 UTC [gossip.comm] func1 -> DEBU 1723 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.561 UTC [gossip.gossip] handleMessage -> DEBU 1724 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.562 UTC [gossip.gossip] handleMessage -> DEBU 1725 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1726 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1727 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.562 UTC [gossip.comm] func1 -> DEBU 1728 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.562 UTC [gossip.gossip] handleMessage -> DEBU 1729 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.563 UTC [gossip.gossip] handleMessage -> DEBU 172a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.564 UTC [gossip.comm] Send -> DEBU 1730 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 1731 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1732 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1733 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.565 UTC [gossip.comm] Send -> DEBU 1734 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +orderer0.example.com | 00000040 8e 8a d3 8b 1c da 7e |......~|" +orderer0.example.com | "2019-09-24 01:05:38.082 UTC [cauthdsl] func2 -> DEBU 19a6 0xc001124f40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.082 UTC [cauthdsl] func1 -> DEBU 19a7 0xc001124f40 gate 1569287138080588400 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.082 UTC [policies] Evaluate -> DEBU 19a8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.082 UTC [policies] Evaluate -> DEBU 19a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19aa Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1735 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1736 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.689 UTC [msp] DeserializeIdentity -> DEBU 1737 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.689 UTC [msp] DeserializeIdentity -> DEBU 1738 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.691 UTC [gossip.comm] Send -> DEBU 1739 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1740 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1741 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1742 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.694 UTC [gossip.gossip] handleMessage -> DEBU 1743 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.694 UTC [msp] DeserializeIdentity -> DEBU 1744 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.695 UTC [msp] DeserializeIdentity -> DEBU 1745 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.695 UTC [msp] DeserializeIdentity -> DEBU 1746 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1747 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1748 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1749 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.696 UTC [cauthdsl] func1 -> DEBU 174d 0xc003604030 gate 1569287093696890400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 174e 0xc003604030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 174f 0xc003604030 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 1750 0xc003604030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 1751 0xc003604030 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [cauthdsl] func1 -> DEBU 1752 0xc003604030 gate 1569287093696890400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.697 UTC [policies] Evaluate -> DEBU 1753 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ac Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [common.deliver] deliverBlocks -> DEBU 19ae [channel: businesschannel] Received seekInfo (0xc000cb0540) start: > stop: > from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.083 UTC [fsblkstorage] Next -> DEBU 19af Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.084 UTC [fsblkstorage] newBlockfileStream -> DEBU 19b0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b1 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b2 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b3 blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.084 UTC [common.deliver] deliverBlocks -> DEBU 19b4 [channel: businesschannel] Delivering block for (0xc000cb0540) for 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.085 UTC [common.deliver] deliverBlocks -> DEBU 19b5 [channel: businesschannel] Done delivering to 172.18.0.5:53888 for (0xc000cb0540)" +orderer0.example.com | "2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b6 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b8 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.086 UTC [fsblkstorage] waitForBlock -> DEBU 19b9 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.085 UTC [common.deliver] Handle -> DEBU 19ba Waiting for new SeekInfo from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.086 UTC [common.deliver] Handle -> DEBU 19bb Attempting to read seek info message from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.091 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.091 UTC [cauthdsl] func1 -> DEBU 19c1 0xc000dd31c0 gate 1569287138091630700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c2 0xc000dd31c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c3 0xc000dd31c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c4 0xc000dd31c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c5 0xc000dd31c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.092 UTC [cauthdsl] func1 -> DEBU 19c6 0xc000dd31c0 gate 1569287138091630700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.093 UTC [cauthdsl] func1 -> DEBU 19ca 0xc000dd3b20 gate 1569287138093670200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cb 0xc000dd3b20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cc 0xc000dd3b20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cd 0xc000dd3b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19ce 0xc000dd3b20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [cauthdsl] func1 -> DEBU 19cf 0xc000dd3b20 gate 1569287138093670200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [policies] Evaluate -> DEBU 19d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.094 UTC [policies] Evaluate -> DEBU 19d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.095 UTC [policies] Evaluate -> DEBU 19d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.095 UTC [cauthdsl] func1 -> DEBU 19d3 0xc00125a360 gate 1569287138095346300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d4 0xc00125a360 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d5 0xc00125a360 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d6 0xc00125a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.096 UTC [cauthdsl] func2 -> DEBU 19d7 0xc00125a360 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.096 UTC [cauthdsl] func1 -> DEBU 19d8 0xc00125a360 gate 1569287138095346300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.097 UTC [policies] Evaluate -> DEBU 19d9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.097 UTC [policies] Evaluate -> DEBU 19da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.097 UTC [policies] func1 -> DEBU 19db Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19dc Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [policies] Evaluate -> DEBU 1754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [policies] Evaluate -> DEBU 1755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [cauthdsl] func1 -> DEBU 1756 0xc003604870 gate 1569287093698460700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1757 0xc003604870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1758 0xc003604870 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1759 0xc003604870 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.698 UTC [msp.identity] Verify -> DEBU 175a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [msp.identity] Verify -> DEBU 175b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [cauthdsl] func2 -> DEBU 175c 0xc003604870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [cauthdsl] func1 -> DEBU 175d 0xc003604870 gate 1569287093698460700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 175e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 175f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 1760 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 1761 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1762 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1763 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1764 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1765 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:53.701 UTC [msp] DeserializeIdentity -> DEBU 1766 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.701 UTC [msp] DeserializeIdentity -> DEBU 1767 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.701 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1768 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1769 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [cauthdsl] func1 -> DEBU 176e 0xc00362b120 gate 1569287093702739900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [cauthdsl] func2 -> DEBU 176f 0xc00362b120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.702 UTC [cauthdsl] func2 -> DEBU 1770 0xc00362b120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.703 UTC [cauthdsl] func2 -> DEBU 1771 0xc00362b120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.703 UTC [cauthdsl] func2 -> DEBU 1772 0xc00362b120 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.703 UTC [cauthdsl] func1 -> DEBU 1773 0xc00362b120 gate 1569287093702739900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1774 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1775 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.704 UTC [cauthdsl] func1 -> DEBU 1777 0xc00362b980 gate 1569287093704779200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.704 UTC [cauthdsl] func2 -> DEBU 1778 0xc00362b980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.705 UTC [cauthdsl] func2 -> DEBU 1779 0xc00362b980 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.705 UTC [cauthdsl] func2 -> DEBU 177a 0xc00362b980 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.705 UTC [msp.identity] Verify -> DEBU 177b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:53.705 UTC [msp.identity] Verify -> DEBU 177c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19e0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [cauthdsl] func1 -> DEBU 19e1 0xc00125b060 gate 1569287138098283200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e2 0xc00125b060 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e3 0xc00125b060 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e4 0xc00125b060 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.098 UTC [msp.identity] Verify -> DEBU 19e5 Verify: digest = 00000000 19 ca 49 4b 7b 89 52 ca 5d 86 7b 23 90 b8 d6 19 |..IK{.R.].{#....| +orderer0.example.com | 00000010 d1 88 e0 93 93 6c 3d 12 7c c8 a8 90 a2 3e 22 18 |.....l=.|....>".|" +orderer0.example.com | "2019-09-24 01:05:38.099 UTC [msp.identity] Verify -> DEBU 19e6 Verify: sig = 00000000 30 44 02 20 1a a7 f4 17 04 3e 99 b2 2a 45 41 e7 |0D. .....>..*EA.| +orderer0.example.com | 00000010 ea ae a6 05 a1 80 2f a7 8e ac 77 5a 73 88 27 19 |....../...wZs.'.| +orderer0.example.com | 00000020 a4 1e c7 e3 02 20 16 d0 93 62 d5 08 a1 99 42 a3 |..... ...b....B.| +orderer0.example.com | 00000030 fd 9b 33 ba f6 ad 5e f7 75 43 6e 8b 72 ba ce bc |..3...^.uCn.r...| +orderer0.example.com | 00000040 29 a2 98 3e 30 d5 |)..>0.|" +orderer0.example.com | "2019-09-24 01:05:38.099 UTC [cauthdsl] func2 -> DEBU 19e7 0xc00125b060 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.100 UTC [cauthdsl] func1 -> DEBU 19e8 0xc00125b060 gate 1569287138098283200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.100 UTC [policies] Evaluate -> DEBU 19e9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.100 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.101 UTC [policies] Evaluate -> DEBU 19eb Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.101 UTC [policies] Evaluate -> DEBU 19ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.102 UTC [policies] Evaluate -> DEBU 19ed Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.102 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.102 UTC [common.deliver] deliverBlocks -> DEBU 19ef [channel: businesschannel] Received seekInfo (0xc00097c300) start: > stop: > from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.102 UTC [fsblkstorage] Next -> DEBU 19f0 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.103 UTC [fsblkstorage] newBlockfileStream -> DEBU 19f1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:38.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f2 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f3 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:38.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f4 blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.104 UTC [common.deliver] deliverBlocks -> DEBU 19f5 [channel: businesschannel] Delivering block for (0xc00097c300) for 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.105 UTC [common.deliver] deliverBlocks -> DEBU 19f6 [channel: businesschannel] Done delivering to 172.18.0.5:53888 for (0xc00097c300)" +orderer0.example.com | "2019-09-24 01:05:38.105 UTC [common.deliver] Handle -> DEBU 19f7 Waiting for new SeekInfo from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.105 UTC [common.deliver] Handle -> DEBU 19f8 Attempting to read seek info message from 172.18.0.5:53888" +orderer0.example.com | "2019-09-24 01:05:38.105 UTC [fsblkstorage] waitForBlock -> DEBU 19f9 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fa Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fb Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fc Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.112 UTC [grpc] infof -> DEBU 19fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:38.113 UTC [common.deliver] Handle -> WARN 19fe Error reading from 172.18.0.5:53888: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:38.113 UTC [orderer.common.server] func1 -> DEBU 19ff Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:38.113 UTC [comm.grpc.server] 1 -> INFO 1a00 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.0784ms +orderer0.example.com | "2019-09-24 01:05:38.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a01 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a02 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +orderer0.example.com | "2019-09-24 01:05:38.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 730.3µs " +orderer0.example.com | "2019-09-24 01:05:38.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a04 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2019-09-24 01:05:38.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a05 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2019-09-24 01:05:38.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.1µs " +orderer0.example.com | "2019-09-24 01:05:38.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 231.3µs " +orderer0.example.com | "2019-09-24 01:05:38.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.281 UTC [orderer.common.server] Deliver -> DEBU 1a0a Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:38.282 UTC [common.deliver] Handle -> DEBU 1a0b Starting new deliver loop for 172.18.0.5:53890" +orderer0.example.com | "2019-09-24 01:05:38.282 UTC [common.deliver] Handle -> DEBU 1a0c Attempting to read seek info message from 172.18.0.5:53890" +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [cauthdsl] func2 -> DEBU 177d 0xc00362b980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [cauthdsl] func1 -> DEBU 177e 0xc00362b980 gate 1569287093704779200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 177f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1781 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.707 UTC [gossip.gossip] handleMessage -> DEBU 1783 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.707 UTC [gossip.gossip] handleMessage -> DEBU 1784 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.707 UTC [msp] DeserializeIdentity -> DEBU 1785 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.708 UTC [msp] DeserializeIdentity -> DEBU 1786 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.708 UTC [msp] DeserializeIdentity -> DEBU 1787 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1788 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1789 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 178a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [cauthdsl] func1 -> DEBU 178e 0xc0036635f0 gate 1569287093709687900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.709 UTC [cauthdsl] func2 -> DEBU 178f 0xc0036635f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1790 0xc0036635f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1791 0xc0036635f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1792 0xc0036635f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.710 UTC [cauthdsl] func1 -> DEBU 1793 0xc0036635f0 gate 1569287093709687900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.710 UTC [policies] Evaluate -> DEBU 1794 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.282 UTC [policies] Evaluate -> DEBU 1a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.282 UTC [policies] Evaluate -> DEBU 1a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.283 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0011d61e0 gate 1569287138283467200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.283 UTC [cauthdsl] func2 -> DEBU 1a13 0xc0011d61e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a14 0xc0011d61e0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a15 0xc0011d61e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a16 0xc0011d61e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.285 UTC [cauthdsl] func1 -> DEBU 1a17 0xc0011d61e0 gate 1569287138283467200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a18 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.286 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc0011d6a20 gate 1569287138286192600 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.286 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0011d6a20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.286 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc0011d6a20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.287 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc0011d6a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.287 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc0011d6a20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.287 UTC [cauthdsl] func1 -> DEBU 1a20 0xc0011d6a20 gate 1569287138286192600 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.288 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.288 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.289 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.289 UTC [cauthdsl] func1 -> DEBU 1a24 0xc0011d7260 gate 1569287138289368000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.289 UTC [cauthdsl] func2 -> DEBU 1a25 0xc0011d7260 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.289 UTC [cauthdsl] func2 -> DEBU 1a26 0xc0011d7260 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.290 UTC [cauthdsl] func2 -> DEBU 1a27 0xc0011d7260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.290 UTC [cauthdsl] func2 -> DEBU 1a28 0xc0011d7260 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.290 UTC [cauthdsl] func1 -> DEBU 1a29 0xc0011d7260 gate 1569287138289368000 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.290 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.291 UTC [policies] func1 -> DEBU 1a2c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.292 UTC [policies] Evaluate -> DEBU 1a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.292 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.292 UTC [cauthdsl] func1 -> DEBU 1a32 0xc0011d7f60 gate 1569287138292554100 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.292 UTC [cauthdsl] func2 -> DEBU 1a33 0xc0011d7f60 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.293 UTC [cauthdsl] func2 -> DEBU 1a34 0xc0011d7f60 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.293 UTC [cauthdsl] func2 -> DEBU 1a35 0xc0011d7f60 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.293 UTC [msp.identity] Verify -> DEBU 1a36 Verify: digest = 00000000 00 6d ea a3 2b ba 0d 69 2d c0 c7 7f d4 ce 33 0c |.m..+..i-.....3.| +orderer0.example.com | 00000010 22 e7 8b 5e b9 81 e6 ca 77 ff 99 75 41 88 31 f7 |"..^....w..uA.1.|" +orderer0.example.com | "2019-09-24 01:05:38.293 UTC [msp.identity] Verify -> DEBU 1a37 Verify: sig = 00000000 30 44 02 20 48 af e0 9a 04 5d 7f 4a 8f da 87 71 |0D. H....].J...q| +orderer0.example.com | 00000010 de 8e d0 0d 42 6a 8f b8 99 3c 86 b1 64 31 5c 71 |....Bj...<..d1\q| +orderer0.example.com | 00000020 31 f6 eb 16 02 20 53 b7 44 a9 c5 2b b3 06 6e fb |1.... S.D..+..n.| +orderer0.example.com | 00000030 ac 39 73 98 32 d0 26 2d 30 d4 73 cd 08 a0 06 ad |.9s.2.&-0.s.....| +orderer0.example.com | 00000040 25 ae bb fc 1e 66 |%....f|" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [cauthdsl] func2 -> DEBU 1a38 0xc0011d7f60 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [cauthdsl] func1 -> DEBU 1a39 0xc0011d7f60 gate 1569287138292554100 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.295 UTC [policies] Evaluate -> DEBU 1a3e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.295 UTC [policies] Evaluate -> DEBU 1a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.711 UTC [policies] Evaluate -> DEBU 1795 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.711 UTC [policies] Evaluate -> DEBU 1796 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.711 UTC [cauthdsl] func1 -> DEBU 1797 0xc003663e30 gate 1569287093711491600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.711 UTC [cauthdsl] func2 -> DEBU 1798 0xc003663e30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.711 UTC [cauthdsl] func2 -> DEBU 1799 0xc003663e30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.712 UTC [cauthdsl] func2 -> DEBU 179a 0xc003663e30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.712 UTC [msp.identity] Verify -> DEBU 179b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:53.718 UTC [msp.identity] Verify -> DEBU 179c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:53.719 UTC [cauthdsl] func2 -> DEBU 179d 0xc003663e30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.719 UTC [cauthdsl] func1 -> DEBU 179e 0xc003663e30 gate 1569287093711491600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:53.719 UTC [policies] Evaluate -> DEBU 179f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.719 UTC [policies] Evaluate -> DEBU 17a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.720 UTC [policies] Evaluate -> DEBU 17a1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.720 UTC [policies] Evaluate -> DEBU 17a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.720 UTC [msp.identity] Verify -> DEBU 17a3 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:53.720 UTC [msp.identity] Verify -> DEBU 17a4 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:53.721 UTC [msp] DeserializeIdentity -> DEBU 17a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.723 UTC [msp] DeserializeIdentity -> DEBU 17a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17a8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17a9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [cauthdsl] func1 -> DEBU 17ad 0xc003683f70 gate 1569287093725420700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17ae 0xc003683f70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17af 0xc003683f70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17b0 0xc003683f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b1 0xc003683f70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func1 -> DEBU 17b2 0xc003683f70 gate 1569287093725420700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.295 UTC [common.deliver] deliverBlocks -> DEBU 1a40 [channel: businesschannel] Received seekInfo (0xc000cb0dc0) start: > stop: > from 172.18.0.5:53890" +orderer0.example.com | "2019-09-24 01:05:38.295 UTC [fsblkstorage] Next -> DEBU 1a41 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.295 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a42 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a43 Remaining bytes=[127751], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a44 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a45 blockbytes [25804] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.296 UTC [common.deliver] deliverBlocks -> DEBU 1a46 [channel: businesschannel] Delivering block for (0xc000cb0dc0) for 172.18.0.5:53890" +orderer0.example.com | "2019-09-24 01:05:38.297 UTC [common.deliver] deliverBlocks -> DEBU 1a47 [channel: businesschannel] Done delivering to 172.18.0.5:53890 for (0xc000cb0dc0)" +orderer0.example.com | "2019-09-24 01:05:38.297 UTC [fsblkstorage] waitForBlock -> DEBU 1a48 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.297 UTC [fsblkstorage] waitForBlock -> DEBU 1a49 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.298 UTC [fsblkstorage] waitForBlock -> DEBU 1a4a Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.298 UTC [fsblkstorage] waitForBlock -> DEBU 1a4b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.297 UTC [common.deliver] Handle -> DEBU 1a4c Waiting for new SeekInfo from 172.18.0.5:53890" +orderer0.example.com | "2019-09-24 01:05:38.300 UTC [common.deliver] Handle -> DEBU 1a4d Attempting to read seek info message from 172.18.0.5:53890" +orderer0.example.com | "2019-09-24 01:05:38.306 UTC [grpc] infof -> DEBU 1a4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:38.308 UTC [common.deliver] Handle -> WARN 1a4f Error reading from 172.18.0.5:53890: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:38.308 UTC [orderer.common.server] func1 -> DEBU 1a50 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:38.308 UTC [comm.grpc.server] 1 -> INFO 1a51 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53890 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.726ms +orderer0.example.com | "2019-09-24 01:05:38.450 UTC [orderer.common.server] Deliver -> DEBU 1a52 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:38.450 UTC [common.deliver] Handle -> DEBU 1a53 Starting new deliver loop for 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.451 UTC [common.deliver] Handle -> DEBU 1a54 Attempting to read seek info message from 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.452 UTC [policies] Evaluate -> DEBU 1a55 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.453 UTC [policies] Evaluate -> DEBU 1a56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.453 UTC [policies] Evaluate -> DEBU 1a57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.454 UTC [policies] Evaluate -> DEBU 1a58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.454 UTC [policies] Evaluate -> DEBU 1a59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.455 UTC [cauthdsl] func1 -> DEBU 1a5a 0xc0008f8170 gate 1569287138454855200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.455 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc0008f8170 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.455 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc0008f8170 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.456 UTC [cauthdsl] func2 -> DEBU 1a5d 0xc0008f8170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.456 UTC [cauthdsl] func2 -> DEBU 1a5e 0xc0008f8170 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.456 UTC [cauthdsl] func1 -> DEBU 1a5f 0xc0008f8170 gate 1569287138454855200 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.456 UTC [policies] Evaluate -> DEBU 1a60 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.457 UTC [policies] Evaluate -> DEBU 1a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.457 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.457 UTC [cauthdsl] func1 -> DEBU 1a63 0xc0008f89b0 gate 1569287138457662500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.458 UTC [cauthdsl] func2 -> DEBU 1a64 0xc0008f89b0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.458 UTC [cauthdsl] func2 -> DEBU 1a65 0xc0008f89b0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.459 UTC [cauthdsl] func2 -> DEBU 1a66 0xc0008f89b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.459 UTC [cauthdsl] func2 -> DEBU 1a67 0xc0008f89b0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.459 UTC [cauthdsl] func1 -> DEBU 1a68 0xc0008f89b0 gate 1569287138457662500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.459 UTC [policies] Evaluate -> DEBU 1a69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.459 UTC [policies] Evaluate -> DEBU 1a6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.460 UTC [policies] Evaluate -> DEBU 1a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.460 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc0008f91f0 gate 1569287138460610900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6d 0xc0008f91f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6e 0xc0008f91f0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6f 0xc0008f91f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.462 UTC [cauthdsl] func2 -> DEBU 1a70 0xc0008f91f0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.462 UTC [cauthdsl] func1 -> DEBU 1a71 0xc0008f91f0 gate 1569287138460610900 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.462 UTC [policies] Evaluate -> DEBU 1a72 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.462 UTC [policies] Evaluate -> DEBU 1a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func1 -> DEBU 17b6 0xc00370e7b0 gate 1569287093726622300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b7 0xc00370e7b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b8 0xc00370e7b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b9 0xc00370e7b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [msp.identity] Verify -> DEBU 17ba Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:53.726 UTC [msp.identity] Verify -> DEBU 17bb Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:53.727 UTC [cauthdsl] func2 -> DEBU 17bc 0xc00370e7b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.728 UTC [cauthdsl] func1 -> DEBU 17bd 0xc00370e7b0 gate 1569287093726622300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17c0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.730 UTC [msp] DeserializeIdentity -> DEBU 17c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.730 UTC [msp] DeserializeIdentity -> DEBU 17c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.730 UTC [gossip.pull] Hello -> DEBU 17c4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:53.731 UTC [msp.identity] Verify -> DEBU 17c5 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:53.731 UTC [msp] DeserializeIdentity -> DEBU 17c6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.731 UTC [msp] DeserializeIdentity -> DEBU 17c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.731 UTC [msp.identity] Verify -> DEBU 17c8 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:53.731 UTC [gossip.comm] Send -> DEBU 17c9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:53.732 UTC [gossip.gossip] handleMessage -> DEBU 17ca Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.732 UTC [gossip.comm] sendToEndpoint -> DEBU 17cb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.732 UTC [gossip.comm] sendToEndpoint -> DEBU 17cc Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.732 UTC [gossip.gossip] handleMessage -> DEBU 17cd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.733 UTC [gossip.comm] func1 -> DEBU 17ce Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17cf Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d0 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:53.736 UTC [msp] DeserializeIdentity -> DEBU 17d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.736 UTC [msp] DeserializeIdentity -> DEBU 17d4 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:38.462 UTC [policies] func1 -> DEBU 1a74 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a75 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.464 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.464 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.464 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0008f9f40 gate 1569287138464677900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0008f9f40 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0008f9f40 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0008f9f40 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.465 UTC [msp.identity] Verify -> DEBU 1a7e Verify: digest = 00000000 cd c0 63 2f 74 72 5b 36 1d 38 a3 62 4a 11 37 85 |..c/tr[6.8.bJ.7.| +orderer0.example.com | 00000010 3e cf 6a c5 8b 68 9a c0 68 32 16 05 56 2f 8d 07 |>.j..h..h2..V/..|" +orderer0.example.com | "2019-09-24 01:05:38.465 UTC [msp.identity] Verify -> DEBU 1a7f Verify: sig = 00000000 30 45 02 21 00 fa 35 f6 ba c4 34 17 12 57 9c fb |0E.!..5...4..W..| +orderer0.example.com | 00000010 ce 79 20 16 d8 e4 54 51 65 bc 04 c1 bc f4 92 76 |.y ...TQe......v| +orderer0.example.com | 00000020 3e 7d e8 bd 1d 02 20 3e 6e f7 dd a9 2f 0a 66 6c |>}.... >n.../.fl| +orderer0.example.com | 00000030 a1 ce b1 49 b0 7e a8 bf 31 34 48 59 b0 df d2 fb |...I.~..14HY....| +orderer0.example.com | 00000040 70 e7 8a 3b 19 63 1d |p..;.c.|" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [cauthdsl] func2 -> DEBU 1a80 0xc0008f9f40 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [cauthdsl] func1 -> DEBU 1a81 0xc0008f9f40 gate 1569287138464677900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a82 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a84 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a86 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a87 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.467 UTC [common.deliver] deliverBlocks -> DEBU 1a88 [channel: businesschannel] Received seekInfo (0xc00097cc80) start: > stop: > from 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.467 UTC [fsblkstorage] Next -> DEBU 1a89 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.467 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +orderer0.example.com | "2019-09-24 01:05:38.467 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8b Remaining bytes=[101944], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.468 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8c Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +orderer0.example.com | "2019-09-24 01:05:38.468 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8d blockbytes [25475] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.469 UTC [common.deliver] deliverBlocks -> DEBU 1a8e [channel: businesschannel] Delivering block for (0xc00097cc80) for 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.469 UTC [common.deliver] deliverBlocks -> DEBU 1a8f [channel: businesschannel] Done delivering to 172.18.0.5:53892 for (0xc00097cc80)" +orderer0.example.com | "2019-09-24 01:05:38.470 UTC [common.deliver] Handle -> DEBU 1a90 Waiting for new SeekInfo from 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.471 UTC [common.deliver] Handle -> DEBU 1a92 Attempting to read seek info message from 172.18.0.5:53892" +orderer0.example.com | "2019-09-24 01:05:38.470 UTC [fsblkstorage] waitForBlock -> DEBU 1a91 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.472 UTC [fsblkstorage] waitForBlock -> DEBU 1a93 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.473 UTC [fsblkstorage] waitForBlock -> DEBU 1a94 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.473 UTC [fsblkstorage] waitForBlock -> DEBU 1a95 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.475 UTC [common.deliver] Handle -> WARN 1a97 Error reading from 172.18.0.5:53892: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:38.476 UTC [orderer.common.server] func1 -> DEBU 1a98 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:38.476 UTC [comm.grpc.server] 1 -> INFO 1a99 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53892 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.7697ms +orderer0.example.com | "2019-09-24 01:05:38.475 UTC [grpc] infof -> DEBU 1a96 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:38.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2019-09-24 01:05:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.6µs " +orderer0.example.com | "2019-09-24 01:05:38.662 UTC [orderer.common.server] Deliver -> DEBU 1a9d Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:38.662 UTC [common.deliver] Handle -> DEBU 1a9e Starting new deliver loop for 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.662 UTC [common.deliver] Handle -> DEBU 1a9f Attempting to read seek info message from 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.664 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.737 UTC [cauthdsl] func1 -> DEBU 17db 0xc0037d19d0 gate 1569287093737576600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.737 UTC [cauthdsl] func2 -> DEBU 17dc 0xc0037d19d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.738 UTC [cauthdsl] func2 -> DEBU 17dd 0xc0037d19d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [cauthdsl] func2 -> DEBU 17de 0xc0037d19d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [cauthdsl] func2 -> DEBU 17df 0xc0037d19d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [cauthdsl] func1 -> DEBU 17e0 0xc0037d19d0 gate 1569287093737576600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.742 UTC [cauthdsl] func1 -> DEBU 17e4 0xc003828210 gate 1569287093740169900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e5 0xc003828210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e6 0xc003828210 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e7 0xc003828210 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.743 UTC [msp.identity] Verify -> DEBU 17e8 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:53.743 UTC [msp.identity] Verify -> DEBU 17e9 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [cauthdsl] func2 -> DEBU 17ea 0xc003828210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [cauthdsl] func1 -> DEBU 17eb 0xc003828210 gate 1569287093740169900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.744 UTC [msp] DeserializeIdentity -> DEBU 17f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.745 UTC [msp] DeserializeIdentity -> DEBU 17f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:53.745 UTC [policies] Evaluate -> DEBU 17f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [policies] Evaluate -> DEBU 17f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [policies] Evaluate -> DEBU 17f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [cauthdsl] func1 -> DEBU 17f8 0xc0038299f0 gate 1569287093746463400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17f9 0xc0038299f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17fa 0xc0038299f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17fb 0xc0038299f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 17fc 0xc0038299f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [cauthdsl] func1 -> DEBU 17fd 0xc0038299f0 gate 1569287093746463400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 17fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 17ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 1800 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [cauthdsl] func1 -> DEBU 1801 0xc00386a230 gate 1569287093747662500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 1802 0xc00386a230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 1803 0xc00386a230 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:53.748 UTC [cauthdsl] func2 -> DEBU 1804 0xc00386a230 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.748 UTC [msp.identity] Verify -> DEBU 1805 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:53.748 UTC [msp.identity] Verify -> DEBU 1806 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [cauthdsl] func2 -> DEBU 1807 0xc00386a230 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [cauthdsl] func1 -> DEBU 1808 0xc00386a230 gate 1569287093747662500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.664 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.664 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0001d4590 gate 1569287138664938900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.665 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc0001d4590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.665 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc0001d4590 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.666 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc0001d4590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.666 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc0001d4590 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.666 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc0001d4590 gate 1569287138664938900 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.666 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.667 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.667 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.667 UTC [cauthdsl] func1 -> DEBU 1aae 0xc0001d4f50 gate 1569287138667467400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.667 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0001d4f50 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.667 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc0001d4f50 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.668 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0001d4f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.668 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0001d4f50 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.668 UTC [cauthdsl] func1 -> DEBU 1ab3 0xc0001d4f50 gate 1569287138667467400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.668 UTC [policies] Evaluate -> DEBU 1ab4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.668 UTC [policies] Evaluate -> DEBU 1ab5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.669 UTC [policies] Evaluate -> DEBU 1ab6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.669 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0001d5b30 gate 1569287138669416400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.669 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc0001d5b30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc0001d5b30 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0001d5b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0001d5b30 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.670 UTC [cauthdsl] func1 -> DEBU 1abc 0xc0001d5b30 gate 1569287138669416400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.670 UTC [policies] Evaluate -> DEBU 1abd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1abe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.671 UTC [policies] func1 -> DEBU 1abf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1ac0 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1ac1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.672 UTC [cauthdsl] func1 -> DEBU 1ac5 0xc0003b2de0 gate 1569287138672824900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0003b2de0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac7 0xc0003b2de0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc0003b2de0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.673 UTC [msp.identity] Verify -> DEBU 1ac9 Verify: digest = 00000000 f5 83 e4 34 a5 2f 94 dc 18 92 9e 6c ab b7 84 2f |...4./.....l.../| +orderer0.example.com | 00000010 13 c6 98 ad f8 4d ce 75 f7 ef ba 73 3d b4 f6 ba |.....M.u...s=...|" +orderer0.example.com | "2019-09-24 01:05:38.674 UTC [msp.identity] Verify -> DEBU 1aca Verify: sig = 00000000 30 44 02 20 54 68 1e b6 01 b1 f0 ce ce 98 1d e8 |0D. Th..........| +orderer0.example.com | 00000010 4f 9b 61 81 f8 1e f0 f0 43 c4 8f ff a6 ef ba a0 |O.a.....C.......| +orderer0.example.com | 00000020 36 1d 38 42 02 20 5e bf 56 1d 16 77 b2 a3 d3 7b |6.8B. ^.V..w...{| +orderer0.example.com | 00000030 02 12 ad 91 b9 18 be 4f dd 1b ba 0c de a5 80 68 |.......O.......h| +orderer0.example.com | 00000040 fd 38 18 bf 0e e0 |.8....|" +orderer0.example.com | "2019-09-24 01:05:38.674 UTC [cauthdsl] func2 -> DEBU 1acb 0xc0003b2de0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [cauthdsl] func1 -> DEBU 1acc 0xc0003b2de0 gate 1569287138672824900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1acd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1acf Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.676 UTC [common.deliver] deliverBlocks -> DEBU 1ad3 [channel: businesschannel] Received seekInfo (0xc000cb1640) start: > stop: > from 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.676 UTC [fsblkstorage] Next -> DEBU 1ad4 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +orderer0.example.com | "2019-09-24 01:05:38.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad6 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 1809 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:53.749 UTC [gossip.gossip] handleMessage -> DEBU 180d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.750 UTC [gossip.gossip] handleMessage -> DEBU 180e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.750 UTC [gossip.pull] HandleMessage -> DEBU 180f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.750 UTC [gossip.gossip] handleMessage -> DEBU 1810 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.873 UTC [gossip.comm] func1 -> DEBU 1811 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.874 UTC [gossip.gossip] handleMessage -> DEBU 1812 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.875 UTC [msp] DeserializeIdentity -> DEBU 1813 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.875 UTC [msp] DeserializeIdentity -> DEBU 1814 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:53.877 UTC [gossip.gossip] handleMessage -> DEBU 1815 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:53.883 UTC [gossip.comm] func1 -> DEBU 1816 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.883 UTC [gossip.gossip] handleMessage -> DEBU 1817 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.883 UTC [gossip.pull] HandleMessage -> DEBU 1818 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:53.884 UTC [gossip.pull] SendDigest -> DEBU 1819 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:53.884 UTC [gossip.gossip] handleMessage -> DEBU 181a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.077 UTC [gossip.comm] func1 -> DEBU 181b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.077 UTC [gossip.gossip] handleMessage -> DEBU 181c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:38.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +orderer0.example.com | "2019-09-24 01:05:38.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad9 Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +orderer0.example.com | "2019-09-24 01:05:38.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad7 Remaining bytes=[76466], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ada Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +orderer0.example.com | "2019-09-24 01:05:38.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1adc blockbytes [25480] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.678 UTC [common.deliver] deliverBlocks -> DEBU 1add [channel: businesschannel] Delivering block for (0xc000cb1640) for 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.6µs " +orderer0.example.com | "2019-09-24 01:05:38.678 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Done delivering to 172.18.0.5:53894 for (0xc000cb1640)" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [common.deliver] Handle -> DEBU 1adf Waiting for new SeekInfo from 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [common.deliver] Handle -> DEBU 1ae0 Attempting to read seek info message from 172.18.0.5:53894" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae1 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae3 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae4 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:38.689 UTC [grpc] infof -> DEBU 1ae7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:38.689 UTC [common.deliver] Handle -> WARN 1ae8 Error reading from 172.18.0.5:53894: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:38.689 UTC [orderer.common.server] func1 -> DEBU 1ae9 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:38.690 UTC [comm.grpc.server] 1 -> INFO 1aea streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53894 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.3731ms +orderer0.example.com | "2019-09-24 01:05:38.889 UTC [orderer.common.server] Deliver -> DEBU 1aeb Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:38.889 UTC [common.deliver] Handle -> DEBU 1aec Starting new deliver loop for 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.890 UTC [common.deliver] Handle -> DEBU 1aed Attempting to read seek info message from 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.891 UTC [policies] Evaluate -> DEBU 1aee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1aef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.893 UTC [cauthdsl] func1 -> DEBU 1af3 0xc000178980 gate 1569287138893165700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.893 UTC [cauthdsl] func2 -> DEBU 1af4 0xc000178980 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.893 UTC [cauthdsl] func2 -> DEBU 1af5 0xc000178980 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.894 UTC [cauthdsl] func2 -> DEBU 1af6 0xc000178980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.894 UTC [cauthdsl] func2 -> DEBU 1af7 0xc000178980 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.894 UTC [cauthdsl] func1 -> DEBU 1af8 0xc000178980 gate 1569287138893165700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [cauthdsl] func1 -> DEBU 1afc 0xc000179560 gate 1569287138895394600 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1afd 0xc000179560 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1afe 0xc000179560 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1aff 0xc000179560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:38.896 UTC [cauthdsl] func2 -> DEBU 1b00 0xc000179560 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.896 UTC [cauthdsl] func1 -> DEBU 1b01 0xc000179560 gate 1569287138895394600 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.897 UTC [cauthdsl] func1 -> DEBU 1b05 0xc000179db0 gate 1569287138896992100 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b06 0xc000179db0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b07 0xc000179db0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b08 0xc000179db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.077 UTC [msp] DeserializeIdentity -> DEBU 181d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.078 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.078 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.081 UTC [gossip.gossip] handleMessage -> DEBU 1820 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.168 UTC [gossip.comm] func1 -> DEBU 1821 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.169 UTC [gossip.gossip] handleMessage -> DEBU 1822 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.170 UTC [gossip.gossip] handleMessage -> DEBU 1823 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1824 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1825 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.171 UTC [msp] DeserializeIdentity -> DEBU 1826 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1827 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1828 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1829 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.172 UTC [policies] Evaluate -> DEBU 182a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.175 UTC [gossip.comm] func1 -> DEBU 182b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.175 UTC [policies] Evaluate -> DEBU 182c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:54.175 UTC [policies] Evaluate -> DEBU 182d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.176 UTC [cauthdsl] func1 -> DEBU 182e 0xc0038948b0 gate 1569287094176228000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.176 UTC [cauthdsl] func2 -> DEBU 182f 0xc0038948b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.175 UTC [gossip.comm] func1 -> DEBU 1830 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.176 UTC [cauthdsl] func2 -> DEBU 1831 0xc0038948b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.178 UTC [gossip.gossip] handleMessage -> DEBU 1832 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.178 UTC [cauthdsl] func2 -> DEBU 1833 0xc0038948b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.179 UTC [cauthdsl] func2 -> DEBU 1834 0xc0038948b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.179 UTC [cauthdsl] func1 -> DEBU 1835 0xc0038948b0 gate 1569287094176228000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.180 UTC [gossip.comm] func1 -> DEBU 1836 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.180 UTC [policies] Evaluate -> DEBU 1837 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b09 0xc000179db0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.898 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc000179db0 gate 1569287138896992100 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:38.898 UTC [policies] func1 -> DEBU 1b0d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0e Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b12 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [cauthdsl] func1 -> DEBU 1b13 0xc0002b6800 gate 1569287138899462200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b14 0xc0002b6800 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b15 0xc0002b6800 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b16 0xc0002b6800 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:38.900 UTC [msp.identity] Verify -> DEBU 1b17 Verify: digest = 00000000 c1 8e f7 81 4e 7a 32 8a 6d 42 5e 02 9b f1 d2 9b |....Nz2.mB^.....| +orderer0.example.com | 00000010 99 27 a6 b1 66 16 e6 2e 4f 42 3f 4e e5 10 36 19 |.'..f...OB?N..6.|" +orderer0.example.com | "2019-09-24 01:05:38.900 UTC [msp.identity] Verify -> DEBU 1b18 Verify: sig = 00000000 30 45 02 21 00 d0 19 ba d1 28 05 8d b1 22 92 8f |0E.!.....(..."..| +orderer0.example.com | 00000010 79 b8 1c e9 49 c4 bf 01 92 0d e0 1e 95 bc 0f 2c |y...I..........,| +orderer0.example.com | 00000020 60 2b a8 5b a9 02 20 5e 6d 53 2b 11 87 5a 31 d6 |`+.[.. ^mS+..Z1.| +orderer0.example.com | 00000030 5b c4 55 96 4f 84 fd 37 b2 f1 bb e9 5f dd 2b f5 |[.U.O..7...._.+.| +orderer0.example.com | 00000040 ee 3e 94 22 65 db 8e |.>."e..|" +orderer0.example.com | "2019-09-24 01:05:38.900 UTC [cauthdsl] func2 -> DEBU 1b19 0xc0002b6800 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:38.900 UTC [cauthdsl] func1 -> DEBU 1b1a 0xc0002b6800 gate 1569287138899462200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1d Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1f Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.902 UTC [policies] Evaluate -> DEBU 1b20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:38.902 UTC [common.deliver] deliverBlocks -> DEBU 1b21 [channel: businesschannel] Received seekInfo (0xc00097d840) start: > stop: > from 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.902 UTC [fsblkstorage] Next -> DEBU 1b22 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:38.902 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b23 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76768]" +orderer0.example.com | "2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b24 Remaining bytes=[50983], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b25 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +orderer0.example.com | "2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b26 blockbytes [4522] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:38.904 UTC [common.deliver] deliverBlocks -> DEBU 1b27 [channel: businesschannel] Delivering block for (0xc00097d840) for 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.904 UTC [common.deliver] deliverBlocks -> DEBU 1b28 [channel: businesschannel] Done delivering to 172.18.0.5:53896 for (0xc00097d840)" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b29 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2b Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [common.deliver] Handle -> DEBU 1b2d Waiting for new SeekInfo from 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.905 UTC [common.deliver] Handle -> DEBU 1b2e Attempting to read seek info message from 172.18.0.5:53896" +orderer0.example.com | "2019-09-24 01:05:38.928 UTC [grpc] warningf -> DEBU 1b2f transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53896: read: connection reset by peer" +orderer0.example.com | "2019-09-24 01:05:38.928 UTC [common.deliver] Handle -> WARN 1b30 Error reading from 172.18.0.5:53896: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:38.928 UTC [orderer.common.server] func1 -> DEBU 1b31 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:38.928 UTC [comm.grpc.server] 1 -> INFO 1b32 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.3689ms +orderer0.example.com | "2019-09-24 01:05:38.929 UTC [grpc] infof -> DEBU 1b33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:39.086 UTC [orderer.common.server] Deliver -> DEBU 1b34 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:39.086 UTC [common.deliver] Handle -> DEBU 1b35 Starting new deliver loop for 172.18.0.5:53898" +orderer0.example.com | "2019-09-24 01:05:39.086 UTC [common.deliver] Handle -> DEBU 1b36 Attempting to read seek info message from 172.18.0.5:53898" +peer0.org1.example.com | "2019-09-24 01:04:54.181 UTC [policies] Evaluate -> DEBU 1838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.183 UTC [policies] Evaluate -> DEBU 183a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.183 UTC [gossip.comm] func1 -> DEBU 1839 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.183 UTC [cauthdsl] func1 -> DEBU 183b 0xc0038950f0 gate 1569287094183587100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.183 UTC [gossip.comm] func1 -> DEBU 183c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183d 0xc0038950f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183e 0xc0038950f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183f 0xc0038950f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.184 UTC [msp.identity] Verify -> DEBU 1840 Verify: digest = 00000000 ae 12 c2 9a 74 ba 9c 98 cd c7 1c 9e 95 ef 14 90 |....t...........| +peer0.org1.example.com | 00000010 44 19 1b e5 f7 59 93 31 a6 19 f0 f6 b6 f2 b9 59 |D....Y.1.......Y|" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [msp.identity] Verify -> DEBU 1841 Verify: sig = 00000000 30 45 02 21 00 bc 7f cf 92 ae 8d ee be bb 92 fc |0E.!............| +peer0.org1.example.com | 00000010 79 17 f3 7f a1 22 b0 21 f7 27 db 94 6a 4a 5c 92 |y....".!.'..jJ\.| +peer0.org1.example.com | 00000020 11 b5 31 a3 9e 02 20 45 a0 a3 b1 d7 8f f3 84 28 |..1... E.......(| +peer0.org1.example.com | 00000030 32 8f 28 82 1b df 05 7b 55 1a c9 b7 bf 86 48 6c |2.(....{U.....Hl| +peer0.org1.example.com | 00000040 ba be 8b 13 7b 44 d3 |....{D.|" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [cauthdsl] func2 -> DEBU 1842 0xc0038950f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [cauthdsl] func1 -> DEBU 1843 0xc0038950f0 gate 1569287094183587100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1844 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1845 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1846 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.186 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1848 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1849 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:54.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 184a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 184b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 184c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:54.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 184d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 184e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.191 UTC [gossip.gossip] handleMessage -> DEBU 1850 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.192 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1852 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.192 UTC [msp] DeserializeIdentity -> DEBU 1853 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.193 UTC [msp] DeserializeIdentity -> DEBU 1854 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.194 UTC [msp] DeserializeIdentity -> DEBU 1855 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1856 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1857 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1858 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1859 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.196 UTC [gossip.comm] Send -> DEBU 185a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.196 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.197 UTC [gossip.comm] Send -> DEBU 185c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 1860 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1861 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.198 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1864 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1865 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.199 UTC [cauthdsl] func1 -> DEBU 1869 0xc0038bb270 gate 1569287094199979700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186a 0xc0038bb270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186b 0xc0038bb270 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186c 0xc0038bb270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186d 0xc0038bb270 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.201 UTC [cauthdsl] func1 -> DEBU 186e 0xc0038bb270 gate 1569287094199979700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.201 UTC [cauthdsl] func1 -> DEBU 1872 0xc0038bbac0 gate 1569287094201715700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1873 0xc0038bbac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1874 0xc0038bbac0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1875 0xc0038bbac0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.202 UTC [msp.identity] Verify -> DEBU 1876 Verify: digest = 00000000 f4 f9 09 e7 13 84 d2 36 15 2e 37 23 7b 2b 5a 8a |.......6..7#{+Z.| +peer0.org1.example.com | 00000010 d1 b1 be b1 bd 9c 57 9b ce a2 81 11 40 f3 2b 62 |......W.....@.+b|" +peer0.org1.example.com | "2019-09-24 01:04:54.202 UTC [msp.identity] Verify -> DEBU 1877 Verify: sig = 00000000 30 45 02 21 00 ab b3 bd f0 74 97 a2 ed 0f 40 3f |0E.!.....t....@?| +peer0.org1.example.com | 00000010 9e 5a ae b3 bf 0b 56 e3 7c 84 27 cc 29 2f 21 cd |.Z....V.|.'.)/!.| +peer0.org1.example.com | 00000020 59 d9 15 07 13 02 20 47 36 78 41 92 00 5b f9 fa |Y..... G6xA..[..| +peer0.org1.example.com | 00000030 bd b8 8d dc 67 e0 88 d7 39 ca 2b e6 1b 29 e7 b1 |....g...9.+..)..| +peer0.org1.example.com | 00000040 00 6c b2 50 6d 70 c4 |.l.Pmp.|" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [cauthdsl] func2 -> DEBU 1878 0xc0038bbac0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [cauthdsl] func1 -> DEBU 1879 0xc0038bbac0 gate 1569287094201715700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.204 UTC [gossip.discovery] handleAliveMessage -> DEBU 187e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 187f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 1880 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 1881 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1882 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1883 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] handleAliveMessage -> DEBU 1884 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1885 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1886 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1887 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.205 UTC [gossip.gossip] handleMessage -> DEBU 1888 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 1889 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 188a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 188c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1890 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1891 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1892 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1894 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1895 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1896 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.209 UTC [msp] DeserializeIdentity -> DEBU 189a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.209 UTC [msp] DeserializeIdentity -> DEBU 189b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.209 UTC [gossip.comm] Send -> DEBU 189c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.210 UTC [msp] DeserializeIdentity -> DEBU 189d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 189e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 189f Exiting" +orderer0.example.com | "2019-09-24 01:05:39.089 UTC [policies] Evaluate -> DEBU 1b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.089 UTC [policies] Evaluate -> DEBU 1b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.090 UTC [policies] Evaluate -> DEBU 1b39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.210 UTC [gossip.comm] Send -> DEBU 18a0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.213 UTC [gossip.comm] sendToEndpoint -> DEBU 18a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.214 UTC [gossip.comm] sendToEndpoint -> DEBU 18a2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.231 UTC [msp] GetDefaultSigningIdentity -> DEBU 18a3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:54.231 UTC [msp.identity] Sign -> DEBU 18a4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151019 " +peer0.org1.example.com | "2019-09-24 01:04:54.232 UTC [msp.identity] Sign -> DEBU 18a5 Sign: digest: 5E018370BD54108CBA14FB03A94C559D85B2688E56E970A9C0A21BC420583808 " +peer0.org1.example.com | "2019-09-24 01:04:54.232 UTC [msp] GetDefaultSigningIdentity -> DEBU 18a6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:54.233 UTC [msp.identity] Sign -> DEBU 18a7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:54.233 UTC [msp.identity] Sign -> DEBU 18a8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:54.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 18a9 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:54.241 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.242 UTC [msp] DeserializeIdentity -> DEBU 18ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.242 UTC [gossip.comm] Send -> DEBU 18ac Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.243 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.243 UTC [gossip.comm] sendToEndpoint -> DEBU 18ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.243 UTC [gossip.comm] Send -> DEBU 18af Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.243 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.243 UTC [msp] DeserializeIdentity -> DEBU 18b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.244 UTC [gossip.comm] Send -> DEBU 18b3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.245 UTC [gossip.comm] sendToEndpoint -> DEBU 18b5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.245 UTC [gossip.comm] sendToEndpoint -> DEBU 18b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.253 UTC [gossip.comm] func1 -> DEBU 18b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.253 UTC [gossip.gossip] handleMessage -> DEBU 18b8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.254 UTC [gossip.gossip] handleMessage -> DEBU 18b9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.255 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ba Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.255 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18bb Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.255 UTC [msp.identity] Verify -> DEBU 18bc Verify: digest = 00000000 5e 01 83 70 bd 54 10 8c ba 14 fb 03 a9 4c 55 9d |^..p.T.......LU.| +peer0.org1.example.com | 00000010 85 b2 68 8e 56 e9 70 a9 c0 a2 1b c4 20 58 38 08 |..h.V.p..... X8.|" +peer0.org1.example.com | "2019-09-24 01:04:54.255 UTC [msp.identity] Verify -> DEBU 18bd Verify: sig = 00000000 30 44 02 20 4e 1c b8 2a e8 66 f6 4a 43 df 5e 75 |0D. N..*.f.JC.^u| +peer0.org1.example.com | 00000010 5e 36 8c 32 03 7e ef 26 40 5e c2 bc 82 20 fe 74 |^6.2.~.&@^... .t| +peer0.org1.example.com | 00000020 76 8a 3e 7a 02 20 42 17 fd 4c a7 5a 28 bc 42 55 |v.>z. B..L.Z(.BU| +peer0.org1.example.com | 00000030 3b 12 8d db 5a 09 33 b5 c6 f2 f7 4b 02 3e 49 5a |;...Z.3....K.>IZ| +peer0.org1.example.com | 00000040 0e e2 e7 3f 2e ea |...?..|" +peer0.org1.example.com | "2019-09-24 01:04:54.256 UTC [gossip.discovery] isSentByMe -> DEBU 18be Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.256 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18bf Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.276 UTC [gossip.comm] func1 -> DEBU 18c0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:39.090 UTC [policies] Evaluate -> DEBU 1b3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.091 UTC [policies] Evaluate -> DEBU 1b3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.091 UTC [cauthdsl] func1 -> DEBU 1b3c 0xc0001d0470 gate 1569287139091180000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.091 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc0001d0470 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.091 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc0001d0470 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.092 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc0001d0470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.092 UTC [cauthdsl] func2 -> DEBU 1b40 0xc0001d0470 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.092 UTC [cauthdsl] func1 -> DEBU 1b41 0xc0001d0470 gate 1569287139091180000 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.092 UTC [policies] Evaluate -> DEBU 1b42 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.093 UTC [policies] Evaluate -> DEBU 1b43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.093 UTC [policies] Evaluate -> DEBU 1b44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.094 UTC [cauthdsl] func1 -> DEBU 1b45 0xc0001d0cb0 gate 1569287139094077400 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b46 0xc0001d0cb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b47 0xc0001d0cb0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b48 0xc0001d0cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [cauthdsl] func2 -> DEBU 1b49 0xc0001d0cb0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [cauthdsl] func1 -> DEBU 1b4a 0xc0001d0cb0 gate 1569287139094077400 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.095 UTC [cauthdsl] func1 -> DEBU 1b4e 0xc0001d14f0 gate 1569287139095961300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc0001d14f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b50 0xc0001d14f0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b51 0xc0001d14f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b52 0xc0001d14f0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [cauthdsl] func1 -> DEBU 1b53 0xc0001d14f0 gate 1569287139095961300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.096 UTC [policies] Evaluate -> DEBU 1b54 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.097 UTC [policies] Evaluate -> DEBU 1b55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.097 UTC [policies] func1 -> DEBU 1b56 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b57 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b5b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.099 UTC [cauthdsl] func1 -> DEBU 1b5c 0xc000946210 gate 1569287139099190200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.099 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc000946210 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.099 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc000946210 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.100 UTC [cauthdsl] func2 -> DEBU 1b5f 0xc000946210 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.100 UTC [msp.identity] Verify -> DEBU 1b60 Verify: digest = 00000000 7c 36 e9 6d 28 59 67 9f cc 45 46 77 ff 15 da d9 ||6.m(Yg..EFw....| +orderer0.example.com | 00000010 6f 4c d1 d7 96 a0 7f 95 07 07 53 fd f8 9f 28 a5 |oL........S...(.|" +orderer0.example.com | "2019-09-24 01:05:39.100 UTC [msp.identity] Verify -> DEBU 1b61 Verify: sig = 00000000 30 44 02 20 6a 0e ae 6f b0 4b 7f 52 db fc 98 9a |0D. j..o.K.R....| +orderer0.example.com | 00000010 87 fc e9 91 b4 05 24 e8 d9 d5 9a cc 79 f4 6c 07 |......$.....y.l.| +orderer0.example.com | 00000020 4f da 65 cf 02 20 54 46 d0 a2 8a a5 71 7e 5f 82 |O.e.. TF....q~_.| +orderer0.example.com | 00000030 c0 14 88 c4 37 42 b4 28 f1 83 25 e7 d0 d1 cf e7 |....7B.(..%.....| +orderer0.example.com | 00000040 ea fd 58 48 f3 f5 |..XH..|" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [cauthdsl] func2 -> DEBU 1b62 0xc000946210 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [cauthdsl] func1 -> DEBU 1b63 0xc000946210 gate 1569287139099190200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b64 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b65 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b66 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.102 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.102 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.102 UTC [common.deliver] deliverBlocks -> DEBU 1b6a [channel: businesschannel] Received seekInfo (0xc000cb1e80) start: > stop: > from 172.18.0.5:53898" +orderer0.example.com | "2019-09-24 01:05:39.103 UTC [fsblkstorage] Next -> DEBU 1b6b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org1.example.com | "2019-09-24 01:04:54.277 UTC [gossip.gossip] handleMessage -> DEBU 18c1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.278 UTC [msp] DeserializeIdentity -> DEBU 18c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.278 UTC [msp] DeserializeIdentity -> DEBU 18c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.279 UTC [msp] DeserializeIdentity -> DEBU 18c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.279 UTC [gossip.gossip] handleMessage -> DEBU 18c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.495 UTC [gossip.comm] func1 -> DEBU 18c6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.495 UTC [gossip.gossip] handleMessage -> DEBU 18c7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.496 UTC [gossip.pull] HandleMessage -> DEBU 18c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.497 UTC [gossip.pull] SendDigest -> DEBU 18c9 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:54.497 UTC [gossip.gossip] handleMessage -> DEBU 18ca Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.503 UTC [gossip.comm] func1 -> DEBU 18cb Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.503 UTC [gossip.gossip] handleMessage -> DEBU 18cc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.505 UTC [gossip.gossip] handleMessage -> DEBU 18cd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ce Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.505 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18cf Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.505 UTC [msp.identity] Verify -> DEBU 18d0 Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +peer0.org1.example.com | 00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +peer0.org1.example.com | "2019-09-24 01:04:54.505 UTC [msp.identity] Verify -> DEBU 18d1 Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +peer0.org1.example.com | 00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +peer0.org1.example.com | 00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +peer0.org1.example.com | 00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +peer0.org1.example.com | 00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +peer0.org1.example.com | "2019-09-24 01:04:54.506 UTC [msp.identity] Verify -> DEBU 18d2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:54.506 UTC [msp.identity] Verify -> DEBU 18d3 Verify: sig = 00000000 30 45 02 21 00 ca e9 1f e2 bb d0 d4 af 7b 93 bd |0E.!.........{..| +peer0.org1.example.com | 00000010 c8 a8 82 0d c8 45 4f f1 94 40 22 30 bc af dd 8c |.....EO..@"0....| +peer0.org1.example.com | 00000020 45 74 c5 b8 ca 02 20 59 88 4e 78 d9 07 3b 48 af |Et.... Y.Nx..;H.| +peer0.org1.example.com | 00000030 27 a1 6c 13 62 19 0e 7d dc 34 04 f2 e4 0f 51 ed |'.l.b..}.4....Q.| +peer0.org1.example.com | 00000040 5c d4 24 32 e7 da 6d |\.$2..m|" +peer0.org1.example.com | "2019-09-24 01:04:54.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d7 Updating aliveness data: membership: timestamp: " +orderer0.example.com | "2019-09-24 01:05:39.103 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b6c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81292]" +orderer0.example.com | "2019-09-24 01:05:39.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6d Remaining bytes=[46459], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6e Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +orderer0.example.com | "2019-09-24 01:05:39.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6f blockbytes [3982] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.104 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Delivering block for (0xc000cb1e80) for 172.18.0.5:53898" +orderer0.example.com | "2019-09-24 01:05:39.105 UTC [common.deliver] deliverBlocks -> DEBU 1b71 [channel: businesschannel] Done delivering to 172.18.0.5:53898 for (0xc000cb1e80)" +orderer0.example.com | "2019-09-24 01:05:39.105 UTC [common.deliver] Handle -> DEBU 1b72 Waiting for new SeekInfo from 172.18.0.5:53898" +orderer0.example.com | "2019-09-24 01:05:39.105 UTC [common.deliver] Handle -> DEBU 1b73 Attempting to read seek info message from 172.18.0.5:53898" +orderer0.example.com | "2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b74 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b75 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b76 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b77 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:39.113 UTC [grpc] infof -> DEBU 1b78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:39.113 UTC [common.deliver] Handle -> WARN 1b79 Error reading from 172.18.0.5:53898: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:39.114 UTC [orderer.common.server] func1 -> DEBU 1b7a Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:39.114 UTC [comm.grpc.server] 1 -> INFO 1b7b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53898 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.3614ms +orderer0.example.com | "2019-09-24 01:05:39.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +orderer0.example.com | "2019-09-24 01:05:39.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200µs " +orderer0.example.com | "2019-09-24 01:05:39.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7f Sending msg of 28 bytes to 2 on channel businesschannel took 48µs" +orderer0.example.com | "2019-09-24 01:05:39.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b80 Sending msg of 28 bytes to 3 on channel businesschannel took 276.6µs" +orderer0.example.com | "2019-09-24 01:05:39.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +orderer0.example.com | "2019-09-24 01:05:39.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.6µs " +orderer0.example.com | "2019-09-24 01:05:39.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b84 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.310 UTC [orderer.common.server] Deliver -> DEBU 1b85 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:39.310 UTC [common.deliver] Handle -> DEBU 1b86 Starting new deliver loop for 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.311 UTC [common.deliver] Handle -> DEBU 1b87 Attempting to read seek info message from 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.313 UTC [policies] Evaluate -> DEBU 1b8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.313 UTC [policies] Evaluate -> DEBU 1b8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.314 UTC [cauthdsl] func1 -> DEBU 1b8d 0xc0009672c0 gate 1569287139314216500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.314 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0009672c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.314 UTC [cauthdsl] func2 -> DEBU 1b8f 0xc0009672c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.315 UTC [cauthdsl] func2 -> DEBU 1b90 0xc0009672c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.315 UTC [cauthdsl] func2 -> DEBU 1b91 0xc0009672c0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.315 UTC [cauthdsl] func1 -> DEBU 1b92 0xc0009672c0 gate 1569287139314216500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.315 UTC [policies] Evaluate -> DEBU 1b93 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [policies] Evaluate -> DEBU 1b95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [cauthdsl] func1 -> DEBU 1b96 0xc000967bb0 gate 1569287139316435500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b97 0xc000967bb0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b98 0xc000967bb0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b99 0xc000967bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.317 UTC [cauthdsl] func2 -> DEBU 1b9a 0xc000967bb0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.317 UTC [cauthdsl] func1 -> DEBU 1b9b 0xc000967bb0 gate 1569287139316435500 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.317 UTC [policies] Evaluate -> DEBU 1b9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.317 UTC [policies] Evaluate -> DEBU 1b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.318 UTC [policies] Evaluate -> DEBU 1b9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.318 UTC [cauthdsl] func1 -> DEBU 1b9f 0xc00097e630 gate 1569287139318412300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.318 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc00097e630 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.318 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc00097e630 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc00097e630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [cauthdsl] func2 -> DEBU 1ba3 0xc00097e630 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [cauthdsl] func1 -> DEBU 1ba4 0xc00097e630 gate 1569287139318412300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [policies] Evaluate -> DEBU 1ba5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [policies] Evaluate -> DEBU 1ba6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.319 UTC [policies] func1 -> DEBU 1ba7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1ba8 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1bac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.320 UTC [cauthdsl] func1 -> DEBU 1bad 0xc00097f3e0 gate 1569287139320572800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1bae 0xc00097f3e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1baf 0xc00097f3e0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1bb0 0xc00097f3e0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.321 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 f5 db 81 ad 57 6d 12 69 c4 69 47 01 66 9d 53 04 |....Wm.i.iG.f.S.| +orderer0.example.com | 00000010 63 60 e7 9b 9e 60 60 15 85 41 7c 94 a0 20 4c 9e |c`...``..A|.. L.|" +orderer0.example.com | "2019-09-24 01:05:39.321 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 45 02 21 00 eb 6a 32 7f 80 4e 2e 0a 76 ea f0 |0E.!..j2..N..v..| +orderer0.example.com | 00000010 66 e0 79 ed eb 9c 70 fa 72 b8 b2 90 8f 48 67 fe |f.y...p.r....Hg.| +orderer0.example.com | 00000020 2d e6 c8 3d 8f 02 20 5e df 5d c3 8c 72 f6 78 b6 |-..=.. ^.]..r.x.| +orderer0.example.com | 00000030 99 ee 44 44 d0 d0 93 db 78 5d 22 c6 5e 97 62 19 |..DD....x]".^.b.| +orderer0.example.com | 00000040 29 e0 a4 97 c2 34 97 |)....4.|" +orderer0.example.com | "2019-09-24 01:05:39.322 UTC [cauthdsl] func2 -> DEBU 1bb3 0xc00097f3e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.322 UTC [cauthdsl] func1 -> DEBU 1bb4 0xc00097f3e0 gate 1569287139320572800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.322 UTC [policies] Evaluate -> DEBU 1bb5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.322 UTC [policies] Evaluate -> DEBU 1bb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb7 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb9 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [common.deliver] deliverBlocks -> DEBU 1bbb [channel: businesschannel] Received seekInfo (0xc001254cc0) start: > stop: > from 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [fsblkstorage] Next -> DEBU 1bbc Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:39.323 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bbd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +orderer0.example.com | "2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bbe Remaining bytes=[42475], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bbf Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +orderer0.example.com | "2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc0 blockbytes [3984] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1bc1 [channel: businesschannel] Delivering block for (0xc001254cc0) for 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1bc2 [channel: businesschannel] Done delivering to 172.18.0.5:53900 for (0xc001254cc0)" +orderer0.example.com | "2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc3 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc4 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org1.example.com | "2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 18da Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18db Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.508 UTC [gossip.discovery] sendMemResponse -> DEBU 18dc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:54.508 UTC [msp] DeserializeIdentity -> DEBU 18dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.509 UTC [msp] DeserializeIdentity -> DEBU 18de Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.509 UTC [gossip.comm] Send -> DEBU 18df Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.509 UTC [gossip.discovery] sendMemResponse -> DEBU 18e0 Exiting, replying with alive: > alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:54.510 UTC [gossip.comm] sendToEndpoint -> DEBU 18e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.510 UTC [gossip.comm] sendToEndpoint -> DEBU 18e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.807 UTC [gossip.comm] func1 -> DEBU 18e3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.808 UTC [gossip.gossip] handleMessage -> DEBU 18e4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.808 UTC [gossip.pull] HandleMessage -> DEBU 18e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.809 UTC [msp] DeserializeIdentity -> DEBU 18e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.809 UTC [msp] DeserializeIdentity -> DEBU 18e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.810 UTC [gossip.pull] SendDigest -> DEBU 18ec Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:54.811 UTC [gossip.gossip] handleMessage -> DEBU 18ed Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.815 UTC [gossip.comm] func1 -> DEBU 18ee Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.815 UTC [gossip.gossip] handleMessage -> DEBU 18ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.815 UTC [gossip.gossip] handleMessage -> DEBU 18f0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18f1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18f2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.817 UTC [msp] DeserializeIdentity -> DEBU 18f3 Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc5 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc6 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:39.326 UTC [common.deliver] Handle -> DEBU 1bc7 Waiting for new SeekInfo from 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.327 UTC [common.deliver] Handle -> DEBU 1bc8 Attempting to read seek info message from 172.18.0.5:53900" +orderer0.example.com | "2019-09-24 01:05:39.336 UTC [grpc] infof -> DEBU 1bc9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:39.336 UTC [common.deliver] Handle -> WARN 1bca Error reading from 172.18.0.5:53900: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:39.336 UTC [orderer.common.server] func1 -> DEBU 1bcb Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:39.336 UTC [comm.grpc.server] 1 -> INFO 1bcc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.2543ms +orderer0.example.com | "2019-09-24 01:05:39.492 UTC [orderer.common.server] Deliver -> DEBU 1bcd Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:39.492 UTC [common.deliver] Handle -> DEBU 1bce Starting new deliver loop for 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.492 UTC [common.deliver] Handle -> DEBU 1bcf Attempting to read seek info message from 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.493 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.493 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func1 -> DEBU 1bd5 0xc000d031e0 gate 1569287139495076300 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000d031e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd7 0xc000d031e0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd8 0xc000d031e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000d031e0 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.495 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000d031e0 gate 1569287139495076300 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.496 UTC [policies] Evaluate -> DEBU 1bdb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.497 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.497 UTC [policies] Evaluate -> DEBU 1bdd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.497 UTC [cauthdsl] func1 -> DEBU 1bde 0xc000d03a20 gate 1569287139497626700 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1bdf 0xc000d03a20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be0 0xc000d03a20 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be1 0xc000d03a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be2 0xc000d03a20 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [cauthdsl] func1 -> DEBU 1be3 0xc000d03a20 gate 1569287139497626700 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.498 UTC [policies] Evaluate -> DEBU 1be4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [policies] Evaluate -> DEBU 1be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [policies] Evaluate -> DEBU 1be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [cauthdsl] func1 -> DEBU 1be7 0xc000d70280 gate 1569287139499141800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1be8 0xc000d70280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1be9 0xc000d70280 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1bea 0xc000d70280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1beb 0xc000d70280 principal evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.500 UTC [cauthdsl] func1 -> DEBU 1bec 0xc000d70280 gate 1569287139499141800 evaluation fails" +orderer0.example.com | "2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2019-09-24 01:05:39.500 UTC [policies] func1 -> DEBU 1bef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bf0 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.501 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc000d710c0 gate 1569287139501849500 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc000d710c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:54.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.819 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.819 UTC [policies] Evaluate -> DEBU 18f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.820 UTC [policies] Evaluate -> DEBU 18f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:54.820 UTC [policies] Evaluate -> DEBU 18f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.821 UTC [cauthdsl] func1 -> DEBU 18fa 0xc003a02a20 gate 1569287094821185000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.823 UTC [cauthdsl] func2 -> DEBU 18fb 0xc003a02a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.823 UTC [cauthdsl] func2 -> DEBU 18fc 0xc003a02a20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.824 UTC [cauthdsl] func2 -> DEBU 18fd 0xc003a02a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.825 UTC [cauthdsl] func2 -> DEBU 18fe 0xc003a02a20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.825 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003a02a20 gate 1569287094821185000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.825 UTC [policies] Evaluate -> DEBU 1900 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.825 UTC [policies] Evaluate -> DEBU 1901 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.826 UTC [policies] Evaluate -> DEBU 1902 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.826 UTC [cauthdsl] func1 -> DEBU 1903 0xc003a03260 gate 1569287094826507800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.826 UTC [cauthdsl] func2 -> DEBU 1904 0xc003a03260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1905 0xc003a03260 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1906 0xc003a03260 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.827 UTC [msp.identity] Verify -> DEBU 1907 Verify: digest = 00000000 7a 01 ae 55 90 19 8d 3d 42 98 c2 b3 96 78 ef 8f |z..U...=B....x..| +peer0.org1.example.com | 00000010 c2 d2 c4 26 ff e6 6b 45 d3 4a a4 d1 9e 51 47 2f |...&..kE.J...QG/|" +peer0.org1.example.com | "2019-09-24 01:04:54.827 UTC [msp.identity] Verify -> DEBU 1908 Verify: sig = 00000000 30 45 02 21 00 e7 1a 37 92 34 62 25 dc e7 2d c8 |0E.!...7.4b%..-.| +peer0.org1.example.com | 00000010 65 c7 66 03 a2 2c 50 8d d4 00 34 62 de 96 e7 b2 |e.f..,P...4b....| +peer0.org1.example.com | 00000020 30 fc 36 ad 03 02 20 25 0a e1 6c b1 b6 9b 9d 7b |0.6... %..l....{| +peer0.org1.example.com | 00000030 a7 f2 25 c4 d5 96 b9 18 38 73 37 0e 5c e6 21 79 |..%.....8s7.\.!y| +peer0.org1.example.com | 00000040 63 5c 9f 3b ee 33 9c |c\.;.3.|" +peer0.org1.example.com | "2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1909 0xc003a03260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [cauthdsl] func1 -> DEBU 190a 0xc003a03260 gate 1569287094826507800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.828 UTC [gossip.discovery] handleAliveMessage -> DEBU 190f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1910 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1911 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1912 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:54.830 UTC [gossip.discovery] learnExistingMembers -> DEBU 1914 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.830 UTC [gossip.discovery] handleAliveMessage -> DEBU 1915 Exiting" +orderer0.example.com | "2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc000d710c0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc000d710c0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.502 UTC [msp.identity] Verify -> DEBU 1bf9 Verify: digest = 00000000 52 91 7d 92 f4 e1 fd 1f cc 54 6c 09 ca f0 20 4f |R.}......Tl... O| +orderer0.example.com | 00000010 b3 35 38 70 52 f7 18 ca 2f 31 8c aa e2 4e 29 c6 |.58pR.../1...N).|" +orderer0.example.com | "2019-09-24 01:05:39.503 UTC [msp.identity] Verify -> DEBU 1bfa Verify: sig = 00000000 30 45 02 21 00 fb 11 9e 8d 21 87 45 63 06 65 86 |0E.!.....!.Ec.e.| +orderer0.example.com | 00000010 9d ba 20 55 fd 10 3e ee 82 40 27 69 fe b1 8f 90 |.. U..>..@'i....| +orderer0.example.com | 00000020 d1 a5 4f 01 87 02 20 5f 60 83 6b 98 8d a6 d4 60 |..O... _`.k....`| +orderer0.example.com | 00000030 83 31 2f 2f 0b c7 e3 d7 46 30 27 c8 dc d6 7f 05 |.1//....F0'.....| +orderer0.example.com | 00000040 03 de d4 53 98 e4 c5 |...S...|" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc000d710c0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [cauthdsl] func1 -> DEBU 1bfc 0xc000d710c0 gate 1569287139501849500 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bfd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.830 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1916 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.830 UTC [gossip.discovery] sendMemResponse -> DEBU 1917 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:54.831 UTC [msp] DeserializeIdentity -> DEBU 1918 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.831 UTC [msp] DeserializeIdentity -> DEBU 1919 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.832 UTC [msp] DeserializeIdentity -> DEBU 191a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.832 UTC [gossip.comm] Send -> DEBU 191b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.832 UTC [gossip.discovery] sendMemResponse -> DEBU 191c Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:54.832 UTC [gossip.comm] sendToEndpoint -> DEBU 191d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.833 UTC [gossip.comm] sendToEndpoint -> DEBU 191e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.850 UTC [gossip.pull] Hello -> DEBU 191f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:54.851 UTC [gossip.comm] Send -> DEBU 1920 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.851 UTC [gossip.pull] Hello -> DEBU 1921 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:54.851 UTC [gossip.comm] Send -> DEBU 1922 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1923 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1924 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.852 UTC [gossip.pull] Hello -> DEBU 1925 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:54.852 UTC [gossip.comm] Send -> DEBU 1926 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1927 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1929 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.853 UTC [gossip.comm] func1 -> DEBU 1928 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.854 UTC [gossip.gossip] handleMessage -> DEBU 192a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.854 UTC [gossip.pull] HandleMessage -> DEBU 192b GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.853 UTC [gossip.comm] sendToEndpoint -> DEBU 192c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.854 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.854 UTC [gossip.gossip] handleMessage -> DEBU 192d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.855 UTC [gossip.comm] func1 -> DEBU 192f Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +orderer0.example.com | "2019-09-24 01:05:39.505 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.506 UTC [common.deliver] deliverBlocks -> DEBU 1c03 [channel: businesschannel] Received seekInfo (0xc001255180) start: > stop: > from 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.506 UTC [fsblkstorage] Next -> DEBU 1c04 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2019-09-24 01:05:39.508 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c05 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +orderer0.example.com | "2019-09-24 01:05:39.508 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c06 Remaining bytes=[38489], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c07 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +orderer0.example.com | "2019-09-24 01:05:39.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 blockbytes [38486] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.510 UTC [common.deliver] deliverBlocks -> DEBU 1c09 [channel: businesschannel] Delivering block for (0xc001255180) for 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.510 UTC [common.deliver] deliverBlocks -> DEBU 1c0a [channel: businesschannel] Done delivering to 172.18.0.5:53902 for (0xc001255180)" +orderer0.example.com | "2019-09-24 01:05:39.511 UTC [fsblkstorage] waitForBlock -> DEBU 1c0b Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.511 UTC [fsblkstorage] waitForBlock -> DEBU 1c0c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:39.511 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.511 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.5:53902" +orderer0.example.com | "2019-09-24 01:05:39.512 UTC [fsblkstorage] waitForBlock -> DEBU 1c0f Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2019-09-24 01:05:39.512 UTC [fsblkstorage] waitForBlock -> DEBU 1c10 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2019-09-24 01:05:39.517 UTC [common.deliver] Handle -> WARN 1c11 Error reading from 172.18.0.5:53902: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:39.518 UTC [orderer.common.server] func1 -> DEBU 1c13 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:39.518 UTC [comm.grpc.server] 1 -> INFO 1c14 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53902 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.1105ms +orderer0.example.com | "2019-09-24 01:05:39.517 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:39.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c16 Sending msg of 28 bytes to 3 on channel testchainid took 60.4µs" +orderer0.example.com | "2019-09-24 01:05:39.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200µs " +orderer0.example.com | "2019-09-24 01:05:39.673 UTC [orderer.common.server] Deliver -> DEBU 1c18 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:39.673 UTC [common.deliver] Handle -> DEBU 1c19 Starting new deliver loop for 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.673 UTC [common.deliver] Handle -> DEBU 1c1a Attempting to read seek info message from 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.673 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [cauthdsl] func1 -> DEBU 1c20 0xc000d0f280 gate 1569287139674423200 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000d0f280 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c22 0xc000d0f280 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c23 0xc000d0f280 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [msp.identity] Verify -> DEBU 1c24 Verify: digest = 00000000 de 40 2f d6 dd a1 bf 6c d4 18 b6 1b 1c ef 0b ef |.@/....l........| +orderer0.example.com | 00000010 c9 37 1e 39 30 64 a7 4d 07 fe 6f 1b 56 7e 70 f0 |.7.90d.M..o.V~p.|" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [msp.identity] Verify -> DEBU 1c25 Verify: sig = 00000000 30 45 02 21 00 98 fc 6d 8b 41 cb 3f 9a 4a 48 98 |0E.!...m.A.?.JH.| +orderer0.example.com | 00000010 b0 17 7a 94 a9 54 6f 75 c4 61 71 d2 f5 71 16 a1 |..z..Tou.aq..q..| +orderer0.example.com | 00000020 c9 7e e3 fc 3b 02 20 07 42 79 7c c0 f3 c7 f4 d2 |.~..;. .By|.....| +orderer0.example.com | 00000030 3b d6 8b bb 26 f0 c2 09 48 77 a9 8b 3e 00 a6 50 |;...&...Hw..>..P| +orderer0.example.com | 00000040 92 f6 0b 83 90 1d 01 |.......|" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [cauthdsl] func2 -> DEBU 1c26 0xc000d0f280 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [cauthdsl] func1 -> DEBU 1c27 0xc000d0f280 gate 1569287139674423200 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.675 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2c Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2e Sending msg of 28 bytes to 2 on channel businesschannel took 272.5µs" +orderer0.example.com | "2019-09-24 01:05:39.676 UTC [common.deliver] deliverBlocks -> DEBU 1c2f [channel: testchainid] Received seekInfo (0xc00104e980) start: > stop: > from 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.677 UTC [fsblkstorage] Next -> DEBU 1c30 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org1.example.com | "2019-09-24 01:04:54.855 UTC [gossip.gossip] handleMessage -> DEBU 1930 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.855 UTC [gossip.pull] HandleMessage -> DEBU 1931 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.855 UTC [gossip.gossip] handleMessage -> DEBU 1932 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.856 UTC [gossip.comm] func1 -> DEBU 1933 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.856 UTC [gossip.gossip] handleMessage -> DEBU 1934 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.856 UTC [gossip.pull] HandleMessage -> DEBU 1935 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.856 UTC [gossip.gossip] handleMessage -> DEBU 1936 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 1937 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 1938 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101A " +peer0.org1.example.com | "2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 1939 Sign: digest: 89C505F5415F9852461C31F4430506923ACAEB7146C740E89BD4B2FB7B3804ED " +peer0.org1.example.com | "2019-09-24 01:04:54.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 193a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 193b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:54.870 UTC [msp.identity] Sign -> DEBU 193c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:54.870 UTC [gossip.comm] Send -> DEBU 193d Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.871 UTC [msp] DeserializeIdentity -> DEBU 193e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.871 UTC [gossip.comm] sendToEndpoint -> DEBU 193f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.871 UTC [gossip.comm] sendToEndpoint -> DEBU 1940 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.872 UTC [gossip.comm] Send -> DEBU 1941 Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.875 UTC [msp] DeserializeIdentity -> DEBU 1944 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.873 UTC [gossip.comm] func1 -> DEBU 1942 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.875 UTC [gossip.gossip] handleMessage -> DEBU 1945 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.876 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.876 UTC [gossip.comm] sendToEndpoint -> DEBU 194a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.877 UTC [gossip.comm] sendToEndpoint -> DEBU 194c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.875 UTC [gossip.comm] Send -> DEBU 1946 Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.878 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.878 UTC [msp] DeserializeIdentity -> DEBU 194e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.879 UTC [gossip.comm] sendToEndpoint -> DEBU 194f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.879 UTC [gossip.comm] sendToEndpoint -> DEBU 1950 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.879 UTC [gossip.comm] func1 -> DEBU 1951 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.874 UTC [gossip.comm] func1 -> DEBU 1943 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.879 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.882 UTC [gossip.pull] SendDigest -> DEBU 1954 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:54.881 UTC [gossip.comm] func1 -> DEBU 1953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.882 UTC [gossip.gossip] handleMessage -> DEBU 1955 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.883 UTC [gossip.gossip] handleMessage -> DEBU 1956 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.884 UTC [gossip.gossip] handleMessage -> DEBU 1957 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.884 UTC [gossip.gossip] handleMessage -> DEBU 1958 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1959 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.884 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 195a Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.886 UTC [msp.identity] Verify -> DEBU 195b Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +peer0.org1.example.com | 00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +peer0.org1.example.com | "2019-09-24 01:04:54.886 UTC [msp.identity] Verify -> DEBU 195c Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +peer0.org1.example.com | 00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +peer0.org1.example.com | 00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +peer0.org1.example.com | 00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +peer0.org1.example.com | 00000040 d5 42 dd b3 f9 54 |.B...T|" +peer0.org1.example.com | "2019-09-24 01:04:54.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.886 UTC [gossip.discovery] isSentByMe -> DEBU 195e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 195f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1960 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.888 UTC [msp] DeserializeIdentity -> DEBU 1961 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1962 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1963 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1964 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1965 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1966 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [cauthdsl] func1 -> DEBU 1968 0xc003c11f40 gate 1569287094889701400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [cauthdsl] func2 -> DEBU 1969 0xc003c11f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.889 UTC [cauthdsl] func2 -> DEBU 196a 0xc003c11f40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [cauthdsl] func2 -> DEBU 196b 0xc003c11f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [cauthdsl] func2 -> DEBU 196c 0xc003c11f40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [cauthdsl] func1 -> DEBU 196d 0xc003c11f40 gate 1569287094889701400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 196e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 196f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 1970 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.890 UTC [cauthdsl] func1 -> DEBU 1971 0xc003c98780 gate 1569287094890897700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1972 0xc003c98780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1973 0xc003c98780 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1974 0xc003c98780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.891 UTC [msp.identity] Verify -> DEBU 1975 Verify: digest = 00000000 7a 01 ae 55 90 19 8d 3d 42 98 c2 b3 96 78 ef 8f |z..U...=B....x..| +peer0.org1.example.com | 00000010 c2 d2 c4 26 ff e6 6b 45 d3 4a a4 d1 9e 51 47 2f |...&..kE.J...QG/|" +peer0.org1.example.com | "2019-09-24 01:04:54.891 UTC [msp.identity] Verify -> DEBU 1976 Verify: sig = 00000000 30 45 02 21 00 e7 1a 37 92 34 62 25 dc e7 2d c8 |0E.!...7.4b%..-.| +peer0.org1.example.com | 00000010 65 c7 66 03 a2 2c 50 8d d4 00 34 62 de 96 e7 b2 |e.f..,P...4b....| +peer0.org1.example.com | 00000020 30 fc 36 ad 03 02 20 25 0a e1 6c b1 b6 9b 9d 7b |0.6... %..l....{| +peer0.org1.example.com | 00000030 a7 f2 25 c4 d5 96 b9 18 38 73 37 0e 5c e6 21 79 |..%.....8s7.\.!y| +peer0.org1.example.com | 00000040 63 5c 9f 3b ee 33 9c |c\.;.3.|" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [cauthdsl] func2 -> DEBU 1977 0xc003c98780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [cauthdsl] func1 -> DEBU 1978 0xc003c98780 gate 1569287094890897700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 1979 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 197d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 197e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.893 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 197f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.894 UTC [msp.identity] Verify -> DEBU 1980 Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +peer0.org1.example.com | 00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +peer0.org1.example.com | "2019-09-24 01:04:54.894 UTC [msp.identity] Verify -> DEBU 1981 Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +peer0.org1.example.com | 00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +peer0.org1.example.com | 00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +peer0.org1.example.com | 00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +peer0.org1.example.com | 00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +peer0.org1.example.com | "2019-09-24 01:04:54.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 1982 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 1983 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1984 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1985 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1986 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [gossip.gossip] handleMessage -> DEBU 1987 Exiting" +orderer0.example.com | "2019-09-24 01:05:39.677 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c31 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c32 Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c33 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c34 blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.678 UTC [common.deliver] deliverBlocks -> DEBU 1c36 [channel: testchainid] Delivering block for (0xc00104e980) for 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c35 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +orderer0.example.com | "2019-09-24 01:05:39.678 UTC [common.deliver] deliverBlocks -> DEBU 1c37 [channel: testchainid] Done delivering to 172.18.0.5:53904 for (0xc00104e980)" +orderer0.example.com | "2019-09-24 01:05:39.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 229.7µs " +orderer0.example.com | "2019-09-24 01:05:39.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.8µs " +orderer0.example.com | "2019-09-24 01:05:39.681 UTC [common.deliver] Handle -> DEBU 1c3a Waiting for new SeekInfo from 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.681 UTC [common.deliver] Handle -> DEBU 1c3b Attempting to read seek info message from 172.18.0.5:53904" +orderer0.example.com | "2019-09-24 01:05:39.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:39.686 UTC [grpc] infof -> DEBU 1c3e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:39.686 UTC [common.deliver] Handle -> WARN 1c3f Error reading from 172.18.0.5:53904: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:39.686 UTC [orderer.common.server] func1 -> DEBU 1c40 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:39.686 UTC [comm.grpc.server] 1 -> INFO 1c41 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53904 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.5763ms +orderer0.example.com | "2019-09-24 01:05:39.835 UTC [orderer.common.server] Deliver -> DEBU 1c42 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:39.835 UTC [common.deliver] Handle -> DEBU 1c43 Starting new deliver loop for 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.836 UTC [common.deliver] Handle -> DEBU 1c44 Attempting to read seek info message from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.837 UTC [policies] Evaluate -> DEBU 1c45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.837 UTC [policies] Evaluate -> DEBU 1c46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.838 UTC [policies] Evaluate -> DEBU 1c47 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.838 UTC [policies] Evaluate -> DEBU 1c48 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.839 UTC [policies] Evaluate -> DEBU 1c49 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.839 UTC [cauthdsl] func1 -> DEBU 1c4a 0xc000b03be0 gate 1569287139839943800 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.840 UTC [cauthdsl] func2 -> DEBU 1c4b 0xc000b03be0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.840 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000b03be0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.841 UTC [cauthdsl] func2 -> DEBU 1c4d 0xc000b03be0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.841 UTC [msp.identity] Verify -> DEBU 1c4e Verify: digest = 00000000 42 9f ae 40 c6 4a 34 d7 db ba f3 f2 0f 2f 27 77 |B..@.J4....../'w| +orderer0.example.com | 00000010 4a a3 92 9f 38 e9 83 1c ee 4b 2d ba 0c a4 74 6d |J...8....K-...tm|" +orderer0.example.com | "2019-09-24 01:05:39.841 UTC [msp.identity] Verify -> DEBU 1c4f Verify: sig = 00000000 30 44 02 20 40 d9 c1 cf da 3c e5 77 60 72 31 1a |0D. @....<.w`r1.| +orderer0.example.com | 00000010 0e 67 c6 d9 66 3c 6d af 7c 19 8d c9 bc e2 9b 73 |.g..f..kM..X..-.....| +orderer0.example.com | 00000040 47 64 a2 c8 64 0c |Gd..d.|" +orderer0.example.com | "2019-09-24 01:05:39.843 UTC [cauthdsl] func2 -> DEBU 1c50 0xc000b03be0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.844 UTC [cauthdsl] func1 -> DEBU 1c51 0xc000b03be0 gate 1569287139839943800 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c52 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c54 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.845 UTC [policies] Evaluate -> DEBU 1c56 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [gossip.gossip] handleMessage -> DEBU 1988 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [msp.identity] Verify -> DEBU 1989 Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +peer0.org1.example.com | 00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +peer0.org1.example.com | "2019-09-24 01:04:54.895 UTC [msp.identity] Verify -> DEBU 198a Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +peer0.org1.example.com | 00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +peer0.org1.example.com | 00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +peer0.org1.example.com | 00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +peer0.org1.example.com | 00000040 d5 42 dd b3 f9 54 |.B...T|" +peer0.org1.example.com | "2019-09-24 01:04:54.896 UTC [gossip.comm] func1 -> DEBU 198b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.898 UTC [msp.identity] Verify -> DEBU 198c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:54.898 UTC [msp.identity] Verify -> DEBU 198d Verify: sig = 00000000 30 45 02 21 00 f5 3d 79 52 b6 ca 38 b5 a3 80 2b |0E.!..=yR..8...+| +peer0.org1.example.com | 00000010 db d1 a3 bf a9 2a 30 90 e0 76 dc ac 5e 69 ac d0 |.....*0..v..^i..| +peer0.org1.example.com | 00000020 c5 64 64 84 18 02 20 6c f2 d8 87 1d 99 02 37 af |.dd... l......7.| +peer0.org1.example.com | 00000030 0c 2a d3 53 ff a1 17 72 b1 d9 a6 d9 22 bb 49 12 |.*.S...r....".I.| +peer0.org1.example.com | 00000040 c8 8b f8 5e a8 49 f6 |...^.I.|" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 198e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.discovery] isSentByMe -> DEBU 198f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 1990 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1991 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1992 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.gossip] handleMessage -> DEBU 1993 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.900 UTC [gossip.gossip] handleMessage -> DEBU 1994 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1995 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.900 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +peer0.org1.example.com | 00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +peer0.org1.example.com | "2019-09-24 01:04:54.900 UTC [msp.identity] Verify -> DEBU 1997 Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +peer0.org1.example.com | 00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +peer0.org1.example.com | 00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +peer0.org1.example.com | 00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +peer0.org1.example.com | 00000040 d5 42 dd b3 f9 54 |.B...T|" +peer0.org1.example.com | "2019-09-24 01:04:54.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1998 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.901 UTC [gossip.discovery] isSentByMe -> DEBU 1999 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 199a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 199b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.903 UTC [msp.identity] Verify -> DEBU 199c Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +peer0.org1.example.com | 00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +peer0.org1.example.com | "2019-09-24 01:04:54.903 UTC [msp.identity] Verify -> DEBU 199d Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +peer0.org1.example.com | 00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +peer0.org1.example.com | 00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +peer0.org1.example.com | 00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +peer0.org1.example.com | 00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +peer0.org1.example.com | "2019-09-24 01:04:54.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 199e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 199f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a0 Exiting" +orderer0.example.com | "2019-09-24 01:05:39.845 UTC [policies] Evaluate -> DEBU 1c57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.845 UTC [common.deliver] deliverBlocks -> DEBU 1c58 [channel: testchainid] Received seekInfo (0xc00104f180) start: > stop: > from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.846 UTC [fsblkstorage] Next -> DEBU 1c59 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:39.846 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c5a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:39.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5b Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5c Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:39.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5d blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.848 UTC [common.deliver] deliverBlocks -> DEBU 1c5e [channel: testchainid] Delivering block for (0xc00104f180) for 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.849 UTC [common.deliver] deliverBlocks -> DEBU 1c5f [channel: testchainid] Done delivering to 172.18.0.5:53906 for (0xc00104f180)" +orderer0.example.com | "2019-09-24 01:05:39.850 UTC [common.deliver] Handle -> DEBU 1c60 Waiting for new SeekInfo from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.850 UTC [common.deliver] Handle -> DEBU 1c61 Attempting to read seek info message from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c66 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:39.853 UTC [cauthdsl] func1 -> DEBU 1c67 0xc000d92190 gate 1569287139852992600 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c68 0xc000d92190 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c69 0xc000d92190 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc000d92190 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:39.853 UTC [msp.identity] Verify -> DEBU 1c6b Verify: digest = 00000000 9d 29 eb a6 9a 33 8f be 1d d6 b5 08 ea 78 7c 7b |.)...3.......x|{| +orderer0.example.com | 00000010 89 95 27 51 cb aa e8 37 88 86 54 2a a3 26 58 dd |..'Q...7..T*.&X.|" +orderer0.example.com | "2019-09-24 01:05:39.854 UTC [msp.identity] Verify -> DEBU 1c6c Verify: sig = 00000000 30 44 02 20 72 a8 da bf 00 a4 28 23 1c 71 64 1b |0D. r.....(#.qd.| +orderer0.example.com | 00000010 62 98 98 10 70 7c 05 e3 69 03 67 32 27 e4 32 e9 |b...p|..i.g2'.2.| +orderer0.example.com | 00000020 7a 35 68 34 02 20 07 29 34 c4 73 4a 3e e2 23 32 |z5h4. .)4.sJ>.#2| +orderer0.example.com | 00000030 9d ce 9d c3 57 ed e2 66 15 c9 57 4d bf 10 78 78 |....W..f..WM..xx| +orderer0.example.com | 00000040 12 4c fd 35 8d 99 |.L.5..|" +orderer0.example.com | "2019-09-24 01:05:39.854 UTC [cauthdsl] func2 -> DEBU 1c6d 0xc000d92190 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:39.854 UTC [cauthdsl] func1 -> DEBU 1c6e 0xc000d92190 gate 1569287139852992600 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:39.854 UTC [policies] Evaluate -> DEBU 1c6f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c70 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c71 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c73 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.856 UTC [policies] Evaluate -> DEBU 1c74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:39.856 UTC [common.deliver] deliverBlocks -> DEBU 1c75 [channel: testchainid] Received seekInfo (0xc001255940) start: > stop: > from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.857 UTC [fsblkstorage] Next -> DEBU 1c76 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:39.857 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c77 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:39.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c78 Remaining bytes=[47980], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:39.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c79 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:39.860 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c7a blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:39.861 UTC [common.deliver] deliverBlocks -> DEBU 1c7b [channel: testchainid] Delivering block for (0xc001255940) for 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.862 UTC [common.deliver] deliverBlocks -> DEBU 1c7c [channel: testchainid] Done delivering to 172.18.0.5:53906 for (0xc001255940)" +orderer0.example.com | "2019-09-24 01:05:39.862 UTC [common.deliver] Handle -> DEBU 1c7d Waiting for new SeekInfo from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.863 UTC [common.deliver] Handle -> DEBU 1c7e Attempting to read seek info message from 172.18.0.5:53906" +orderer0.example.com | "2019-09-24 01:05:39.872 UTC [common.deliver] Handle -> WARN 1c7f Error reading from 172.18.0.5:53906: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:39.872 UTC [orderer.common.server] func1 -> DEBU 1c80 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:39.872 UTC [comm.grpc.server] 1 -> INFO 1c81 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53906 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.6184ms +orderer0.example.com | "2019-09-24 01:05:39.872 UTC [grpc] infof -> DEBU 1c82 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:40.003 UTC [orderer.common.server] Deliver -> DEBU 1c83 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:40.003 UTC [common.deliver] Handle -> DEBU 1c84 Starting new deliver loop for 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.003 UTC [common.deliver] Handle -> DEBU 1c85 Attempting to read seek info message from 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.005 UTC [policies] Evaluate -> DEBU 1c86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.005 UTC [policies] Evaluate -> DEBU 1c87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:40.006 UTC [policies] Evaluate -> DEBU 1c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.007 UTC [policies] Evaluate -> DEBU 1c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:40.007 UTC [policies] Evaluate -> DEBU 1c8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.008 UTC [cauthdsl] func1 -> DEBU 1c8b 0xc001091e80 gate 1569287140008220900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:40.008 UTC [cauthdsl] func2 -> DEBU 1c8c 0xc001091e80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:40.008 UTC [cauthdsl] func2 -> DEBU 1c8d 0xc001091e80 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:40.009 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc001091e80 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:40.009 UTC [msp.identity] Verify -> DEBU 1c8f Verify: digest = 00000000 4c e2 a6 02 a4 91 7a cc 6d 79 e9 50 4f 39 2e ec |L.....z.my.PO9..| +orderer0.example.com | 00000010 c0 8d 44 d2 7e 90 82 52 1a 7a 54 1a 4e c1 83 d0 |..D.~..R.zT.N...|" +peer0.org1.example.com | "2019-09-24 01:04:54.904 UTC [gossip.gossip] handleMessage -> DEBU 19a1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a2 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a3 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:54.905 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:54.908 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.908 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func1 -> DEBU 19ab 0xc003e29980 gate 1569287094909050100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ac 0xc003e29980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ad 0xc003e29980 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ae 0xc003e29980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19af 0xc003e29980 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [cauthdsl] func1 -> DEBU 19b0 0xc003e29980 gate 1569287094909050100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [policies] Evaluate -> DEBU 19b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [cauthdsl] func1 -> DEBU 19b4 0xc003e621d0 gate 1569287094910118200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003e621d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b6 0xc003e621d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b7 0xc003e621d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 d2 d2 d7 0c 52 e9 f1 6b 80 14 5e 13 4e 37 1d 6c |....R..k..^.N7.l| +peer0.org1.example.com | 00000010 f2 0d 66 aa 5c e6 12 6e be 52 93 0b cd cd f1 4e |..f.\..n.R.....N|" +peer0.org1.example.com | "2019-09-24 01:04:54.910 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 44 02 20 0f 57 ae 46 82 65 fe eb cd 0f f0 ab |0D. .W.F.e......| +peer0.org1.example.com | 00000010 66 67 ea fe f1 50 a5 29 c0 92 8c 06 f9 05 00 d0 |fg...P.)........| +peer0.org1.example.com | 00000020 62 f2 1e 25 02 20 5e 86 06 59 b9 ff 1e 28 55 04 |b..%. ^..Y...(U.| +peer0.org1.example.com | 00000030 34 4f da b3 ec f5 5b dd f2 f2 1b 6e d4 df 2f 54 |4O....[....n../T| +peer0.org1.example.com | 00000040 07 33 4b 1b 0e 90 |.3K...|" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [cauthdsl] func2 -> DEBU 19ba 0xc003e621d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [cauthdsl] func1 -> DEBU 19bb 0xc003e621d0 gate 1569287094910118200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2019-09-24 01:05:40.009 UTC [msp.identity] Verify -> DEBU 1c90 Verify: sig = 00000000 30 45 02 21 00 ce 59 76 bb 6d 7f 51 db 8b 3c 26 |0E.!..Yv.m.Q..<&| +orderer0.example.com | 00000010 31 64 48 dd c0 a2 c3 a0 09 1c 13 79 8c 57 2e a3 |1dH........y.W..| +orderer0.example.com | 00000020 5a 8a b1 bb 13 02 20 05 17 f0 1a 69 3c a6 76 51 |Z..... ....i<.vQ| +orderer0.example.com | 00000030 f9 6f 28 91 77 cf 3f 5d 03 25 22 4b fc 27 7d 79 |.o(.w.?].%"K.'}y| +orderer0.example.com | 00000040 6b 54 2a bd 5e 15 45 |kT*.^.E|" +orderer0.example.com | "2019-09-24 01:05:40.011 UTC [cauthdsl] func2 -> DEBU 1c91 0xc001091e80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:40.011 UTC [cauthdsl] func1 -> DEBU 1c92 0xc001091e80 gate 1569287140008220900 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:40.012 UTC [policies] Evaluate -> DEBU 1c93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:40.012 UTC [policies] Evaluate -> DEBU 1c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c95 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c97 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:40.014 UTC [common.deliver] deliverBlocks -> DEBU 1c99 [channel: testchainid] Received seekInfo (0xc00104f580) start: > stop: > from 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.014 UTC [fsblkstorage] Next -> DEBU 1c9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:40.014 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2019-09-24 01:05:40.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9c Remaining bytes=[47980], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:40.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9d Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2019-09-24 01:05:40.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9e blockbytes [20284] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:40.017 UTC [common.deliver] deliverBlocks -> DEBU 1c9f [channel: testchainid] Delivering block for (0xc00104f580) for 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.017 UTC [common.deliver] deliverBlocks -> DEBU 1ca0 [channel: testchainid] Done delivering to 172.18.0.5:53908 for (0xc00104f580)" +orderer0.example.com | "2019-09-24 01:05:40.017 UTC [common.deliver] Handle -> DEBU 1ca1 Waiting for new SeekInfo from 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.018 UTC [common.deliver] Handle -> DEBU 1ca2 Attempting to read seek info message from 172.18.0.5:53908" +orderer0.example.com | "2019-09-24 01:05:40.030 UTC [common.deliver] Handle -> WARN 1ca3 Error reading from 172.18.0.5:53908: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:40.030 UTC [orderer.common.server] func1 -> DEBU 1ca4 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:40.031 UTC [comm.grpc.server] 1 -> INFO 1ca5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.4195ms +orderer0.example.com | "2019-09-24 01:05:40.031 UTC [grpc] infof -> DEBU 1ca6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:40.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:40.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca8 Sending msg of 28 bytes to 3 on channel testchainid took 82.1µs" +orderer0.example.com | "2019-09-24 01:05:40.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2796ms " +orderer0.example.com | "2019-09-24 01:05:40.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caa Sending msg of 28 bytes to 2 on channel businesschannel took 52.9µs" +orderer0.example.com | "2019-09-24 01:05:40.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cab Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 01:05:40.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.4µs " +orderer0.example.com | "2019-09-24 01:05:40.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 221.2µs " +orderer0.example.com | "2019-09-24 01:05:40.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:40.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [orderer.common.server] Deliver -> DEBU 1cb0 Starting new Deliver handler" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [common.deliver] Handle -> DEBU 1cb1 Starting new deliver loop for 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [common.deliver] Handle -> DEBU 1cb2 Attempting to read seek info message from 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [policies] Evaluate -> DEBU 1cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [policies] Evaluate -> DEBU 1cb7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [cauthdsl] func1 -> DEBU 1cb8 0xc00104dba0 gate 1569287140187347000 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc00104dba0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cba 0xc00104dba0 processing identity 0 with bytes of fd4750" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc00104dba0 principal matched by identity 0" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [msp.identity] Verify -> DEBU 1cbc Verify: digest = 00000000 bf 22 10 4a 95 eb e4 03 ca 66 e3 31 da 69 8e a4 |.".J.....f.1.i..| +orderer0.example.com | 00000010 20 85 dc 94 a9 7d 16 72 22 83 19 38 a0 05 ac a3 | ....}.r"..8....|" +orderer0.example.com | "2019-09-24 01:05:40.187 UTC [msp.identity] Verify -> DEBU 1cbd Verify: sig = 00000000 30 44 02 20 65 d8 48 ab 8a 8a 76 ed 9f 14 bb ab |0D. e.H...v.....| +orderer0.example.com | 00000010 85 05 40 29 c9 ab de 75 3f 56 25 79 23 0e b0 78 |..@)...u?V%y#..x| +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:54.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] sendMemResponse -> DEBU 19c7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [msp] DeserializeIdentity -> DEBU 19c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.913 UTC [msp] DeserializeIdentity -> DEBU 19c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.913 UTC [msp] DeserializeIdentity -> DEBU 19ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:54.913 UTC [gossip.comm] Send -> DEBU 19cb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:54.913 UTC [gossip.discovery] sendMemResponse -> DEBU 19cc Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:54.914 UTC [gossip.comm] sendToEndpoint -> DEBU 19cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:54.914 UTC [gossip.comm] sendToEndpoint -> DEBU 19ce Exiting" +peer0.org1.example.com | "2019-09-24 01:04:54.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cf Exiting" +peer0.org1.example.com | "2019-09-24 01:04:56.739 UTC [gossip.election] waitForInterrupt -> DEBU 19d0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:04:56.739 UTC [gossip.election] IsLeader -> DEBU 19d1 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:04:56.740 UTC [msp] GetDefaultSigningIdentity -> DEBU 19d2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:56.740 UTC [msp.identity] Sign -> DEBU 19d3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510071801 " +peer0.org1.example.com | "2019-09-24 01:04:56.740 UTC [msp.identity] Sign -> DEBU 19d4 Sign: digest: C1A88620DB1EEB3D16B30B6707ADDB5712E2A959488E4CE50D090F0AEC9D9DF2 " +peer0.org1.example.com | "2019-09-24 01:04:56.740 UTC [gossip.election] waitForInterrupt -> DEBU 19d5 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:04:56.743 UTC [msp] DeserializeIdentity -> DEBU 19d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.745 UTC [gossip.comm] Send -> DEBU 19da Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19db Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.746 UTC [msp] DeserializeIdentity -> DEBU 19dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:56.746 UTC [gossip.comm] sendToEndpoint -> DEBU 19dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:56.746 UTC [gossip.comm] sendToEndpoint -> DEBU 19de Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.689 UTC [msp] DeserializeIdentity -> DEBU 19df Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.689 UTC [msp] DeserializeIdentity -> DEBU 19e0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.690 UTC [gossip.comm] Send -> DEBU 19e1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +orderer0.example.com | 00000020 4f f7 7c 2e 02 20 27 5c d8 48 b5 28 36 5a b1 67 |O.|.. '\.H.(6Z.g| +orderer0.example.com | 00000030 4b 91 4b bc 92 49 0b 9f 72 20 62 16 55 5b 2c 35 |K.K..I..r b.U[,5| +orderer0.example.com | 00000040 da 47 2b 81 4f 51 |.G+.OQ|" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [cauthdsl] func2 -> DEBU 1cbe 0xc00104dba0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [cauthdsl] func1 -> DEBU 1cbf 0xc00104dba0 gate 1569287140187347000 evaluation succeeds" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc2 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc4 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:40.189 UTC [policies] Evaluate -> DEBU 1cc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2019-09-24 01:05:40.189 UTC [common.deliver] deliverBlocks -> DEBU 1cc6 [channel: testchainid] Received seekInfo (0xc00115c540) start: > stop: > from 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.189 UTC [fsblkstorage] Next -> DEBU 1cc7 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +orderer0.example.com | "2019-09-24 01:05:40.189 UTC [fsblkstorage] newBlockfileStream -> DEBU 1cc8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +orderer0.example.com | "2019-09-24 01:05:40.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc9 Remaining bytes=[27693], Going to peek [8] bytes" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cca Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ccb blockbytes [27690] read from file [0]" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [common.deliver] deliverBlocks -> DEBU 1ccc [channel: testchainid] Delivering block for (0xc00115c540) for 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [common.deliver] deliverBlocks -> DEBU 1ccd [channel: testchainid] Done delivering to 172.18.0.5:53910 for (0xc00115c540)" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [common.deliver] Handle -> DEBU 1cce Waiting for new SeekInfo from 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.190 UTC [common.deliver] Handle -> DEBU 1ccf Attempting to read seek info message from 172.18.0.5:53910" +orderer0.example.com | "2019-09-24 01:05:40.199 UTC [common.deliver] Handle -> WARN 1cd0 Error reading from 172.18.0.5:53910: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-09-24 01:05:40.199 UTC [orderer.common.server] func1 -> DEBU 1cd1 Closing Deliver stream" +orderer0.example.com | "2019-09-24 01:05:40.199 UTC [comm.grpc.server] 1 -> INFO 1cd2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8943ms +orderer0.example.com | "2019-09-24 01:05:40.199 UTC [grpc] infof -> DEBU 1cd3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2019-09-24 01:05:40.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:40.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd5 Sending msg of 28 bytes to 3 on channel testchainid took 8µs" +orderer0.example.com | "2019-09-24 01:05:40.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +orderer0.example.com | "2019-09-24 01:05:40.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +orderer0.example.com | "2019-09-24 01:05:40.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd8 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +orderer0.example.com | "2019-09-24 01:05:40.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +orderer0.example.com | "2019-09-24 01:05:40.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " +orderer0.example.com | "2019-09-24 01:05:40.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:40.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cde Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +orderer0.example.com | "2019-09-24 01:05:41.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +orderer0.example.com | "2019-09-24 01:05:41.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.9µs " +orderer0.example.com | "2019-09-24 01:05:41.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce1 Sending msg of 28 bytes to 2 on channel businesschannel took 413.4µs" +orderer0.example.com | "2019-09-24 01:05:41.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce2 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +orderer0.example.com | "2019-09-24 01:05:41.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +orderer0.example.com | "2019-09-24 01:05:41.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.187 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce7 Sending msg of 28 bytes to 3 on channel testchainid took 163.3µs" +peer0.org1.example.com | "2019-09-24 01:04:57.690 UTC [gossip.comm] sendToEndpoint -> DEBU 19e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.690 UTC [gossip.comm] sendToEndpoint -> DEBU 19e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.691 UTC [gossip.comm] sendToEndpoint -> DEBU 19e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.692 UTC [gossip.comm] sendToEndpoint -> DEBU 19e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.691 UTC [gossip.comm] sendToEndpoint -> DEBU 19e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.693 UTC [gossip.comm] sendToEndpoint -> DEBU 19e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.693 UTC [gossip.comm] func1 -> DEBU 19e9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.694 UTC [gossip.gossip] handleMessage -> DEBU 19ea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.692 UTC [gossip.comm] func1 -> DEBU 19e6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.694 UTC [msp] DeserializeIdentity -> DEBU 19ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.694 UTC [gossip.comm] func1 -> DEBU 19eb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.695 UTC [msp] DeserializeIdentity -> DEBU 19ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.695 UTC [msp] DeserializeIdentity -> DEBU 19ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.696 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.696 UTC [policies] Evaluate -> DEBU 19f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.697 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.697 UTC [cauthdsl] func1 -> DEBU 19f5 0xc003e7eb50 gate 1569287097697194200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f6 0xc003e7eb50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f7 0xc003e7eb50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f8 0xc003e7eb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.698 UTC [cauthdsl] func2 -> DEBU 19f9 0xc003e7eb50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.698 UTC [cauthdsl] func1 -> DEBU 19fa 0xc003e7eb50 gate 1569287097697194200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.699 UTC [cauthdsl] func1 -> DEBU 19fe 0xc003e7f390 gate 1569287097699196500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 19ff 0xc003e7f390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 1a00 0xc003e7f390 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 1a01 0xc003e7f390 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.700 UTC [msp.identity] Verify -> DEBU 1a02 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:57.700 UTC [msp.identity] Verify -> DEBU 1a03 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:57.700 UTC [cauthdsl] func2 -> DEBU 1a04 0xc003e7f390 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.700 UTC [cauthdsl] func1 -> DEBU 1a05 0xc003e7f390 gate 1569287097699196500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.700 UTC [policies] Evaluate -> DEBU 1a06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a08 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.702 UTC [msp.identity] Verify -> DEBU 1a0a Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:57.703 UTC [msp.identity] Verify -> DEBU 1a0b Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:57.703 UTC [msp] DeserializeIdentity -> DEBU 1a0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.703 UTC [msp] DeserializeIdentity -> DEBU 1a0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a0f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a10 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [cauthdsl] func1 -> DEBU 1a14 0xc003ea33a0 gate 1569287097704816600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.704 UTC [cauthdsl] func2 -> DEBU 1a15 0xc003ea33a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a16 0xc003ea33a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a17 0xc003ea33a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a18 0xc003ea33a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [cauthdsl] func1 -> DEBU 1a19 0xc003ea33a0 gate 1569287097704816600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.706 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc003ea3c20 gate 1569287097706119800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc003ea3c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc003ea3c20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a20 0xc003ea3c20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.706 UTC [msp.identity] Verify -> DEBU 1a21 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:57.707 UTC [msp.identity] Verify -> DEBU 1a22 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +orderer0.example.com | "2019-09-24 01:05:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 705.1µs " +orderer0.example.com | "2019-09-24 01:05:41.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce9 Sending msg of 28 bytes to 2 on channel businesschannel took 84.2µs" +orderer0.example.com | "2019-09-24 01:05:41.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cea Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +orderer0.example.com | "2019-09-24 01:05:41.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ceb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379µs " +orderer0.example.com | "2019-09-24 01:05:41.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.7µs " +orderer0.example.com | "2019-09-24 01:05:41.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ced Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:41.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cee Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.155 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cef Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.9µs " +orderer0.example.com | "2019-09-24 01:05:42.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +orderer0.example.com | "2019-09-24 01:05:42.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf2 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +orderer0.example.com | "2019-09-24 01:05:42.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +orderer0.example.com | "2019-09-24 01:05:42.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.6µs " +orderer0.example.com | "2019-09-24 01:05:42.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 710.3µs " +orderer0.example.com | "2019-09-24 01:05:42.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf9 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +orderer0.example.com | "2019-09-24 01:05:42.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.6µs " +orderer0.example.com | "2019-09-24 01:05:42.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfb Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +orderer0.example.com | "2019-09-24 01:05:42.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +orderer0.example.com | "2019-09-24 01:05:42.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.1µs " +orderer0.example.com | "2019-09-24 01:05:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfe Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:42.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2175ms " +orderer0.example.com | "2019-09-24 01:05:42.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d00 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d01 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d02 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +orderer0.example.com | "2019-09-24 01:05:43.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +orderer0.example.com | "2019-09-24 01:05:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d04 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +orderer0.example.com | "2019-09-24 01:05:43.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d05 Sending msg of 28 bytes to 2 on channel businesschannel took 6.5µs" +orderer0.example.com | "2019-09-24 01:05:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.4µs " +orderer0.example.com | "2019-09-24 01:05:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.8µs " +orderer0.example.com | "2019-09-24 01:05:43.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.8µs " +orderer0.example.com | "2019-09-24 01:05:43.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0c Sending msg of 28 bytes to 3 on channel testchainid took 229.6µs" +orderer0.example.com | "2019-09-24 01:05:43.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 01:05:43.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0e Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +orderer0.example.com | "2019-09-24 01:05:43.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +orderer0.example.com | "2019-09-24 01:05:43.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.8µs " +orderer0.example.com | "2019-09-24 01:05:43.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d11 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:43.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d12 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:44.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d13 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:44.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d14 Sending msg of 28 bytes to 3 on channel testchainid took 51.7µs" +orderer0.example.com | "2019-09-24 01:05:44.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +orderer0.example.com | "2019-09-24 01:05:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d16 Sending msg of 28 bytes to 2 on channel businesschannel took 48.8µs" +orderer0.example.com | "2019-09-24 01:05:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d17 Sending msg of 28 bytes to 3 on channel businesschannel took 7.9µs" +orderer0.example.com | "2019-09-24 01:05:44.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.9µs " +orderer0.example.com | "2019-09-24 01:05:44.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 594.4µs " +orderer0.example.com | "2019-09-24 01:05:44.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:44.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:44.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:44.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1d Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2019-09-24 01:05:44.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +orderer0.example.com | "2019-09-24 01:05:44.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1f Sending msg of 28 bytes to 2 on channel businesschannel took 53.5µs" +orderer0.example.com | "2019-09-24 01:05:44.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d20 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +orderer0.example.com | "2019-09-24 01:05:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +orderer0.example.com | "2019-09-24 01:05:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +orderer0.example.com | "2019-09-24 01:05:44.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d23 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:57.707 UTC [cauthdsl] func2 -> DEBU 1a23 0xc003ea3c20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.707 UTC [cauthdsl] func1 -> DEBU 1a24 0xc003ea3c20 gate 1569287097706119800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.707 UTC [policies] Evaluate -> DEBU 1a25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.707 UTC [policies] Evaluate -> DEBU 1a26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.708 UTC [policies] Evaluate -> DEBU 1a27 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.708 UTC [policies] Evaluate -> DEBU 1a28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.708 UTC [msp.identity] Verify -> DEBU 1a29 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:57.708 UTC [msp.identity] Verify -> DEBU 1a2a Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:57.709 UTC [gossip.gossip] handleMessage -> DEBU 1a2b Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.709 UTC [gossip.gossip] handleMessage -> DEBU 1a2c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.709 UTC [msp] DeserializeIdentity -> DEBU 1a2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.710 UTC [msp] DeserializeIdentity -> DEBU 1a2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.710 UTC [msp] DeserializeIdentity -> DEBU 1a2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a31 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a32 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.714 UTC [policies] Evaluate -> DEBU 1a33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.715 UTC [policies] Evaluate -> DEBU 1a34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.715 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.720 UTC [cauthdsl] func1 -> DEBU 1a36 0xc003f12010 gate 1569287097715700900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.720 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003f12010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.720 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003f12010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [cauthdsl] func2 -> DEBU 1a39 0xc003f12010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc003f12010 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc003f12010 gate 1569287097715700900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.722 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc003f12850 gate 1569287097722062900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a40 0xc003f12850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a41 0xc003f12850 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a42 0xc003f12850 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.722 UTC [msp.identity] Verify -> DEBU 1a43 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:57.723 UTC [msp.identity] Verify -> DEBU 1a44 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:57.723 UTC [cauthdsl] func2 -> DEBU 1a45 0xc003f12850 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.723 UTC [cauthdsl] func1 -> DEBU 1a46 0xc003f12850 gate 1569287097722062900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.723 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a49 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4d Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4e Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:57.726 UTC [msp] DeserializeIdentity -> DEBU 1a4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.726 UTC [msp] DeserializeIdentity -> DEBU 1a50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a52 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a53 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [cauthdsl] func1 -> DEBU 1a57 0xc003f39000 gate 1569287097727389100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [cauthdsl] func2 -> DEBU 1a58 0xc003f39000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.727 UTC [cauthdsl] func2 -> DEBU 1a59 0xc003f39000 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [cauthdsl] func2 -> DEBU 1a5a 0xc003f39000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc003f39000 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [cauthdsl] func1 -> DEBU 1a5c 0xc003f39000 gate 1569287097727389100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.729 UTC [cauthdsl] func1 -> DEBU 1a60 0xc003f39840 gate 1569287097729071600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a61 0xc003f39840 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2019-09-24 01:05:44.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d24 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d25 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d26 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +orderer0.example.com | "2019-09-24 01:05:45.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.232ms " +orderer0.example.com | "2019-09-24 01:05:45.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d28 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +orderer0.example.com | "2019-09-24 01:05:45.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 314.2µs " +orderer0.example.com | "2019-09-24 01:05:45.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2a Sending msg of 28 bytes to 3 on channel businesschannel took 87.7µs" +orderer0.example.com | "2019-09-24 01:05:45.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.24ms " +orderer0.example.com | "2019-09-24 01:05:45.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.652 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-09-24 01:05:45.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.3µs " +orderer0.example.com | "2019-09-24 01:05:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d31 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 01:05:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d32 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +orderer0.example.com | "2019-09-24 01:05:45.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +peer0.org1.example.com | "2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a62 0xc003f39840 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a63 0xc003f39840 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.729 UTC [msp.identity] Verify -> DEBU 1a64 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:57.730 UTC [msp.identity] Verify -> DEBU 1a65 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:57.730 UTC [cauthdsl] func2 -> DEBU 1a66 0xc003f39840 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.730 UTC [cauthdsl] func1 -> DEBU 1a67 0xc003f39840 gate 1569287097729071600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.730 UTC [policies] Evaluate -> DEBU 1a68 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a6a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.731 UTC [gossip.gossip] handleMessage -> DEBU 1a6c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.732 UTC [gossip.gossip] handleMessage -> DEBU 1a6d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.732 UTC [msp] DeserializeIdentity -> DEBU 1a6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.732 UTC [msp] DeserializeIdentity -> DEBU 1a6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.732 UTC [gossip.pull] Hello -> DEBU 1a71 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:57.733 UTC [msp] DeserializeIdentity -> DEBU 1a72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.732 UTC [msp.identity] Verify -> DEBU 1a70 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:04:57.733 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a74 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [gossip.comm] Send -> DEBU 1a75 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [gossip.comm] sendToEndpoint -> DEBU 1a76 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a77 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a78 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:04:57.734 UTC [gossip.comm] sendToEndpoint -> DEBU 1a79 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.735 UTC [msp] DeserializeIdentity -> DEBU 1a7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.735 UTC [msp] DeserializeIdentity -> DEBU 1a7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a7d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a7e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [policies] Evaluate -> DEBU 1a7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [policies] Evaluate -> DEBU 1a81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.736 UTC [gossip.comm] func1 -> DEBU 1a80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func1 -> DEBU 1a83 0xc003f961e0 gate 1569287097737183900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a84 0xc003f961e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a85 0xc003f961e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a86 0xc003f961e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a87 0xc003f961e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.737 UTC [cauthdsl] func1 -> DEBU 1a88 0xc003f961e0 gate 1569287097737183900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a89 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc003f96ad0 gate 1569287097738334700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc003f96ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8e 0xc003f96ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8f 0xc003f96ad0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.738 UTC [msp.identity] Verify -> DEBU 1a90 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:04:57.739 UTC [msp.identity] Verify -> DEBU 1a91 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:04:57.739 UTC [cauthdsl] func2 -> DEBU 1a92 0xc003f96ad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.739 UTC [cauthdsl] func1 -> DEBU 1a93 0xc003f96ad0 gate 1569287097738334700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a96 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.740 UTC [msp] DeserializeIdentity -> DEBU 1a98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.743 UTC [msp] DeserializeIdentity -> DEBU 1a99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a9b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a9c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func1 -> DEBU 1aa0 0xc0030c2540 gate 1569287097745225900 evaluation starts" +orderer0.example.com | "2019-09-24 01:05:45.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.1µs " +orderer0.example.com | "2019-09-24 01:05:45.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d35 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:45.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d36 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d37 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d38 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +orderer0.example.com | "2019-09-24 01:05:46.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +orderer0.example.com | "2019-09-24 01:05:46.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d3a Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2019-09-24 01:05:46.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d3b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2019-09-24 01:05:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.5µs " +orderer0.example.com | "2019-09-24 01:05:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +orderer0.example.com | "2019-09-24 01:05:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d40 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d41 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2019-09-24 01:05:46.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.9µs " +orderer0.example.com | "2019-09-24 01:05:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d43 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +orderer0.example.com | "2019-09-24 01:05:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2019-09-24 01:05:46.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.1µs " +orderer0.example.com | "2019-09-24 01:05:46.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226µs " +orderer0.example.com | "2019-09-24 01:05:46.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d47 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:46.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d48 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d49 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4a Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +orderer0.example.com | "2019-09-24 01:05:47.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.6µs " +orderer0.example.com | "2019-09-24 01:05:47.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4c Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +orderer0.example.com | "2019-09-24 01:05:47.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4d Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +orderer0.example.com | "2019-09-24 01:05:47.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +orderer0.example.com | "2019-09-24 01:05:47.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.2µs " +orderer0.example.com | "2019-09-24 01:05:47.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d50 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d51 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d52 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d53 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +orderer0.example.com | "2019-09-24 01:05:47.620 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.7µs " +orderer0.example.com | "2019-09-24 01:05:47.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d55 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" +orderer0.example.com | "2019-09-24 01:05:47.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d56 Sending msg of 28 bytes to 3 on channel businesschannel took 48.2µs" +orderer0.example.com | "2019-09-24 01:05:47.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +orderer0.example.com | "2019-09-24 01:05:47.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +orderer0.example.com | "2019-09-24 01:05:47.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d59 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:47.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d5a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:48.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d5b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:48.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5c Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +orderer0.example.com | "2019-09-24 01:05:48.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +orderer0.example.com | "2019-09-24 01:05:48.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5e Sending msg of 28 bytes to 2 on channel businesschannel took 54.3µs" +orderer0.example.com | "2019-09-24 01:05:48.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5f Sending msg of 28 bytes to 3 on channel businesschannel took 82µs" +orderer0.example.com | "2019-09-24 01:05:48.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.1µs " +orderer0.example.com | "2019-09-24 01:05:48.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6971ms " +orderer0.example.com | "2019-09-24 01:05:48.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d62 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:48.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d63 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:48.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d64 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:48.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d65 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +orderer0.example.com | "2019-09-24 01:05:48.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.3µs " +orderer0.example.com | "2019-09-24 01:05:49.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d67 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:49.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d68 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +orderer0.example.com | "2019-09-24 01:05:49.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.8µs " +orderer0.example.com | "2019-09-24 01:05:49.368 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d6a Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +orderer0.example.com | "2019-09-24 01:05:49.368 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d6b Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +orderer0.example.com | "2019-09-24 01:05:49.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " +orderer0.example.com | "2019-09-24 01:05:49.369 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.8µs " +orderer0.example.com | "2019-09-24 01:05:49.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d6e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:49.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d6f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:49.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d70 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:49.628 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d71 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +orderer0.example.com | "2019-09-24 01:05:49.629 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.6µs " +orderer0.example.com | "2019-09-24 01:05:49.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d73 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 01:05:49.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d74 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +orderer0.example.com | "2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +orderer0.example.com | "2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.6µs " +orderer0.example.com | "2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d77 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d78 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d79 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7a Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2019-09-24 01:05:50.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +orderer0.example.com | "2019-09-24 01:05:50.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7c Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +orderer0.example.com | "2019-09-24 01:05:50.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7d Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +orderer0.example.com | "2019-09-24 01:05:50.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +orderer0.example.com | "2019-09-24 01:05:50.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa1 0xc0030c2540 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa2 0xc0030c2540 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa3 0xc0030c2540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc0030c2540 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.745 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0030c2540 gate 1569287097745225900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [cauthdsl] func1 -> DEBU 1aa9 0xc0030c2d80 gate 1569287097747170100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aaa 0xc0030c2d80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aab 0xc0030c2d80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aac 0xc0030c2d80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [msp.identity] Verify -> DEBU 1aad Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:04:57.747 UTC [msp.identity] Verify -> DEBU 1aae Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0030c2d80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0030c2d80 gate 1569287097747170100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab5 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.749 UTC [gossip.pull] HandleMessage -> DEBU 1ab7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.873 UTC [gossip.comm] func1 -> DEBU 1ab9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.875 UTC [gossip.gossip] handleMessage -> DEBU 1aba Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.875 UTC [msp] DeserializeIdentity -> DEBU 1abb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.875 UTC [msp] DeserializeIdentity -> DEBU 1abc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:57.876 UTC [gossip.gossip] handleMessage -> DEBU 1abd Exiting" +peer0.org1.example.com | "2019-09-24 01:04:57.891 UTC [gossip.comm] func1 -> DEBU 1abe Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.891 UTC [gossip.gossip] handleMessage -> DEBU 1abf Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.891 UTC [gossip.pull] HandleMessage -> DEBU 1ac0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:57.891 UTC [gossip.pull] SendDigest -> DEBU 1ac1 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:57.891 UTC [gossip.gossip] handleMessage -> DEBU 1ac2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.076 UTC [gossip.comm] func1 -> DEBU 1ac3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.076 UTC [gossip.gossip] handleMessage -> DEBU 1ac4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.077 UTC [msp] DeserializeIdentity -> DEBU 1ac5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.077 UTC [msp] DeserializeIdentity -> DEBU 1ac6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.078 UTC [msp] DeserializeIdentity -> DEBU 1ac7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.078 UTC [gossip.gossip] handleMessage -> DEBU 1ac8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.275 UTC [gossip.comm] func1 -> DEBU 1ac9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.275 UTC [gossip.gossip] handleMessage -> DEBU 1aca Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.279 UTC [msp] DeserializeIdentity -> DEBU 1acb Obtaining identity" +orderer0.example.com | "2019-09-24 01:05:50.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d80 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d81 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d82 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.620 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d83 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +orderer0.example.com | "2019-09-24 01:05:50.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 525.9µs " +orderer0.example.com | "2019-09-24 01:05:50.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d85 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +orderer0.example.com | "2019-09-24 01:05:50.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d86 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2019-09-24 01:05:50.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.3µs " +orderer0.example.com | "2019-09-24 01:05:50.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d88 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:50.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.8357ms " +orderer0.example.com | "2019-09-24 01:05:50.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d8a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d8b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8c Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +orderer0.example.com | "2019-09-24 01:05:51.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.6µs " +orderer0.example.com | "2019-09-24 01:05:51.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8e Sending msg of 28 bytes to 3 on channel businesschannel took 58.4µs" +orderer0.example.com | "2019-09-24 01:05:51.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8f Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2019-09-24 01:05:51.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.4µs " +orderer0.example.com | "2019-09-24 01:05:51.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +orderer0.example.com | "2019-09-24 01:05:51.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d93 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d92 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d94 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d95 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2019-09-24 01:05:51.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.1µs " +orderer0.example.com | "2019-09-24 01:05:51.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d97 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +orderer0.example.com | "2019-09-24 01:05:51.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d98 Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +orderer0.example.com | "2019-09-24 01:05:51.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.6µs " +orderer0.example.com | "2019-09-24 01:05:51.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.9µs " +orderer0.example.com | "2019-09-24 01:05:51.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:51.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:52.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:52.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d9e Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +orderer0.example.com | "2019-09-24 01:05:52.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.7µs " +orderer0.example.com | "2019-09-24 01:05:52.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1da0 Sending msg of 28 bytes to 2 on channel businesschannel took 23.4µs" +orderer0.example.com | "2019-09-24 01:05:52.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1da1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.3µs " +orderer0.example.com | "2019-09-24 01:05:52.143 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1da2 Sending msg of 28 bytes to 3 on channel businesschannel took 25µs" +orderer0.example.com | "2019-09-24 01:05:52.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.7µs " +orderer0.example.com | "2019-09-24 01:05:52.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1da4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:58.280 UTC [msp] DeserializeIdentity -> DEBU 1acc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.280 UTC [msp] DeserializeIdentity -> DEBU 1acd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.280 UTC [gossip.gossip] handleMessage -> DEBU 1ace Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.506 UTC [gossip.comm] func1 -> DEBU 1acf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.506 UTC [gossip.comm] func1 -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.507 UTC [gossip.gossip] handleMessage -> DEBU 1ad1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.510 UTC [gossip.pull] HandleMessage -> DEBU 1ad2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.511 UTC [gossip.pull] SendDigest -> DEBU 1ad3 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:04:58.511 UTC [gossip.gossip] handleMessage -> DEBU 1ad4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad6 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ad8 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1ad9 Verify: digest = 00000000 e3 b0 d9 be 7a 84 49 63 90 1f 0d 0e 7a 16 c6 76 |....z.Ic....z..v| +peer0.org1.example.com | 00000010 8a c2 f3 34 70 30 4a b3 c4 94 2d a1 1c a7 4b 97 |...4p0J...-...K.|" +peer0.org1.example.com | "2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1ada Verify: sig = 00000000 30 45 02 21 00 9b 7d 57 89 f2 38 a9 80 ce 37 f0 |0E.!..}W..8...7.| +peer0.org1.example.com | 00000010 15 15 f0 d7 2a 1b f1 d0 69 75 33 c5 d5 04 08 ae |....*...iu3.....| +peer0.org1.example.com | 00000020 1f 7d 8e 9f 43 02 20 7c 6a 50 6b 35 55 7d 8c 0f |.}..C. |jPk5U}..| +peer0.org1.example.com | 00000030 8e 9e e4 ef af 3c 99 cd 08 29 04 f1 ae 64 74 6d |.....<...)...dtm| +peer0.org1.example.com | 00000040 5f 8c d0 58 38 2a 4e |_..X8*N|" +peer0.org1.example.com | "2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1adb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:04:58.514 UTC [msp.identity] Verify -> DEBU 1adc Verify: sig = 00000000 30 45 02 21 00 99 23 38 95 9e bd 64 51 a8 17 5d |0E.!..#8...dQ..]| +peer0.org1.example.com | 00000010 e2 f7 6c 29 32 b8 99 5b 2e e0 85 89 cc d6 5c 58 |..l)2..[......\X| +peer0.org1.example.com | 00000020 18 a8 7e 05 4d 02 20 7a cf 2f 69 68 ad bd 53 3a |..~.M. z./ih..S:| +peer0.org1.example.com | 00000030 b1 e0 d8 35 68 1f da 0d 37 e9 2e ec 55 2f 20 a4 |...5h...7...U/ .| +peer0.org1.example.com | 00000040 42 ad b3 f5 65 89 58 |B...e.X|" +peer0.org1.example.com | "2019-09-24 01:04:58.514 UTC [gossip.discovery] handleAliveMessage -> DEBU 1add Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ade Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1adf updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +orderer0.example.com | "2019-09-24 01:05:52.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1da5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:52.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1da6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:52.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1da7 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2019-09-24 01:05:52.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1da8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.9µs " +orderer0.example.com | "2019-09-24 01:05:52.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1da9 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +orderer0.example.com | "2019-09-24 01:05:52.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1daa Sending msg of 28 bytes to 3 on channel businesschannel took 122µs" +orderer0.example.com | "2019-09-24 01:05:52.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.6µs " +orderer0.example.com | "2019-09-24 01:05:52.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.8µs " +orderer0.example.com | "2019-09-24 01:05:52.643 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dad Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:52.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dae Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1daf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1db0 Sending msg of 28 bytes to 3 on channel testchainid took 180.2µs" +orderer0.example.com | "2019-09-24 01:05:53.120 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1db1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 339.9µs " +orderer0.example.com | "2019-09-24 01:05:53.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1db2 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +orderer0.example.com | "2019-09-24 01:05:53.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1db3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.1µs " +orderer0.example.com | "2019-09-24 01:05:53.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1db4 Sending msg of 28 bytes to 3 on channel businesschannel took 22.1µs" +orderer0.example.com | "2019-09-24 01:05:53.144 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1db5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.7µs " +orderer0.example.com | "2019-09-24 01:05:53.146 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1db6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1db7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1db8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1db9 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +orderer0.example.com | "2019-09-24 01:05:53.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.7µs " +orderer0.example.com | "2019-09-24 01:05:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dbb Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +orderer0.example.com | "2019-09-24 01:05:53.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1dbc Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +orderer0.example.com | "2019-09-24 01:05:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.5µs " +orderer0.example.com | "2019-09-24 01:05:53.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1dbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.9µs " +orderer0.example.com | "2019-09-24 01:05:53.649 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dbf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2019-09-24 01:05:53.649 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1dc0 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | "2019-09-24 01:04:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ae3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.515 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.516 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:04:58.516 UTC [msp] DeserializeIdentity -> DEBU 1ae6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.516 UTC [msp] DeserializeIdentity -> DEBU 1ae7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.517 UTC [gossip.comm] Send -> DEBU 1ae8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.517 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae9 Exiting, replying with alive: > alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:58.517 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.517 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.547 UTC [gossip.comm] func1 -> DEBU 1aec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.547 UTC [gossip.gossip] handleMessage -> DEBU 1aed Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.547 UTC [gossip.gossip] handleMessage -> DEBU 1aee Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1af0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.548 UTC [msp.identity] Verify -> DEBU 1af1 Verify: digest = 00000000 4d 1a c8 05 29 4f f5 e6 81 7f d7 a4 11 80 a0 4a |M...)O.........J| +peer0.org1.example.com | 00000010 40 d3 55 b0 9a a9 2e 9a 55 82 84 fa 20 cb cb b9 |@.U.....U... ...|" +peer0.org1.example.com | "2019-09-24 01:04:58.548 UTC [msp.identity] Verify -> DEBU 1af2 Verify: sig = 00000000 30 44 02 20 4c b4 81 5c e5 fb 90 fb a1 23 0a 37 |0D. L..\.....#.7| +peer0.org1.example.com | 00000010 b9 8e 8a f3 fa 94 6a 83 21 0e b1 1e 1c c1 03 62 |......j.!......b| +peer0.org1.example.com | 00000020 4a e1 51 8f 02 20 33 79 04 79 81 0c 70 df 9e 3d |J.Q.. 3y.y..p..=| +peer0.org1.example.com | 00000030 29 4f e8 06 9b 6a 98 d9 e6 c2 b4 c9 54 69 b2 8b |)O...j......Ti..| +peer0.org1.example.com | 00000040 58 f9 93 5b eb 36 |X..[.6|" +peer0.org1.example.com | "2019-09-24 01:04:58.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 1af3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af5 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af6 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:58.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.550 UTC [gossip.discovery] handleAliveMessage -> DEBU 1af9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.550 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1afa Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.550 UTC [msp] DeserializeIdentity -> DEBU 1afb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.550 UTC [msp] DeserializeIdentity -> DEBU 1afc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.551 UTC [msp] DeserializeIdentity -> DEBU 1afd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.551 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.551 UTC [msp] DeserializeIdentity -> DEBU 1aff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.551 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.558 UTC [gossip.comm] func1 -> DEBU 1b05 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.558 UTC [gossip.gossip] handleMessage -> DEBU 1b06 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.558 UTC [gossip.gossip] handleMessage -> DEBU 1b07 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b08 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b09 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.559 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.559 UTC [gossip.gossip] handleMessage -> DEBU 1b0b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.559 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.808 UTC [gossip.comm] func1 -> DEBU 1b0f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.808 UTC [gossip.gossip] handleMessage -> DEBU 1b10 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [gossip.pull] HandleMessage -> DEBU 1b11 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b15 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b17 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.809 UTC [gossip.pull] SendDigest -> DEBU 1b18 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:04:58.810 UTC [gossip.gossip] handleMessage -> DEBU 1b19 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.816 UTC [gossip.comm] func1 -> DEBU 1b1a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.816 UTC [gossip.gossip] handleMessage -> DEBU 1b1b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.817 UTC [gossip.gossip] handleMessage -> DEBU 1b1c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b1d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.817 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b1e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.818 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b21 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b22 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.818 UTC [policies] Evaluate -> DEBU 1b23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.819 UTC [policies] Evaluate -> DEBU 1b24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:58.819 UTC [policies] Evaluate -> DEBU 1b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.819 UTC [cauthdsl] func1 -> DEBU 1b26 0xc003466fc0 gate 1569287098819433200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.819 UTC [cauthdsl] func2 -> DEBU 1b27 0xc003466fc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.819 UTC [cauthdsl] func2 -> DEBU 1b28 0xc003466fc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.820 UTC [cauthdsl] func2 -> DEBU 1b29 0xc003466fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:58.820 UTC [cauthdsl] func2 -> DEBU 1b2a 0xc003466fc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.822 UTC [cauthdsl] func1 -> DEBU 1b2b 0xc003466fc0 gate 1569287098819433200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.822 UTC [policies] Evaluate -> DEBU 1b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.822 UTC [policies] Evaluate -> DEBU 1b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.823 UTC [policies] Evaluate -> DEBU 1b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.823 UTC [cauthdsl] func1 -> DEBU 1b2f 0xc003467800 gate 1569287098823655500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.823 UTC [cauthdsl] func2 -> DEBU 1b30 0xc003467800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.824 UTC [cauthdsl] func2 -> DEBU 1b31 0xc003467800 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.824 UTC [cauthdsl] func2 -> DEBU 1b32 0xc003467800 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.824 UTC [msp.identity] Verify -> DEBU 1b33 Verify: digest = 00000000 fa e6 2c b4 91 91 2a 25 4e 0c 0d 07 cf 51 f4 0c |..,...*%N....Q..| +peer0.org1.example.com | 00000010 00 19 fb 8b ef 7e c8 30 13 61 3d fd 9b 2d 1b 63 |.....~.0.a=..-.c|" +peer0.org1.example.com | "2019-09-24 01:04:58.824 UTC [msp.identity] Verify -> DEBU 1b34 Verify: sig = 00000000 30 44 02 20 0e 4b d2 29 1c 9c 5e c9 2b d6 a6 4e |0D. .K.)..^.+..N| +peer0.org1.example.com | 00000010 6b ff 99 fc 06 f6 09 be c1 93 71 7d 36 e5 fc 18 |k.........q}6...| +peer0.org1.example.com | 00000020 eb 45 dd 50 02 20 40 d6 a9 8c 3b d7 ef 7e 6a 48 |.E.P. @...;..~jH| +peer0.org1.example.com | 00000030 0b 65 7a 80 ac f9 bc b0 ea 4f 7a a9 66 d5 74 0e |.ez......Oz.f.t.| +peer0.org1.example.com | 00000040 e2 da 70 5d 06 06 |..p]..|" +peer0.org1.example.com | "2019-09-24 01:04:58.825 UTC [cauthdsl] func2 -> DEBU 1b35 0xc003467800 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.825 UTC [cauthdsl] func1 -> DEBU 1b36 0xc003467800 gate 1569287098823655500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.826 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:58.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b40 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.827 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b41 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b42 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.827 UTC [gossip.discovery] sendMemResponse -> DEBU 1b43 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:04:58.828 UTC [msp] DeserializeIdentity -> DEBU 1b44 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.829 UTC [msp] DeserializeIdentity -> DEBU 1b45 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.829 UTC [msp] DeserializeIdentity -> DEBU 1b46 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.829 UTC [gossip.comm] Send -> DEBU 1b47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1b48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1b49 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.830 UTC [gossip.discovery] sendMemResponse -> DEBU 1b4a Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:58.853 UTC [gossip.pull] Hello -> DEBU 1b4b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:58.854 UTC [gossip.comm] Send -> DEBU 1b4c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.854 UTC [gossip.pull] Hello -> DEBU 1b4d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:58.854 UTC [gossip.comm] Send -> DEBU 1b4e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.855 UTC [gossip.pull] Hello -> DEBU 1b4f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:04:58.855 UTC [gossip.comm] Send -> DEBU 1b50 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.855 UTC [gossip.comm] sendToEndpoint -> DEBU 1b51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.855 UTC [gossip.comm] sendToEndpoint -> DEBU 1b52 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b54 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b55 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b56 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.857 UTC [gossip.comm] func1 -> DEBU 1b57 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.857 UTC [gossip.comm] func1 -> DEBU 1b58 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.857 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.858 UTC [gossip.pull] HandleMessage -> DEBU 1b5a GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.858 UTC [gossip.comm] func1 -> DEBU 1b5b Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.858 UTC [gossip.gossip] handleMessage -> DEBU 1b5c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.859 UTC [gossip.gossip] handleMessage -> DEBU 1b5d Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.859 UTC [gossip.pull] HandleMessage -> DEBU 1b5e GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.859 UTC [gossip.gossip] handleMessage -> DEBU 1b5f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.860 UTC [gossip.gossip] handleMessage -> DEBU 1b60 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.860 UTC [gossip.pull] HandleMessage -> DEBU 1b61 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.860 UTC [gossip.gossip] handleMessage -> DEBU 1b62 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.874 UTC [gossip.comm] func1 -> DEBU 1b63 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.874 UTC [gossip.gossip] handleMessage -> DEBU 1b64 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.875 UTC [gossip.pull] HandleMessage -> DEBU 1b65 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.875 UTC [msp] DeserializeIdentity -> DEBU 1b66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b68 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.878 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b6b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:58.878 UTC [msp.identity] Sign -> DEBU 1b6c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101B " +peer0.org1.example.com | "2019-09-24 01:04:58.878 UTC [msp.identity] Sign -> DEBU 1b6d Sign: digest: A7D5B7C49335254EFD2C13660B952D6AB4B892CE143F8199690B3222AC3E8D2A " +peer0.org1.example.com | "2019-09-24 01:04:58.878 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b6e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [msp.identity] Sign -> DEBU 1b6f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [msp.identity] Sign -> DEBU 1b70 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [gossip.comm] Send -> DEBU 1b71 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b72 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [gossip.pull] SendDigest -> DEBU 1b73 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [gossip.gossip] handleMessage -> DEBU 1b74 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.879 UTC [msp] DeserializeIdentity -> DEBU 1b75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.880 UTC [gossip.comm] Send -> DEBU 1b76 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.880 UTC [msp] DeserializeIdentity -> DEBU 1b77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 1b78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 1b79 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.881 UTC [gossip.comm] Send -> DEBU 1b7a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.884 UTC [gossip.comm] func1 -> DEBU 1b7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.886 UTC [gossip.comm] func1 -> DEBU 1b80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.884 UTC [gossip.gossip] handleMessage -> DEBU 1b81 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.886 UTC [gossip.gossip] handleMessage -> DEBU 1b82 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.887 UTC [gossip.gossip] handleMessage -> DEBU 1b83 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.890 UTC [gossip.comm] func1 -> DEBU 1b84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.890 UTC [gossip.comm] func1 -> DEBU 1b85 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b87 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.891 UTC [msp.identity] Verify -> DEBU 1b88 Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +peer0.org1.example.com | 00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +peer0.org1.example.com | "2019-09-24 01:04:58.891 UTC [msp.identity] Verify -> DEBU 1b89 Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +peer0.org1.example.com | 00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +peer0.org1.example.com | 00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +peer0.org1.example.com | 00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +peer0.org1.example.com | 00000040 24 c8 a8 1c be f2 |$.....|" +peer0.org1.example.com | "2019-09-24 01:04:58.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.892 UTC [gossip.discovery] isSentByMe -> DEBU 1b8b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b8d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.895 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b8f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b90 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b91 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b92 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b93 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [cauthdsl] func1 -> DEBU 1b95 0xc003a1cbd0 gate 1569287098896727700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [cauthdsl] func2 -> DEBU 1b96 0xc003a1cbd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.896 UTC [cauthdsl] func2 -> DEBU 1b97 0xc003a1cbd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.897 UTC [cauthdsl] func2 -> DEBU 1b98 0xc003a1cbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:58.897 UTC [cauthdsl] func2 -> DEBU 1b99 0xc003a1cbd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.897 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc003a1cbd0 gate 1569287098896727700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc003a1d410 gate 1569287098898290100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc003a1d410 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc003a1d410 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc003a1d410 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.898 UTC [msp.identity] Verify -> DEBU 1ba2 Verify: digest = 00000000 d2 d2 d7 0c 52 e9 f1 6b 80 14 5e 13 4e 37 1d 6c |....R..k..^.N7.l| +peer0.org1.example.com | 00000010 f2 0d 66 aa 5c e6 12 6e be 52 93 0b cd cd f1 4e |..f.\..n.R.....N|" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [msp.identity] Verify -> DEBU 1ba3 Verify: sig = 00000000 30 44 02 20 0f 57 ae 46 82 65 fe eb cd 0f f0 ab |0D. .W.F.e......| +peer0.org1.example.com | 00000010 66 67 ea fe f1 50 a5 29 c0 92 8c 06 f9 05 00 d0 |fg...P.)........| +peer0.org1.example.com | 00000020 62 f2 1e 25 02 20 5e 86 06 59 b9 ff 1e 28 55 04 |b..%. ^..Y...(U.| +peer0.org1.example.com | 00000030 34 4f da b3 ec f5 5b dd f2 f2 1b 6e d4 df 2f 54 |4O....[....n../T| +peer0.org1.example.com | 00000040 07 33 4b 1b 0e 90 |.3K...|" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc003a1d410 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [cauthdsl] func1 -> DEBU 1ba5 0xc003a1d410 gate 1569287098898290100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1baa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bab Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bac Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.gossip] handleMessage -> DEBU 1bae Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.901 UTC [gossip.gossip] handleMessage -> DEBU 1baf Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bb0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +peer0.org1.example.com | 00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +peer0.org1.example.com | "2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +peer0.org1.example.com | 00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +peer0.org1.example.com | 00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +peer0.org1.example.com | 00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +peer0.org1.example.com | 00000040 24 c8 a8 1c be f2 |$.....|" +peer0.org1.example.com | "2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 b3 e8 bf f5 c0 79 4d db c2 53 12 |0E.!......yM..S.| +peer0.org1.example.com | 00000010 bd 11 28 22 1b f2 31 45 66 e7 ea 61 bc 4e 15 51 |..("..1Ef..a.N.Q| +peer0.org1.example.com | 00000020 30 0c ad 6b 70 02 20 17 10 da be a6 55 f1 8e b2 |0..kp. .....U...| +peer0.org1.example.com | 00000030 90 f9 9b bd a5 de d6 26 d2 f0 2c f0 fd 8d 91 79 |.......&..,....y| +peer0.org1.example.com | 00000040 15 d5 eb 2a d8 23 e6 |...*.#.|" +peer0.org1.example.com | "2019-09-24 01:04:58.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.903 UTC [gossip.discovery] isSentByMe -> DEBU 1bb6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb7 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bb8 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.904 UTC [gossip.gossip] handleMessage -> DEBU 1bb9 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.904 UTC [gossip.gossip] handleMessage -> DEBU 1bba Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bbc Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.906 UTC [msp.identity] Verify -> DEBU 1bbd Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +peer0.org1.example.com | 00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +peer0.org1.example.com | "2019-09-24 01:04:58.906 UTC [msp.identity] Verify -> DEBU 1bbe Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +peer0.org1.example.com | 00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +peer0.org1.example.com | 00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +peer0.org1.example.com | 00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +peer0.org1.example.com | 00000040 24 c8 a8 1c be f2 |$.....|" +peer0.org1.example.com | "2019-09-24 01:04:58.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.907 UTC [gossip.discovery] isSentByMe -> DEBU 1bc0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bc2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.910 UTC [msp] DeserializeIdentity -> DEBU 1bc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:58.911 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bc5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.911 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bc6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.911 UTC [policies] Evaluate -> DEBU 1bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.911 UTC [policies] Evaluate -> DEBU 1bc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [policies] Evaluate -> DEBU 1bc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func1 -> DEBU 1bca 0xc003ba6f40 gate 1569287098912328000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcb 0xc003ba6f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcc 0xc003ba6f40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcd 0xc003ba6f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bce 0xc003ba6f40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [cauthdsl] func1 -> DEBU 1bcf 0xc003ba6f40 gate 1569287098912328000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.912 UTC [policies] Evaluate -> DEBU 1bd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [policies] Evaluate -> DEBU 1bd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc003ba7780 gate 1569287098913285300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc003ba7780 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc003ba7780 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc003ba7780 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 fa e6 2c b4 91 91 2a 25 4e 0c 0d 07 cf 51 f4 0c |..,...*%N....Q..| +peer0.org1.example.com | 00000010 00 19 fb 8b ef 7e c8 30 13 61 3d fd 9b 2d 1b 63 |.....~.0.a=..-.c|" +peer0.org1.example.com | "2019-09-24 01:04:58.913 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 44 02 20 0e 4b d2 29 1c 9c 5e c9 2b d6 a6 4e |0D. .K.)..^.+..N| +peer0.org1.example.com | 00000010 6b ff 99 fc 06 f6 09 be c1 93 71 7d 36 e5 fc 18 |k.........q}6...| +peer0.org1.example.com | 00000020 eb 45 dd 50 02 20 40 d6 a9 8c 3b d7 ef 7e 6a 48 |.E.P. @...;..~jH| +peer0.org1.example.com | 00000030 0b 65 7a 80 ac f9 bc b0 ea 4f 7a a9 66 d5 74 0e |.ez......Oz.f.t.| +peer0.org1.example.com | 00000040 e2 da 70 5d 06 06 |..p]..|" +peer0.org1.example.com | "2019-09-24 01:04:58.914 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc003ba7780 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.914 UTC [cauthdsl] func1 -> DEBU 1bda 0xc003ba7780 gate 1569287098913285300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.915 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bdf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 1be0 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1be1 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.916 UTC [gossip.gossip] handleMessage -> DEBU 1be2 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1be3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1be4 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:58.917 UTC [msp] DeserializeIdentity -> DEBU 1be5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1be6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:58.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:58.921 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.921 UTC [policies] Evaluate -> DEBU 1bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:58.922 UTC [policies] Evaluate -> DEBU 1beb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.922 UTC [cauthdsl] func1 -> DEBU 1bec 0xc003d77330 gate 1569287098922116800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.922 UTC [cauthdsl] func2 -> DEBU 1bed 0xc003d77330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.922 UTC [cauthdsl] func2 -> DEBU 1bee 0xc003d77330 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003d77330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003d77330 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [cauthdsl] func1 -> DEBU 1bf1 0xc003d77330 gate 1569287098922116800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:58.924 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc003d77b70 gate 1569287098924457500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:58.926 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc003d77b70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:58.927 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc003d77b70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:58.927 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc003d77b70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.927 UTC [msp.identity] Verify -> DEBU 1bf9 Verify: digest = 00000000 4d f6 15 bd 1d 92 18 6f ce d3 f6 0a 13 d7 d5 5f |M......o......._| +peer0.org1.example.com | 00000010 69 ab af ea 96 5b c4 cc ad 43 fe e4 ad f9 66 e5 |i....[...C....f.|" +peer0.org1.example.com | "2019-09-24 01:04:58.927 UTC [msp.identity] Verify -> DEBU 1bfa Verify: sig = 00000000 30 44 02 20 5c 38 a4 51 b8 43 fa b1 e5 54 17 87 |0D. \8.Q.C...T..| +peer0.org1.example.com | 00000010 59 c8 aa 0e 5c 97 3a a5 30 16 f1 3d 00 64 01 0f |Y...\.:.0..=.d..| +peer0.org1.example.com | 00000020 30 f8 e8 d0 02 20 26 f2 8a 60 b3 39 48 c2 58 bc |0.... &..`.9H.X.| +peer0.org1.example.com | 00000030 6c ca 18 66 18 9d 0e 3b 35 44 40 ad 03 51 21 cd |l..f...;5D@..Q!.| +peer0.org1.example.com | 00000040 95 04 d2 4e ba cc |...N..|" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc003d77b70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [cauthdsl] func1 -> DEBU 1bfc 0xc003d77b70 gate 1569287098924457500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bfd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:58.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c01 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c02 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c03 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c04 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c05 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c06 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c07 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c08 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:58.930 UTC [gossip.discovery] sendMemResponse -> DEBU 1c09 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:04:58.930 UTC [msp] DeserializeIdentity -> DEBU 1c0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.930 UTC [msp] DeserializeIdentity -> DEBU 1c0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.931 UTC [msp] DeserializeIdentity -> DEBU 1c0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:58.931 UTC [gossip.comm] Send -> DEBU 1c0d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:58.931 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0e Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +peer0.org1.example.com | "2019-09-24 01:04:58.931 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:04:58.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1c10 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.163 UTC [gossip.comm] func1 -> DEBU 1c11 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.163 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.164 UTC [gossip.gossip] handleMessage -> DEBU 1c13 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c14 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c15 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:59.165 UTC [msp] DeserializeIdentity -> DEBU 1c16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c19 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:59.166 UTC [policies] Evaluate -> DEBU 1c1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.166 UTC [policies] Evaluate -> DEBU 1c1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:59.167 UTC [policies] Evaluate -> DEBU 1c1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.167 UTC [cauthdsl] func1 -> DEBU 1c1d 0xc003e51bb0 gate 1569287099167229900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003e51bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003e51bb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003e51bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:59.168 UTC [cauthdsl] func2 -> DEBU 1c21 0xc003e51bb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:59.168 UTC [cauthdsl] func1 -> DEBU 1c22 0xc003e51bb0 gate 1569287099167229900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c23 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [cauthdsl] func1 -> DEBU 1c26 0xc003f8e3f0 gate 1569287099169005900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003f8e3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003f8e3f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c29 0xc003f8e3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [msp.identity] Verify -> DEBU 1c2a Verify: digest = 00000000 1f e1 61 07 00 d4 6a 13 e1 c4 f4 a5 37 7f c1 ca |..a...j.....7...| +peer0.org1.example.com | 00000010 b8 5d ad 8b c7 7a a5 63 b5 db ea 53 6f d2 9c cb |.]...z.c...So...|" +peer0.org1.example.com | "2019-09-24 01:04:59.169 UTC [msp.identity] Verify -> DEBU 1c2b Verify: sig = 00000000 30 44 02 20 05 66 5b 85 f7 31 ec 1c f0 c2 89 02 |0D. .f[..1......| +peer0.org1.example.com | 00000010 a7 aa 25 93 d5 09 c6 f4 42 91 a2 58 05 bc b1 ff |..%.....B..X....| +peer0.org1.example.com | 00000020 5e 17 3f e1 02 20 6a 02 4b 09 44 f5 33 d4 d5 46 |^.?.. j.K.D.3..F| +peer0.org1.example.com | 00000030 02 08 24 fe 2c 13 dc 9d 88 5b 51 32 ca 4d b3 36 |..$.,....[Q2.M.6| +peer0.org1.example.com | 00000040 aa 54 cb 35 c9 56 |.T.5.V|" +peer0.org1.example.com | "2019-09-24 01:04:59.170 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc003f8e3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:59.170 UTC [cauthdsl] func1 -> DEBU 1c2d 0xc003f8e3f0 gate 1569287099169005900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c30 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.172 UTC [policies] Evaluate -> DEBU 1c31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.172 UTC [gossip.comm] func1 -> DEBU 1c32 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c34 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:59.173 UTC [gossip.gossip] handleMessage -> DEBU 1c36 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.173 UTC [gossip.comm] func1 -> DEBU 1c35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.175 UTC [gossip.comm] func1 -> DEBU 1c37 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c38 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:59.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c39 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:59.177 UTC [gossip.comm] func1 -> DEBU 1c3a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.177 UTC [gossip.comm] func1 -> DEBU 1c3b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c3c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:59.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c3d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.179 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c3e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3f Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.179 UTC [gossip.gossip] handleMessage -> DEBU 1c41 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.180 UTC [gossip.gossip] handleMessage -> DEBU 1c43 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.179 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c42 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:04:59.180 UTC [msp] DeserializeIdentity -> DEBU 1c45 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.180 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.181 UTC [msp] DeserializeIdentity -> DEBU 1c46 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.181 UTC [msp] DeserializeIdentity -> DEBU 1c47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c48 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:04:59.182 UTC [msp] DeserializeIdentity -> DEBU 1c49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:59.182 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [gossip.comm] Send -> DEBU 1c4e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c51 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.184 UTC [gossip.comm] Send -> DEBU 1c52 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [gossip.comm] sendToEndpoint -> DEBU 1c53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.184 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.183 UTC [policies] Evaluate -> DEBU 1c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.185 UTC [policies] Evaluate -> DEBU 1c55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:04:59.185 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.185 UTC [cauthdsl] func1 -> DEBU 1c58 0xc003e65eb0 gate 1569287099185492000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:59.185 UTC [cauthdsl] func2 -> DEBU 1c59 0xc003e65eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:59.186 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc003e65eb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:59.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1c56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.186 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc003e65eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:04:59.187 UTC [gossip.comm] sendToEndpoint -> DEBU 1c5c Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.190 UTC [cauthdsl] func2 -> DEBU 1c5d 0xc003e65eb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:59.191 UTC [cauthdsl] func1 -> DEBU 1c5e 0xc003e65eb0 gate 1569287099185492000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:04:59.191 UTC [policies] Evaluate -> DEBU 1c5f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.191 UTC [policies] Evaluate -> DEBU 1c60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [policies] Evaluate -> DEBU 1c61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [cauthdsl] func1 -> DEBU 1c62 0xc0028ec6f0 gate 1569287099192150700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c63 0xc0028ec6f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c64 0xc0028ec6f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c65 0xc0028ec6f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [msp.identity] Verify -> DEBU 1c66 Verify: digest = 00000000 d6 b7 32 91 35 1c 01 2b 8d 4e d1 49 aa 25 d9 51 |..2.5..+.N.I.%.Q| +peer0.org1.example.com | 00000010 d6 0f 2f 37 8d ce a2 62 e8 18 21 59 63 29 f6 e5 |../7...b..!Yc)..|" +peer0.org1.example.com | "2019-09-24 01:04:59.192 UTC [msp.identity] Verify -> DEBU 1c67 Verify: sig = 00000000 30 45 02 21 00 dd 6d 36 f8 cd 3a 1c 38 f4 f3 9c |0E.!..m6..:.8...| +peer0.org1.example.com | 00000010 fd 03 07 75 a4 60 b8 97 51 15 4f fd a1 ae 0e 67 |...u.`..Q.O....g| +peer0.org1.example.com | 00000020 34 93 a6 d7 a1 02 20 5a b9 a7 f9 79 ab 62 6c ad |4..... Z...y.bl.| +peer0.org1.example.com | 00000030 83 6a 65 80 ea 60 3e b5 9b 96 af 6a b6 07 46 58 |.je..`>....j..FX| +peer0.org1.example.com | 00000040 26 c1 ea 77 a4 e1 84 |&..w...|" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [cauthdsl] func2 -> DEBU 1c68 0xc0028ec6f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [cauthdsl] func1 -> DEBU 1c69 0xc0028ec6f0 gate 1569287099192150700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:04:59.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c6e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c70 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c71 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c72 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c73 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c74 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c75 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.gossip] handleMessage -> DEBU 1c76 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c77 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c78 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c79 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c7a Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c7b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c7c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c7d Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.198 UTC [gossip.gossip] handleMessage -> DEBU 1c7e Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.198 UTC [gossip.gossip] handleMessage -> DEBU 1c7f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c80 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c81 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.199 UTC [gossip.gossip] handleMessage -> DEBU 1c82 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c83 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c84 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.206 UTC [msp] DeserializeIdentity -> DEBU 1c85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.206 UTC [msp] DeserializeIdentity -> DEBU 1c86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.208 UTC [gossip.comm] Send -> DEBU 1c8b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.208 UTC [msp] DeserializeIdentity -> DEBU 1c8c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.208 UTC [msp] DeserializeIdentity -> DEBU 1c8d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.209 UTC [gossip.comm] Send -> DEBU 1c8e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.209 UTC [gossip.comm] sendToEndpoint -> DEBU 1c8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.209 UTC [gossip.comm] sendToEndpoint -> DEBU 1c90 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.210 UTC [gossip.comm] sendToEndpoint -> DEBU 1c91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.210 UTC [gossip.comm] sendToEndpoint -> DEBU 1c92 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c93 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:59.233 UTC [msp.identity] Sign -> DEBU 1c94 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101C " +peer0.org1.example.com | "2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c95 Sign: digest: 3BD934C528418AE7056BB4CE5E7219BAEBC27372ED51771AA0EEFA990448F6E6 " +peer0.org1.example.com | "2019-09-24 01:04:59.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c96 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c97 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c98 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:04:59.235 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1c99 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:04:59.240 UTC [msp] DeserializeIdentity -> DEBU 1c9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.240 UTC [msp] DeserializeIdentity -> DEBU 1c9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.241 UTC [msp] DeserializeIdentity -> DEBU 1c9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.241 UTC [gossip.comm] Send -> DEBU 1c9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.241 UTC [gossip.comm] Send -> DEBU 1c9e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.241 UTC [msp] DeserializeIdentity -> DEBU 1c9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca4 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca3 Exiting" +peer0.org1.example.com | "2019-09-24 01:04:59.242 UTC [gossip.comm] Send -> DEBU 1ca1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:04:59.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:04:59.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.689 UTC [msp] DeserializeIdentity -> DEBU 1ca7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.689 UTC [msp] DeserializeIdentity -> DEBU 1ca8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.690 UTC [gossip.comm] Send -> DEBU 1ca9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1caa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cad Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.692 UTC [gossip.comm] sendToEndpoint -> DEBU 1cae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1caf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.694 UTC [gossip.comm] func1 -> DEBU 1cb0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.694 UTC [gossip.gossip] handleMessage -> DEBU 1cb1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.695 UTC [msp.identity] Verify -> DEBU 1cb2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:01.696 UTC [msp.identity] Verify -> DEBU 1cb5 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:01.696 UTC [gossip.comm] func1 -> DEBU 1cb3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.696 UTC [gossip.comm] func1 -> DEBU 1cb4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.697 UTC [msp.identity] Verify -> DEBU 1cb6 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:01.697 UTC [msp.identity] Verify -> DEBU 1cb7 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:01.698 UTC [msp] DeserializeIdentity -> DEBU 1cb8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.698 UTC [msp] DeserializeIdentity -> DEBU 1cb9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cbb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cbc Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.699 UTC [cauthdsl] func1 -> DEBU 1cc0 0xc0038ccce0 gate 1569287101699924900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc1 0xc0038ccce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc2 0xc0038ccce0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc3 0xc0038ccce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc4 0xc0038ccce0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [cauthdsl] func1 -> DEBU 1cc5 0xc0038ccce0 gate 1569287101699924900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.700 UTC [policies] Evaluate -> DEBU 1cc6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.701 UTC [policies] Evaluate -> DEBU 1cc7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.701 UTC [policies] Evaluate -> DEBU 1cc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.701 UTC [cauthdsl] func1 -> DEBU 1cc9 0xc0038cd520 gate 1569287101701309900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.701 UTC [cauthdsl] func2 -> DEBU 1cca 0xc0038cd520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.701 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc0038cd520 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.702 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc0038cd520 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.702 UTC [msp.identity] Verify -> DEBU 1ccd Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:01.702 UTC [msp.identity] Verify -> DEBU 1cce Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:01.702 UTC [cauthdsl] func2 -> DEBU 1ccf 0xc0038cd520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.703 UTC [cauthdsl] func1 -> DEBU 1cd0 0xc0038cd520 gate 1569287101701309900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.704 UTC [msp] DeserializeIdentity -> DEBU 1cd5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.704 UTC [msp] DeserializeIdentity -> DEBU 1cd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.705 UTC [cauthdsl] func1 -> DEBU 1cdd 0xc0038dccf0 gate 1569287101705831400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1cde 0xc0038dccf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1cdf 0xc0038dccf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1ce0 0xc0038dccf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1ce1 0xc0038dccf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [cauthdsl] func1 -> DEBU 1ce2 0xc0038dccf0 gate 1569287101705831400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.706 UTC [policies] Evaluate -> DEBU 1ce3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.707 UTC [policies] Evaluate -> DEBU 1ce4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.707 UTC [policies] Evaluate -> DEBU 1ce5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.707 UTC [cauthdsl] func1 -> DEBU 1ce6 0xc0038dd530 gate 1569287101707537700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.707 UTC [cauthdsl] func2 -> DEBU 1ce7 0xc0038dd530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.707 UTC [cauthdsl] func2 -> DEBU 1ce8 0xc0038dd530 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.708 UTC [cauthdsl] func2 -> DEBU 1ce9 0xc0038dd530 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.708 UTC [msp.identity] Verify -> DEBU 1cea Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:01.708 UTC [msp.identity] Verify -> DEBU 1ceb Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:01.708 UTC [cauthdsl] func2 -> DEBU 1cec 0xc0038dd530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.708 UTC [cauthdsl] func1 -> DEBU 1ced 0xc0038dd530 gate 1569287101707537700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cf0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.709 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.710 UTC [gossip.gossip] handleMessage -> DEBU 1cf3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.714 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cf8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cf9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.720 UTC [policies] Evaluate -> DEBU 1cfa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.721 UTC [policies] Evaluate -> DEBU 1cfb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.721 UTC [policies] Evaluate -> DEBU 1cfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.721 UTC [cauthdsl] func1 -> DEBU 1cfd 0xc003c23040 gate 1569287101721497600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.721 UTC [cauthdsl] func2 -> DEBU 1cfe 0xc003c23040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.721 UTC [cauthdsl] func2 -> DEBU 1cff 0xc003c23040 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [cauthdsl] func2 -> DEBU 1d00 0xc003c23040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [cauthdsl] func2 -> DEBU 1d01 0xc003c23040 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [cauthdsl] func1 -> DEBU 1d02 0xc003c23040 gate 1569287101721497600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d03 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d05 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.723 UTC [cauthdsl] func1 -> DEBU 1d06 0xc003c23880 gate 1569287101723023200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d07 0xc003c23880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d08 0xc003c23880 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d09 0xc003c23880 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.723 UTC [msp.identity] Verify -> DEBU 1d0a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:01.724 UTC [msp.identity] Verify -> DEBU 1d0b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:01.725 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003c23880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.725 UTC [cauthdsl] func1 -> DEBU 1d0d 0xc003c23880 gate 1569287101723023200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.725 UTC [policies] Evaluate -> DEBU 1d0e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d0f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d10 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.727 UTC [msp.identity] Verify -> DEBU 1d12 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:01.727 UTC [msp.identity] Verify -> DEBU 1d13 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:01.728 UTC [msp.identity] Verify -> DEBU 1d14 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:01.728 UTC [msp.identity] Verify -> DEBU 1d15 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:01.729 UTC [msp] DeserializeIdentity -> DEBU 1d16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.729 UTC [msp] DeserializeIdentity -> DEBU 1d17 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d19 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d1a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.732 UTC [cauthdsl] func1 -> DEBU 1d1e 0xc003cbde90 gate 1569287101732001000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d1f 0xc003cbde90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d20 0xc003cbde90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d21 0xc003cbde90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.733 UTC [cauthdsl] func2 -> DEBU 1d22 0xc003cbde90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.733 UTC [cauthdsl] func1 -> DEBU 1d23 0xc003cbde90 gate 1569287101732001000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.733 UTC [policies] Evaluate -> DEBU 1d24 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.733 UTC [policies] Evaluate -> DEBU 1d25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.734 UTC [policies] Evaluate -> DEBU 1d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.734 UTC [cauthdsl] func1 -> DEBU 1d28 0xc003e946d0 gate 1569287101734937300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.734 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.735 UTC [msp] DeserializeIdentity -> DEBU 1d29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.736 UTC [gossip.pull] Hello -> DEBU 1d2a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:01.736 UTC [msp] DeserializeIdentity -> DEBU 1d2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.736 UTC [msp] DeserializeIdentity -> DEBU 1d2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.737 UTC [gossip.comm] Send -> DEBU 1d2d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:01.737 UTC [gossip.comm] sendToEndpoint -> DEBU 1d2e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.737 UTC [gossip.comm] sendToEndpoint -> DEBU 1d2f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.738 UTC [gossip.comm] func1 -> DEBU 1d30 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d31 0xc003e946d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d32 0xc003e946d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d33 0xc003e946d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [msp.identity] Verify -> DEBU 1d34 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [msp.identity] Verify -> DEBU 1d35 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [cauthdsl] func2 -> DEBU 1d36 0xc003e946d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [cauthdsl] func1 -> DEBU 1d37 0xc003e946d0 gate 1569287101734937300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d3a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.740 UTC [policies] Evaluate -> DEBU 1d3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.740 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.740 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.740 UTC [msp] DeserializeIdentity -> DEBU 1d3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.741 UTC [gossip.election] waitForInterrupt -> DEBU 1d3f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.741 UTC [gossip.election] IsLeader -> DEBU 1d40 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:01.741 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d41 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:01.741 UTC [msp.identity] Sign -> DEBU 1d42 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510081801 " +peer0.org1.example.com | "2019-09-24 01:05:01.742 UTC [msp.identity] Sign -> DEBU 1d43 Sign: digest: 3E1769C597F64C0C38E12DC81BBC2F1C30AF0836D6F44C7BBAABA67453513A15 " +peer0.org1.example.com | "2019-09-24 01:05:01.742 UTC [gossip.election] waitForInterrupt -> DEBU 1d44 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:01.741 UTC [msp] DeserializeIdentity -> DEBU 1d45 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.742 UTC [msp] DeserializeIdentity -> DEBU 1d46 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.743 UTC [gossip.comm] Send -> DEBU 1d4b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:01.744 UTC [msp] DeserializeIdentity -> DEBU 1d4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.744 UTC [msp] DeserializeIdentity -> DEBU 1d4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.744 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.744 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d51 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d52 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func1 -> DEBU 1d56 0xc0041321e0 gate 1569287101747123100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d57 0xc0041321e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d58 0xc0041321e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d59 0xc0041321e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d5a 0xc0041321e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.747 UTC [cauthdsl] func1 -> DEBU 1d5b 0xc0041321e0 gate 1569287101747123100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [cauthdsl] func1 -> DEBU 1d5f 0xc004132a20 gate 1569287101748503200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d60 0xc004132a20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d61 0xc004132a20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d62 0xc004132a20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.749 UTC [msp.identity] Verify -> DEBU 1d63 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:01.749 UTC [msp.identity] Verify -> DEBU 1d64 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:01.749 UTC [cauthdsl] func2 -> DEBU 1d65 0xc004132a20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.749 UTC [cauthdsl] func1 -> DEBU 1d66 0xc004132a20 gate 1569287101748503200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d67 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d69 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.751 UTC [msp.identity] Verify -> DEBU 1d6b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:01.751 UTC [msp.identity] Verify -> DEBU 1d6c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:01.751 UTC [msp] DeserializeIdentity -> DEBU 1d6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.751 UTC [msp] DeserializeIdentity -> DEBU 1d6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d70 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d71 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:01.752 UTC [policies] Evaluate -> DEBU 1d72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.752 UTC [policies] Evaluate -> DEBU 1d73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [policies] Evaluate -> DEBU 1d74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func1 -> DEBU 1d75 0xc0025f0910 gate 1569287101753217700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d76 0xc0025f0910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d77 0xc0025f0910 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d78 0xc0025f0910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d79 0xc0025f0910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.753 UTC [cauthdsl] func1 -> DEBU 1d7a 0xc0025f0910 gate 1569287101753217700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [cauthdsl] func1 -> DEBU 1d7e 0xc0025f1150 gate 1569287101754665800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [cauthdsl] func2 -> DEBU 1d7f 0xc0025f1150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:01.754 UTC [cauthdsl] func2 -> DEBU 1d80 0xc0025f1150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:01.755 UTC [cauthdsl] func2 -> DEBU 1d81 0xc0025f1150 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.755 UTC [msp.identity] Verify -> DEBU 1d82 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:01.756 UTC [msp.identity] Verify -> DEBU 1d83 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:01.756 UTC [cauthdsl] func2 -> DEBU 1d84 0xc0025f1150 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:01.756 UTC [cauthdsl] func1 -> DEBU 1d85 0xc0025f1150 gate 1569287101754665800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d88 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.758 UTC [policies] Evaluate -> DEBU 1d89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:01.758 UTC [msp.identity] Verify -> DEBU 1d8a Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:01.758 UTC [msp.identity] Verify -> DEBU 1d8b Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:01.758 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.759 UTC [gossip.gossip] handleMessage -> DEBU 1d8d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.759 UTC [gossip.pull] HandleMessage -> DEBU 1d8e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.759 UTC [gossip.gossip] handleMessage -> DEBU 1d8f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.832 UTC [gossip.comm] func1 -> DEBU 1d90 Got message: GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.832 UTC [gossip.gossip] handleMessage -> DEBU 1d91 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.832 UTC [gossip.gossip] handleMessage -> DEBU 1d92 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d93 Got message: GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d94 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d95 Verify: digest = 00000000 ec 01 a5 82 65 90 de ba a6 5c 3b 74 b5 af cb bf |....e....\;t....| +peer0.org1.example.com | 00000010 2b 09 d9 a4 fb 35 19 91 45 94 33 9e d1 c9 91 6b |+....5..E.3....k|" +peer0.org1.example.com | "2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d96 Verify: sig = 00000000 30 45 02 21 00 ba 27 79 5f af ed 9c 41 c8 ef 58 |0E.!..'y_...A..X| +peer0.org1.example.com | 00000010 a4 c4 7a 10 4e 92 1a e9 bd e6 7e 66 f9 51 51 2b |..z.N.....~f.QQ+| +peer0.org1.example.com | 00000020 d5 3b 46 db a8 02 20 17 e8 ad a9 b1 61 f3 c1 1d |.;F... .....a...| +peer0.org1.example.com | 00000030 16 53 75 6f c6 56 92 8f 8c c9 d6 5d a6 b5 17 58 |.Suo.V.....]...X| +peer0.org1.example.com | 00000040 af 56 7d ce 71 f4 87 |.V}.q..|" +peer0.org1.example.com | "2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d97 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d98 Verify: sig = 00000000 30 44 02 20 16 76 8e 25 d8 da 9c a2 4e 74 59 ae |0D. .v.%....NtY.| +peer0.org1.example.com | 00000010 bb d1 de c1 ce 88 da fd 35 08 73 6c c1 1e 64 1d |........5.sl..d.| +peer0.org1.example.com | 00000020 b6 58 d0 c4 02 20 20 da ce 75 4d 46 0f 51 db e4 |.X... ..uMF.Q..| +peer0.org1.example.com | 00000030 06 69 ec 88 39 8a 88 71 56 c1 4a fb 95 d1 27 56 |.i..9..qV.J...'V| +peer0.org1.example.com | 00000040 7a b1 f7 08 eb f7 |z.....|" +peer0.org1.example.com | "2019-09-24 01:05:01.835 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d99 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.835 UTC [gossip.discovery] sendMemResponse -> DEBU 1d9a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:01.835 UTC [msp] DeserializeIdentity -> DEBU 1d9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.836 UTC [msp] DeserializeIdentity -> DEBU 1d9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.836 UTC [gossip.comm] Send -> DEBU 1d9d Entering, sending GossipMessage: Channel: , nonce: 9607930029945762733, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:01.836 UTC [gossip.discovery] sendMemResponse -> DEBU 1d9e Exiting, replying with alive: alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +peer0.org1.example.com | "2019-09-24 01:05:01.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9607930029945762733, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1da0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.872 UTC [gossip.comm] func1 -> DEBU 1da1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.872 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.873 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.873 UTC [msp] DeserializeIdentity -> DEBU 1da4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:01.873 UTC [gossip.gossip] handleMessage -> DEBU 1da5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:01.891 UTC [gossip.comm] func1 -> DEBU 1da6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.892 UTC [gossip.gossip] handleMessage -> DEBU 1da7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.892 UTC [gossip.pull] HandleMessage -> DEBU 1da8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:01.892 UTC [gossip.pull] SendDigest -> DEBU 1da9 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:01.893 UTC [gossip.gossip] handleMessage -> DEBU 1daa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.079 UTC [gossip.comm] func1 -> DEBU 1dab Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.079 UTC [gossip.gossip] handleMessage -> DEBU 1dac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.079 UTC [msp] DeserializeIdentity -> DEBU 1dad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.080 UTC [msp] DeserializeIdentity -> DEBU 1dae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.080 UTC [msp] DeserializeIdentity -> DEBU 1daf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.080 UTC [gossip.gossip] handleMessage -> DEBU 1db0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.276 UTC [gossip.comm] func1 -> DEBU 1db1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.276 UTC [gossip.gossip] handleMessage -> DEBU 1db2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.276 UTC [msp] DeserializeIdentity -> DEBU 1db3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.276 UTC [msp] DeserializeIdentity -> DEBU 1db4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.277 UTC [msp] DeserializeIdentity -> DEBU 1db5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.277 UTC [gossip.gossip] handleMessage -> DEBU 1db6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.505 UTC [gossip.comm] func1 -> DEBU 1db7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.505 UTC [gossip.gossip] handleMessage -> DEBU 1db8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.506 UTC [gossip.pull] HandleMessage -> DEBU 1db9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.506 UTC [gossip.pull] SendDigest -> DEBU 1dba Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:02.506 UTC [gossip.gossip] handleMessage -> DEBU 1dbb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.508 UTC [gossip.comm] func1 -> DEBU 1dbc Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.508 UTC [gossip.gossip] handleMessage -> DEBU 1dbd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.509 UTC [gossip.gossip] handleMessage -> DEBU 1dbe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.509 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dbf Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.510 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.510 UTC [msp.identity] Verify -> DEBU 1dc1 Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +peer0.org1.example.com | 00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +peer0.org1.example.com | "2019-09-24 01:05:02.510 UTC [msp.identity] Verify -> DEBU 1dc2 Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1dc3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:02.511 UTC [msp.identity] Verify -> DEBU 1dc4 Verify: sig = 00000000 30 44 02 20 59 86 17 73 e7 af 2d c7 5d 06 fb 28 |0D. Y..s..-.]..(| +peer0.org1.example.com | 00000010 39 f3 00 ab 59 5b fd 58 71 98 5b 64 55 f9 69 71 |9...Y[.Xq.[dU.iq| +peer0.org1.example.com | 00000020 e8 9e 51 97 02 20 26 b3 17 9a a7 64 ee 1f c0 86 |..Q.. &....d....| +peer0.org1.example.com | 00000030 9f d2 0d db e2 67 10 47 77 d9 33 a7 45 b3 cb 70 |.....g.Gw.3.E..p| +peer0.org1.example.com | 00000040 2d 46 4f ba 87 54 |-FO..T|" +peer0.org1.example.com | "2019-09-24 01:05:02.511 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.511 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:02.511 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc7 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc8 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dca Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.512 UTC [gossip.discovery] sendMemResponse -> DEBU 1dcd Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:02.513 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.514 UTC [msp] DeserializeIdentity -> DEBU 1dcf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.514 UTC [gossip.comm] Send -> DEBU 1dd0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.515 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.515 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.515 UTC [gossip.discovery] sendMemResponse -> DEBU 1dd3 Exiting, replying with alive: > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +peer0.org1.example.com | "2019-09-24 01:05:02.809 UTC [gossip.comm] func1 -> DEBU 1dd4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.810 UTC [gossip.gossip] handleMessage -> DEBU 1dd5 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.810 UTC [gossip.pull] HandleMessage -> DEBU 1dd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.810 UTC [msp] DeserializeIdentity -> DEBU 1dd7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dd8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dd9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dda Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.812 UTC [msp] DeserializeIdentity -> DEBU 1ddb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.812 UTC [msp] DeserializeIdentity -> DEBU 1ddc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.812 UTC [gossip.pull] SendDigest -> DEBU 1ddd Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:02.812 UTC [gossip.gossip] handleMessage -> DEBU 1dde Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.817 UTC [gossip.comm] func1 -> DEBU 1ddf Got message: GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.818 UTC [gossip.gossip] handleMessage -> DEBU 1de0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.819 UTC [gossip.gossip] handleMessage -> DEBU 1de1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1de2 Got message: GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1de3 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.819 UTC [msp] DeserializeIdentity -> DEBU 1de4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1de8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1de9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.821 UTC [cauthdsl] func1 -> DEBU 1deb 0xc0031917d0 gate 1569287102821237700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1dec 0xc0031917d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1ded 0xc0031917d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1dee 0xc0031917d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1def 0xc0031917d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [cauthdsl] func1 -> DEBU 1df0 0xc0031917d0 gate 1569287102821237700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [cauthdsl] func1 -> DEBU 1df4 0xc0034b6010 gate 1569287102822753900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.822 UTC [cauthdsl] func2 -> DEBU 1df5 0xc0034b6010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1df6 0xc0034b6010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1df7 0xc0034b6010 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +peer0.org1.example.com | 00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +peer0.org1.example.com | 00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +peer0.org1.example.com | 00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +peer0.org1.example.com | 00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +peer0.org1.example.com | 00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc0034b6010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.823 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc0034b6010 gate 1569287102822753900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e00 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e01 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e02 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e03 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e04 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:02.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e05 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e06 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.826 UTC [gossip.discovery] sendMemResponse -> DEBU 1e07 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.828 UTC [gossip.comm] Send -> DEBU 1e0b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.828 UTC [gossip.discovery] sendMemResponse -> DEBU 1e0c Exiting, replying with alive: alive:\265\233\226\257j\266\007FX&\301\352w\244\341\204" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +peer0.org1.example.com | "2019-09-24 01:05:02.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.826 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.855 UTC [gossip.pull] Hello -> DEBU 1e10 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:02.856 UTC [gossip.comm] Send -> DEBU 1e11 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.857 UTC [gossip.comm] sendToEndpoint -> DEBU 1e12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.857 UTC [gossip.comm] sendToEndpoint -> DEBU 1e14 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.857 UTC [gossip.pull] Hello -> DEBU 1e13 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:02.858 UTC [gossip.comm] Send -> DEBU 1e15 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.859 UTC [gossip.comm] func1 -> DEBU 1e16 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.859 UTC [gossip.comm] sendToEndpoint -> DEBU 1e18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.859 UTC [gossip.comm] sendToEndpoint -> DEBU 1e19 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.860 UTC [gossip.gossip] handleMessage -> DEBU 1e1a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.860 UTC [gossip.pull] HandleMessage -> DEBU 1e1b GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.859 UTC [gossip.pull] Hello -> DEBU 1e17 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:02.861 UTC [gossip.comm] Send -> DEBU 1e1c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.861 UTC [gossip.gossip] handleMessage -> DEBU 1e1d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.861 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.861 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.862 UTC [gossip.comm] func1 -> DEBU 1e20 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.862 UTC [gossip.gossip] handleMessage -> DEBU 1e21 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.862 UTC [gossip.pull] HandleMessage -> DEBU 1e22 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.862 UTC [gossip.gossip] handleMessage -> DEBU 1e23 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.863 UTC [gossip.comm] func1 -> DEBU 1e24 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.863 UTC [gossip.gossip] handleMessage -> DEBU 1e25 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.863 UTC [gossip.pull] HandleMessage -> DEBU 1e26 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.863 UTC [gossip.gossip] handleMessage -> DEBU 1e27 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.876 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.876 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.877 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.879 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:02.880 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.882 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e33 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:02.882 UTC [msp.identity] Sign -> DEBU 1e34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101D " +peer0.org1.example.com | "2019-09-24 01:05:02.882 UTC [msp.identity] Sign -> DEBU 1e35 Sign: digest: 113328036A796C8E3A7C01359F48116BE9FEFD8A5EACA8B5B65CE47554B5A397 " +peer0.org1.example.com | "2019-09-24 01:05:02.883 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e36 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:02.883 UTC [msp.identity] Sign -> DEBU 1e37 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:02.883 UTC [msp.identity] Sign -> DEBU 1e38 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:02.884 UTC [gossip.comm] Send -> DEBU 1e39 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.884 UTC [msp] DeserializeIdentity -> DEBU 1e3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.884 UTC [gossip.comm] Send -> DEBU 1e3b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.884 UTC [msp] DeserializeIdentity -> DEBU 1e3c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.885 UTC [gossip.comm] Send -> DEBU 1e3d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.885 UTC [gossip.comm] sendToEndpoint -> DEBU 1e3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.885 UTC [gossip.comm] sendToEndpoint -> DEBU 1e3f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e40 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e41 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e42 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e43 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.888 UTC [gossip.comm] func1 -> DEBU 1e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.894 UTC [gossip.gossip] handleMessage -> DEBU 1e45 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.894 UTC [gossip.gossip] handleMessage -> DEBU 1e46 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e48 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.894 UTC [msp.identity] Verify -> DEBU 1e49 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +peer0.org1.example.com | 00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +peer0.org1.example.com | "2019-09-24 01:05:02.895 UTC [msp.identity] Verify -> DEBU 1e4a Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +peer0.org1.example.com | 00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +peer0.org1.example.com | 00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +peer0.org1.example.com | 00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +peer0.org1.example.com | 00000040 c8 5c 19 95 96 df bb |.\.....|" +peer0.org1.example.com | "2019-09-24 01:05:02.895 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.895 UTC [gossip.discovery] isSentByMe -> DEBU 1e4c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.895 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e4e Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.896 UTC [msp.identity] Verify -> DEBU 1e4f Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +peer0.org1.example.com | 00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +peer0.org1.example.com | "2019-09-24 01:05:02.896 UTC [msp.identity] Verify -> DEBU 1e50 Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1e51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e52 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e53 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.897 UTC [gossip.comm] func1 -> DEBU 1e54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.897 UTC [gossip.gossip] handleMessage -> DEBU 1e55 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.897 UTC [gossip.gossip] handleMessage -> DEBU 1e56 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.898 UTC [gossip.comm] func1 -> DEBU 1e58 Got message: GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.898 UTC [gossip.comm] func1 -> DEBU 1e5a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.898 UTC [gossip.gossip] handleMessage -> DEBU 1e5b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e59 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.899 UTC [msp.identity] Verify -> DEBU 1e5c Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +peer0.org1.example.com | 00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +peer0.org1.example.com | "2019-09-24 01:05:02.899 UTC [msp.identity] Verify -> DEBU 1e5d Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +peer0.org1.example.com | 00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +peer0.org1.example.com | 00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +peer0.org1.example.com | 00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +peer0.org1.example.com | 00000040 c8 5c 19 95 96 df bb |.\.....|" +peer0.org1.example.com | "2019-09-24 01:05:02.900 UTC [msp.identity] Verify -> DEBU 1e5e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:02.900 UTC [msp.identity] Verify -> DEBU 1e5f Verify: sig = 00000000 30 45 02 21 00 e6 85 b4 aa c5 c3 f7 7a 44 fd 27 |0E.!........zD.'| +peer0.org1.example.com | 00000010 22 d8 e9 08 20 ab 53 ac 5d 19 32 21 7c 93 75 57 |"... .S.].2!|.uW| +peer0.org1.example.com | 00000020 ac 88 12 d8 dd 02 20 14 a1 39 da 93 d9 57 17 7d |...... ..9...W.}| +peer0.org1.example.com | 00000030 4d d2 28 14 43 9d c4 dc f5 1e d3 a6 f2 f9 1c f1 |M.(.C...........| +peer0.org1.example.com | 00000040 1e 05 9a 23 8e f6 48 |...#..H|" +peer0.org1.example.com | "2019-09-24 01:05:02.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e60 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.901 UTC [gossip.discovery] isSentByMe -> DEBU 1e61 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e62 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e63 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e64 Got message: GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e65 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.902 UTC [msp] DeserializeIdentity -> DEBU 1e66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e67 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:02.903 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e68 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.903 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e69 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.908 UTC [policies] Evaluate -> DEBU 1e6a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.909 UTC [policies] Evaluate -> DEBU 1e6b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:02.909 UTC [policies] Evaluate -> DEBU 1e6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.909 UTC [gossip.gossip] handleMessage -> DEBU 1e6d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.910 UTC [gossip.gossip] handleMessage -> DEBU 1e6f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.909 UTC [cauthdsl] func1 -> DEBU 1e6e 0xc00249fca0 gate 1569287102909533500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.910 UTC [cauthdsl] func2 -> DEBU 1e70 0xc00249fca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.910 UTC [cauthdsl] func2 -> DEBU 1e71 0xc00249fca0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e72 0xc00249fca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e73 0xc00249fca0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [cauthdsl] func1 -> DEBU 1e74 0xc00249fca0 gate 1569287102909533500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e75 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [cauthdsl] func1 -> DEBU 1e78 0xc002487040 gate 1569287102911528200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e79 0xc002487040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.912 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc002487040 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.912 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc002487040 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.912 UTC [msp.identity] Verify -> DEBU 1e7c Verify: digest = 00000000 0f 7e 9c c8 61 82 b2 2d 31 6f 26 7f 38 5f a8 ed |.~..a..-1o&.8_..| +peer0.org1.example.com | 00000010 3c 1b 95 d0 39 ca 65 79 ab f3 95 5d a4 e9 17 24 |<...9.ey...]...$|" +peer0.org1.example.com | "2019-09-24 01:05:02.912 UTC [msp.identity] Verify -> DEBU 1e7d Verify: sig = 00000000 30 44 02 20 0f 0f 11 87 58 a5 c4 25 ed 95 d8 d4 |0D. ....X..%....| +peer0.org1.example.com | 00000010 48 e4 45 c7 80 4a 21 7d 3d 3d d6 e0 4a 44 39 ce |H.E..J!}==..JD9.| +peer0.org1.example.com | 00000020 cc 10 a5 5c 02 20 4a 74 e9 4c 44 ba 76 21 3e bf |...\. Jt.LD.v!>.| +peer0.org1.example.com | 00000030 67 c1 42 2d 8b 62 64 d6 b5 1d b4 6e f2 07 e6 ac |g.B-.bd....n....| +peer0.org1.example.com | 00000040 a1 87 f6 1b e3 82 |......|" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [cauthdsl] func2 -> DEBU 1e7e 0xc002487040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [cauthdsl] func1 -> DEBU 1e7f 0xc002487040 gate 1569287102911528200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e82 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e84 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e85 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e86 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e87 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e88 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:02.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e89 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e8a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e8b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.920 UTC [gossip.discovery] sendMemResponse -> DEBU 1e8c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:02.920 UTC [msp] DeserializeIdentity -> DEBU 1e8d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [msp] DeserializeIdentity -> DEBU 1e8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [msp] DeserializeIdentity -> DEBU 1e8f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [gossip.comm] Send -> DEBU 1e90 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1e91 Exiting, replying with alive: alive:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1e92 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1e93 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.922 UTC [gossip.gossip] handleMessage -> DEBU 1e94 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e96 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [msp.identity] Verify -> DEBU 1e97 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +peer0.org1.example.com | 00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [msp.identity] Verify -> DEBU 1e98 Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +peer0.org1.example.com | 00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +peer0.org1.example.com | 00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +peer0.org1.example.com | 00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +peer0.org1.example.com | 00000040 c8 5c 19 95 96 df bb |.\.....|" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [gossip.discovery] isSentByMe -> DEBU 1e9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e9b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e9c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.924 UTC [msp] DeserializeIdentity -> DEBU 1e9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e9f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [cauthdsl] func1 -> DEBU 1ea4 0xc0027d9bb0 gate 1569287102925725400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.925 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc0027d9bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea6 0xc0027d9bb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea7 0xc0027d9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc0027d9bb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc0027d9bb0 gate 1569287102925725400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:02.926 UTC [cauthdsl] func1 -> DEBU 1ead 0xc0029be3f0 gate 1569287102926674100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eae 0xc0029be3f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc0029be3f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eb0 0xc0029be3f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [msp.identity] Verify -> DEBU 1eb1 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +peer0.org1.example.com | 00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +peer0.org1.example.com | 00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +peer0.org1.example.com | 00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +peer0.org1.example.com | 00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +peer0.org1.example.com | 00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [cauthdsl] func2 -> DEBU 1eb3 0xc0029be3f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [cauthdsl] func1 -> DEBU 1eb4 0xc0029be3f0 gate 1569287102926674100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.930 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.931 UTC [policies] Evaluate -> DEBU 1eb7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.931 UTC [policies] Evaluate -> DEBU 1eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:02.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1eb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1eba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ebb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:02.932 UTC [msp.identity] Verify -> DEBU 1ebc Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +peer0.org1.example.com | 00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +peer0.org1.example.com | "2019-09-24 01:05:02.932 UTC [msp.identity] Verify -> DEBU 1ebd Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1ebe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:02.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ebf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:02.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.487 UTC [gossip.comm] func1 -> DEBU 1ec1 Got message: GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.487 UTC [gossip.gossip] handleMessage -> DEBU 1ec2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.488 UTC [gossip.gossip] handleMessage -> DEBU 1ec3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.488 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec4 Got message: GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.488 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ec5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:03.488 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ec7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ec8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ec9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1eca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1ecb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1ecc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.490 UTC [cauthdsl] func1 -> DEBU 1ecd 0xc0027dd6a0 gate 1569287103490191000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ece 0xc0027dd6a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc0027dd6a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ed0 0xc0027dd6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [cauthdsl] func2 -> DEBU 1ed1 0xc0027dd6a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [cauthdsl] func1 -> DEBU 1ed2 0xc0027dd6a0 gate 1569287103490191000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.491 UTC [cauthdsl] func1 -> DEBU 1ed6 0xc0027ddee0 gate 1569287103491915600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed7 0xc0027ddee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed8 0xc0027ddee0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed9 0xc0027ddee0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:03.492 UTC [msp.identity] Verify -> DEBU 1eda Verify: digest = 00000000 3f 53 d2 95 c9 07 69 47 ae 84 7a 52 0e b4 2d ee |?S....iG..zR..-.| +peer0.org1.example.com | 00000010 cf 63 96 b8 e3 ce c9 a6 06 77 1f 68 53 78 bf a0 |.c.......w.hSx..|" +peer0.org1.example.com | "2019-09-24 01:05:03.492 UTC [msp.identity] Verify -> DEBU 1edb Verify: sig = 00000000 30 45 02 21 00 9e a3 7b 46 de 9d a7 47 41 83 73 |0E.!...{F...GA.s| +peer0.org1.example.com | 00000010 e9 68 b9 5c 51 2e 3d 34 18 55 4e 6b da ae 59 7d |.h.\Q.=4.UNk..Y}| +peer0.org1.example.com | 00000020 b4 be 27 8e e2 02 20 6e 62 9a 71 5e 32 ac 84 93 |..'... nb.q^2...| +peer0.org1.example.com | 00000030 d1 6c 2e 3a cd 90 27 9f e0 e3 99 d2 85 2a 9a 6d |.l.:..'......*.m| +peer0.org1.example.com | 00000040 29 a0 5d 13 c2 79 48 |).]..yH|" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [cauthdsl] func2 -> DEBU 1edc 0xc0027ddee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [cauthdsl] func1 -> DEBU 1edd 0xc0027ddee0 gate 1569287103491915600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ede Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1edf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ee0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ee1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.494 UTC [gossip.discovery] sendMemResponse -> DEBU 1ee2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.495 UTC [gossip.comm] Send -> DEBU 1ee6 Entering, sending GossipMessage: Channel: , nonce: 9012046223815031437, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:03.495 UTC [gossip.discovery] sendMemResponse -> DEBU 1ee7 Exiting, replying with alive:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive: alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +peer0.org1.example.com | "2019-09-24 01:05:03.495 UTC [gossip.comm] sendToEndpoint -> DEBU 1ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9012046223815031437, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.495 UTC [gossip.comm] sendToEndpoint -> DEBU 1ee9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.494 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eea Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.552 UTC [gossip.comm] func1 -> DEBU 1eeb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.552 UTC [gossip.gossip] handleMessage -> DEBU 1eec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.552 UTC [gossip.gossip] handleMessage -> DEBU 1eed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eee Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1eef Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:03.553 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: digest = 00000000 a3 69 cc 15 b6 d1 81 fa db 34 e6 c1 58 65 63 70 |.i.......4..Xecp| +peer0.org1.example.com | 00000010 68 dc 8d 1c cd 05 0a 2e e6 5d 1c 04 b4 42 4c 68 |h........]...BLh|" +peer0.org1.example.com | "2019-09-24 01:05:03.553 UTC [msp.identity] Verify -> DEBU 1ef1 Verify: sig = 00000000 30 45 02 21 00 c8 a1 c1 85 4a fb 07 5d 53 50 c7 |0E.!.....J..]SP.| +peer0.org1.example.com | 00000010 7f 71 7f 92 de 7e a8 47 fa e7 06 f1 4b 19 02 48 |.q...~.G....K..H| +peer0.org1.example.com | 00000020 bb 6d ec 7f 84 02 20 5a 64 39 24 0b c2 45 50 a9 |.m.... Zd9$..EP.| +peer0.org1.example.com | 00000030 00 24 e2 27 c7 4b ee b0 49 8d 8f a6 e4 0b 0a 30 |.$.'.K..I......0| +peer0.org1.example.com | 00000040 f0 bc 05 3c 87 38 a7 |...<.8.|" +peer0.org1.example.com | "2019-09-24 01:05:03.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:03.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.555 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ef9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.560 UTC [gossip.comm] func1 -> DEBU 1efa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.560 UTC [gossip.gossip] handleMessage -> DEBU 1efb Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.560 UTC [gossip.gossip] handleMessage -> DEBU 1efc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.561 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.561 UTC [gossip.comm] func1 -> DEBU 1eff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.562 UTC [gossip.gossip] handleMessage -> DEBU 1f00 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.562 UTC [gossip.gossip] handleMessage -> DEBU 1f01 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f03 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [gossip.comm] Send -> DEBU 1f07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1f09 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.564 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.564 UTC [gossip.comm] Send -> DEBU 1f0a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:03.564 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.635 UTC [msp] DeserializeIdentity -> DEBU 1f0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.636 UTC [gossip.comm] Send -> DEBU 1f0f Entering, sending GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:03.636 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.636 UTC [gossip.comm] sendToEndpoint -> DEBU 1f11 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.638 UTC [gossip.comm] func1 -> DEBU 1f12 Got message: GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.638 UTC [gossip.gossip] handleMessage -> DEBU 1f13 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.639 UTC [gossip.gossip] handleMessage -> DEBU 1f14 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f15 Got message: GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.639 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f16 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:03.640 UTC [msp.identity] Verify -> DEBU 1f17 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +peer0.org1.example.com | 00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +peer0.org1.example.com | "2019-09-24 01:05:03.640 UTC [msp.identity] Verify -> DEBU 1f18 Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +peer0.org1.example.com | 00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +peer0.org1.example.com | 00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +peer0.org1.example.com | 00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +peer0.org1.example.com | 00000040 c8 5c 19 95 96 df bb |.\.....|" +peer0.org1.example.com | "2019-09-24 01:05:03.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f19 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.640 UTC [gossip.discovery] isSentByMe -> DEBU 1f1a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.641 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f1b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.641 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f1c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:03.641 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:03.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:03.641 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:03.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00033bfd0 gate 1569287103643003200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00033bfd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00033bfd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00033bfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00033bfd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00033bfd0 gate 1569287103643003200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc0027ae810 gate 1569287103643868100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc0027ae810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc0027ae810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f30 0xc0027ae810 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:03.644 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +peer0.org1.example.com | 00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +peer0.org1.example.com | "2019-09-24 01:05:03.644 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +peer0.org1.example.com | 00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +peer0.org1.example.com | 00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +peer0.org1.example.com | 00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +peer0.org1.example.com | 00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [cauthdsl] func2 -> DEBU 1f33 0xc0027ae810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [cauthdsl] func1 -> DEBU 1f34 0xc0027ae810 gate 1569287103643868100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:03.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f39 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:03.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f3a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:03.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f3b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.173 UTC [gossip.comm] func1 -> DEBU 1f3c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.174 UTC [gossip.gossip] handleMessage -> DEBU 1f3e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.173 UTC [gossip.comm] func1 -> DEBU 1f3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f3f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f40 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:04.175 UTC [msp] DeserializeIdentity -> DEBU 1f41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f44 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f45 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.176 UTC [cauthdsl] func1 -> DEBU 1f49 0xc0028244d0 gate 1569287104176625400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:04.174 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.176 UTC [cauthdsl] func2 -> DEBU 1f4a 0xc0028244d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:04.177 UTC [gossip.gossip] handleMessage -> DEBU 1f4b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.177 UTC [cauthdsl] func2 -> DEBU 1f4c 0xc0028244d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:04.177 UTC [cauthdsl] func2 -> DEBU 1f4d 0xc0028244d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [cauthdsl] func2 -> DEBU 1f4e 0xc0028244d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [cauthdsl] func1 -> DEBU 1f4f 0xc0028244d0 gate 1569287104176625400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.178 UTC [cauthdsl] func1 -> DEBU 1f53 0xc002824e20 gate 1569287104178943200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f54 0xc002824e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f55 0xc002824e20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f56 0xc002824e20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:04.179 UTC [msp.identity] Verify -> DEBU 1f57 Verify: digest = 00000000 03 ef 90 7e 65 c9 e7 2a 83 6a 02 30 53 c1 4d fe |...~e..*.j.0S.M.| +peer0.org1.example.com | 00000010 f8 85 9a 15 7f ed 8e c0 85 82 40 49 2a 2a 72 22 |..........@I**r"|" +peer0.org1.example.com | "2019-09-24 01:05:04.179 UTC [msp.identity] Verify -> DEBU 1f58 Verify: sig = 00000000 30 45 02 21 00 d4 19 53 02 b5 d4 86 8f ff 8d 0c |0E.!...S........| +peer0.org1.example.com | 00000010 22 a7 8a ce 58 88 86 5d c5 a6 e7 86 07 15 0c ba |"...X..]........| +peer0.org1.example.com | 00000020 d8 f9 b5 c0 2e 02 20 01 f5 c4 26 27 32 d0 7a 88 |...... ...&'2.z.| +peer0.org1.example.com | 00000030 6b e6 1f 82 30 b1 9d f6 44 49 f3 13 f5 67 3c 46 |k...0...DI...g DEBU 1f59 0xc002824e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:04.181 UTC [cauthdsl] func1 -> DEBU 1f5a 0xc002824e20 gate 1569287104178943200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:04.182 UTC [policies] Evaluate -> DEBU 1f5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.184 UTC [policies] Evaluate -> DEBU 1f5f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.185 UTC [policies] Evaluate -> DEBU 1f60 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.182 UTC [gossip.comm] func1 -> DEBU 1f5b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.184 UTC [gossip.comm] func1 -> DEBU 1f5d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.184 UTC [gossip.comm] func1 -> DEBU 1f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.185 UTC [policies] Evaluate -> DEBU 1f61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.185 UTC [gossip.comm] func1 -> DEBU 1f62 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f64 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f65 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f66 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f67 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f68 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f69 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.187 UTC [gossip.gossip] handleMessage -> DEBU 1f6c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.187 UTC [gossip.gossip] handleMessage -> DEBU 1f6e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f6f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:04.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:04.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f75 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.191 UTC [msp] DeserializeIdentity -> DEBU 1f74 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.192 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0036467f0 gate 1569287104192837800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc0036467f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc0036467f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc0036467f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:04.194 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0036467f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:04.194 UTC [cauthdsl] func1 -> DEBU 1f7f 0xc0036467f0 gate 1569287104192837800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.193 UTC [msp] DeserializeIdentity -> DEBU 1f7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [cauthdsl] func1 -> DEBU 1f84 0xc003647150 gate 1569287104195158000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f85 0xc003647150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f86 0xc003647150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f87 0xc003647150 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [msp.identity] Verify -> DEBU 1f88 Verify: digest = 00000000 de 2a 78 89 8a de 28 ef 08 7e 0d df 54 40 ee ac |.*x...(..~..T@..| +peer0.org1.example.com | 00000010 5f ee ec c8 4f d4 a3 fa 2b 81 dc cb 9d 98 ea fb |_...O...+.......|" +peer0.org1.example.com | "2019-09-24 01:05:04.196 UTC [msp.identity] Verify -> DEBU 1f89 Verify: sig = 00000000 30 44 02 20 5b 6b 8e 6d 22 0e 39 c1 90 66 af ff |0D. [k.m".9..f..| +peer0.org1.example.com | 00000010 02 0f 3a 5c c7 a5 40 68 d0 a4 f1 4b 0f 6a fc c3 |..:\..@h...K.j..| +peer0.org1.example.com | 00000020 20 ea 40 a3 02 20 2d 70 9a e6 1b d3 eb bf 02 ce | .@.. -p........| +peer0.org1.example.com | 00000030 27 10 13 6c ff 6e a0 9c d2 fa 49 e5 00 e2 36 47 |'..l.n....I...6G| +peer0.org1.example.com | 00000040 7c f1 ae 13 47 9c ||...G.|" +peer0.org1.example.com | "2019-09-24 01:05:04.195 UTC [msp] DeserializeIdentity -> DEBU 1f83 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.196 UTC [msp] DeserializeIdentity -> DEBU 1f8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.196 UTC [cauthdsl] func2 -> DEBU 1f8b 0xc003647150 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:04.196 UTC [cauthdsl] func1 -> DEBU 1f8c 0xc003647150 gate 1569287104195158000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f90 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [msp] DeserializeIdentity -> DEBU 1f8f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [gossip.comm] Send -> DEBU 1f92 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.198 UTC [msp] DeserializeIdentity -> DEBU 1f93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f94 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.198 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f95 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:04.198 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f97 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:04.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f99 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:04.198 UTC [gossip.comm] sendToEndpoint -> DEBU 1f98 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.comm] sendToEndpoint -> DEBU 1f9a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f9b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f9c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.198 UTC [gossip.comm] Send -> DEBU 1f96 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.201 UTC [gossip.comm] sendToEndpoint -> DEBU 1f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.202 UTC [gossip.gossip] handleMessage -> DEBU 1fa3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.203 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.203 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.203 UTC [gossip.gossip] handleMessage -> DEBU 1fa6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.204 UTC [gossip.gossip] handleMessage -> DEBU 1fa8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.gossip] handleMessage -> DEBU 1fa9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fac Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fae Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.206 UTC [gossip.gossip] handleMessage -> DEBU 1faf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.212 UTC [msp] DeserializeIdentity -> DEBU 1fb0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.212 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.215 UTC [msp] DeserializeIdentity -> DEBU 1fb5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.215 UTC [gossip.comm] Send -> DEBU 1fb6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.215 UTC [msp] DeserializeIdentity -> DEBU 1fb7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.216 UTC [gossip.comm] sendToEndpoint -> DEBU 1fb8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.216 UTC [msp] DeserializeIdentity -> DEBU 1fb9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.216 UTC [gossip.comm] sendToEndpoint -> DEBU 1fba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.216 UTC [gossip.comm] Send -> DEBU 1fbb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.217 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.217 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fbe Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:04.235 UTC [msp.identity] Sign -> DEBU 1fbf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101E " +peer0.org1.example.com | "2019-09-24 01:05:04.235 UTC [msp.identity] Sign -> DEBU 1fc0 Sign: digest: 932748BB536E70F9A1251CCF3D9EE42BCD1E92DDD3F87014B85F92B8395D9019 " +peer0.org1.example.com | "2019-09-24 01:05:04.236 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fc1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:04.236 UTC [msp.identity] Sign -> DEBU 1fc2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:04.236 UTC [msp.identity] Sign -> DEBU 1fc3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:04.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fc4 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:04.237 UTC [msp] DeserializeIdentity -> DEBU 1fc5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.237 UTC [msp] DeserializeIdentity -> DEBU 1fc6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.237 UTC [gossip.comm] Send -> DEBU 1fc7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [msp] DeserializeIdentity -> DEBU 1fc8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [gossip.comm] Send -> DEBU 1fc9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [msp] DeserializeIdentity -> DEBU 1fca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [gossip.comm] Send -> DEBU 1fcb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.693 UTC [msp] DeserializeIdentity -> DEBU 1fd2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.693 UTC [msp] DeserializeIdentity -> DEBU 1fd3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.693 UTC [gossip.comm] Send -> DEBU 1fd4 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:05.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1fda Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.695 UTC [gossip.comm] func1 -> DEBU 1fdb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.695 UTC [gossip.gossip] handleMessage -> DEBU 1fdc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.696 UTC [gossip.comm] func1 -> DEBU 1fdd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.696 UTC [msp.identity] Verify -> DEBU 1fde Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:05.696 UTC [gossip.comm] func1 -> DEBU 1fdf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.697 UTC [msp.identity] Verify -> DEBU 1fe0 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:05.697 UTC [msp.identity] Verify -> DEBU 1fe1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:05.698 UTC [msp.identity] Verify -> DEBU 1fe2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:05.698 UTC [msp] DeserializeIdentity -> DEBU 1fe3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.698 UTC [msp] DeserializeIdentity -> DEBU 1fe4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fe5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fe8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fe9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [cauthdsl] func1 -> DEBU 1feb 0xc002b5a750 gate 1569287105699528600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fec 0xc002b5a750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fed 0xc002b5a750 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fee 0xc002b5a750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fef 0xc002b5a750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [cauthdsl] func1 -> DEBU 1ff0 0xc002b5a750 gate 1569287105699528600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [cauthdsl] func1 -> DEBU 1ff4 0xc002b5af90 gate 1569287105700697400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff5 0xc002b5af90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc002b5af90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc002b5af90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.701 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:05.701 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:05.701 UTC [cauthdsl] func2 -> DEBU 1ffa 0xc002b5af90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.701 UTC [cauthdsl] func1 -> DEBU 1ffb 0xc002b5af90 gate 1569287105700697400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.701 UTC [policies] Evaluate -> DEBU 1ffc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.702 UTC [policies] Evaluate -> DEBU 1ffd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.702 UTC [policies] Evaluate -> DEBU 1ffe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.710 UTC [policies] Evaluate -> DEBU 1fff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.711 UTC [msp] DeserializeIdentity -> DEBU 2000 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.711 UTC [msp] DeserializeIdentity -> DEBU 2001 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2002 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2003 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2004 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2005 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2006 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2007 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [cauthdsl] func1 -> DEBU 2008 0xc003a7a760 gate 1569287105722785500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 2009 0xc003a7a760 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 200a 0xc003a7a760 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 200b 0xc003a7a760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 200c 0xc003a7a760 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func1 -> DEBU 200d 0xc003a7a760 gate 1569287105722785500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 200e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 200f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 2010 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func1 -> DEBU 2011 0xc003a7afa0 gate 1569287105723551200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2012 0xc003a7afa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2013 0xc003a7afa0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2014 0xc003a7afa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.724 UTC [msp.identity] Verify -> DEBU 2015 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:05.724 UTC [msp.identity] Verify -> DEBU 2016 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [cauthdsl] func2 -> DEBU 2017 0xc003a7afa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [cauthdsl] func1 -> DEBU 2018 0xc003a7afa0 gate 1569287105723551200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 2019 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.726 UTC [gossip.gossip] handleMessage -> DEBU 201d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.726 UTC [gossip.gossip] handleMessage -> DEBU 201e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.726 UTC [msp] DeserializeIdentity -> DEBU 201f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.727 UTC [msp] DeserializeIdentity -> DEBU 2020 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.727 UTC [msp] DeserializeIdentity -> DEBU 2021 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2022 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2023 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2024 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2025 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2026 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2027 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [cauthdsl] func1 -> DEBU 2028 0xc003b04ab0 gate 1569287105728613600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.728 UTC [cauthdsl] func2 -> DEBU 2029 0xc003b04ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.729 UTC [cauthdsl] func2 -> DEBU 202a 0xc003b04ab0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [cauthdsl] func2 -> DEBU 202b 0xc003b04ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [cauthdsl] func2 -> DEBU 202c 0xc003b04ab0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [cauthdsl] func1 -> DEBU 202d 0xc003b04ab0 gate 1569287105728613600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 202e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 202f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 2030 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.731 UTC [cauthdsl] func1 -> DEBU 2031 0xc003b052f0 gate 1569287105731278900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2032 0xc003b052f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2033 0xc003b052f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2034 0xc003b052f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.732 UTC [msp.identity] Verify -> DEBU 2035 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:05.732 UTC [msp.identity] Verify -> DEBU 2036 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:05.732 UTC [cauthdsl] func2 -> DEBU 2037 0xc003b052f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.733 UTC [cauthdsl] func1 -> DEBU 2038 0xc003b052f0 gate 1569287105731278900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 2039 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.734 UTC [msp.identity] Verify -> DEBU 203d Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:05.734 UTC [msp.identity] Verify -> DEBU 203e Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:05.736 UTC [msp.identity] Verify -> DEBU 203f Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:05.736 UTC [msp.identity] Verify -> DEBU 2040 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2041 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2042 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2043 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2044 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.738 UTC [gossip.pull] Hello -> DEBU 2045 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:05.738 UTC [msp] DeserializeIdentity -> DEBU 2046 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.738 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.738 UTC [gossip.comm] Send -> DEBU 2048 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:05.739 UTC [gossip.comm] sendToEndpoint -> DEBU 2049 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.739 UTC [gossip.comm] sendToEndpoint -> DEBU 204a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 204b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 204c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.741 UTC [gossip.comm] func1 -> DEBU 204d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 204e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.743 UTC [policies] Evaluate -> DEBU 204f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.743 UTC [policies] Evaluate -> DEBU 2050 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.744 UTC [policies] Evaluate -> DEBU 2051 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.744 UTC [cauthdsl] func1 -> DEBU 2052 0xc003c93900 gate 1569287105744239900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.744 UTC [cauthdsl] func2 -> DEBU 2053 0xc003c93900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.744 UTC [cauthdsl] func2 -> DEBU 2054 0xc003c93900 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.745 UTC [cauthdsl] func2 -> DEBU 2055 0xc003c93900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.745 UTC [cauthdsl] func2 -> DEBU 2056 0xc003c93900 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.745 UTC [cauthdsl] func1 -> DEBU 2057 0xc003c93900 gate 1569287105744239900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 2058 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 2059 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 205a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [cauthdsl] func1 -> DEBU 205b 0xc003e1e140 gate 1569287105746463000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205c 0xc003e1e140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205d 0xc003e1e140 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205e 0xc003e1e140 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.747 UTC [msp.identity] Verify -> DEBU 205f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:05.747 UTC [msp.identity] Verify -> DEBU 2060 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:05.747 UTC [cauthdsl] func2 -> DEBU 2061 0xc003e1e140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.747 UTC [cauthdsl] func1 -> DEBU 2062 0xc003e1e140 gate 1569287105746463000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.747 UTC [policies] Evaluate -> DEBU 2063 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2064 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2065 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2066 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.748 UTC [gossip.gossip] handleMessage -> DEBU 2067 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.748 UTC [gossip.gossip] handleMessage -> DEBU 2068 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 206c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 206d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 206e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 206f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 2070 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 2071 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [cauthdsl] func1 -> DEBU 2072 0xc003e1fc50 gate 1569287105750463900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [cauthdsl] func2 -> DEBU 2073 0xc003e1fc50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.750 UTC [cauthdsl] func2 -> DEBU 2074 0xc003e1fc50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [cauthdsl] func2 -> DEBU 2075 0xc003e1fc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [cauthdsl] func2 -> DEBU 2076 0xc003e1fc50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [cauthdsl] func1 -> DEBU 2077 0xc003e1fc50 gate 1569287105750463900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 2078 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 2079 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 207a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func1 -> DEBU 207b 0xc0040b2490 gate 1569287105752013700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207c 0xc0040b2490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207d 0xc0040b2490 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207e 0xc0040b2490 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [msp.identity] Verify -> DEBU 207f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [msp.identity] Verify -> DEBU 2080 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 2081 0xc0040b2490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [cauthdsl] func1 -> DEBU 2082 0xc0040b2490 gate 1569287105752013700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.752 UTC [policies] Evaluate -> DEBU 2083 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2084 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2085 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2086 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.753 UTC [msp.identity] Verify -> DEBU 2087 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:05.753 UTC [msp.identity] Verify -> DEBU 2088 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:05.754 UTC [msp] DeserializeIdentity -> DEBU 2089 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.754 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [cauthdsl] func1 -> DEBU 2091 0xc0028e2380 gate 1569287105755255100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [cauthdsl] func2 -> DEBU 2092 0xc0028e2380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.755 UTC [cauthdsl] func2 -> DEBU 2093 0xc0028e2380 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 2094 0xc0028e2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 2095 0xc0028e2380 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [cauthdsl] func1 -> DEBU 2096 0xc0028e2380 gate 1569287105755255100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [cauthdsl] func1 -> DEBU 209a 0xc0028e2bc0 gate 1569287105756702700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 209b 0xc0028e2bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 209c 0xc0028e2bc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 209d 0xc0028e2bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 20a0 0xc0028e2bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:05.757 UTC [cauthdsl] func1 -> DEBU 20a1 0xc0028e2bc0 gate 1569287105756702700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [msp.identity] Verify -> DEBU 20a6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:05.758 UTC [msp.identity] Verify -> DEBU 20a7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20a8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20a9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.759 UTC [gossip.pull] HandleMessage -> DEBU 20aa GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20ab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.873 UTC [gossip.comm] func1 -> DEBU 20ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.874 UTC [gossip.gossip] handleMessage -> DEBU 20ad Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.876 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.876 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:05.876 UTC [gossip.gossip] handleMessage -> DEBU 20b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:05.893 UTC [gossip.comm] func1 -> DEBU 20b1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.893 UTC [gossip.gossip] handleMessage -> DEBU 20b2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.893 UTC [gossip.pull] HandleMessage -> DEBU 20b3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:05.893 UTC [gossip.pull] SendDigest -> DEBU 20b4 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:05.893 UTC [gossip.gossip] handleMessage -> DEBU 20b5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.080 UTC [gossip.comm] func1 -> DEBU 20b6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.081 UTC [gossip.gossip] handleMessage -> DEBU 20b7 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.081 UTC [msp] DeserializeIdentity -> DEBU 20b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.081 UTC [msp] DeserializeIdentity -> DEBU 20b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.082 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.082 UTC [gossip.gossip] handleMessage -> DEBU 20bb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.286 UTC [gossip.comm] func1 -> DEBU 20bc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.286 UTC [gossip.gossip] handleMessage -> DEBU 20bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.288 UTC [gossip.gossip] handleMessage -> DEBU 20c1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.514 UTC [gossip.comm] func1 -> DEBU 20c2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.514 UTC [gossip.comm] func1 -> DEBU 20c3 Got message: GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.514 UTC [gossip.gossip] handleMessage -> DEBU 20c4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.514 UTC [gossip.pull] HandleMessage -> DEBU 20c5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.515 UTC [gossip.pull] SendDigest -> DEBU 20c6 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:06.515 UTC [gossip.gossip] handleMessage -> DEBU 20c7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.515 UTC [gossip.gossip] handleMessage -> DEBU 20c8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.516 UTC [gossip.gossip] handleMessage -> DEBU 20c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ca Got message: GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20cb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.516 UTC [msp.identity] Verify -> DEBU 20cc Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +peer0.org1.example.com | 00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +peer0.org1.example.com | "2019-09-24 01:05:06.516 UTC [msp.identity] Verify -> DEBU 20cd Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +peer0.org1.example.com | 00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +peer0.org1.example.com | 00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +peer0.org1.example.com | 00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +peer0.org1.example.com | 00000040 e8 f3 3c 28 9b 30 |..<(.0|" +peer0.org1.example.com | "2019-09-24 01:05:06.517 UTC [msp.identity] Verify -> DEBU 20ce Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:06.517 UTC [msp.identity] Verify -> DEBU 20cf Verify: sig = 00000000 30 45 02 21 00 b2 3a a3 77 53 75 98 4e e1 49 f9 |0E.!..:.wSu.N.I.| +peer0.org1.example.com | 00000010 05 85 3f 58 04 d2 5f 07 a5 2f 03 7a 80 51 e3 2e |..?X.._../.z.Q..| +peer0.org1.example.com | 00000020 7d 9c 04 b7 22 02 20 7a 55 df f0 70 95 bd 44 35 |}...". zU..p..D5| +peer0.org1.example.com | 00000030 83 1b 57 d6 7f c8 bc a4 9d 9a 03 49 c8 10 13 c6 |..W........I....| +peer0.org1.example.com | 00000040 7f a0 96 59 6a 9c 9c |...Yj..|" +peer0.org1.example.com | "2019-09-24 01:05:06.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 20d0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:06.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 20d6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20d7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.519 UTC [gossip.discovery] sendMemResponse -> DEBU 20d8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:06.520 UTC [msp] DeserializeIdentity -> DEBU 20d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.520 UTC [msp] DeserializeIdentity -> DEBU 20da Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.520 UTC [gossip.comm] Send -> DEBU 20db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.521 UTC [gossip.discovery] sendMemResponse -> DEBU 20dc Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:06.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20dd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20de Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.742 UTC [gossip.election] waitForInterrupt -> DEBU 20df d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.742 UTC [gossip.election] IsLeader -> DEBU 20e0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:06.743 UTC [msp] GetDefaultSigningIdentity -> DEBU 20e1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:06.743 UTC [msp.identity] Sign -> DEBU 20e2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510091801 " +peer0.org1.example.com | "2019-09-24 01:05:06.743 UTC [msp.identity] Sign -> DEBU 20e3 Sign: digest: FB93C52C991691034EF98B283C8BA564C8485B630705CFF61B2580E12B332F35 " +peer0.org1.example.com | "2019-09-24 01:05:06.744 UTC [gossip.election] waitForInterrupt -> DEBU 20e4 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:06.749 UTC [msp] DeserializeIdentity -> DEBU 20e5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.749 UTC [msp] DeserializeIdentity -> DEBU 20e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.750 UTC [msp] DeserializeIdentity -> DEBU 20e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.750 UTC [msp] DeserializeIdentity -> DEBU 20e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.751 UTC [gossip.comm] Send -> DEBU 20e9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.751 UTC [msp] DeserializeIdentity -> DEBU 20ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.751 UTC [gossip.comm] sendToEndpoint -> DEBU 20eb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.751 UTC [gossip.comm] sendToEndpoint -> DEBU 20ec Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.751 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.809 UTC [gossip.comm] func1 -> DEBU 20ee Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [gossip.gossip] handleMessage -> DEBU 20ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [gossip.pull] HandleMessage -> DEBU 20f0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.812 UTC [msp] DeserializeIdentity -> DEBU 20f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.812 UTC [gossip.pull] SendDigest -> DEBU 20f7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:06.812 UTC [gossip.gossip] handleMessage -> DEBU 20f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.819 UTC [gossip.comm] func1 -> DEBU 20f9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.819 UTC [gossip.gossip] handleMessage -> DEBU 20fa Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.819 UTC [gossip.gossip] handleMessage -> DEBU 20fb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20fc Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20fd Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [msp] DeserializeIdentity -> DEBU 20fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2100 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2101 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2102 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2103 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func1 -> DEBU 2105 0xc002b12810 gate 1569287106821059900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2106 0xc002b12810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2107 0xc002b12810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2108 0xc002b12810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2109 0xc002b12810 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [cauthdsl] func1 -> DEBU 210a 0xc002b12810 gate 1569287106821059900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [policies] Evaluate -> DEBU 210b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.821 UTC [policies] Evaluate -> DEBU 210c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [policies] Evaluate -> DEBU 210d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func1 -> DEBU 210e 0xc002b13050 gate 1569287106822077400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 210f 0xc002b13050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2110 0xc002b13050 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2111 0xc002b13050 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [msp.identity] Verify -> DEBU 2112 Verify: digest = 00000000 b6 9e 41 b7 51 1a 09 09 d6 63 42 d0 4c e8 a2 11 |..A.Q....cB.L...| +peer0.org1.example.com | 00000010 18 a6 b1 5e 46 bb d2 12 39 0c 58 44 a1 e6 fa e0 |...^F...9.XD....|" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [msp.identity] Verify -> DEBU 2113 Verify: sig = 00000000 30 44 02 20 5f a3 f8 7f 4e 98 1f fd e7 a4 04 fa |0D. _...N.......| +peer0.org1.example.com | 00000010 39 59 ab ce ed 40 06 8a 8e 02 2d 62 ff e3 08 70 |9Y...@....-b...p| +peer0.org1.example.com | 00000020 00 41 6f aa 02 20 73 1e ba ff ef 40 5c 32 27 36 |.Ao.. s....@\2'6| +peer0.org1.example.com | 00000030 1f 5c 5d b7 94 76 6b 68 e1 16 10 9d 26 af 7b b7 |.\]..vkh....&.{.| +peer0.org1.example.com | 00000040 56 f7 e5 f4 e3 8e |V.....|" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2114 0xc002b13050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.822 UTC [cauthdsl] func1 -> DEBU 2115 0xc002b13050 gate 1569287106822077400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2118 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [gossip.discovery] handleAliveMessage -> DEBU 211a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 211e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 211f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 2120 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [gossip.discovery] sendMemResponse -> DEBU 2122 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2123 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2124 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2125 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.825 UTC [gossip.comm] Send -> DEBU 2126 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.825 UTC [gossip.discovery] sendMemResponse -> DEBU 2127 Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:06.825 UTC [gossip.comm] sendToEndpoint -> DEBU 2128 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.825 UTC [gossip.comm] sendToEndpoint -> DEBU 2129 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.862 UTC [gossip.pull] Hello -> DEBU 212a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:06.863 UTC [gossip.comm] Send -> DEBU 212b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.864 UTC [gossip.pull] Hello -> DEBU 212c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:06.865 UTC [gossip.comm] Send -> DEBU 212d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.865 UTC [gossip.pull] Hello -> DEBU 212e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:06.865 UTC [gossip.comm] Send -> DEBU 212f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2130 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2131 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2132 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.867 UTC [gossip.comm] sendToEndpoint -> DEBU 2133 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.868 UTC [gossip.comm] sendToEndpoint -> DEBU 2134 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.868 UTC [gossip.comm] sendToEndpoint -> DEBU 2135 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.871 UTC [gossip.comm] func1 -> DEBU 2136 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.871 UTC [gossip.gossip] handleMessage -> DEBU 2137 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.871 UTC [gossip.pull] HandleMessage -> DEBU 2138 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.872 UTC [gossip.gossip] handleMessage -> DEBU 2139 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.872 UTC [gossip.comm] func1 -> DEBU 213a Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.872 UTC [gossip.gossip] handleMessage -> DEBU 213b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.873 UTC [gossip.pull] HandleMessage -> DEBU 213c GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.873 UTC [gossip.gossip] handleMessage -> DEBU 213d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.874 UTC [gossip.comm] func1 -> DEBU 213e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.874 UTC [gossip.gossip] handleMessage -> DEBU 213f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.875 UTC [gossip.pull] HandleMessage -> DEBU 2140 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.875 UTC [gossip.gossip] handleMessage -> DEBU 2141 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.877 UTC [gossip.comm] func1 -> DEBU 2142 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.877 UTC [gossip.gossip] handleMessage -> DEBU 2143 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.877 UTC [gossip.pull] HandleMessage -> DEBU 2144 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2146 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2147 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2148 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.879 UTC [msp] DeserializeIdentity -> DEBU 2149 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.880 UTC [msp] DeserializeIdentity -> DEBU 214a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.880 UTC [gossip.pull] SendDigest -> DEBU 214b Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:06.880 UTC [gossip.gossip] handleMessage -> DEBU 214c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.886 UTC [msp] GetDefaultSigningIdentity -> DEBU 214d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:06.886 UTC [msp.identity] Sign -> DEBU 214e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101F " +peer0.org1.example.com | "2019-09-24 01:05:06.886 UTC [msp.identity] Sign -> DEBU 214f Sign: digest: 42943EFC85F043B7C617A076DD1525B0B2737F477AD82F6A349D6DE1BBD66AC7 " +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [msp] GetDefaultSigningIdentity -> DEBU 2150 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [msp.identity] Sign -> DEBU 2151 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [msp.identity] Sign -> DEBU 2152 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2154 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [msp] DeserializeIdentity -> DEBU 2155 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2156 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2157 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2158 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2159 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 215a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.896 UTC [gossip.comm] func1 -> DEBU 215e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.896 UTC [gossip.gossip] handleMessage -> DEBU 215f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.896 UTC [gossip.gossip] handleMessage -> DEBU 2160 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.896 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2161 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2162 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2163 Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +peer0.org1.example.com | 00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2164 Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +peer0.org1.example.com | 00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +peer0.org1.example.com | 00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +peer0.org1.example.com | 00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +peer0.org1.example.com | 00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2165 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [gossip.discovery] isSentByMe -> DEBU 2166 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2167 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2168 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2169 Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +peer0.org1.example.com | 00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +peer0.org1.example.com | "2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 216a Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +peer0.org1.example.com | 00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +peer0.org1.example.com | 00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +peer0.org1.example.com | 00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +peer0.org1.example.com | 00000040 e8 f3 3c 28 9b 30 |..<(.0|" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 216b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 216c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 216d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.comm] func1 -> DEBU 216e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.comm] func1 -> DEBU 216f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2170 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2171 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2172 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2173 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2174 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [msp.identity] Verify -> DEBU 2175 Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +peer0.org1.example.com | 00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +peer0.org1.example.com | "2019-09-24 01:05:06.898 UTC [msp.identity] Verify -> DEBU 2176 Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +peer0.org1.example.com | 00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +peer0.org1.example.com | 00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +peer0.org1.example.com | 00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +peer0.org1.example.com | 00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2177 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [gossip.discovery] isSentByMe -> DEBU 2178 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2179 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 217a Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [msp] DeserializeIdentity -> DEBU 217b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 217c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 217d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 217e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 217f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2180 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2181 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func1 -> DEBU 2182 0xc002b8f3d0 gate 1569287106899636300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2183 0xc002b8f3d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2184 0xc002b8f3d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2185 0xc002b8f3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2186 0xc002b8f3d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [cauthdsl] func1 -> DEBU 2187 0xc002b8f3d0 gate 1569287106899636300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2188 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2189 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 218a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func1 -> DEBU 218b 0xc002b8fc10 gate 1569287106900071000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218c 0xc002b8fc10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218d 0xc002b8fc10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218e 0xc002b8fc10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 218f Verify: digest = 00000000 b6 9e 41 b7 51 1a 09 09 d6 63 42 d0 4c e8 a2 11 |..A.Q....cB.L...| +peer0.org1.example.com | 00000010 18 a6 b1 5e 46 bb d2 12 39 0c 58 44 a1 e6 fa e0 |...^F...9.XD....|" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 2190 Verify: sig = 00000000 30 44 02 20 5f a3 f8 7f 4e 98 1f fd e7 a4 04 fa |0D. _...N.......| +peer0.org1.example.com | 00000010 39 59 ab ce ed 40 06 8a 8e 02 2d 62 ff e3 08 70 |9Y...@....-b...p| +peer0.org1.example.com | 00000020 00 41 6f aa 02 20 73 1e ba ff ef 40 5c 32 27 36 |.Ao.. s....@\2'6| +peer0.org1.example.com | 00000030 1f 5c 5d b7 94 76 6b 68 e1 16 10 9d 26 af 7b b7 |.\]..vkh....&.{.| +peer0.org1.example.com | 00000040 56 f7 e5 f4 e3 8e |V.....|" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 2191 0xc002b8fc10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [cauthdsl] func1 -> DEBU 2192 0xc002b8fc10 gate 1569287106900071000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2195 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2197 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2198 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2199 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 219a Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +peer0.org1.example.com | 00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +peer0.org1.example.com | "2019-09-24 01:05:06.901 UTC [msp.identity] Verify -> DEBU 219b Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +peer0.org1.example.com | 00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +peer0.org1.example.com | 00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +peer0.org1.example.com | 00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +peer0.org1.example.com | 00000040 e8 f3 3c 28 9b 30 |..<(.0|" +peer0.org1.example.com | "2019-09-24 01:05:06.912 UTC [gossip.comm] func1 -> DEBU 219c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 219d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 219e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 219f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21a0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21a1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [msp] DeserializeIdentity -> DEBU 21a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21a4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21a5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0039f61a0 gate 1569287106917878200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0039f61a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.917 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0039f61a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0039f61a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [gossip.gossip] handleMessage -> DEBU 21ad Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [gossip.gossip] handleMessage -> DEBU 21ae Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21af 0xc0039f61a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0039f61a0 gate 1569287106917878200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func1 -> DEBU 21b4 0xc0039f69e0 gate 1569287106918785800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21b5 0xc0039f69e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21b6 0xc0039f69e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [cauthdsl] func2 -> DEBU 21b7 0xc0039f69e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [msp.identity] Verify -> DEBU 21b8 Verify: digest = 00000000 5d f2 cf ee 2b 70 d9 8b 79 34 f0 4c 8c 4c ec 7b |]...+p..y4.L.L.{| +peer0.org1.example.com | 00000010 17 08 c4 8d 02 56 a0 ee 03 ee dd 61 12 91 f5 30 |.....V.....a...0|" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [msp.identity] Verify -> DEBU 21b9 Verify: sig = 00000000 30 45 02 21 00 82 01 cc 46 fe 5a 10 48 80 69 28 |0E.!....F.Z.H.i(| +peer0.org1.example.com | 00000010 d6 c1 46 6b 8f 5c ee 50 6d 87 75 08 f8 67 82 d9 |..Fk.\.Pm.u..g..| +peer0.org1.example.com | 00000020 3f 0c 7b 14 8f 02 20 2f 32 49 be f7 c4 63 80 1e |?.{... /2I...c..| +peer0.org1.example.com | 00000030 de c5 a6 fe 60 0f 10 dc 47 31 60 d1 4c 09 77 3b |....`...G1`.L.w;| +peer0.org1.example.com | 00000040 14 bc 0b fa e5 a0 04 |.......|" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [cauthdsl] func2 -> DEBU 21ba 0xc0039f69e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [cauthdsl] func1 -> DEBU 21bb 0xc0039f69e0 gate 1569287106918785800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21be Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [policies] Evaluate -> DEBU 21bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c2 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [msp.identity] Verify -> DEBU 21ca Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +peer0.org1.example.com | 00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +peer0.org1.example.com | "2019-09-24 01:05:06.924 UTC [msp.identity] Verify -> DEBU 21cb Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +peer0.org1.example.com | 00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +peer0.org1.example.com | 00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +peer0.org1.example.com | 00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +peer0.org1.example.com | 00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.gossip] handleMessage -> DEBU 21cc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.discovery] sendMemResponse -> DEBU 21cd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [msp.identity] Verify -> DEBU 21cf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [msp.identity] Verify -> DEBU 21d0 Verify: sig = 00000000 30 44 02 20 29 7d ee c9 93 e4 d7 2b eb d5 28 47 |0D. )}.....+..(G| +peer0.org1.example.com | 00000010 ad b1 f2 47 9f 1f e7 c3 25 27 70 e0 4c d6 2e ae |...G....%'p.L...| +peer0.org1.example.com | 00000020 10 68 4a e0 02 20 68 42 65 36 a7 ad 0b be 55 49 |.hJ.. hBe6....UI| +peer0.org1.example.com | 00000030 53 ce dd 31 da c8 c5 cd 11 34 81 07 c6 72 eb 11 |S..1.....4...r..| +peer0.org1.example.com | 00000040 14 7f 4b ef a7 20 |..K.. |" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21d1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.discovery] isSentByMe -> DEBU 21d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:06.925 UTC [gossip.comm] Send -> DEBU 21d7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:06.926 UTC [gossip.discovery] sendMemResponse -> DEBU 21d8 Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 21d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 21da Exiting" +peer0.org1.example.com | "2019-09-24 01:05:07.349 UTC [chaincode.platform.util] DockerBuild -> DEBU 21db Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-824835084/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-824835084/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +peer0.org1.example.com | "2019-09-24 01:05:08.551 UTC [gossip.comm] func1 -> DEBU 21dc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.551 UTC [gossip.gossip] handleMessage -> DEBU 21dd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.551 UTC [gossip.gossip] handleMessage -> DEBU 21de Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21e0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:08.553 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 84 c7 65 a0 ac 29 90 0a 04 0e 1f 3a 88 b5 74 e0 |..e..).....:..t.| +peer0.org1.example.com | 00000010 1a ec eb 79 a9 cd 1f 39 1e 4d e7 a9 43 fc ed 86 |...y...9.M..C...|" +peer0.org1.example.com | "2019-09-24 01:05:08.553 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 44 02 20 37 f7 85 7a 4a b4 d5 7b 8a 63 5a b0 |0D. 7..zJ..{.cZ.| +peer0.org1.example.com | 00000010 c3 da 36 38 e0 6b a8 cf 3b 75 a8 f2 6e a0 af 44 |..68.k..;u..n..D| +peer0.org1.example.com | 00000020 f5 30 d9 ea 02 20 28 f0 07 d1 42 fb 5d 4b 9f 1f |.0... (...B.]K..| +peer0.org1.example.com | 00000030 ba fe b8 84 8c 68 55 71 ad 70 7d 46 22 69 b0 ac |.....hUq.p}F"i..| +peer0.org1.example.com | 00000040 66 c7 4e 2e 9e 76 |f.N..v|" +peer0.org1.example.com | "2019-09-24 01:05:08.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:08.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e5 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e6 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.557 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ea Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.557 UTC [gossip.comm] func1 -> DEBU 21eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.558 UTC [gossip.gossip] handleMessage -> DEBU 21ec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.558 UTC [gossip.gossip] handleMessage -> DEBU 21ed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ee Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ef Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.561 UTC [gossip.comm] func1 -> DEBU 21f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.561 UTC [gossip.gossip] handleMessage -> DEBU 21f1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.561 UTC [gossip.gossip] handleMessage -> DEBU 21f2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.561 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [gossip.comm] Send -> DEBU 21f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:08.563 UTC [gossip.comm] Send -> DEBU 21fa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:08.563 UTC [gossip.comm] sendToEndpoint -> DEBU 21fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.563 UTC [gossip.comm] sendToEndpoint -> DEBU 21fc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.564 UTC [gossip.comm] sendToEndpoint -> DEBU 21fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:08.564 UTC [gossip.comm] sendToEndpoint -> DEBU 21fe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:08.832 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 21ff Sleeping 25s" +peer0.org1.example.com | "2019-09-24 01:05:09.170 UTC [gossip.comm] func1 -> DEBU 2200 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.171 UTC [gossip.gossip] handleMessage -> DEBU 2201 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.171 UTC [gossip.gossip] handleMessage -> DEBU 2202 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2203 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2204 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:09.172 UTC [msp] DeserializeIdentity -> DEBU 2205 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2206 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2207 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2208 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2209 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 220a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 220b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 220c 0xc003f39d60 gate 1569287109174360400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220d 0xc003f39d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220e 0xc003f39d60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220f 0xc003f39d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2210 0xc003f39d60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 2211 0xc003f39d60 gate 1569287109174360400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2212 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2213 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 2215 0xc003f125a0 gate 1569287109174623100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2216 0xc003f125a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2217 0xc003f125a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2218 0xc003f125a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [msp.identity] Verify -> DEBU 2219 Verify: digest = 00000000 06 ae 9f c8 3e 1c 57 48 bd fe 0f 3d 0f 1e 68 e1 |....>.WH...=..h.| +peer0.org1.example.com | 00000010 e0 8e df 4c 04 85 eb a2 ce e4 b5 90 7d 85 ce dc |...L........}...|" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [msp.identity] Verify -> DEBU 221a Verify: sig = 00000000 30 44 02 20 33 6a 81 22 e7 e5 c9 66 93 7a e8 93 |0D. 3j."...f.z..| +peer0.org1.example.com | 00000010 a8 5d 5a 89 bf 3d 41 5b 88 44 f8 84 d0 8c c7 df |.]Z..=A[.D......| +peer0.org1.example.com | 00000020 51 d5 12 64 02 20 34 a1 5a 95 c9 9d 5f 09 c7 cd |Q..d. 4.Z..._...| +peer0.org1.example.com | 00000030 75 99 cc fc f9 61 eb c9 97 63 32 a4 8e 5b ed 9d |u....a...c2..[..| +peer0.org1.example.com | 00000040 fd e1 f0 f4 ea 1d |......|" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 221b 0xc003f125a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 221c 0xc003f125a0 gate 1569287109174623100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [policies] Evaluate -> DEBU 2220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2221 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2222 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2223 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2224 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2225 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2226 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2227 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2228 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.comm] func1 -> DEBU 2229 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.175 UTC [gossip.gossip] handleMessage -> DEBU 222a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.176 UTC [gossip.gossip] handleMessage -> DEBU 222b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 222d Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:09.176 UTC [msp] DeserializeIdentity -> DEBU 222e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 222f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2230 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2231 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2232 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2233 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [cauthdsl] func1 -> DEBU 2235 0xc003ef6a70 gate 1569287109178232100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2236 0xc003ef6a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2237 0xc003ef6a70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2238 0xc003ef6a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [cauthdsl] func2 -> DEBU 2239 0xc003ef6a70 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [cauthdsl] func1 -> DEBU 223a 0xc003ef6a70 gate 1569287109178232100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.179 UTC [cauthdsl] func1 -> DEBU 223e 0xc003ef7300 gate 1569287109179807900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 223f 0xc003ef7300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2240 0xc003ef7300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2241 0xc003ef7300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [msp.identity] Verify -> DEBU 2242 Verify: digest = 00000000 d4 a8 65 9b 52 49 85 64 bb 6b 87 7b 8e 73 93 98 |..e.RI.d.k.{.s..| +peer0.org1.example.com | 00000010 3b 23 7f ca 42 c0 19 67 04 d8 0a 5b d9 c0 56 e4 |;#..B..g...[..V.|" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [msp.identity] Verify -> DEBU 2243 Verify: sig = 00000000 30 45 02 21 00 ad 08 bc 53 8a c2 9f 51 92 c9 1f |0E.!....S...Q...| +peer0.org1.example.com | 00000010 98 19 47 3f a5 f8 fa 62 4f 0a af b1 71 ca 01 39 |..G?...bO...q..9| +peer0.org1.example.com | 00000020 73 28 18 ed 4e 02 20 7d 8b 5f bc 62 90 65 0c f5 |s(..N. }._.b.e..| +peer0.org1.example.com | 00000030 56 bf d3 24 b1 9f 94 f1 80 f1 06 26 57 8b 26 6e |V..$.......&W.&n| +peer0.org1.example.com | 00000040 b4 b8 12 a5 9c bd 88 |.......|" +peer0.org1.example.com | "2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2244 0xc003ef7300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [cauthdsl] func1 -> DEBU 2245 0xc003ef7300 gate 1569287109179807900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2246 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2247 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2248 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 2250 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2251 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.184 UTC [msp] DeserializeIdentity -> DEBU 2252 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2253 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2254 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2255 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2256 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2257 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 2258 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [gossip.comm] Send -> DEBU 2259 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [gossip.comm] Send -> DEBU 225b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 225e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 225f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 2260 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.187 UTC [gossip.comm] Send -> DEBU 2261 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.188 UTC [gossip.comm] Send -> DEBU 2263 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.192 UTC [gossip.comm] func1 -> DEBU 2264 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.193 UTC [gossip.comm] sendToEndpoint -> DEBU 2265 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.193 UTC [gossip.comm] sendToEndpoint -> DEBU 2266 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.193 UTC [gossip.comm] func1 -> DEBU 2267 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 2268 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.comm] sendToEndpoint -> DEBU 2269 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 226a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 226b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.comm] sendToEndpoint -> DEBU 226c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 226d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.195 UTC [gossip.comm] sendToEndpoint -> DEBU 226e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.195 UTC [gossip.comm] sendToEndpoint -> DEBU 226f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2270 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2273 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.196 UTC [gossip.comm] sendToEndpoint -> DEBU 2272 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.198 UTC [gossip.comm] sendToEndpoint -> DEBU 2274 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.198 UTC [gossip.comm] func1 -> DEBU 2275 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.199 UTC [gossip.comm] func1 -> DEBU 2276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2277 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2278 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2279 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 227a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.200 UTC [gossip.gossip] handleMessage -> DEBU 227f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 2280 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2281 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151020 " +peer0.org1.example.com | "2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2282 Sign: digest: 1E086772AE5777446190CD67E4691693AB9501F038CBE230BAC7E164839BAEF9 " +peer0.org1.example.com | "2019-09-24 01:05:09.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 2283 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2284 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:09.238 UTC [msp.identity] Sign -> DEBU 2285 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:09.238 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2286 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 2287 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 2289 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 228b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 228d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 228e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 228f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2290 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2291 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2292 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2293 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.689 UTC [msp] DeserializeIdentity -> DEBU 2294 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.690 UTC [msp] DeserializeIdentity -> DEBU 2295 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.690 UTC [gossip.comm] Send -> DEBU 2296 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2297 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2298 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2299 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.693 UTC [gossip.comm] func1 -> DEBU 229d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.693 UTC [gossip.gossip] handleMessage -> DEBU 229e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 229f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 22a0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 22a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22a2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22a3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22a4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func1 -> DEBU 22a8 0xc003e71850 gate 1569287109694665700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22a9 0xc003e71850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22aa 0xc003e71850 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22ab 0xc003e71850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22ac 0xc003e71850 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.694 UTC [cauthdsl] func1 -> DEBU 22ad 0xc003e71850 gate 1569287109694665700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func1 -> DEBU 22b1 0xc003cec210 gate 1569287109695173500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b2 0xc003cec210 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b3 0xc003cec210 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b4 0xc003cec210 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22b5 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22b6 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b7 0xc003cec210 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [cauthdsl] func1 -> DEBU 22b8 0xc003cec210 gate 1569287109695173500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22bb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22bd Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22be Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [msp] DeserializeIdentity -> DEBU 22bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [msp] DeserializeIdentity -> DEBU 22c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func1 -> DEBU 22c7 0xc003c98100 gate 1569287109696737100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22c8 0xc003c98100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22c9 0xc003c98100 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22ca 0xc003c98100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22cb 0xc003c98100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.696 UTC [cauthdsl] func1 -> DEBU 22cc 0xc003c98100 gate 1569287109696737100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func1 -> DEBU 22d0 0xc003c98940 gate 1569287109697162300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d1 0xc003c98940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d2 0xc003c98940 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d3 0xc003c98940 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [msp.identity] Verify -> DEBU 22d4 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [msp.identity] Verify -> DEBU 22d5 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d6 0xc003c98940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [cauthdsl] func1 -> DEBU 22d7 0xc003c98940 gate 1569287109697162300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22da Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.698 UTC [msp.identity] Verify -> DEBU 22dc Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:09.698 UTC [msp.identity] Verify -> DEBU 22dd Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:09.703 UTC [gossip.comm] func1 -> DEBU 22de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.703 UTC [gossip.comm] func1 -> DEBU 22df Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.703 UTC [gossip.gossip] handleMessage -> DEBU 22e0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.704 UTC [gossip.gossip] handleMessage -> DEBU 22e1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.705 UTC [msp.identity] Verify -> DEBU 22e2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:09.710 UTC [msp.identity] Verify -> DEBU 22e3 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:09.711 UTC [msp.identity] Verify -> DEBU 22e4 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:09.711 UTC [msp.identity] Verify -> DEBU 22e5 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:09.715 UTC [msp] DeserializeIdentity -> DEBU 22e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [msp] DeserializeIdentity -> DEBU 22e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22e9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22ea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [cauthdsl] func1 -> DEBU 22ee 0xc003c11930 gate 1569287109716701000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22ef 0xc003c11930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f0 0xc003c11930 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f1 0xc003c11930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f2 0xc003c11930 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22f3 0xc003c11930 gate 1569287109716701000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22f7 0xc003bd0170 gate 1569287109717288400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22f8 0xc003bd0170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22f9 0xc003bd0170 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22fa 0xc003bd0170 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [msp.identity] Verify -> DEBU 22fb Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [msp.identity] Verify -> DEBU 22fc Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22fd 0xc003bd0170 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22fe 0xc003bd0170 gate 1569287109717288400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22ff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2300 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2301 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2302 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [msp] DeserializeIdentity -> DEBU 2303 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [msp] DeserializeIdentity -> DEBU 2304 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2305 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2306 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2307 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2308 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2309 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 230a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.718 UTC [cauthdsl] func1 -> DEBU 230b 0xc003bd1950 gate 1569287109718965400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230c 0xc003bd1950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230d 0xc003bd1950 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230e 0xc003bd1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230f 0xc003bd1950 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [cauthdsl] func1 -> DEBU 2310 0xc003bd1950 gate 1569287109718965400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [policies] Evaluate -> DEBU 2311 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.719 UTC [policies] Evaluate -> DEBU 2312 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.720 UTC [policies] Evaluate -> DEBU 2313 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func1 -> DEBU 2314 0xc003bbc190 gate 1569287109721050900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2315 0xc003bbc190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2316 0xc003bbc190 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2317 0xc003bbc190 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [msp.identity] Verify -> DEBU 2318 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [msp.identity] Verify -> DEBU 2319 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 231a 0xc003bbc190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [cauthdsl] func1 -> DEBU 231b 0xc003bbc190 gate 1569287109721050900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [gossip.gossip] handleMessage -> DEBU 2320 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [gossip.gossip] handleMessage -> DEBU 2321 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2322 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2323 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2324 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2325 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2326 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2327 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.722 UTC [policies] Evaluate -> DEBU 2328 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2329 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 232a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 232b 0xc003bbdca0 gate 1569287109724364200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232c 0xc003bbdca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232d 0xc003bbdca0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232e 0xc003bbdca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232f 0xc003bbdca0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 2330 0xc003bbdca0 gate 1569287109724364200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2331 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2332 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2333 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 2334 0xc003ba04f0 gate 1569287109724887800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 2335 0xc003ba04f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 2336 0xc003ba04f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 2337 0xc003ba04f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.725 UTC [msp.identity] Verify -> DEBU 2338 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:09.725 UTC [msp.identity] Verify -> DEBU 2339 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 233a 0xc003ba04f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [cauthdsl] func1 -> DEBU 233b 0xc003ba04f0 gate 1569287109724887800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [msp.identity] Verify -> DEBU 2340 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:09.726 UTC [msp.identity] Verify -> DEBU 2341 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [msp.identity] Verify -> DEBU 2342 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [msp.identity] Verify -> DEBU 2343 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [msp] DeserializeIdentity -> DEBU 2344 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [msp] DeserializeIdentity -> DEBU 2345 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2346 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2347 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2348 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 2349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 234a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 234b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [cauthdsl] func1 -> DEBU 234c 0xc003a02b20 gate 1569287109727855100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234d 0xc003a02b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234e 0xc003a02b20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234f 0xc003a02b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 2350 0xc003a02b20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 2351 0xc003a02b20 gate 1569287109727855100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2352 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2353 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 2355 0xc003a03360 gate 1569287109728191800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2356 0xc003a03360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2357 0xc003a03360 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2358 0xc003a03360 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [msp.identity] Verify -> DEBU 2359 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [msp.identity] Verify -> DEBU 235a Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 235b 0xc003a03360 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 235c 0xc003a03360 gate 1569287109728191800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:09.728 UTC [gossip.gossip] handleMessage -> DEBU 2361 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2362 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2363 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [gossip.pull] Hello -> DEBU 2364 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2365 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2366 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.739 UTC [gossip.comm] Send -> DEBU 2367 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:09.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2368 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2369 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.741 UTC [gossip.comm] func1 -> DEBU 236a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.741 UTC [gossip.gossip] handleMessage -> DEBU 236b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.741 UTC [gossip.pull] HandleMessage -> DEBU 236c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.741 UTC [gossip.gossip] handleMessage -> DEBU 236d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.876 UTC [gossip.comm] func1 -> DEBU 236e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.876 UTC [gossip.gossip] handleMessage -> DEBU 236f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.877 UTC [msp] DeserializeIdentity -> DEBU 2370 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.877 UTC [msp] DeserializeIdentity -> DEBU 2371 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:09.877 UTC [gossip.gossip] handleMessage -> DEBU 2372 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:09.893 UTC [gossip.comm] func1 -> DEBU 2373 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.893 UTC [gossip.gossip] handleMessage -> DEBU 2374 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.893 UTC [gossip.pull] HandleMessage -> DEBU 2375 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:09.893 UTC [gossip.pull] SendDigest -> DEBU 2376 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:09.893 UTC [gossip.gossip] handleMessage -> DEBU 2377 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.078 UTC [gossip.comm] func1 -> DEBU 2378 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.078 UTC [gossip.gossip] handleMessage -> DEBU 2379 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.079 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [gossip.comm] func1 -> DEBU 237e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [gossip.gossip] handleMessage -> DEBU 237f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2380 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2381 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2382 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.276 UTC [gossip.gossip] handleMessage -> DEBU 2383 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.520 UTC [gossip.comm] func1 -> DEBU 2384 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.comm] func1 -> DEBU 2385 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 2386 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.pull] HandleMessage -> DEBU 2387 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.pull] SendDigest -> DEBU 2388 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 2389 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 238a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 238b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.521 UTC [gossip.discovery] handleMsgFromComm -> DEBU 238c Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 238d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.522 UTC [msp.identity] Verify -> DEBU 238e Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +peer0.org1.example.com | 00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +peer0.org1.example.com | "2019-09-24 01:05:10.522 UTC [msp.identity] Verify -> DEBU 238f Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +peer0.org1.example.com | 00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +peer0.org1.example.com | 00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +peer0.org1.example.com | 00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2390 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [msp.identity] Verify -> DEBU 2391 Verify: sig = 00000000 30 45 02 21 00 9c 7e a7 88 6e 19 17 b1 e8 98 69 |0E.!..~..n.....i| +peer0.org1.example.com | 00000010 30 e7 b1 28 de 23 df 55 d8 e0 26 00 95 47 6c 75 |0..(.#.U..&..Glu| +peer0.org1.example.com | 00000020 09 1b e3 cd f2 02 20 46 fc a8 d5 f4 73 a8 42 9e |...... F....s.B.| +peer0.org1.example.com | 00000030 43 45 12 eb 88 fe a1 28 2a 25 fd c1 00 6d ed 77 |CE.....(*%...m.w| +peer0.org1.example.com | 00000040 8f a5 8f 64 00 41 26 |...d.A&|" +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 2392 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2393 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2394 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2395 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2396 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:10.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2397 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 2398 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2399 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.524 UTC [gossip.discovery] sendMemResponse -> DEBU 239a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:10.525 UTC [msp] DeserializeIdentity -> DEBU 239b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.525 UTC [msp] DeserializeIdentity -> DEBU 239c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.531 UTC [gossip.comm] Send -> DEBU 239d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.532 UTC [gossip.discovery] sendMemResponse -> DEBU 239e Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:10.532 UTC [gossip.comm] sendToEndpoint -> DEBU 239f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.532 UTC [gossip.comm] sendToEndpoint -> DEBU 23a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.812 UTC [gossip.comm] func1 -> DEBU 23a1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.812 UTC [gossip.gossip] handleMessage -> DEBU 23a2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.812 UTC [gossip.pull] HandleMessage -> DEBU 23a3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.812 UTC [msp] DeserializeIdentity -> DEBU 23a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [gossip.pull] SendDigest -> DEBU 23aa Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:10.813 UTC [gossip.gossip] handleMessage -> DEBU 23ab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [gossip.comm] func1 -> DEBU 23ac Got message: GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [gossip.gossip] handleMessage -> DEBU 23ad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [gossip.gossip] handleMessage -> DEBU 23ae Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23af Got message: GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23b0 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.819 UTC [msp] DeserializeIdentity -> DEBU 23b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.821 UTC [policies] Evaluate -> DEBU 23b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [policies] Evaluate -> DEBU 23b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [policies] Evaluate -> DEBU 23b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [cauthdsl] func1 -> DEBU 23b8 0xc003943710 gate 1569287110822445100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23b9 0xc003943710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23ba 0xc003943710 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23bb 0xc003943710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23bc 0xc003943710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.823 UTC [cauthdsl] func1 -> DEBU 23bd 0xc003943710 gate 1569287110822445100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.823 UTC [cauthdsl] func1 -> DEBU 23c1 0xc00390c0c0 gate 1569287110823726300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c2 0xc00390c0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c3 0xc00390c0c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c4 0xc00390c0c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.824 UTC [msp.identity] Verify -> DEBU 23c5 Verify: digest = 00000000 2b 89 6c c2 ea e8 f3 9b 02 01 10 09 06 9d 7d 60 |+.l...........}`| +peer0.org1.example.com | 00000010 8e f4 ae 3a c6 84 89 c3 23 b1 a0 f1 45 09 cd 7b |...:....#...E..{|" +peer0.org1.example.com | "2019-09-24 01:05:10.824 UTC [msp.identity] Verify -> DEBU 23c6 Verify: sig = 00000000 30 45 02 21 00 c9 26 4a de a5 86 e3 9e 5e b2 a2 |0E.!..&J.....^..| +peer0.org1.example.com | 00000010 fc 0a 08 9a bc 28 24 73 a3 c0 42 e4 21 96 b4 4e |.....($s..B.!..N| +peer0.org1.example.com | 00000020 58 f5 b0 6e d8 02 20 1e c2 32 41 ed 66 1e 59 56 |X..n.. ..2A.f.YV| +peer0.org1.example.com | 00000030 b1 59 6e b0 c6 90 55 c6 1d 17 0b b4 f3 46 19 86 |.Yn...U......F..| +peer0.org1.example.com | 00000040 3e 15 97 f1 b5 f1 89 |>......|" +peer0.org1.example.com | "2019-09-24 01:05:10.825 UTC [cauthdsl] func2 -> DEBU 23c7 0xc00390c0c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.825 UTC [cauthdsl] func1 -> DEBU 23c8 0xc00390c0c0 gate 1569287110823726300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:10.825 UTC [policies] Evaluate -> DEBU 23c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.825 UTC [policies] Evaluate -> DEBU 23ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.826 UTC [policies] Evaluate -> DEBU 23cb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.826 UTC [policies] Evaluate -> DEBU 23cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 23cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 23ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23cf updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] handleAliveMessage -> DEBU 23d3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.827 UTC [gossip.discovery] sendMemResponse -> DEBU 23d5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.829 UTC [gossip.comm] Send -> DEBU 23d9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.829 UTC [gossip.comm] sendToEndpoint -> DEBU 23da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.829 UTC [gossip.comm] sendToEndpoint -> DEBU 23db Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.829 UTC [gossip.discovery] sendMemResponse -> DEBU 23dc Exiting, replying with alive: alive: alive:\025\227\361\265\361\211" > alive: " +peer0.org1.example.com | "2019-09-24 01:05:10.866 UTC [gossip.pull] Hello -> DEBU 23dd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:10.868 UTC [gossip.comm] Send -> DEBU 23de Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.868 UTC [gossip.pull] Hello -> DEBU 23df Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:10.868 UTC [gossip.comm] Send -> DEBU 23e0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.868 UTC [gossip.pull] Hello -> DEBU 23e1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:10.870 UTC [gossip.comm] Send -> DEBU 23e2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.870 UTC [gossip.comm] sendToEndpoint -> DEBU 23e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.870 UTC [gossip.comm] sendToEndpoint -> DEBU 23e4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.873 UTC [gossip.comm] func1 -> DEBU 23e9 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.873 UTC [gossip.gossip] handleMessage -> DEBU 23ea Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.873 UTC [gossip.pull] HandleMessage -> DEBU 23eb GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.873 UTC [gossip.gossip] handleMessage -> DEBU 23ec Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.874 UTC [gossip.comm] func1 -> DEBU 23ed Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.874 UTC [gossip.gossip] handleMessage -> DEBU 23ee Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.874 UTC [gossip.pull] HandleMessage -> DEBU 23ef GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.874 UTC [gossip.gossip] handleMessage -> DEBU 23f0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.878 UTC [gossip.comm] func1 -> DEBU 23f1 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.878 UTC [gossip.gossip] handleMessage -> DEBU 23f2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.878 UTC [gossip.pull] HandleMessage -> DEBU 23f3 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.878 UTC [gossip.gossip] handleMessage -> DEBU 23f4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.879 UTC [gossip.comm] func1 -> DEBU 23f5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.879 UTC [gossip.gossip] handleMessage -> DEBU 23f6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.879 UTC [gossip.pull] HandleMessage -> DEBU 23f7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.879 UTC [msp] DeserializeIdentity -> DEBU 23f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23f9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.881 UTC [gossip.pull] SendDigest -> DEBU 23fe Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:10.881 UTC [gossip.gossip] handleMessage -> DEBU 23ff Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.888 UTC [msp] GetDefaultSigningIdentity -> DEBU 2400 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:10.888 UTC [msp.identity] Sign -> DEBU 2401 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151021 " +peer0.org1.example.com | "2019-09-24 01:05:10.888 UTC [msp.identity] Sign -> DEBU 2402 Sign: digest: 36BB88EB363ACB5850D103C45B8107FB6566BCE7487AC9C172C611AC8A2B3B01 " +peer0.org1.example.com | "2019-09-24 01:05:10.888 UTC [msp] GetDefaultSigningIdentity -> DEBU 2403 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:10.889 UTC [msp.identity] Sign -> DEBU 2404 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:10.889 UTC [msp.identity] Sign -> DEBU 2405 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:10.890 UTC [gossip.comm] Send -> DEBU 2406 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.890 UTC [msp] DeserializeIdentity -> DEBU 2407 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.891 UTC [gossip.comm] Send -> DEBU 2408 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.891 UTC [msp] DeserializeIdentity -> DEBU 2409 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.891 UTC [gossip.comm] Send -> DEBU 240a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.891 UTC [gossip.comm] sendToEndpoint -> DEBU 240b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 2410 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.901 UTC [gossip.comm] func1 -> DEBU 2411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2412 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2413 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2414 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.comm] func1 -> DEBU 2415 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.comm] func1 -> DEBU 2416 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2417 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2418 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.903 UTC [msp.identity] Verify -> DEBU 2419 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +peer0.org1.example.com | 00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +peer0.org1.example.com | "2019-09-24 01:05:10.903 UTC [msp.identity] Verify -> DEBU 241a Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +peer0.org1.example.com | 00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +peer0.org1.example.com | 00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +peer0.org1.example.com | 00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +peer0.org1.example.com | 00000040 89 d8 a3 aa 96 74 |.....t|" +peer0.org1.example.com | "2019-09-24 01:05:10.904 UTC [gossip.comm] func1 -> DEBU 241b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 241c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.905 UTC [gossip.discovery] isSentByMe -> DEBU 241d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 241e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 241f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.906 UTC [msp.identity] Verify -> DEBU 2420 Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +peer0.org1.example.com | 00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +peer0.org1.example.com | "2019-09-24 01:05:10.906 UTC [msp.identity] Verify -> DEBU 2421 Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +peer0.org1.example.com | 00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +peer0.org1.example.com | 00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +peer0.org1.example.com | 00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2422 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 2423 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2424 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.907 UTC [gossip.gossip] handleMessage -> DEBU 2425 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.907 UTC [gossip.gossip] handleMessage -> DEBU 2426 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.908 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2427 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2428 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.908 UTC [msp] DeserializeIdentity -> DEBU 2429 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 242a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 242b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 242c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.910 UTC [cauthdsl] func1 -> DEBU 2430 0xc003895f60 gate 1569287110910114100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.910 UTC [cauthdsl] func2 -> DEBU 2431 0xc003895f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.910 UTC [cauthdsl] func2 -> DEBU 2432 0xc003895f60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.911 UTC [cauthdsl] func2 -> DEBU 2433 0xc003895f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:10.912 UTC [cauthdsl] func2 -> DEBU 2434 0xc003895f60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.913 UTC [cauthdsl] func1 -> DEBU 2435 0xc003895f60 gate 1569287110910114100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2436 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2437 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2438 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.915 UTC [cauthdsl] func1 -> DEBU 2439 0xc0038827b0 gate 1569287110915416800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.915 UTC [cauthdsl] func2 -> DEBU 243a 0xc0038827b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.916 UTC [cauthdsl] func2 -> DEBU 243b 0xc0038827b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.917 UTC [cauthdsl] func2 -> DEBU 243c 0xc0038827b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.917 UTC [msp.identity] Verify -> DEBU 243d Verify: digest = 00000000 ab 80 6e 57 a1 9e 89 4a 9c 7c 20 37 cd d1 68 52 |..nW...J.| 7..hR| +peer0.org1.example.com | 00000010 9a 48 2b 16 74 d6 cf 3b 7c fb db d9 c9 4a 48 ed |.H+.t..;|....JH.|" +peer0.org1.example.com | "2019-09-24 01:05:10.917 UTC [msp.identity] Verify -> DEBU 243e Verify: sig = 00000000 30 44 02 20 36 7e 81 86 6f 77 70 9b fc 95 f0 26 |0D. 6~..owp....&| +peer0.org1.example.com | 00000010 04 fa 44 8b f4 d9 f2 d8 f3 db 1f 6d b2 bf 98 51 |..D........m...Q| +peer0.org1.example.com | 00000020 69 0a a3 cc 02 20 1a 83 ac 40 76 08 d0 84 04 d8 |i.... ...@v.....| +peer0.org1.example.com | 00000030 10 17 4c 46 af 15 6e f3 3a bc 75 38 b5 ff 61 4d |..LF..n.:.u8..aM| +peer0.org1.example.com | 00000040 1a 61 e0 12 12 b6 |.a....|" +peer0.org1.example.com | "2019-09-24 01:05:10.919 UTC [cauthdsl] func2 -> DEBU 243f 0xc0038827b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.920 UTC [cauthdsl] func1 -> DEBU 2440 0xc0038827b0 gate 1569287110915416800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2441 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2442 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2443 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.921 UTC [policies] Evaluate -> DEBU 2444 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 2445 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 2446 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:10.923 UTC [gossip.discovery] learnExistingMembers -> DEBU 2447 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 2448 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 2449 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 244a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 244b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.925 UTC [gossip.discovery] sendMemResponse -> DEBU 244c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:10.925 UTC [msp] DeserializeIdentity -> DEBU 244d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.926 UTC [msp] DeserializeIdentity -> DEBU 244e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.926 UTC [msp] DeserializeIdentity -> DEBU 244f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.927 UTC [gossip.comm] Send -> DEBU 2450 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:10.928 UTC [gossip.discovery] sendMemResponse -> DEBU 2451 Exiting, replying with alive: alive: alive:\025\227\361\265\361\211" > alive: " +peer0.org1.example.com | "2019-09-24 01:05:10.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2452 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2453 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2454 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2455 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2457 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.931 UTC [gossip.gossip] handleMessage -> DEBU 2456 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.931 UTC [gossip.gossip] handleMessage -> DEBU 2458 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.932 UTC [msp.identity] Verify -> DEBU 2459 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +peer0.org1.example.com | 00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +peer0.org1.example.com | "2019-09-24 01:05:10.932 UTC [msp.identity] Verify -> DEBU 245a Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +peer0.org1.example.com | 00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +peer0.org1.example.com | 00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +peer0.org1.example.com | 00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +peer0.org1.example.com | 00000040 89 d8 a3 aa 96 74 |.....t|" +peer0.org1.example.com | "2019-09-24 01:05:10.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 245b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.932 UTC [gossip.discovery] isSentByMe -> DEBU 245c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 245d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 245e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [msp] DeserializeIdentity -> DEBU 245f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2460 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2461 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2462 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [policies] Evaluate -> DEBU 2463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.933 UTC [policies] Evaluate -> DEBU 2464 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 2465 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 2466 0xc003829370 gate 1569287110934061600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2467 0xc003829370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2468 0xc003829370 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2469 0xc003829370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 246a 0xc003829370 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 246b 0xc003829370 gate 1569287110934061600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 246f 0xc003829bb0 gate 1569287110934803600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2470 0xc003829bb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2471 0xc003829bb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2472 0xc003829bb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [msp.identity] Verify -> DEBU 2473 Verify: digest = 00000000 2b 89 6c c2 ea e8 f3 9b 02 01 10 09 06 9d 7d 60 |+.l...........}`| +peer0.org1.example.com | 00000010 8e f4 ae 3a c6 84 89 c3 23 b1 a0 f1 45 09 cd 7b |...:....#...E..{|" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [msp.identity] Verify -> DEBU 2474 Verify: sig = 00000000 30 45 02 21 00 c9 26 4a de a5 86 e3 9e 5e b2 a2 |0E.!..&J.....^..| +peer0.org1.example.com | 00000010 fc 0a 08 9a bc 28 24 73 a3 c0 42 e4 21 96 b4 4e |.....($s..B.!..N| +peer0.org1.example.com | 00000020 58 f5 b0 6e d8 02 20 1e c2 32 41 ed 66 1e 59 56 |X..n.. ..2A.f.YV| +peer0.org1.example.com | 00000030 b1 59 6e b0 c6 90 55 c6 1d 17 0b b4 f3 46 19 86 |.Yn...U......F..| +peer0.org1.example.com | 00000040 3e 15 97 f1 b5 f1 89 |>......|" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2475 0xc003829bb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [cauthdsl] func1 -> DEBU 2476 0xc003829bb0 gate 1569287110934803600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:10.935 UTC [policies] Evaluate -> DEBU 2477 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 2478 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 2479 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 247a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 247b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 247c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 247d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.937 UTC [msp.identity] Verify -> DEBU 247e Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +peer0.org1.example.com | 00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +peer0.org1.example.com | "2019-09-24 01:05:10.937 UTC [msp.identity] Verify -> DEBU 247f Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +peer0.org1.example.com | 00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +peer0.org1.example.com | 00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +peer0.org1.example.com | 00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2480 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 2481 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2482 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.938 UTC [gossip.gossip] handleMessage -> DEBU 2483 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2484 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2485 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:10.938 UTC [msp.identity] Verify -> DEBU 2486 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +peer0.org1.example.com | 00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +peer0.org1.example.com | "2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2487 Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +peer0.org1.example.com | 00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +peer0.org1.example.com | 00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +peer0.org1.example.com | 00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +peer0.org1.example.com | 00000040 89 d8 a3 aa 96 74 |.....t|" +peer0.org1.example.com | "2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2488 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2489 Verify: sig = 00000000 30 45 02 21 00 b0 07 88 37 ce 1e 6c 18 fc fd 22 |0E.!....7..l..."| +peer0.org1.example.com | 00000010 ee 86 70 cf a3 6e 6c c5 e5 04 42 d8 b4 ec 2a ba |..p..nl...B...*.| +peer0.org1.example.com | 00000020 c9 c8 c7 22 e2 02 20 7c af 4f 8e a5 c4 75 ae f7 |...".. |.O...u..| +peer0.org1.example.com | 00000030 de 06 e9 61 01 a1 8a cf da 8b c4 5b a3 70 a5 87 |...a.......[.p..| +peer0.org1.example.com | 00000040 fb 0e 0b f9 75 c2 56 |....u.V|" +peer0.org1.example.com | "2019-09-24 01:05:10.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 248a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.940 UTC [gossip.discovery] isSentByMe -> DEBU 248b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:10.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 248c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 248d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:10.990 UTC [dockercontroller] deployImage -> DEBU 248e Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +peer0.org1.example.com | "2019-09-24 01:05:10.990 UTC [dockercontroller] createContainer -> DEBU 248f create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:05:10.990 UTC [dockercontroller] getDockerHostConfig -> DEBU 2490 docker container hostconfig NetworkMode: hlf_net" +peer0.org1.example.com | "2019-09-24 01:05:11.088 UTC [dockercontroller] createContainer -> DEBU 2491 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | "2019-09-24 01:05:11.745 UTC [gossip.election] waitForInterrupt -> DEBU 2492 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:11.745 UTC [gossip.election] IsLeader -> DEBU 2493 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:11.747 UTC [msp] GetDefaultSigningIdentity -> DEBU 2494 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:11.747 UTC [msp.identity] Sign -> DEBU 2495 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100A1801 " +peer0.org1.example.com | "2019-09-24 01:05:11.748 UTC [msp.identity] Sign -> DEBU 2496 Sign: digest: 470F3468657CFB93B980914EC45013AF0AE2F3EC488A227A8F4A6A9089BB4F73 " +peer0.org1.example.com | "2019-09-24 01:05:11.748 UTC [gossip.election] waitForInterrupt -> DEBU 2497 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 2498 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 2499 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 249a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.750 UTC [msp] DeserializeIdentity -> DEBU 249b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.751 UTC [gossip.comm] Send -> DEBU 249c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:11.751 UTC [msp] DeserializeIdentity -> DEBU 249d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.751 UTC [msp] DeserializeIdentity -> DEBU 249e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:11.752 UTC [gossip.comm] sendToEndpoint -> DEBU 249f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:11.752 UTC [gossip.comm] sendToEndpoint -> DEBU 24a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:11.911 UTC [dockercontroller] Start -> DEBU 24a1 Started container dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | "2019-09-24 01:05:11.912 UTC [container] unlockContainer -> DEBU 24a2 container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-09-24 01:05:11.912 UTC [container] lockContainer -> DEBU 24a3 waiting for container(exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 01:05:11.912 UTC [container] lockContainer -> DEBU 24a4 got container (exp02-1.0) lock" +peer0.org1.example.com | "2019-09-24 01:05:11.912 UTC [container] unlockContainer -> DEBU 24a5 container lock deleted(exp02-1.0)" +peer0.org1.example.com | "2019-09-24 01:05:11.948 UTC [chaincode.accesscontrol] authenticate -> DEBU 24a6 Chaincode exp02:1.0 's authentication is authorized" +peer0.org1.example.com | "2019-09-24 01:05:11.948 UTC [chaincode] handleMessage -> DEBU 24a7 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:05:11.948 UTC [chaincode] HandleRegister -> DEBU 24a8 Received REGISTER in state created" +peer0.org1.example.com | "2019-09-24 01:05:11.949 UTC [chaincode] Register -> DEBU 24a9 registered handler complete for chaincode exp02:1.0" +peer0.org1.example.com | "2019-09-24 01:05:11.949 UTC [chaincode] HandleRegister -> DEBU 24aa Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +peer0.org1.example.com | "2019-09-24 01:05:11.950 UTC [chaincode] HandleRegister -> DEBU 24ab Changed state to established for name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 01:05:11.950 UTC [chaincode] sendReady -> DEBU 24ac sending READY for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 01:05:11.951 UTC [chaincode] sendReady -> DEBU 24ad Changed to state ready for chaincode name:"exp02:1.0" " +peer0.org1.example.com | "2019-09-24 01:05:11.952 UTC [chaincode] Launch -> DEBU 24ae launch complete" +peer0.org1.example.com | "2019-09-24 01:05:11.952 UTC [chaincode] Execute -> DEBU 24af Entry" +peer0.org1.example.com | "2019-09-24 01:05:11.954 UTC [chaincode] handleMessage -> DEBU 24b0 [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:11.954 UTC [chaincode] HandleTransaction -> DEBU 24b1 [920b3a8e] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:11.954 UTC [chaincode] HandleTransaction -> DEBU 24b2 [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:11.955 UTC [chaincode] handleMessage -> DEBU 24b3 [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:11.956 UTC [chaincode] HandleTransaction -> DEBU 24b4 [920b3a8e] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:11.956 UTC [chaincode] HandleTransaction -> DEBU 24b5 [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:11.957 UTC [chaincode] handleMessage -> DEBU 24b6 [920b3a8e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:11.957 UTC [chaincode] Notify -> DEBU 24b7 [920b3a8e] notifying Txid:920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:11.957 UTC [chaincode] Execute -> DEBU 24b8 Exit" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [endorser] callChaincode -> INFO 24b9 [businesschannel][920b3a8e] Exit chaincode: name:"lscc" (31611ms)" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 24ba Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [lockbasedtxmgr] Done -> DEBU 24bb Done with transaction simulation / query execution [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [endorser] SimulateProposal -> DEBU 24bc [businesschannel][920b3a8e] Exit" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [endorser] endorseProposal -> DEBU 24bd [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [endorser] endorseProposal -> DEBU 24be [businesschannel][920b3a8e] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:11.958 UTC [endorser] EndorseWithPlugin -> DEBU 24bf Entering endorsement for {plugin: escc, channel: businesschannel, tx: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:11.959 UTC [msp.identity] Sign -> DEBU 24c0 Sign: plaintext: 0A201A6FC0751CAAD428F774801633B9...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:11.959 UTC [msp.identity] Sign -> DEBU 24c1 Sign: digest: 283B7DE9CCFD6F00CE9D252F211CD8FE2857E676AF956918FDC7B0D7EC714F45 " +peer0.org1.example.com | "2019-09-24 01:05:11.959 UTC [endorser] EndorseWithPlugin -> DEBU 24c2 Exiting {plugin: escc, channel: businesschannel, tx: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:11.959 UTC [endorser] endorseProposal -> DEBU 24c3 [businesschannel][920b3a8e] Exit" +peer0.org1.example.com | "2019-09-24 01:05:11.959 UTC [lockbasedtxmgr] Done -> DEBU 24c4 Done with transaction simulation / query execution [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +peer0.org1.example.com | "2019-09-24 01:05:11.960 UTC [endorser] func1 -> DEBU 24c5 Exit: request from 172.18.0.5:49898" +peer0.org1.example.com | "2019-09-24 01:05:11.960 UTC [comm.grpc.server] 1 -> INFO 24c6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49898 grpc.code=OK grpc.call_duration=31.6218462s +peer0.org1.example.com | "2019-09-24 01:05:11.980 UTC [grpc] infof -> DEBU 24c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:11.981 UTC [grpc] infof -> DEBU 24c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:12.425 UTC [endorser] ProcessProposal -> DEBU 24c9 Entering: request from 172.18.0.5:49906" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [protoutils] ValidateProposalMessage -> DEBU 24ca ValidateProposalMessage starts for signed proposal 0xc003698730" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [protoutils] validateChannelHeader -> DEBU 24cb validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24cc begin" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [msp] GetManagerForChain -> DEBU 24cd Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24ce creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24cf creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [msp.identity] Verify -> DEBU 24d0 Verify: digest = 00000000 37 41 4e c0 1f 14 a4 de fb 36 ba 03 c2 f7 af 39 |7AN......6.....9| +peer0.org1.example.com | 00000010 6c 57 bf ff da 59 6d a2 3d fc bd 20 07 fa 8d 12 |lW...Ym.=.. ....|" +peer0.org1.example.com | "2019-09-24 01:05:12.426 UTC [msp.identity] Verify -> DEBU 24d1 Verify: sig = 00000000 30 45 02 21 00 87 48 a3 d8 a8 c7 f9 34 bd fc bd |0E.!..H.....4...| +peer0.org1.example.com | 00000010 e6 a4 91 50 a2 c8 5c e4 55 10 77 c0 6a a1 25 46 |...P..\.U.w.j.%F| +peer0.org1.example.com | 00000020 66 35 4b fb d9 02 20 38 b1 9b 44 9a b1 c8 cb 73 |f5K... 8..D....s| +peer0.org1.example.com | 00000030 26 ca b2 9f 42 26 03 80 27 3d 0e 78 46 dc 25 6f |&...B&..'=.xF.%o| +peer0.org1.example.com | 00000040 f3 70 03 37 60 23 1b |.p.7`#.|" +peer0.org1.example.com | "2019-09-24 01:05:12.427 UTC [protoutils] checkSignatureFromCreator -> DEBU 24d2 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:12.427 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 24d3 validateChaincodeProposalMessage starts for proposal 0xc0026eb880, header 0xc003698b40" +peer0.org1.example.com | "2019-09-24 01:05:12.428 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 24d4 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:12.428 UTC [endorser] preProcess -> DEBU 24d5 [businesschannel][13c0b6ef] processing txid: 13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe" +peer0.org1.example.com | "2019-09-24 01:05:12.428 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 24d6 retrieveTransactionByID() - txId = [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +peer0.org1.example.com | "2019-09-24 01:05:12.429 UTC [aclmgmt] CheckACL -> DEBU 24d7 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:12.429 UTC [aclmgmt] CheckACL -> DEBU 24d8 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:12.430 UTC [cauthdsl] func1 -> DEBU 24dc 0xc003562d10 gate 1569287112430509800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:12.430 UTC [cauthdsl] func2 -> DEBU 24dd 0xc003562d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:12.430 UTC [cauthdsl] func2 -> DEBU 24de 0xc003562d10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:12.430 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 24df Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:12.431 UTC [msp] Validate -> DEBU 24e0 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:12.431 UTC [msp] getCertificationChain -> DEBU 24e1 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [cauthdsl] func2 -> DEBU 24e2 0xc003562d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [msp.identity] Verify -> DEBU 24e3 Verify: digest = 00000000 37 41 4e c0 1f 14 a4 de fb 36 ba 03 c2 f7 af 39 |7AN......6.....9| +peer0.org1.example.com | 00000010 6c 57 bf ff da 59 6d a2 3d fc bd 20 07 fa 8d 12 |lW...Ym.=.. ....|" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [msp.identity] Verify -> DEBU 24e4 Verify: sig = 00000000 30 45 02 21 00 87 48 a3 d8 a8 c7 f9 34 bd fc bd |0E.!..H.....4...| +peer0.org1.example.com | 00000010 e6 a4 91 50 a2 c8 5c e4 55 10 77 c0 6a a1 25 46 |...P..\.U.w.j.%F| +peer0.org1.example.com | 00000020 66 35 4b fb d9 02 20 38 b1 9b 44 9a b1 c8 cb 73 |f5K... 8..D....s| +peer0.org1.example.com | 00000030 26 ca b2 9f 42 26 03 80 27 3d 0e 78 46 dc 25 6f |&...B&..'=.xF.%o| +peer0.org1.example.com | 00000040 f3 70 03 37 60 23 1b |.p.7`#.|" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [cauthdsl] func2 -> DEBU 24e5 0xc003562d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [cauthdsl] func1 -> DEBU 24e6 0xc003562d10 gate 1569287112430509800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [policies] Evaluate -> DEBU 24e7 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:12.432 UTC [policies] Evaluate -> DEBU 24e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:12.433 UTC [policies] Evaluate -> DEBU 24e9 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:12.433 UTC [policies] Evaluate -> DEBU 24ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:12.434 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 24eb constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:12.434 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 24ec constructing new tx simulator txid = [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +peer0.org1.example.com | "2019-09-24 01:05:12.434 UTC [endorser] SimulateProposal -> DEBU 24ed [businesschannel][13c0b6ef] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:12.434 UTC [stateleveldb] GetState -> DEBU 24ee GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:12.435 UTC [endorser] SimulateProposal -> DEBU 24ef [businesschannel][13c0b6ef] Exit" +peer0.org1.example.com | "2019-09-24 01:05:12.435 UTC [lockbasedtxmgr] Done -> DEBU 24f0 Done with transaction simulation / query execution [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +peer0.org1.example.com | "2019-09-24 01:05:12.435 UTC [endorser] func1 -> DEBU 24f1 Exit: request from 172.18.0.5:49906" +peer0.org1.example.com | "2019-09-24 01:05:12.436 UTC [comm.grpc.server] 1 -> INFO 24f2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49906 grpc.code=OK grpc.call_duration=10.7942ms +peer0.org1.example.com | "2019-09-24 01:05:12.440 UTC [grpc] infof -> DEBU 24f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:12.441 UTC [grpc] infof -> DEBU 24f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:13.558 UTC [gossip.comm] func1 -> DEBU 24f5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.558 UTC [gossip.gossip] handleMessage -> DEBU 24f6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.558 UTC [gossip.gossip] handleMessage -> DEBU 24f7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f9 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:13.559 UTC [msp.identity] Verify -> DEBU 24fa Verify: digest = 00000000 d5 0b 75 07 02 0d 2d c4 14 44 2f 8e 53 d5 a5 f8 |..u...-..D/.S...| +peer0.org1.example.com | 00000010 8f 80 d3 65 99 ce b3 71 8d 7a e6 b9 85 6e 52 9a |...e...q.z...nR.|" +peer0.org1.example.com | "2019-09-24 01:05:13.559 UTC [msp.identity] Verify -> DEBU 24fb Verify: sig = 00000000 30 44 02 20 35 b9 5c 9d 06 ee ca 2a 94 e2 70 5f |0D. 5.\....*..p_| +peer0.org1.example.com | 00000010 0c b8 f5 7d 7f 9c 61 66 81 80 fc 55 61 3a 73 44 |...}..af...Ua:sD| +peer0.org1.example.com | 00000020 b2 91 fe 31 02 20 6d 8a 8d c0 e8 6b bc 5c fc ec |...1. m....k.\..| +peer0.org1.example.com | 00000030 0d ed aa c9 e9 84 00 49 5d 86 ff d6 1a ea 71 bc |.......I].....q.| +peer0.org1.example.com | 00000040 ab e4 ce a7 2e 78 |.....x|" +peer0.org1.example.com | "2019-09-24 01:05:13.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:13.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2500 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:13.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2501 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2502 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2503 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.567 UTC [gossip.comm] func1 -> DEBU 2504 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.567 UTC [gossip.gossip] handleMessage -> DEBU 2505 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.567 UTC [gossip.gossip] handleMessage -> DEBU 2506 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2507 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2508 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.568 UTC [gossip.comm] func1 -> DEBU 2509 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.568 UTC [gossip.gossip] handleMessage -> DEBU 250a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.568 UTC [gossip.gossip] handleMessage -> DEBU 250b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 250c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 250d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 250e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 250f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 2510 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.569 UTC [gossip.comm] Send -> DEBU 2511 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 2512 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.570 UTC [gossip.comm] Send -> DEBU 2513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:13.570 UTC [gossip.comm] sendToEndpoint -> DEBU 2514 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.570 UTC [gossip.comm] sendToEndpoint -> DEBU 2515 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2516 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2517 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.693 UTC [msp] DeserializeIdentity -> DEBU 2518 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.693 UTC [msp] DeserializeIdentity -> DEBU 2519 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.694 UTC [gossip.comm] Send -> DEBU 251a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.695 UTC [gossip.comm] sendToEndpoint -> DEBU 251e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.696 UTC [gossip.comm] sendToEndpoint -> DEBU 251f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.697 UTC [gossip.comm] func1 -> DEBU 2520 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.697 UTC [gossip.gossip] handleMessage -> DEBU 2521 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2522 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.699 UTC [gossip.comm] func1 -> DEBU 2523 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.697 UTC [msp] DeserializeIdentity -> DEBU 2524 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.700 UTC [msp] DeserializeIdentity -> DEBU 2525 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.701 UTC [gossip.comm] func1 -> DEBU 2526 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.701 UTC [msp] DeserializeIdentity -> DEBU 2527 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2528 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2529 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.703 UTC [cauthdsl] func1 -> DEBU 252e 0xc0034da120 gate 1569287113703609100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.703 UTC [cauthdsl] func2 -> DEBU 252f 0xc0034da120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2530 0xc0034da120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2531 0xc0034da120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2532 0xc0034da120 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [cauthdsl] func1 -> DEBU 2533 0xc0034da120 gate 1569287113703609100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [policies] Evaluate -> DEBU 2534 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.704 UTC [policies] Evaluate -> DEBU 2535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.705 UTC [policies] Evaluate -> DEBU 2536 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.705 UTC [cauthdsl] func1 -> DEBU 2537 0xc0034daaa0 gate 1569287113705540700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.705 UTC [cauthdsl] func2 -> DEBU 2538 0xc0034daaa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.705 UTC [cauthdsl] func2 -> DEBU 2539 0xc0034daaa0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.706 UTC [cauthdsl] func2 -> DEBU 253a 0xc0034daaa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.706 UTC [msp.identity] Verify -> DEBU 253b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:13.706 UTC [msp.identity] Verify -> DEBU 253c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:13.707 UTC [cauthdsl] func2 -> DEBU 253d 0xc0034daaa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.707 UTC [cauthdsl] func1 -> DEBU 253e 0xc0034daaa0 gate 1569287113705540700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.707 UTC [policies] Evaluate -> DEBU 253f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.707 UTC [policies] Evaluate -> DEBU 2540 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.708 UTC [policies] Evaluate -> DEBU 2541 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.708 UTC [policies] Evaluate -> DEBU 2542 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.708 UTC [msp.identity] Verify -> DEBU 2543 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:13.708 UTC [msp.identity] Verify -> DEBU 2544 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:13.709 UTC [msp] DeserializeIdentity -> DEBU 2545 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.709 UTC [msp] DeserializeIdentity -> DEBU 2546 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2547 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2548 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2549 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [cauthdsl] func1 -> DEBU 254d 0xc0034c2a40 gate 1569287113710514700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 254e 0xc0034c2a40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 254f 0xc0034c2a40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 2550 0xc0034c2a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 2551 0xc0034c2a40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.711 UTC [cauthdsl] func1 -> DEBU 2552 0xc0034c2a40 gate 1569287113710514700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.715 UTC [policies] Evaluate -> DEBU 2553 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.715 UTC [policies] Evaluate -> DEBU 2554 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.716 UTC [policies] Evaluate -> DEBU 2555 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.716 UTC [cauthdsl] func1 -> DEBU 2556 0xc0034c3300 gate 1569287113716449500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2557 0xc0034c3300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2558 0xc0034c3300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2559 0xc0034c3300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.717 UTC [msp.identity] Verify -> DEBU 255a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:13.717 UTC [msp.identity] Verify -> DEBU 255b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:13.717 UTC [cauthdsl] func2 -> DEBU 255c 0xc0034c3300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.717 UTC [cauthdsl] func1 -> DEBU 255d 0xc0034c3300 gate 1569287113716449500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.717 UTC [policies] Evaluate -> DEBU 255e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 255f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 2560 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 2561 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.719 UTC [msp.identity] Verify -> DEBU 2562 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:13.719 UTC [msp.identity] Verify -> DEBU 2563 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:13.719 UTC [gossip.gossip] handleMessage -> DEBU 2564 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.719 UTC [gossip.gossip] handleMessage -> DEBU 2565 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2566 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2567 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2568 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:13.721 UTC [msp.identity] Verify -> DEBU 2569 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:13.721 UTC [msp] DeserializeIdentity -> DEBU 256a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.721 UTC [msp] DeserializeIdentity -> DEBU 256b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 256c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.722 UTC [policies] Evaluate -> DEBU 256f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.722 UTC [policies] Evaluate -> DEBU 2570 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [policies] Evaluate -> DEBU 2571 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [cauthdsl] func1 -> DEBU 2572 0xc0034824a0 gate 1569287113723286000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2573 0xc0034824a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2574 0xc0034824a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2575 0xc0034824a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2576 0xc0034824a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.724 UTC [cauthdsl] func1 -> DEBU 2577 0xc0034824a0 gate 1569287113723286000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.724 UTC [policies] Evaluate -> DEBU 2578 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.724 UTC [policies] Evaluate -> DEBU 2579 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.725 UTC [policies] Evaluate -> DEBU 257a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.725 UTC [cauthdsl] func1 -> DEBU 257b 0xc003482ce0 gate 1569287113725101800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257c 0xc003482ce0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257d 0xc003482ce0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257e 0xc003482ce0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.726 UTC [msp.identity] Verify -> DEBU 257f Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:13.726 UTC [msp.identity] Verify -> DEBU 2580 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:13.726 UTC [cauthdsl] func2 -> DEBU 2581 0xc003482ce0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [cauthdsl] func1 -> DEBU 2582 0xc003482ce0 gate 1569287113725101800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2583 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2584 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2585 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2586 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.727 UTC [msp] DeserializeIdentity -> DEBU 2587 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.728 UTC [msp] DeserializeIdentity -> DEBU 2588 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2589 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func1 -> DEBU 258f 0xc0034504d0 gate 1569287113729523900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2590 0xc0034504d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2591 0xc0034504d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2592 0xc0034504d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2593 0xc0034504d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.729 UTC [cauthdsl] func1 -> DEBU 2594 0xc0034504d0 gate 1569287113729523900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2595 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2596 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [cauthdsl] func1 -> DEBU 2598 0xc003450d10 gate 1569287113730601100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 2599 0xc003450d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 259a 0xc003450d10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 259b 0xc003450d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [msp.identity] Verify -> DEBU 259c Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [msp.identity] Verify -> DEBU 259d Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [cauthdsl] func2 -> DEBU 259e 0xc003450d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [cauthdsl] func1 -> DEBU 259f 0xc003450d10 gate 1569287113730601100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [policies] Evaluate -> DEBU 25a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.731 UTC [policies] Evaluate -> DEBU 25a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [policies] Evaluate -> DEBU 25a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [policies] Evaluate -> DEBU 25a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [gossip.gossip] handleMessage -> DEBU 25a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [gossip.gossip] handleMessage -> DEBU 25a5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.732 UTC [msp] DeserializeIdentity -> DEBU 25a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [msp] DeserializeIdentity -> DEBU 25a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25aa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ab Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.734 UTC [cauthdsl] func1 -> DEBU 25af 0xc003436830 gate 1569287113734027400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b0 0xc003436830 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b1 0xc003436830 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b2 0xc003436830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b3 0xc003436830 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [cauthdsl] func1 -> DEBU 25b4 0xc003436830 gate 1569287113734027400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [cauthdsl] func1 -> DEBU 25b8 0xc003437070 gate 1569287113735495200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25b9 0xc003437070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25ba 0xc003437070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25bb 0xc003437070 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [msp.identity] Verify -> DEBU 25bc Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +peer0.org1.example.com | 00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [msp.identity] Verify -> DEBU 25bd Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +peer0.org1.example.com | 00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +peer0.org1.example.com | 00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +peer0.org1.example.com | 00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +peer0.org1.example.com | 00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [cauthdsl] func2 -> DEBU 25be 0xc003437070 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [cauthdsl] func1 -> DEBU 25bf 0xc003437070 gate 1569287113735495200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.737 UTC [policies] Evaluate -> DEBU 25c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c4 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c5 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +peer0.org1.example.com | 00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +peer0.org1.example.com | "2019-09-24 01:05:13.738 UTC [msp.identity] Verify -> DEBU 25c7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +peer0.org1.example.com | 00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +peer0.org1.example.com | 00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +peer0.org1.example.com | 00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +peer0.org1.example.com | 00000040 75 4a a7 55 37 8e |uJ.U7.|" +peer0.org1.example.com | "2019-09-24 01:05:13.738 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.738 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25cb Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.740 UTC [msp] DeserializeIdentity -> DEBU 25cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.740 UTC [msp] DeserializeIdentity -> DEBU 25cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.740 UTC [gossip.pull] Hello -> DEBU 25ce Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:13.741 UTC [msp] DeserializeIdentity -> DEBU 25cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.741 UTC [msp] DeserializeIdentity -> DEBU 25d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.741 UTC [gossip.comm] Send -> DEBU 25d1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:13.742 UTC [gossip.comm] sendToEndpoint -> DEBU 25d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.742 UTC [gossip.comm] sendToEndpoint -> DEBU 25d3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:13.742 UTC [policies] Evaluate -> DEBU 25d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.743 UTC [gossip.comm] func1 -> DEBU 25d6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.744 UTC [policies] Evaluate -> DEBU 25d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:13.744 UTC [policies] Evaluate -> DEBU 25d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.744 UTC [cauthdsl] func1 -> DEBU 25d9 0xc0034037d0 gate 1569287113744331800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25da 0xc0034037d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25db 0xc0034037d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25dc 0xc0034037d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25dd 0xc0034037d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [cauthdsl] func1 -> DEBU 25de 0xc0034037d0 gate 1569287113744331800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25df Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:13.746 UTC [cauthdsl] func1 -> DEBU 25e2 0xc0033c6010 gate 1569287113746214800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e3 0xc0033c6010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e4 0xc0033c6010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e5 0xc0033c6010 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.746 UTC [msp.identity] Verify -> DEBU 25e6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +peer0.org1.example.com | 00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +peer0.org1.example.com | "2019-09-24 01:05:13.747 UTC [msp.identity] Verify -> DEBU 25e7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +peer0.org1.example.com | 00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +peer0.org1.example.com | 00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +peer0.org1.example.com | 00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +peer0.org1.example.com | 00000040 71 b0 09 f6 0b e3 |q.....|" +peer0.org1.example.com | "2019-09-24 01:05:13.747 UTC [cauthdsl] func2 -> DEBU 25e8 0xc0033c6010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:13.747 UTC [cauthdsl] func1 -> DEBU 25e9 0xc0033c6010 gate 1569287113746214800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:13.747 UTC [policies] Evaluate -> DEBU 25ea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.747 UTC [policies] Evaluate -> DEBU 25eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [policies] Evaluate -> DEBU 25ec Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [policies] Evaluate -> DEBU 25ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25ee Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25ef Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [gossip.pull] HandleMessage -> DEBU 25f0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25f1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.878 UTC [gossip.comm] func1 -> DEBU 25f2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.878 UTC [gossip.gossip] handleMessage -> DEBU 25f3 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.878 UTC [msp] DeserializeIdentity -> DEBU 25f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.879 UTC [msp] DeserializeIdentity -> DEBU 25f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:13.879 UTC [gossip.gossip] handleMessage -> DEBU 25f6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:13.894 UTC [gossip.comm] func1 -> DEBU 25f7 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.894 UTC [gossip.gossip] handleMessage -> DEBU 25f8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.895 UTC [gossip.pull] HandleMessage -> DEBU 25f9 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:13.895 UTC [gossip.pull] SendDigest -> DEBU 25fa Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:13.895 UTC [gossip.gossip] handleMessage -> DEBU 25fb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.001 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 25fc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.002 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 25fd Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 25fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 25ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.003 UTC [msp] DeserializeIdentity -> DEBU 2601 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.005 UTC [msp.identity] newIdentity -> DEBU 2602 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +peer0.org1.example.com | KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +peer0.org1.example.com | YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +peer0.org1.example.com | MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +peer0.org1.example.com | oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +peer0.org1.example.com | PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +peer0.org1.example.com | fQ== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:14.006 UTC [cauthdsl] func1 -> DEBU 2603 0xc003372080 gate 1569287114006981400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.007 UTC [cauthdsl] func2 -> DEBU 2604 0xc003372080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.007 UTC [cauthdsl] func2 -> DEBU 2605 0xc003372080 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.007 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2606 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:05:14.010 UTC [msp] Validate -> DEBU 2607 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:14.012 UTC [cauthdsl] func2 -> DEBU 2608 0xc003372080 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.017 UTC [msp.identity] Verify -> DEBU 2609 Verify: digest = 00000000 6e df 11 bf 53 6d ce 34 a8 64 be b5 77 1b 1b 28 |n...Sm.4.d..w..(| +peer0.org1.example.com | 00000010 30 1b 6a 11 9e f4 a9 4a 7f c1 ee 32 a4 33 65 50 |0.j....J...2.3eP|" +peer0.org1.example.com | "2019-09-24 01:05:14.017 UTC [msp.identity] Verify -> DEBU 260a Verify: sig = 00000000 30 45 02 21 00 d6 0b a8 d5 cb c9 86 ba 24 73 c0 |0E.!.........$s.| +peer0.org1.example.com | 00000010 63 ac b4 85 9d 03 52 82 a6 f1 d6 3e 88 be 52 22 |c.....R....>..R"| +peer0.org1.example.com | 00000020 83 06 12 1b c4 02 20 25 d8 c5 33 f6 ba 40 48 d8 |...... %..3..@H.| +peer0.org1.example.com | 00000030 be 44 b9 59 05 e1 49 1f fd 02 a3 0f 6c 15 fb 2d |.D.Y..I.....l..-| +peer0.org1.example.com | 00000040 fd 16 76 fc 47 04 cf |..v.G..|" +peer0.org1.example.com | "2019-09-24 01:05:14.019 UTC [cauthdsl] func2 -> DEBU 260b 0xc003372080 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.019 UTC [cauthdsl] func1 -> DEBU 260c 0xc003372080 gate 1569287114006981400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260f Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:14.020 UTC [policies] Evaluate -> DEBU 2610 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:14.021 UTC [blocksProvider] DeliverBlocks -> DEBU 2611 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.021 UTC [gossip.state] addPayload -> DEBU 2612 [businesschannel] Adding payload to local buffer, blockNum = [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.023 UTC [gossip.state] addPayload -> DEBU 2613 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 01:05:14.023 UTC [blocksProvider] DeliverBlocks -> DEBU 2614 [businesschannel] Gossiping block [3], peers number [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.024 UTC [gossip.channel] AddToMsgStore -> DEBU 2615 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:05:14.024 UTC [gossip.pull] Add -> DEBU 2616 Added 3, total items: 3" +peer0.org1.example.com | "2019-09-24 01:05:14.024 UTC [gossip.state] deliverPayloads -> DEBU 2617 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.024 UTC [gossip.state] deliverPayloads -> DEBU 2618 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:05:14.025 UTC [gossip.privdata] StoreBlock -> INFO 2619 [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-09-24 01:05:14.025 UTC [gossip.privdata] StoreBlock -> DEBU 261a [businesschannel] Validating block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.026 UTC [committer.txvalidator] Validate -> DEBU 261b [businesschannel] START Block Validation for block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.026 UTC [committer.txvalidator] Validate -> DEBU 261c expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:05:14.026 UTC [committer.txvalidator] validateTx -> DEBU 261d [businesschannel] validateTx starts for block 0xc0003b3c00 env 0xc0034cc820 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:14.028 UTC [protoutils] ValidateTransaction -> DEBU 261e ValidateTransactionEnvelope starts for envelope 0xc0034cc820" +peer0.org1.example.com | "2019-09-24 01:05:14.028 UTC [protoutils] ValidateTransaction -> DEBU 261f Header is channel_header:"\010\003\032\014\010\250\327\245\354\005\020\220\325\231\261\001\"\017businesschannel*@920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\333~ \007\222\207\n\037\005\344\201my\377z\"\013\035\275\306y@k\177" " +peer0.org1.example.com | "2019-09-24 01:05:14.028 UTC [protoutils] validateChannelHeader -> DEBU 2620 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:14.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2621 begin" +peer0.org1.example.com | "2019-09-24 01:05:14.029 UTC [msp] GetManagerForChain -> DEBU 2622 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:14.031 UTC [protoutils] checkSignatureFromCreator -> DEBU 2623 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:14.032 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:14.032 UTC [msp.identity] Verify -> DEBU 2625 Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +peer0.org1.example.com | 00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +peer0.org1.example.com | "2019-09-24 01:05:14.034 UTC [msp.identity] Verify -> DEBU 2626 Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +peer0.org1.example.com | 00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +peer0.org1.example.com | 00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +peer0.org1.example.com | 00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +peer0.org1.example.com | 00000040 cf d1 1e e6 b1 d6 |......|" +peer0.org1.example.com | "2019-09-24 01:05:14.034 UTC [protoutils] checkSignatureFromCreator -> DEBU 2627 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:14.035 UTC [msp] DeserializeIdentity -> DEBU 2628 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.035 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [gossip.comm] Send -> DEBU 262c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [gossip.comm] sendToEndpoint -> DEBU 262f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.036 UTC [gossip.comm] sendToEndpoint -> DEBU 2630 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2631 validateEndorserTransaction starts for data 0xc0039c0000, header channel_header:"\010\003\032\014\010\250\327\245\354\005\020\220\325\231\261\001\"\017businesschannel*@920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\333~ \007\222\207\n\037\005\344\201my\377z\"\013\035\275\306y@k\177" " +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2632 validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2633 validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [protoutils] ValidateTransaction -> DEBU 2634 ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [committer.txvalidator] validateTx -> DEBU 2635 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2636 retrieveTransactionByID() - txId = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [committer.txvalidator] validateTx -> DEBU 2637 Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2638 [businesschannel] VSCCValidateTx starts for bytes 0xc00397a000" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2639 Validating Tx 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 263a constructing new query executor txid = [8392fa6f-05f6-49ff-962e-b5278f8eec75]" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [lockbasedtxmgr] Done -> DEBU 263b Done with transaction simulation / query execution [8392fa6f-05f6-49ff-962e-b5278f8eec75]" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [msp] DeserializeIdentity -> DEBU 263c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.037 UTC [msp.identity] newIdentity -> DEBU 263d Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +peer0.org1.example.com | 6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +peer0.org1.example.com | PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +peer0.org1.example.com | doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:14.038 UTC [cauthdsl] func1 -> DEBU 263e 0xc003312430 gate 1569287114037998300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.038 UTC [cauthdsl] func2 -> DEBU 263f 0xc003312430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.038 UTC [cauthdsl] func2 -> DEBU 2640 0xc003312430 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.038 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2641 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:14.038 UTC [msp] Validate -> DEBU 2642 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:14.039 UTC [msp] getCertificationChain -> DEBU 2643 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:14.039 UTC [cauthdsl] func2 -> DEBU 2644 0xc003312430 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.042 UTC [msp.identity] Verify -> DEBU 2645 Verify: digest = 00000000 28 3b 7d e9 cc fd 6f 00 ce 9d 25 2f 21 1c d8 fe |(;}...o...%/!...| +peer0.org1.example.com | 00000010 28 57 e6 76 af 95 69 18 fd c7 b0 d7 ec 71 4f 45 |(W.v..i......qOE|" +peer0.org1.example.com | "2019-09-24 01:05:14.043 UTC [msp.identity] Verify -> DEBU 2646 Verify: sig = 00000000 30 45 02 21 00 b1 5f 76 7c f1 ba cb d9 0f 91 62 |0E.!.._v|......b| +peer0.org1.example.com | 00000010 df 74 be 01 f9 8c 93 57 3e 93 d5 00 ef b5 21 dc |.t.....W>.....!.| +peer0.org1.example.com | 00000020 a9 7b 25 c6 06 02 20 02 d8 e4 97 0b 3f 4a d4 ce |.{%... .....?J..| +peer0.org1.example.com | 00000030 8a ff 8d 3b 44 4c f3 3c 9b 9b 4e 84 c4 38 08 50 |...;DL.<..N..8.P| +peer0.org1.example.com | 00000040 d9 d8 7a c5 c6 fd 0c |..z....|" +peer0.org1.example.com | "2019-09-24 01:05:14.045 UTC [cauthdsl] func2 -> DEBU 2647 0xc003312430 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 2648 0xc003312430 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 2649 0xc003312430 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 264a 0xc003312430 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.046 UTC [cauthdsl] func1 -> DEBU 264b 0xc003312430 gate 1569287114037998300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.047 UTC [vscc] Validate -> DEBU 264c VSCC info: doing special validation for LSCC" +peer0.org1.example.com | "2019-09-24 01:05:14.048 UTC [vscc] ValidateLSCCInvocation -> DEBU 264d VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-09-24 01:05:14.049 UTC [vscc] ValidateLSCCInvocation -> DEBU 264e VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +peer0.org1.example.com | "2019-09-24 01:05:14.050 UTC [vscc] ValidateLSCCInvocation -> DEBU 264f Namespace exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.050 UTC [vscc] ValidateLSCCInvocation -> DEBU 2650 Namespace lscc" +peer0.org1.example.com | "2019-09-24 01:05:14.051 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2651 constructing new query executor txid = [cc7dabd2-2cf5-40c1-9697-ebf10d333b77]" +peer0.org1.example.com | "2019-09-24 01:05:14.051 UTC [stateleveldb] GetState -> DEBU 2652 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.051 UTC [lockbasedtxmgr] Done -> DEBU 2653 Done with transaction simulation / query execution [cc7dabd2-2cf5-40c1-9697-ebf10d333b77]" +peer0.org1.example.com | "2019-09-24 01:05:14.051 UTC [vscc] ValidateLSCCInvocation -> DEBU 2654 Validating deploy for cc exp02 version 1.0" +peer0.org1.example.com | "2019-09-24 01:05:14.052 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2655 constructing new query executor txid = [80b8b37c-bf02-4d17-8ba4-13025b921e75]" +peer0.org1.example.com | "2019-09-24 01:05:14.052 UTC [stateleveldb] GetState -> DEBU 2656 GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 01:05:14.053 UTC [lockbasedtxmgr] Done -> DEBU 2657 Done with transaction simulation / query execution [80b8b37c-bf02-4d17-8ba4-13025b921e75]" +peer0.org1.example.com | "2019-09-24 01:05:14.053 UTC [cauthdsl] func1 -> DEBU 2658 0xc0032be750 gate 1569287114053420500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 2659 0xc0032be750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 265a 0xc0032be750 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 265b 0xc0032be750 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.054 UTC [msp.identity] Verify -> DEBU 265c Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +peer0.org1.example.com | 00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +peer0.org1.example.com | "2019-09-24 01:05:14.054 UTC [msp.identity] Verify -> DEBU 265d Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +peer0.org1.example.com | 00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +peer0.org1.example.com | 00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +peer0.org1.example.com | 00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +peer0.org1.example.com | 00000040 cf d1 1e e6 b1 d6 |......|" +peer0.org1.example.com | "2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 265e 0xc0032be750 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 265f 0xc0032be750 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 2660 0xc0032be750 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 2661 0xc0032be750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.056 UTC [cauthdsl] func1 -> DEBU 2662 0xc0032be750 gate 1569287114053420500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.056 UTC [vscc] Validate -> DEBU 2663 block 3, namespace: lscc, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 01:05:14.056 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2664 Transaction 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 appears to be valid" +peer0.org1.example.com | "2019-09-24 01:05:14.057 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2665 [businesschannel] VSCCValidateTx completes env bytes 0xc00397a000" +peer0.org1.example.com | "2019-09-24 01:05:14.057 UTC [committer.txvalidator] Validate -> DEBU 2666 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:05:14.057 UTC [committer.txvalidator] Validate -> INFO 2667 [businesschannel] Validated block [3] in 31ms" +peer0.org1.example.com | "2019-09-24 01:05:14.058 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2668 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:05:14.058 UTC [gossip.privdata] StoreBlock -> DEBU 2669 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:05:14.058 UTC [kvledger] CommitWithPvtData -> DEBU 266a [businesschannel] Validating state for block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.058 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:05:14.058 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266c lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:05:14.059 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266d Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:05:14.059 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 266e ValidateAndPrepareBatch() for block number = [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.059 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 266f preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:14.059 UTC [valimpl] preprocessProtoBlock -> DEBU 2670 txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 01:05:14.060 UTC [stateleveldb] GetState -> DEBU 2671 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.060 UTC [statebasedval] validateKVRead -> DEBU 2672 Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +peer0.org1.example.com | "2019-09-24 01:05:14.060 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2673 Block [3] Transaction index [0] TxId [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [valinternal] ApplyWriteSet -> DEBU 2674 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00258a500), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00258a540), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00258a580)}" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2675 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2676 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2677 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2678 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0034ced70)}}" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleStateUpdates -> INFO 2679 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [stateleveldb] GetState -> DEBU 267a GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 267b Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-09-24 01:05:14.062 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 267c Created metadata tar" +peer0.org1.example.com | "2019-09-24 01:05:14.062 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 267d Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +peer0.org1.example.com | "2019-09-24 01:05:14.062 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 267e Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +peer0.org1.example.com | "2019-09-24 01:05:14.062 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 267f Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +peer0.org1.example.com | "2019-09-24 01:05:14.062 UTC [stateleveldb] GetState -> DEBU 2680 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2681 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 52 58 144 240 110 207 56 101 78 202 52 49 57 223 134 6 123 34 173 95 237 156 185 141 51 29 190 63 231 47 70 30 2 32 66 224 77 177 176 27 188 75 228 104 123 24 87 128 51 157 226 182 180 248 196 248 125 250 44 190 102 227 160 241 180 195]} 0x1527e30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002957380 0xc0027c1500 {{0 0} 0 0 0 0} {false}})]}" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [stateleveldb] GetState -> DEBU 2682 GetState(). ns=lscc, key=exp02~collection" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2683 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc000191f40})}" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [kvledger] CommitWithPvtData -> DEBU 2684 [businesschannel] Adding CommitHash to the block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [kvledger] CommitWithPvtData -> DEBU 2685 [businesschannel] Committing block [3] to storage" +peer0.org1.example.com | "2019-09-24 01:05:14.063 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2686 Writing block [3] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:05:14.057 UTC [committer.txvalidator] validateTx -> DEBU 2687 [businesschannel] validateTx completes for block 0xc0003b3c00 env 0xc0034cc820 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:14.065 UTC [pvtdatastorage] Prepare -> DEBU 2688 Saved 0 private data write sets for block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 2689 Indexing block [blockNum=3, blockHash=[]byte{0x7b, 0xa8, 0x45, 0xce, 0x5d, 0x8d, 0x8, 0x76, 0x56, 0x78, 0x91, 0xdb, 0x7d, 0x1c, 0x31, 0x7b, 0xf2, 0x8, 0x34, 0xf4, 0xa9, 0x92, 0xfe, 0x49, 0x2f, 0x65, 0x4, 0x9f, 0x10, 0x2b, 0x3a, 0x80} txOffsets= +peer0.org1.example.com | txId=920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 locPointer=offset=70, bytesLength=3516 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 268a Adding txLoc [fileSuffixNum=0, offset=76909, bytesLength=3516] for tx ID: [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] to txid-index" +peer0.org1.example.com | "2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 268b Adding txLoc [fileSuffixNum=0, offset=76909, bytesLength=3516] for tx number:[0] ID: [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:05:14.068 UTC [fsblkstorage] updateCheckpoint -> DEBU 268c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81398], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | "2019-09-24 01:05:14.068 UTC [pvtdatastorage] Commit -> DEBU 268d Committing private data for block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.069 UTC [pvtdatastorage] Commit -> DEBU 268e Committed private data for block [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [kvledger] CommitWithPvtData -> DEBU 268f [businesschannel] Committing block [3] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2690 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2691 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2692 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2693 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [stateleveldb] ApplyUpdates -> DEBU 2694 Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +peer0.org1.example.com | "2019-09-24 01:05:14.070 UTC [stateleveldb] ApplyUpdates -> DEBU 2695 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 01:05:14.071 UTC [stateleveldb] ApplyUpdates -> DEBU 2696 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 01:05:14.072 UTC [lockbasedtxmgr] Commit -> DEBU 2697 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:05:14.072 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2698 Preparing potential purge list working-set for expiringAtBlk [4]" +peer0.org1.example.com | "2019-09-24 01:05:14.072 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2699 constructing new query executor txid = [b530097f-370c-4efd-87a7-fac3c5269d57]" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 269a Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [stateleveldb] GetState -> DEBU 269b GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 269c Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [lockbasedtxmgr] Done -> DEBU 269d Done with transaction simulation / query execution [b530097f-370c-4efd-87a7-fac3c5269d57]" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 269e Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +peer0.org1.example.com | "2019-09-24 01:05:14.073 UTC [msp] GetDefaultSigningIdentity -> DEBU 269f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.074 UTC [msp.identity] Sign -> DEBU 26a0 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08031A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 01:05:14.074 UTC [msp.identity] Sign -> DEBU 26a1 Sign: digest: D6196EB0D8CB159321B6858FE3AACF325F0D9FB789F5C4F42AEC7B36ED3C91E2 " +peer0.org1.example.com | "2019-09-24 01:05:14.074 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 26a2 Listeners for channel businesschannel invoked" +peer0.org1.example.com | "2019-09-24 01:05:14.079 UTC [gossip.comm] func1 -> DEBU 26a3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.079 UTC [gossip.comm] func1 -> DEBU 26a4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.079 UTC [gossip.gossip] handleMessage -> DEBU 26a5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.080 UTC [gossip.gossip] handleMessage -> DEBU 26a9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.081 UTC [gossip.gossip] handleMessage -> DEBU 26aa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.081 UTC [msp] DeserializeIdentity -> DEBU 26ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.081 UTC [leveldbhelper] GetIterator -> DEBU 26ac Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:05:14.081 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 26ad No expiry entry found for expiringAtBlk [4]" +peer0.org1.example.com | "2019-09-24 01:05:14.082 UTC [lockbasedtxmgr] func1 -> DEBU 26ae launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26b0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.082 UTC [kvledger] CommitWithPvtData -> DEBU 26b1 [businesschannel] Committing block [3] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:05:14.084 UTC [historyleveldb] Commit -> DEBU 26b3 Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26b2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.086 UTC [cauthdsl] func1 -> DEBU 26b7 0xc003193330 gate 1569287114086273600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26b8 0xc003193330 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26b9 0xc003193330 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26ba 0xc003193330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [cauthdsl] func2 -> DEBU 26bb 0xc003193330 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [historyleveldb] Commit -> DEBU 26bc Channel [businesschannel]: Updates committed to history database for blockNo [3]" +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [kvledger] CommitWithPvtData -> INFO 26bd [businesschannel] Committed block [3] with 1 transaction(s) in 28ms (state_validation=5ms block_and_pvtdata_commit=6ms state_commit=12ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [msp] GetDefaultSigningIdentity -> DEBU 26be Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [msp.identity] Sign -> DEBU 26bf Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08041A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [msp.identity] Sign -> DEBU 26c0 Sign: digest: C4FCA78480FEC28F1EF4F1368F7E94E2E41904024E55EB327DE5C37E2854E90F " +peer0.org1.example.com | "2019-09-24 01:05:14.087 UTC [cauthdsl] func1 -> DEBU 26c1 0xc003193330 gate 1569287114086273600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.088 UTC [gossip.state] commitBlock -> DEBU 26c5 [businesschannel] Committed block [3] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:05:14.089 UTC [cauthdsl] func1 -> DEBU 26c6 0xc003193b80 gate 1569287114088713500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26c7 0xc003193b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.089 UTC [gossip.comm] func1 -> DEBU 26c8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26c9 0xc003193b80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26ca 0xc003193b80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.090 UTC [msp.identity] Verify -> DEBU 26cb Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:14.090 UTC [gossip.comm] func1 -> DEBU 26cc Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.091 UTC [msp.identity] Verify -> DEBU 26cd Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:14.092 UTC [cauthdsl] func2 -> DEBU 26ce 0xc003193b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.092 UTC [cauthdsl] func1 -> DEBU 26cf 0xc003193b80 gate 1569287114088713500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.094 UTC [policies] Evaluate -> DEBU 26d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.094 UTC [msp] DeserializeIdentity -> DEBU 26d4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [msp] DeserializeIdentity -> DEBU 26d5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d6 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d7 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.096 UTC [cauthdsl] func1 -> DEBU 26db 0xc00304cd90 gate 1569287114096038400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26dc 0xc00304cd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26dd 0xc00304cd90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26de 0xc00304cd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26df 0xc00304cd90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.097 UTC [cauthdsl] func1 -> DEBU 26e0 0xc00304cd90 gate 1569287114096038400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.097 UTC [cauthdsl] func1 -> DEBU 26e4 0xc00304d5d0 gate 1569287114097709000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e5 0xc00304d5d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e6 0xc00304d5d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e7 0xc00304d5d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [msp.identity] Verify -> DEBU 26e8 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [msp.identity] Verify -> DEBU 26e9 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00304d5d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [cauthdsl] func1 -> DEBU 26eb 0xc00304d5d0 gate 1569287114097709000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [policies] Evaluate -> DEBU 26ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.101 UTC [policies] Evaluate -> DEBU 26ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.102 UTC [policies] Evaluate -> DEBU 26ee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.102 UTC [policies] Evaluate -> DEBU 26ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.102 UTC [gossip.gossip] handleMessage -> DEBU 26f0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.102 UTC [gossip.gossip] handleMessage -> DEBU 26f1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [msp] DeserializeIdentity -> DEBU 26f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26f4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26f5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [policies] Evaluate -> DEBU 26f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.104 UTC [policies] Evaluate -> DEBU 26f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 26f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func1 -> DEBU 26f9 0xc00303aea0 gate 1569287114105043000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fa 0xc00303aea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fb 0xc00303aea0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fc 0xc00303aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fd 0xc00303aea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [cauthdsl] func1 -> DEBU 26fe 0xc00303aea0 gate 1569287114105043000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 26ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 2700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 2701 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func1 -> DEBU 2702 0xc00303b6e0 gate 1569287114106187800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2703 0xc00303b6e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2704 0xc00303b6e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2705 0xc00303b6e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [msp.identity] Verify -> DEBU 2706 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [msp.identity] Verify -> DEBU 2707 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2708 0xc00303b6e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [cauthdsl] func1 -> DEBU 2709 0xc00303b6e0 gate 1569287114106187800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 270a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 270b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 270c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 270d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [msp] DeserializeIdentity -> DEBU 270e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [gossip.gossip] handleMessage -> DEBU 270f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [gossip.gossip] handleMessage -> DEBU 2710 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [msp] DeserializeIdentity -> DEBU 2711 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2712 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2713 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2714 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 2715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 2718 0xc002a630e0 gate 1569287114108170800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2719 0xc002a630e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271a 0xc002a630e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271b 0xc002a630e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271c 0xc002a630e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 271d 0xc002a630e0 gate 1569287114108170800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 271e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 271f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 2721 0xc002a63920 gate 1569287114108612900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2722 0xc002a63920 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2723 0xc002a63920 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2724 0xc002a63920 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [msp.identity] Verify -> DEBU 2725 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:14.108 UTC [msp.identity] Verify -> DEBU 2726 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [cauthdsl] func2 -> DEBU 2727 0xc002a63920 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [cauthdsl] func1 -> DEBU 2728 0xc002a63920 gate 1569287114108612900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 2729 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.109 UTC [gossip.gossip] handleMessage -> DEBU 272d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 272e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 272f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.112 UTC [gossip.comm] Send -> DEBU 2730 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 2731 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.113 UTC [msp] DeserializeIdentity -> DEBU 2732 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.113 UTC [gossip.comm] sendToEndpoint -> DEBU 2733 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.113 UTC [gossip.comm] sendToEndpoint -> DEBU 2734 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.114 UTC [gossip.comm] sendToEndpoint -> DEBU 2735 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.114 UTC [gossip.comm] sendToEndpoint -> DEBU 2736 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [gossip.comm] func1 -> DEBU 2737 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [gossip.gossip] handleMessage -> DEBU 2738 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [gossip.gossip] handleMessage -> DEBU 2739 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 273a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 273b Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [msp] DeserializeIdentity -> DEBU 273c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 273d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 273e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 273f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2740 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2741 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 2743 0xc0030d3670 gate 1569287114172238900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2744 0xc0030d3670 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2745 0xc0030d3670 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2746 0xc0030d3670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2747 0xc0030d3670 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 2748 0xc0030d3670 gate 1569287114172238900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 274a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 274b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 274c 0xc0030d3eb0 gate 1569287114172602100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274d 0xc0030d3eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274e 0xc0030d3eb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274f 0xc0030d3eb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [msp.identity] Verify -> DEBU 2750 Verify: digest = 00000000 cf 45 bf 69 5f a5 14 5c 01 a0 a5 16 73 8e 23 56 |.E.i_..\....s.#V| +peer0.org1.example.com | 00000010 7e 6e 03 31 12 25 18 57 ff 41 84 af c8 30 ba 29 |~n.1.%.W.A...0.)|" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [msp.identity] Verify -> DEBU 2751 Verify: sig = 00000000 30 45 02 21 00 ad a3 03 57 7c 93 dc 86 cd bd a9 |0E.!....W|......| +peer0.org1.example.com | 00000010 6a c3 43 68 7f da 41 a7 45 94 28 dc b1 ef 4f 2a |j.Ch..A.E.(...O*| +peer0.org1.example.com | 00000020 d2 ab e4 f1 23 02 20 6b 09 29 9f 65 79 af 17 99 |....#. k.).ey...| +peer0.org1.example.com | 00000030 a7 3f 70 3b e0 85 ca b0 bc c7 3f 34 5c b7 73 ea |.?p;......?4\.s.| +peer0.org1.example.com | 00000040 0a c5 4e 94 b9 7c 83 |..N..|.|" +peer0.org1.example.com | "2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2752 0xc0030d3eb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [cauthdsl] func1 -> DEBU 2753 0xc0030d3eb0 gate 1569287114172602100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2756 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 2758 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 2759 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 275e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 275f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.comm] func1 -> DEBU 2760 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.gossip] handleMessage -> DEBU 2762 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2763 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2764 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.174 UTC [msp] DeserializeIdentity -> DEBU 2765 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2766 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2767 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2768 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 2769 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 276a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 276b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.175 UTC [cauthdsl] func1 -> DEBU 276c 0xc00035e390 gate 1569287114175891200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276d 0xc00035e390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276e 0xc00035e390 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276f 0xc00035e390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2770 0xc00035e390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 2771 0xc00035e390 gate 1569287114175891200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2772 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2773 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2774 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 2775 0xc00035ebd0 gate 1569287114176603400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2776 0xc00035ebd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2777 0xc00035ebd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2778 0xc00035ebd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [msp.identity] Verify -> DEBU 2779 Verify: digest = 00000000 79 08 38 28 d2 f8 5d 64 36 65 5d 27 38 e0 bb 51 |y.8(..]d6e]'8..Q| +peer0.org1.example.com | 00000010 73 f1 0d a8 0e 24 a3 7a 05 66 ac 19 00 de fc a0 |s....$.z.f......|" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [msp.identity] Verify -> DEBU 277a Verify: sig = 00000000 30 45 02 21 00 fd ad 28 1e 9e 0c b5 a9 cb e4 f4 |0E.!...(........| +peer0.org1.example.com | 00000010 2c 37 15 c7 96 70 57 30 fe 0d 45 2e d3 fa 7a bc |,7...pW0..E...z.| +peer0.org1.example.com | 00000020 ad 5b 73 17 d3 02 20 3e 93 52 61 68 b5 09 e8 b5 |.[s... >.Rah....| +peer0.org1.example.com | 00000030 8b f7 80 19 3c 50 d6 79 15 df d0 2c 13 89 03 0d |.... DEBU 277b 0xc00035ebd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 277c 0xc00035ebd0 gate 1569287114176603400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 2780 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 2781 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2782 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2783 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2784 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2785 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2786 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 2787 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.177 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2788 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 2789 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [gossip.comm] Send -> DEBU 2790 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 2791 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 2792 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2793 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2794 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2795 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2796 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2797 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 2798 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2799 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 279a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 27a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.181 UTC [gossip.comm] sendToEndpoint -> DEBU 27a1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.181 UTC [gossip.comm] sendToEndpoint -> DEBU 27a2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.184 UTC [gossip.comm] func1 -> DEBU 27a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.184 UTC [gossip.gossip] handleMessage -> DEBU 27a4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.184 UTC [gossip.gossip] handleMessage -> DEBU 27a5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27a6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27a7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.185 UTC [gossip.comm] func1 -> DEBU 27a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.185 UTC [gossip.gossip] handleMessage -> DEBU 27a9 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.185 UTC [gossip.gossip] handleMessage -> DEBU 27aa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ac Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.196 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.196 UTC [gossip.comm] func1 -> DEBU 27ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27af Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27b1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.197 UTC [gossip.gossip] handleMessage -> DEBU 27b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.241 UTC [msp] GetDefaultSigningIdentity -> DEBU 27b7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.241 UTC [msp.identity] Sign -> DEBU 27b8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151022 " +peer0.org1.example.com | "2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27b9 Sign: digest: A9708982081846BD972466CE3DD8153F0E812057135182833B45DED116E5B8FB " +peer0.org1.example.com | "2019-09-24 01:05:14.242 UTC [msp] GetDefaultSigningIdentity -> DEBU 27ba Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27bb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27bc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:14.243 UTC [gossip.discovery] periodicalSendAlive -> DEBU 27bd Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:14.252 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.253 UTC [msp] DeserializeIdentity -> DEBU 27bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.255 UTC [msp] DeserializeIdentity -> DEBU 27c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.256 UTC [gossip.comm] Send -> DEBU 27c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.258 UTC [gossip.comm] sendToEndpoint -> DEBU 27c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.258 UTC [gossip.comm] sendToEndpoint -> DEBU 27c3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.258 UTC [gossip.comm] Send -> DEBU 27c4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.258 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.259 UTC [gossip.comm] Send -> DEBU 27c6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.259 UTC [gossip.comm] sendToEndpoint -> DEBU 27c7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.263 UTC [gossip.comm] sendToEndpoint -> DEBU 27c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.263 UTC [gossip.comm] sendToEndpoint -> DEBU 27c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.264 UTC [gossip.comm] sendToEndpoint -> DEBU 27ca Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.278 UTC [gossip.comm] func1 -> DEBU 27cb Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.278 UTC [gossip.comm] func1 -> DEBU 27cc Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.278 UTC [gossip.gossip] handleMessage -> DEBU 27cd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.278 UTC [msp] DeserializeIdentity -> DEBU 27ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.280 UTC [msp] DeserializeIdentity -> DEBU 27cf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.280 UTC [msp] DeserializeIdentity -> DEBU 27d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.280 UTC [gossip.gossip] handleMessage -> DEBU 27d1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.280 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [msp] DeserializeIdentity -> DEBU 27d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27d5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27d6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.281 UTC [cauthdsl] func1 -> DEBU 27da 0xc00039e0c0 gate 1569287114281946700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27db 0xc00039e0c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27dc 0xc00039e0c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27dd 0xc00039e0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27de 0xc00039e0c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func1 -> DEBU 27df 0xc00039e0c0 gate 1569287114281946700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func1 -> DEBU 27e3 0xc00039ea20 gate 1569287114282436300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e4 0xc00039ea20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e5 0xc00039ea20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e6 0xc00039ea20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [msp.identity] Verify -> DEBU 27e7 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +peer0.org1.example.com | 00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +peer0.org1.example.com | "2019-09-24 01:05:14.282 UTC [msp.identity] Verify -> DEBU 27e8 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +peer0.org1.example.com | 00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +peer0.org1.example.com | 00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +peer0.org1.example.com | 00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +peer0.org1.example.com | 00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +peer0.org1.example.com | "2019-09-24 01:05:14.283 UTC [cauthdsl] func2 -> DEBU 27e9 0xc00039ea20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.284 UTC [cauthdsl] func1 -> DEBU 27ea 0xc00039ea20 gate 1569287114282436300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ed Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [msp] DeserializeIdentity -> DEBU 27ef Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [msp] DeserializeIdentity -> DEBU 27f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27f1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27f2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func1 -> DEBU 27f6 0xc00039fed0 gate 1569287114285559600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f7 0xc00039fed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f8 0xc00039fed0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f9 0xc00039fed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27fa 0xc00039fed0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [cauthdsl] func1 -> DEBU 27fb 0xc00039fed0 gate 1569287114285559600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [policies] Evaluate -> DEBU 27fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [cauthdsl] func1 -> DEBU 27ff 0xc0003ca730 gate 1569287114286263500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2800 0xc0003ca730 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2801 0xc0003ca730 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2802 0xc0003ca730 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [msp.identity] Verify -> DEBU 2803 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +peer0.org1.example.com | 00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +peer0.org1.example.com | "2019-09-24 01:05:14.286 UTC [msp.identity] Verify -> DEBU 2804 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +peer0.org1.example.com | 00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +peer0.org1.example.com | 00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +peer0.org1.example.com | 00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +peer0.org1.example.com | 00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [cauthdsl] func2 -> DEBU 2805 0xc0003ca730 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [cauthdsl] func1 -> DEBU 2806 0xc0003ca730 gate 1569287114286263500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2807 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2808 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2809 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 280a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.287 UTC [gossip.gossip] handleMessage -> DEBU 280b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] func1 -> DEBU 280c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 280d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.gossip] handleMessage -> DEBU 280e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 280f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2810 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] Send -> DEBU 2811 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2812 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2813 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2814 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2815 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2816 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2817 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2818 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2819 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [cauthdsl] func1 -> DEBU 281b 0xc0003f80c0 gate 1569287114288541200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 281d 0xc0003f80c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 281e 0xc0003f80c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 2820 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 2821 0xc0003f80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.294 UTC [cauthdsl] func2 -> DEBU 2822 0xc0003f80c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.295 UTC [cauthdsl] func1 -> DEBU 2823 0xc0003f80c0 gate 1569287114288541200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2824 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.295 UTC [cauthdsl] func1 -> DEBU 2827 0xc0003f8910 gate 1569287114295837900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.296 UTC [cauthdsl] func2 -> DEBU 2828 0xc0003f8910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.296 UTC [cauthdsl] func2 -> DEBU 2829 0xc0003f8910 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.297 UTC [cauthdsl] func2 -> DEBU 282a 0xc0003f8910 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.297 UTC [msp.identity] Verify -> DEBU 282b Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +peer0.org1.example.com | 00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +peer0.org1.example.com | "2019-09-24 01:05:14.297 UTC [msp.identity] Verify -> DEBU 282c Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +peer0.org1.example.com | 00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +peer0.org1.example.com | 00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +peer0.org1.example.com | 00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +peer0.org1.example.com | 00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +peer0.org1.example.com | "2019-09-24 01:05:14.298 UTC [cauthdsl] func2 -> DEBU 282d 0xc0003f8910 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.298 UTC [cauthdsl] func1 -> DEBU 282e 0xc0003f8910 gate 1569287114295837900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 282f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2830 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2831 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2832 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.300 UTC [gossip.gossip] handleMessage -> DEBU 2833 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.514 UTC [gossip.comm] func1 -> DEBU 2834 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.514 UTC [gossip.comm] func1 -> DEBU 2835 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.515 UTC [gossip.gossip] handleMessage -> DEBU 2836 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.515 UTC [gossip.pull] HandleMessage -> DEBU 2837 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.515 UTC [gossip.pull] SendDigest -> DEBU 2838 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:14.515 UTC [gossip.gossip] handleMessage -> DEBU 2839 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [gossip.gossip] handleMessage -> DEBU 283a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [gossip.gossip] handleMessage -> DEBU 283b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 283c Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 283d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [msp.identity] Verify -> DEBU 283e Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +peer0.org1.example.com | 00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +peer0.org1.example.com | "2019-09-24 01:05:14.516 UTC [msp.identity] Verify -> DEBU 283f Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +peer0.org1.example.com | 00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +peer0.org1.example.com | 00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +peer0.org1.example.com | 00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +peer0.org1.example.com | 00000040 09 f7 2d 8a ed 68 |..-..h|" +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [msp.identity] Verify -> DEBU 2840 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [msp.identity] Verify -> DEBU 2841 Verify: sig = 00000000 30 45 02 21 00 d9 d7 8b 46 94 bd be 85 85 77 8e |0E.!....F.....w.| +peer0.org1.example.com | 00000010 1f 68 59 91 6c 0f a5 88 80 e2 3d e2 55 88 69 44 |.hY.l.....=.U.iD| +peer0.org1.example.com | 00000020 51 69 9e d7 08 02 20 08 f1 78 14 91 75 91 f4 e6 |Qi.... ..x..u...| +peer0.org1.example.com | 00000030 58 c3 7e 0f f4 02 bc 79 80 41 41 eb e1 e3 17 25 |X.~....y.AA....%| +peer0.org1.example.com | 00000040 ce 01 87 c6 39 7d c9 |....9}.|" +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2842 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2843 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2844 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2845 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 2846 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:14.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 2847 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 2848 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2849 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.520 UTC [gossip.discovery] sendMemResponse -> DEBU 284a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:14.520 UTC [msp] DeserializeIdentity -> DEBU 284b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.520 UTC [msp] DeserializeIdentity -> DEBU 284c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.520 UTC [gossip.comm] Send -> DEBU 284d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.520 UTC [gossip.discovery] sendMemResponse -> DEBU 284e Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:14.521 UTC [gossip.comm] sendToEndpoint -> DEBU 284f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.521 UTC [gossip.comm] sendToEndpoint -> DEBU 2850 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.620 UTC [endorser] ProcessProposal -> DEBU 2851 Entering: request from 172.18.0.5:49910" +peer0.org1.example.com | "2019-09-24 01:05:14.620 UTC [protoutils] ValidateProposalMessage -> DEBU 2852 ValidateProposalMessage starts for signed proposal 0xc003341c70" +peer0.org1.example.com | "2019-09-24 01:05:14.620 UTC [protoutils] validateChannelHeader -> DEBU 2853 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:14.620 UTC [protoutils] checkSignatureFromCreator -> DEBU 2854 begin" +peer0.org1.example.com | "2019-09-24 01:05:14.621 UTC [msp] GetManagerForChain -> DEBU 2855 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:14.621 UTC [protoutils] checkSignatureFromCreator -> DEBU 2856 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:14.621 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:14.621 UTC [msp.identity] Verify -> DEBU 2858 Verify: digest = 00000000 5c 9a ec a3 b3 10 47 f0 2f 90 f2 16 5e 02 3a 22 |\.....G./...^.:"| +peer0.org1.example.com | 00000010 d6 ad cb 1c 1d 80 cb a0 ff 3a f8 f8 17 5b 55 9c |.........:...[U.|" +peer0.org1.example.com | "2019-09-24 01:05:14.621 UTC [msp.identity] Verify -> DEBU 2859 Verify: sig = 00000000 30 44 02 20 73 fc 51 23 aa 0f 9c 14 6a 0a 40 e4 |0D. s.Q#....j.@.| +peer0.org1.example.com | 00000010 4f 8e 11 1c 2b b2 42 68 f8 1a 60 46 d3 72 e5 4c |O...+.Bh..`F.r.L| +peer0.org1.example.com | 00000020 b7 f3 f9 94 02 20 5c 75 78 99 bd 0e 75 d6 9a 10 |..... \ux...u...| +peer0.org1.example.com | 00000030 bd 19 95 97 fa 58 42 0b 3e 44 6f a3 45 b6 9b a3 |.....XB.>Do.E...| +peer0.org1.example.com | 00000040 95 85 31 b2 e7 18 |..1...|" +peer0.org1.example.com | "2019-09-24 01:05:14.622 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:14.622 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285b validateChaincodeProposalMessage starts for proposal 0xc0027a5e30, header 0xc0032220a0" +peer0.org1.example.com | "2019-09-24 01:05:14.622 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.622 UTC [endorser] preProcess -> DEBU 285d [businesschannel][db9c2a8d] processing txid: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad" +peer0.org1.example.com | "2019-09-24 01:05:14.622 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 285e retrieveTransactionByID() - txId = [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +peer0.org1.example.com | "2019-09-24 01:05:14.623 UTC [aclmgmt] CheckACL -> DEBU 285f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:14.623 UTC [aclmgmt] CheckACL -> DEBU 2860 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:14.623 UTC [policies] Evaluate -> DEBU 2861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.623 UTC [policies] Evaluate -> DEBU 2862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.624 UTC [policies] Evaluate -> DEBU 2863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.624 UTC [cauthdsl] func1 -> DEBU 2864 0xc000396e80 gate 1569287114624215100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2865 0xc000396e80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2866 0xc000396e80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2867 0xc000396e80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.625 UTC [msp.identity] Verify -> DEBU 2868 Verify: digest = 00000000 5c 9a ec a3 b3 10 47 f0 2f 90 f2 16 5e 02 3a 22 |\.....G./...^.:"| +peer0.org1.example.com | 00000010 d6 ad cb 1c 1d 80 cb a0 ff 3a f8 f8 17 5b 55 9c |.........:...[U.|" +peer0.org1.example.com | "2019-09-24 01:05:14.625 UTC [msp.identity] Verify -> DEBU 2869 Verify: sig = 00000000 30 44 02 20 73 fc 51 23 aa 0f 9c 14 6a 0a 40 e4 |0D. s.Q#....j.@.| +peer0.org1.example.com | 00000010 4f 8e 11 1c 2b b2 42 68 f8 1a 60 46 d3 72 e5 4c |O...+.Bh..`F.r.L| +peer0.org1.example.com | 00000020 b7 f3 f9 94 02 20 5c 75 78 99 bd 0e 75 d6 9a 10 |..... \ux...u...| +peer0.org1.example.com | 00000030 bd 19 95 97 fa 58 42 0b 3e 44 6f a3 45 b6 9b a3 |.....XB.>Do.E...| +peer0.org1.example.com | 00000040 95 85 31 b2 e7 18 |..1...|" +peer0.org1.example.com | "2019-09-24 01:05:14.625 UTC [cauthdsl] func2 -> DEBU 286a 0xc000396e80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.625 UTC [cauthdsl] func1 -> DEBU 286b 0xc000396e80 gate 1569287114624215100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286e Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.626 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2870 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:14.627 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2871 constructing new tx simulator txid = [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +peer0.org1.example.com | "2019-09-24 01:05:14.627 UTC [endorser] SimulateProposal -> DEBU 2872 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.627 UTC [stateleveldb] GetState -> DEBU 2873 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.627 UTC [ccprovider] GetChaincodeData -> DEBU 2874 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:14.628 UTC [endorser] callChaincode -> INFO 2875 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.628 UTC [chaincode] Execute -> DEBU 2876 Entry" +peer0.org1.example.com | "2019-09-24 01:05:14.630 UTC [chaincode] handleMessage -> DEBU 2877 [db9c2a8d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.630 UTC [chaincode] HandleTransaction -> DEBU 2878 [db9c2a8d] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:14.630 UTC [chaincode] HandleGetState -> DEBU 2879 [db9c2a8d] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.630 UTC [stateleveldb] GetState -> DEBU 287a GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:14.630 UTC [chaincode] HandleTransaction -> DEBU 287b [db9c2a8d] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:14.631 UTC [chaincode] handleMessage -> DEBU 287c [db9c2a8d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.631 UTC [chaincode] Notify -> DEBU 287d [db9c2a8d] notifying Txid:db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.631 UTC [chaincode] Execute -> DEBU 287e Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [endorser] callChaincode -> INFO 287f [businesschannel][db9c2a8d] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2880 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [lockbasedtxmgr] Done -> DEBU 2881 Done with transaction simulation / query execution [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [endorser] SimulateProposal -> DEBU 2882 [businesschannel][db9c2a8d] Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [endorser] endorseProposal -> DEBU 2883 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [endorser] endorseProposal -> DEBU 2884 [businesschannel][db9c2a8d] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:14.632 UTC [endorser] EndorseWithPlugin -> DEBU 2885 Entering endorsement for {plugin: escc, channel: businesschannel, tx: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:14.633 UTC [msp.identity] Sign -> DEBU 2886 Sign: plaintext: 0A2083E09D1B77BB658A57904AE57E31...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:14.633 UTC [msp.identity] Sign -> DEBU 2887 Sign: digest: 4D8304D5D73060BF98371DEC109738F22FD1C034F6C5BE63B90EB5B86568C741 " +peer0.org1.example.com | "2019-09-24 01:05:14.633 UTC [endorser] EndorseWithPlugin -> DEBU 2888 Exiting {plugin: escc, channel: businesschannel, tx: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:14.633 UTC [endorser] endorseProposal -> DEBU 2889 [businesschannel][db9c2a8d] Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.633 UTC [lockbasedtxmgr] Done -> DEBU 288a Done with transaction simulation / query execution [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +peer0.org1.example.com | "2019-09-24 01:05:14.634 UTC [endorser] func1 -> DEBU 288b Exit: request from 172.18.0.5:49910" +peer0.org1.example.com | "2019-09-24 01:05:14.634 UTC [comm.grpc.server] 1 -> INFO 288c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49910 grpc.code=OK grpc.call_duration=14.217ms +peer0.org1.example.com | "2019-09-24 01:05:14.637 UTC [grpc] infof -> DEBU 288d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:14.638 UTC [grpc] infof -> DEBU 288e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:14.813 UTC [gossip.comm] func1 -> DEBU 288f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.814 UTC [gossip.gossip] handleMessage -> DEBU 2890 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.815 UTC [gossip.pull] HandleMessage -> DEBU 2891 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.816 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.817 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.820 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.820 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.821 UTC [msp] DeserializeIdentity -> DEBU 2896 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.822 UTC [msp] DeserializeIdentity -> DEBU 2897 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.823 UTC [gossip.pull] SendDigest -> DEBU 2898 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:14.823 UTC [gossip.gossip] handleMessage -> DEBU 2899 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.831 UTC [gossip.comm] func1 -> DEBU 289a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.831 UTC [gossip.gossip] handleMessage -> DEBU 289b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.832 UTC [gossip.gossip] handleMessage -> DEBU 289c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 289e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.833 UTC [msp] DeserializeIdentity -> DEBU 289f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28a0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28a1 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28a2 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.835 UTC [policies] Evaluate -> DEBU 28a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [policies] Evaluate -> DEBU 28a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [policies] Evaluate -> DEBU 28a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [cauthdsl] func1 -> DEBU 28a6 0xc0003e7230 gate 1569287114836210800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a7 0xc0003e7230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a8 0xc0003e7230 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a9 0xc0003e7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.837 UTC [cauthdsl] func2 -> DEBU 28aa 0xc0003e7230 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.837 UTC [cauthdsl] func1 -> DEBU 28ab 0xc0003e7230 gate 1569287114836210800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.838 UTC [cauthdsl] func1 -> DEBU 28af 0xc0003e7b50 gate 1569287114838186400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b0 0xc0003e7b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b1 0xc0003e7b50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b2 0xc0003e7b50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [msp.identity] Verify -> DEBU 28b3 Verify: digest = 00000000 56 e1 81 a1 3f b7 25 79 70 a1 9b 27 fa 99 ab d1 |V...?.%yp..'....| +peer0.org1.example.com | 00000010 81 45 2c ae aa 4f 38 dd 30 77 d9 b2 36 19 7b 3e |.E,..O8.0w..6.{>|" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [msp.identity] Verify -> DEBU 28b4 Verify: sig = 00000000 30 44 02 20 20 4c 28 46 28 69 40 0a ff 46 4c fa |0D. L(F(i@..FL.| +peer0.org1.example.com | 00000010 4a 3c d5 2f a0 d6 29 72 a5 a1 13 87 1e fa 8a 6b |J<./..)r.......k| +peer0.org1.example.com | 00000020 36 b3 23 31 02 20 18 bc 7a dd 76 d7 6a b4 c3 90 |6.#1. ..z.v.j...| +peer0.org1.example.com | 00000030 db a7 fe 22 2a 04 5d d0 a2 f9 f8 4c c3 b0 44 06 |..."*.]....L..D.| +peer0.org1.example.com | 00000040 64 57 dd f6 01 c9 |dW....|" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [cauthdsl] func2 -> DEBU 28b5 0xc0003e7b50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [cauthdsl] func1 -> DEBU 28b6 0xc0003e7b50 gate 1569287114838186400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b9 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.840 UTC [policies] Evaluate -> DEBU 28ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 28bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bd updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28be Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [gossip.discovery] sendMemResponse -> DEBU 28c2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [msp] DeserializeIdentity -> DEBU 28c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.841 UTC [msp] DeserializeIdentity -> DEBU 28c4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.842 UTC [msp] DeserializeIdentity -> DEBU 28c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.842 UTC [gossip.comm] Send -> DEBU 28c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.842 UTC [gossip.discovery] sendMemResponse -> DEBU 28c7 Exiting, replying with alive: alive:\223Rah\265\t\350\265\213\367\200\031 alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:14.842 UTC [gossip.comm] sendToEndpoint -> DEBU 28c8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.842 UTC [gossip.comm] sendToEndpoint -> DEBU 28c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ca Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.859 UTC [endorser] ProcessProposal -> DEBU 28cb Entering: request from 172.18.0.5:49914" +peer0.org1.example.com | "2019-09-24 01:05:14.859 UTC [protoutils] ValidateProposalMessage -> DEBU 28cc ValidateProposalMessage starts for signed proposal 0xc003160f50" +peer0.org1.example.com | "2019-09-24 01:05:14.859 UTC [protoutils] validateChannelHeader -> DEBU 28cd validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28ce begin" +peer0.org1.example.com | "2019-09-24 01:05:14.860 UTC [msp] GetManagerForChain -> DEBU 28cf Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d0 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d1 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:14.860 UTC [msp.identity] Verify -> DEBU 28d2 Verify: digest = 00000000 c5 7e 04 77 13 db 12 87 d5 88 16 96 2b 26 d8 72 |.~.w........+&.r| +peer0.org1.example.com | 00000010 58 25 e8 f2 bc 90 4d b8 10 61 cd 35 e1 82 db 54 |X%....M..a.5...T|" +peer0.org1.example.com | "2019-09-24 01:05:14.861 UTC [msp.identity] Verify -> DEBU 28d3 Verify: sig = 00000000 30 45 02 21 00 ab ea 55 58 6d 67 1e b1 6a 91 e8 |0E.!...UXmg..j..| +peer0.org1.example.com | 00000010 c4 c8 9a 6a 7d 94 53 42 22 93 92 5c 44 56 44 28 |...j}.SB"..\DVD(| +peer0.org1.example.com | 00000020 06 68 15 9a 97 02 20 0c df 99 c9 a8 ce f3 4c 76 |.h.... .......Lv| +peer0.org1.example.com | 00000030 17 32 73 93 4b ab 42 52 4d 45 76 84 72 af ee fa |.2s.K.BRMEv.r...| +peer0.org1.example.com | 00000040 8b f0 ab 13 15 67 00 |.....g.|" +peer0.org1.example.com | "2019-09-24 01:05:14.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d4 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:14.861 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28d5 validateChaincodeProposalMessage starts for proposal 0xc00298a070, header 0xc003161360" +peer0.org1.example.com | "2019-09-24 01:05:14.861 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28d6 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.861 UTC [endorser] preProcess -> DEBU 28d7 [businesschannel][716eee82] processing txid: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28d8 retrieveTransactionByID() - txId = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [aclmgmt] CheckACL -> DEBU 28d9 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [aclmgmt] CheckACL -> DEBU 28da acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [cauthdsl] func1 -> DEBU 28de 0xc0024c4600 gate 1569287114862626400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [cauthdsl] func2 -> DEBU 28df 0xc0024c4600 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.862 UTC [cauthdsl] func2 -> DEBU 28e0 0xc0024c4600 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.863 UTC [cauthdsl] func2 -> DEBU 28e1 0xc0024c4600 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.863 UTC [msp.identity] Verify -> DEBU 28e2 Verify: digest = 00000000 c5 7e 04 77 13 db 12 87 d5 88 16 96 2b 26 d8 72 |.~.w........+&.r| +peer0.org1.example.com | 00000010 58 25 e8 f2 bc 90 4d b8 10 61 cd 35 e1 82 db 54 |X%....M..a.5...T|" +peer0.org1.example.com | "2019-09-24 01:05:14.863 UTC [msp.identity] Verify -> DEBU 28e3 Verify: sig = 00000000 30 45 02 21 00 ab ea 55 58 6d 67 1e b1 6a 91 e8 |0E.!...UXmg..j..| +peer0.org1.example.com | 00000010 c4 c8 9a 6a 7d 94 53 42 22 93 92 5c 44 56 44 28 |...j}.SB"..\DVD(| +peer0.org1.example.com | 00000020 06 68 15 9a 97 02 20 0c df 99 c9 a8 ce f3 4c 76 |.h.... .......Lv| +peer0.org1.example.com | 00000030 17 32 73 93 4b ab 42 52 4d 45 76 84 72 af ee fa |.2s.K.BRMEv.r...| +peer0.org1.example.com | 00000040 8b f0 ab 13 15 67 00 |.....g.|" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [cauthdsl] func2 -> DEBU 28e4 0xc0024c4600 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [cauthdsl] func1 -> DEBU 28e5 0xc0024c4600 gate 1569287114862626400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e8 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:14.865 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 28ea constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:14.865 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 28eb constructing new tx simulator txid = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +peer0.org1.example.com | "2019-09-24 01:05:14.866 UTC [endorser] SimulateProposal -> DEBU 28ec [businesschannel][716eee82] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.866 UTC [stateleveldb] GetState -> DEBU 28ed GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:14.867 UTC [ccprovider] GetChaincodeData -> DEBU 28ee Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:14.867 UTC [endorser] callChaincode -> INFO 28ef [businesschannel][716eee82] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.867 UTC [chaincode] Execute -> DEBU 28f0 Entry" +peer0.org1.example.com | "2019-09-24 01:05:14.869 UTC [chaincode] handleMessage -> DEBU 28f1 [716eee82] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.869 UTC [chaincode] HandleTransaction -> DEBU 28f2 [716eee82] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:14.870 UTC [chaincode] HandleGetState -> DEBU 28f3 [716eee82] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.870 UTC [stateleveldb] GetState -> DEBU 28f4 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:14.870 UTC [chaincode] HandleTransaction -> DEBU 28f5 [716eee82] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28f6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28f7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28f8 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28f9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28fa Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28fb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.comm] sendToEndpoint -> DEBU 28fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.871 UTC [gossip.comm] sendToEndpoint -> DEBU 28fd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 28fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 28ff Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 2900 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 2901 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.comm] func1 -> DEBU 2902 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2903 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.pull] HandleMessage -> DEBU 2904 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2905 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.comm] func1 -> DEBU 2906 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2907 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.pull] HandleMessage -> DEBU 2908 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 2909 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.comm] func1 -> DEBU 290a Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 290b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.pull] HandleMessage -> DEBU 290c GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 290d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.878 UTC [gossip.comm] func1 -> DEBU 290e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [gossip.gossip] handleMessage -> DEBU 290f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [gossip.pull] HandleMessage -> DEBU 2910 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2911 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2912 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2913 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2914 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2915 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.880 UTC [msp] DeserializeIdentity -> DEBU 2916 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.880 UTC [gossip.pull] SendDigest -> DEBU 2917 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:14.880 UTC [gossip.gossip] handleMessage -> DEBU 2918 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.881 UTC [chaincode] handleMessage -> DEBU 2919 [716eee82] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.881 UTC [chaincode] HandleTransaction -> DEBU 291a [716eee82] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:14.882 UTC [chaincode] HandleGetState -> DEBU 291b [716eee82] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.882 UTC [stateleveldb] GetState -> DEBU 291c GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 01:05:14.882 UTC [chaincode] HandleTransaction -> DEBU 291d [716eee82] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:14.883 UTC [chaincode] handleMessage -> DEBU 291e [716eee82] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.883 UTC [chaincode] HandleTransaction -> DEBU 291f [716eee82] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:14.884 UTC [chaincode] HandleTransaction -> DEBU 2920 [716eee82] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:14.885 UTC [chaincode] handleMessage -> DEBU 2921 [716eee82] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.885 UTC [chaincode] HandleTransaction -> DEBU 2922 [716eee82] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:14.885 UTC [chaincode] HandleTransaction -> DEBU 2923 [716eee82] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:14.886 UTC [chaincode] handleMessage -> DEBU 2924 [716eee82] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:14.887 UTC [chaincode] Notify -> DEBU 2925 [716eee82] notifying Txid:716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:14.887 UTC [chaincode] Execute -> DEBU 2926 Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.887 UTC [endorser] callChaincode -> INFO 2927 [businesschannel][716eee82] Exit chaincode: name:"exp02" (20ms)" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2928 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [lockbasedtxmgr] Done -> DEBU 2929 Done with transaction simulation / query execution [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [endorser] SimulateProposal -> DEBU 292a [businesschannel][716eee82] Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [endorser] endorseProposal -> DEBU 292b [businesschannel][716eee82] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [endorser] endorseProposal -> DEBU 292c [businesschannel][716eee82] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [endorser] EndorseWithPlugin -> DEBU 292d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [msp.identity] Sign -> DEBU 292e Sign: plaintext: 0A2029029BB3FE80ED07C0E2550F2AAF...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:14.888 UTC [msp.identity] Sign -> DEBU 292f Sign: digest: BCB20F877BF7B6CBF3E3ECD39C7F7ECE2D6EF5807B7B0EE760F1568620D9C8EF " +peer0.org1.example.com | "2019-09-24 01:05:14.889 UTC [endorser] EndorseWithPlugin -> DEBU 2930 Exiting {plugin: escc, channel: businesschannel, tx: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:14.889 UTC [endorser] endorseProposal -> DEBU 2931 [businesschannel][716eee82] Exit" +peer0.org1.example.com | "2019-09-24 01:05:14.889 UTC [lockbasedtxmgr] Done -> DEBU 2932 Done with transaction simulation / query execution [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +peer0.org1.example.com | "2019-09-24 01:05:14.889 UTC [endorser] func1 -> DEBU 2933 Exit: request from 172.18.0.5:49914" +peer0.org1.example.com | "2019-09-24 01:05:14.889 UTC [comm.grpc.server] 1 -> INFO 2934 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49914 grpc.code=OK grpc.call_duration=31.0969ms +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 2935 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2936 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151023 " +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2937 Sign: digest: 7E3CFC56FE448402E2D163CF8CF8351350DC9CC0C372EFB174707551CA1146FF " +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 2938 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2939 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 293a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:14.893 UTC [gossip.comm] Send -> DEBU 293b Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.893 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.893 UTC [gossip.comm] Send -> DEBU 293d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.893 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.894 UTC [gossip.comm] Send -> DEBU 293f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 2940 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 2941 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2942 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2943 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2944 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.903 UTC [gossip.comm] sendToEndpoint -> DEBU 2945 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.905 UTC [gossip.comm] func1 -> DEBU 2946 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.906 UTC [gossip.comm] func1 -> DEBU 2947 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.906 UTC [gossip.gossip] handleMessage -> DEBU 2948 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.907 UTC [gossip.gossip] handleMessage -> DEBU 2949 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.907 UTC [gossip.gossip] handleMessage -> DEBU 294c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 294a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 294d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.907 UTC [gossip.comm] func1 -> DEBU 294b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.909 UTC [gossip.comm] func1 -> DEBU 294e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.909 UTC [msp] DeserializeIdentity -> DEBU 294f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2950 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2951 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2952 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 2953 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 2954 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.914 UTC [policies] Evaluate -> DEBU 2955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.914 UTC [cauthdsl] func1 -> DEBU 2956 0xc00256e170 gate 1569287114914746800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2957 0xc00256e170 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2958 0xc00256e170 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2959 0xc00256e170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.921 UTC [cauthdsl] func2 -> DEBU 295c 0xc00256e170 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.921 UTC [cauthdsl] func1 -> DEBU 295d 0xc00256e170 gate 1569287114914746800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.920 UTC [grpc] infof -> DEBU 295a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:14.920 UTC [grpc] infof -> DEBU 295b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:14.922 UTC [policies] Evaluate -> DEBU 295e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.924 UTC [policies] Evaluate -> DEBU 295f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.926 UTC [policies] Evaluate -> DEBU 2960 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.926 UTC [cauthdsl] func1 -> DEBU 2961 0xc00256e9e0 gate 1569287114926932000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.927 UTC [cauthdsl] func2 -> DEBU 2962 0xc00256e9e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.928 UTC [cauthdsl] func2 -> DEBU 2963 0xc00256e9e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.929 UTC [cauthdsl] func2 -> DEBU 2964 0xc00256e9e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.929 UTC [msp.identity] Verify -> DEBU 2965 Verify: digest = 00000000 ce 49 3c 39 ac 26 4c 4e 52 26 86 52 73 9c fa e6 |.I<9.&LNR&.Rs...| +peer0.org1.example.com | 00000010 cd 4f 90 1d 12 b0 de 53 ba 4f 32 80 aa 3f bd 37 |.O.....S.O2..?.7|" +peer0.org1.example.com | "2019-09-24 01:05:14.930 UTC [msp.identity] Verify -> DEBU 2966 Verify: sig = 00000000 30 44 02 20 22 1b 33 d3 c5 1c 78 7e 66 86 34 21 |0D. ".3...x~f.4!| +peer0.org1.example.com | 00000010 2b 90 4f df ca 9d d5 dd 0c 8b 18 97 18 38 9c 26 |+.O..........8.&| +peer0.org1.example.com | 00000020 b9 15 70 4c 02 20 02 55 00 ca 1a c6 97 0e 74 94 |..pL. .U......t.| +peer0.org1.example.com | 00000030 71 8e ea 96 00 85 78 a5 3c 43 c3 b6 85 ae 2d 8f |q.....x. DEBU 2967 0xc00256e9e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.931 UTC [cauthdsl] func1 -> DEBU 2968 0xc00256e9e0 gate 1569287114926932000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.931 UTC [policies] Evaluate -> DEBU 2969 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.931 UTC [policies] Evaluate -> DEBU 296a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.932 UTC [policies] Evaluate -> DEBU 296b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.932 UTC [policies] Evaluate -> DEBU 296c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 296d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 296e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 296f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 2970 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 2971 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:14.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 2972 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 2973 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2974 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.936 UTC [gossip.discovery] sendMemResponse -> DEBU 2975 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:14.936 UTC [msp] DeserializeIdentity -> DEBU 2977 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.937 UTC [msp] DeserializeIdentity -> DEBU 2978 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2976 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 297b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.937 UTC [msp] DeserializeIdentity -> DEBU 2979 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.939 UTC [msp.identity] Verify -> DEBU 297c Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +peer0.org1.example.com | 00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +peer0.org1.example.com | "2019-09-24 01:05:14.940 UTC [msp.identity] Verify -> DEBU 297d Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +peer0.org1.example.com | 00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +peer0.org1.example.com | 00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +peer0.org1.example.com | 00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +peer0.org1.example.com | 00000040 6b 69 ff ea 4b e8 |ki..K.|" +peer0.org1.example.com | "2019-09-24 01:05:14.940 UTC [gossip.comm] Send -> DEBU 297e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:14.941 UTC [gossip.discovery] sendMemResponse -> DEBU 297f Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:14.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 2980 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.942 UTC [gossip.discovery] isSentByMe -> DEBU 2982 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.943 UTC [gossip.discovery] handleAliveMessage -> DEBU 2983 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.941 UTC [gossip.comm] sendToEndpoint -> DEBU 2981 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.937 UTC [gossip.gossip] handleMessage -> DEBU 297a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2984 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [msp] DeserializeIdentity -> DEBU 2987 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2988 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2989 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 298a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [policies] Evaluate -> DEBU 298b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [policies] Evaluate -> DEBU 298c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [policies] Evaluate -> DEBU 298d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [cauthdsl] func1 -> DEBU 298e 0xc002593100 gate 1569287114945479400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 298f 0xc002593100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2990 0xc002593100 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2991 0xc002593100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2992 0xc002593100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.946 UTC [cauthdsl] func1 -> DEBU 2993 0xc002593100 gate 1569287114945479400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2994 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2995 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2996 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.947 UTC [cauthdsl] func1 -> DEBU 2997 0xc002593ad0 gate 1569287114947213300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 2998 0xc002593ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 2999 0xc002593ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 299a 0xc002593ad0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.949 UTC [msp.identity] Verify -> DEBU 299b Verify: digest = 00000000 56 e1 81 a1 3f b7 25 79 70 a1 9b 27 fa 99 ab d1 |V...?.%yp..'....| +peer0.org1.example.com | 00000010 81 45 2c ae aa 4f 38 dd 30 77 d9 b2 36 19 7b 3e |.E,..O8.0w..6.{>|" +peer0.org1.example.com | "2019-09-24 01:05:14.949 UTC [msp.identity] Verify -> DEBU 299c Verify: sig = 00000000 30 44 02 20 20 4c 28 46 28 69 40 0a ff 46 4c fa |0D. L(F(i@..FL.| +peer0.org1.example.com | 00000010 4a 3c d5 2f a0 d6 29 72 a5 a1 13 87 1e fa 8a 6b |J<./..)r.......k| +peer0.org1.example.com | 00000020 36 b3 23 31 02 20 18 bc 7a dd 76 d7 6a b4 c3 90 |6.#1. ..z.v.j...| +peer0.org1.example.com | 00000030 db a7 fe 22 2a 04 5d d0 a2 f9 f8 4c c3 b0 44 06 |..."*.]....L..D.| +peer0.org1.example.com | 00000040 64 57 dd f6 01 c9 |dW....|" +peer0.org1.example.com | "2019-09-24 01:05:14.950 UTC [cauthdsl] func2 -> DEBU 299d 0xc002593ad0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.950 UTC [cauthdsl] func1 -> DEBU 299e 0xc002593ad0 gate 1569287114947213300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 299f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 29a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 29a1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [policies] Evaluate -> DEBU 29a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29a5 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [msp.identity] Verify -> DEBU 29a6 Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +peer0.org1.example.com | 00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +peer0.org1.example.com | "2019-09-24 01:05:14.951 UTC [msp.identity] Verify -> DEBU 29a7 Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +peer0.org1.example.com | 00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +peer0.org1.example.com | 00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +peer0.org1.example.com | 00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +peer0.org1.example.com | 00000040 09 f7 2d 8a ed 68 |..-..h|" +peer0.org1.example.com | "2019-09-24 01:05:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29aa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.943 UTC [gossip.comm] sendToEndpoint -> DEBU 2985 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.944 UTC [gossip.gossip] handleMessage -> DEBU 2986 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.952 UTC [gossip.gossip] handleMessage -> DEBU 29ab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.953 UTC [gossip.gossip] handleMessage -> DEBU 29ac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29ae Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29af Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +peer0.org1.example.com | 00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +peer0.org1.example.com | "2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b0 Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +peer0.org1.example.com | 00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +peer0.org1.example.com | 00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +peer0.org1.example.com | 00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +peer0.org1.example.com | 00000040 6b 69 ff ea 4b e8 |ki..K.|" +peer0.org1.example.com | "2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b2 Verify: sig = 00000000 30 45 02 21 00 d0 b1 45 a7 b5 cc e8 3c 51 31 17 |0E.!...E.... DEBU 29b3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.955 UTC [gossip.discovery] isSentByMe -> DEBU 29b4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 29b5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29b9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.955 UTC [gossip.gossip] handleMessage -> DEBU 29b8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.956 UTC [msp.identity] Verify -> DEBU 29ba Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +peer0.org1.example.com | 00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +peer0.org1.example.com | "2019-09-24 01:05:14.956 UTC [msp.identity] Verify -> DEBU 29bb Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +peer0.org1.example.com | 00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +peer0.org1.example.com | 00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +peer0.org1.example.com | 00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +peer0.org1.example.com | 00000040 6b 69 ff ea 4b e8 |ki..K.|" +peer0.org1.example.com | "2019-09-24 01:05:14.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.956 UTC [gossip.discovery] isSentByMe -> DEBU 29bd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 29be Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.957 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bf Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.957 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func1 -> DEBU 29c7 0xc002612430 gate 1569287114959338900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29c8 0xc002612430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29c9 0xc002612430 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29ca 0xc002612430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29cb 0xc002612430 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [cauthdsl] func1 -> DEBU 29cc 0xc002612430 gate 1569287114959338900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [policies] Evaluate -> DEBU 29cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [cauthdsl] func1 -> DEBU 29d0 0xc002612cb0 gate 1569287114960145200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d1 0xc002612cb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d2 0xc002612cb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d3 0xc002612cb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [msp.identity] Verify -> DEBU 29d4 Verify: digest = 00000000 ce 49 3c 39 ac 26 4c 4e 52 26 86 52 73 9c fa e6 |.I<9.&LNR&.Rs...| +peer0.org1.example.com | 00000010 cd 4f 90 1d 12 b0 de 53 ba 4f 32 80 aa 3f bd 37 |.O.....S.O2..?.7|" +peer0.org1.example.com | "2019-09-24 01:05:14.960 UTC [msp.identity] Verify -> DEBU 29d5 Verify: sig = 00000000 30 44 02 20 22 1b 33 d3 c5 1c 78 7e 66 86 34 21 |0D. ".3...x~f.4!| +peer0.org1.example.com | 00000010 2b 90 4f df ca 9d d5 dd 0c 8b 18 97 18 38 9c 26 |+.O..........8.&| +peer0.org1.example.com | 00000020 b9 15 70 4c 02 20 02 55 00 ca 1a c6 97 0e 74 94 |..pL. .U......t.| +peer0.org1.example.com | 00000030 71 8e ea 96 00 85 78 a5 3c 43 c3 b6 85 ae 2d 8f |q.....x. DEBU 29d6 0xc002612cb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [cauthdsl] func1 -> DEBU 29d7 0xc002612cb0 gate 1569287114960145200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29da Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 29dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 29dd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29de Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:14.962 UTC [msp.identity] Verify -> DEBU 29df Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +peer0.org1.example.com | 00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +peer0.org1.example.com | "2019-09-24 01:05:14.962 UTC [msp.identity] Verify -> DEBU 29e0 Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +peer0.org1.example.com | 00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +peer0.org1.example.com | 00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +peer0.org1.example.com | 00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +peer0.org1.example.com | 00000040 09 f7 2d 8a ed 68 |..-..h|" +peer0.org1.example.com | "2019-09-24 01:05:14.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 29e1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:14.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 29e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:14.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:15.108 UTC [endorser] ProcessProposal -> DEBU 29e4 Entering: request from 172.18.0.5:49920" +peer0.org1.example.com | "2019-09-24 01:05:15.108 UTC [protoutils] ValidateProposalMessage -> DEBU 29e5 ValidateProposalMessage starts for signed proposal 0xc0001f7540" +peer0.org1.example.com | "2019-09-24 01:05:15.108 UTC [protoutils] validateChannelHeader -> DEBU 29e6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:15.109 UTC [protoutils] checkSignatureFromCreator -> DEBU 29e7 begin" +peer0.org1.example.com | "2019-09-24 01:05:15.109 UTC [msp] GetManagerForChain -> DEBU 29e8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:15.110 UTC [msp] DeserializeIdentity -> DEBU 29e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:15.111 UTC [msp.identity] newIdentity -> DEBU 29ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +peer0.org1.example.com | 8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +peer0.org1.example.com | nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +peer0.org1.example.com | PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +peer0.org1.example.com | VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:15.112 UTC [protoutils] checkSignatureFromCreator -> DEBU 29eb creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +peer0.org1.example.com | "2019-09-24 01:05:15.112 UTC [msp] Validate -> DEBU 29ec MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:15.113 UTC [msp] getCertificationChain -> DEBU 29ed MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:15.113 UTC [protoutils] checkSignatureFromCreator -> DEBU 29ee creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:15.114 UTC [msp.identity] Verify -> DEBU 29ef Verify: digest = 00000000 a4 b4 4a ca 5c b0 e7 30 cf 9f f2 6f 43 a3 11 e7 |..J.\..0...oC...| +peer0.org1.example.com | 00000010 9e 82 f9 f2 a4 bd 1f eb a6 fa 5a ff 52 c0 b7 08 |..........Z.R...|" +peer0.org1.example.com | "2019-09-24 01:05:15.114 UTC [msp.identity] Verify -> DEBU 29f0 Verify: sig = 00000000 30 45 02 21 00 d4 fb 5f 00 13 b7 ce eb 53 1f 94 |0E.!..._.....S..| +peer0.org1.example.com | 00000010 a2 78 c9 bc 1e 4e 49 bc f4 a5 9b 93 d5 7f 9f bc |.x...NI.........| +peer0.org1.example.com | 00000020 88 5d 99 6d 53 02 20 76 e9 8c 9f 44 4c fb 2a 6a |.].mS. v...DL.*j| +peer0.org1.example.com | 00000030 46 fb 2c 43 7f a7 ff 2f 9e fd c8 dd 83 0c bc 03 |F.,C.../........| +peer0.org1.example.com | 00000040 f5 23 ff d4 ac 0c 03 |.#.....|" +peer0.org1.example.com | "2019-09-24 01:05:15.115 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f1 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:15.115 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29f2 validateChaincodeProposalMessage starts for proposal 0xc00298b110, header 0xc0001f7950" +peer0.org1.example.com | "2019-09-24 01:05:15.115 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29f3 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:15.116 UTC [endorser] preProcess -> DEBU 29f4 [businesschannel][8cf30482] processing txid: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd" +peer0.org1.example.com | "2019-09-24 01:05:15.116 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 29f5 retrieveTransactionByID() - txId = [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +peer0.org1.example.com | "2019-09-24 01:05:15.117 UTC [aclmgmt] CheckACL -> DEBU 29f6 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:15.117 UTC [aclmgmt] CheckACL -> DEBU 29f7 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:15.119 UTC [cauthdsl] func1 -> DEBU 29fb 0xc002641550 gate 1569287115119126700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:15.119 UTC [cauthdsl] func2 -> DEBU 29fc 0xc002641550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:15.120 UTC [cauthdsl] func2 -> DEBU 29fd 0xc002641550 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:15.121 UTC [cauthdsl] func2 -> DEBU 29fe 0xc002641550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:15.121 UTC [cauthdsl] func2 -> DEBU 29ff 0xc002641550 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:15.121 UTC [cauthdsl] func1 -> DEBU 2a00 0xc002641550 gate 1569287115119126700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:15.121 UTC [policies] Evaluate -> DEBU 2a01 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.122 UTC [policies] Evaluate -> DEBU 2a02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.122 UTC [policies] Evaluate -> DEBU 2a03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:15.122 UTC [cauthdsl] func1 -> DEBU 2a04 0xc002641db0 gate 1569287115122507700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:15.122 UTC [cauthdsl] func2 -> DEBU 2a05 0xc002641db0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:15.123 UTC [cauthdsl] func2 -> DEBU 2a06 0xc002641db0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:15.123 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2a07 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:15.123 UTC [msp] Validate -> DEBU 2a08 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:15.124 UTC [msp] getCertificationChain -> DEBU 2a09 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:15.124 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc002641db0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:15.124 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 a4 b4 4a ca 5c b0 e7 30 cf 9f f2 6f 43 a3 11 e7 |..J.\..0...oC...| +peer0.org1.example.com | 00000010 9e 82 f9 f2 a4 bd 1f eb a6 fa 5a ff 52 c0 b7 08 |..........Z.R...|" +peer0.org1.example.com | "2019-09-24 01:05:15.124 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 45 02 21 00 d4 fb 5f 00 13 b7 ce eb 53 1f 94 |0E.!..._.....S..| +peer0.org1.example.com | 00000010 a2 78 c9 bc 1e 4e 49 bc f4 a5 9b 93 d5 7f 9f bc |.x...NI.........| +peer0.org1.example.com | 00000020 88 5d 99 6d 53 02 20 76 e9 8c 9f 44 4c fb 2a 6a |.].mS. v...DL.*j| +peer0.org1.example.com | 00000030 46 fb 2c 43 7f a7 ff 2f 9e fd c8 dd 83 0c bc 03 |F.,C.../........| +peer0.org1.example.com | 00000040 f5 23 ff d4 ac 0c 03 |.#.....|" +peer0.org1.example.com | "2019-09-24 01:05:15.125 UTC [cauthdsl] func2 -> DEBU 2a0d 0xc002641db0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:15.125 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc002641db0 gate 1569287115122507700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:15.125 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.125 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.126 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.126 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:15.126 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:15.126 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +peer0.org1.example.com | "2019-09-24 01:05:15.127 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:15.127 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:15.127 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:15.127 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:15.128 UTC [chaincode] Execute -> DEBU 2a19 Entry" +peer0.org1.example.com | "2019-09-24 01:05:15.129 UTC [chaincode] handleMessage -> DEBU 2a1a [8cf30482] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:15.129 UTC [chaincode] HandleTransaction -> DEBU 2a1b [8cf30482] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:15.129 UTC [chaincode] HandleGetState -> DEBU 2a1c [8cf30482] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:15.129 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:15.129 UTC [chaincode] HandleTransaction -> DEBU 2a1e [8cf30482] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:15.130 UTC [chaincode] handleMessage -> DEBU 2a1f [8cf30482] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:15.130 UTC [chaincode] Notify -> DEBU 2a20 [8cf30482] notifying Txid:8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:15.130 UTC [chaincode] Execute -> DEBU 2a21 Exit" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][8cf30482] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][8cf30482] Exit" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][8cf30482] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A20CD0EABB6EACD5F2CE03697735873...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:15.131 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: A02ABC76B437A62CD5756B29DB8C421E046EE5F4537770C618A8D9D77B45426B " +peer0.org1.example.com | "2019-09-24 01:05:15.132 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:15.132 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][8cf30482] Exit" +peer0.org1.example.com | "2019-09-24 01:05:15.132 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +peer0.org1.example.com | "2019-09-24 01:05:15.132 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.5:49920" +peer0.org1.example.com | "2019-09-24 01:05:15.132 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49920 grpc.code=OK grpc.call_duration=24.5015ms +peer0.org1.example.com | "2019-09-24 01:05:15.135 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:15.135 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:16.749 UTC [gossip.election] waitForInterrupt -> DEBU 2a32 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:16.749 UTC [gossip.election] IsLeader -> DEBU 2a33 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:16.750 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a34 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:16.750 UTC [msp.identity] Sign -> DEBU 2a35 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100B1801 " +peer0.org1.example.com | "2019-09-24 01:05:16.750 UTC [msp.identity] Sign -> DEBU 2a36 Sign: digest: A6B786DF365C0444A92D4C8CE193485F028FAEABA23974F36B8647661A6D46C7 " +peer0.org1.example.com | "2019-09-24 01:05:16.751 UTC [gossip.election] waitForInterrupt -> DEBU 2a37 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:16.752 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.752 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.753 UTC [gossip.comm] Send -> DEBU 2a3c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.754 UTC [msp] DeserializeIdentity -> DEBU 2a3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.754 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:16.754 UTC [gossip.comm] sendToEndpoint -> DEBU 2a40 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2a41 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2a42 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a45 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:16.903 UTC [cauthdsl] func1 -> DEBU 2a46 0xc00266a8d0 gate 1569287116903754200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a47 0xc00266a8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a48 0xc00266a8d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a49 0xc00266a8d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:16.904 UTC [msp.identity] Verify -> DEBU 2a4a Verify: digest = 00000000 60 c7 29 52 d5 a6 fa 99 3a 3f 20 8c 1d 4e cd 66 |`.)R....:? ..N.f| +peer0.org1.example.com | 00000010 5e d3 dd 46 06 cb 16 2f 9d dd 26 3d 52 fc a5 65 |^..F.../..&=R..e|" +peer0.org1.example.com | "2019-09-24 01:05:16.904 UTC [msp.identity] Verify -> DEBU 2a4b Verify: sig = 00000000 30 44 02 20 11 b8 5a b1 07 b2 a4 7d c7 63 2e 86 |0D. ..Z....}.c..| +peer0.org1.example.com | 00000010 e0 93 5e 1b 0e 23 a7 f2 c9 a4 c7 1b 59 90 de c3 |..^..#......Y...| +peer0.org1.example.com | 00000020 43 50 e9 6d 02 20 11 31 c7 a5 7a 03 bc bd 7f e7 |CP.m. .1..z.....| +peer0.org1.example.com | 00000030 93 f6 e8 38 db 7e bd 0b 55 da e3 29 32 29 4d b4 |...8.~..U..)2)M.| +peer0.org1.example.com | 00000040 62 f1 f3 09 94 fc |b.....|" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc00266a8d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [cauthdsl] func1 -> DEBU 2a4d 0xc00266a8d0 gate 1569287116903754200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a4e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a50 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [blocksProvider] DeliverBlocks -> DEBU 2a52 [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [gossip.state] addPayload -> DEBU 2a53 [businesschannel] Adding payload to local buffer, blockNum = [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [gossip.state] addPayload -> DEBU 2a54 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [blocksProvider] DeliverBlocks -> DEBU 2a55 [businesschannel] Gossiping block [4], peers number [3]" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [gossip.channel] AddToMsgStore -> DEBU 2a56 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:05:16.906 UTC [gossip.pull] Add -> DEBU 2a57 Added 4, total items: 4" +peer0.org1.example.com | "2019-09-24 01:05:16.907 UTC [gossip.state] deliverPayloads -> DEBU 2a58 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.907 UTC [gossip.state] deliverPayloads -> DEBU 2a59 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:05:16.907 UTC [gossip.privdata] StoreBlock -> INFO 2a5a [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-09-24 01:05:16.911 UTC [gossip.privdata] StoreBlock -> DEBU 2a5b [businesschannel] Validating block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.911 UTC [committer.txvalidator] Validate -> DEBU 2a5c [businesschannel] START Block Validation for block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [committer.txvalidator] Validate -> DEBU 2a5d expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [committer.txvalidator] validateTx -> DEBU 2a5e [businesschannel] validateTx starts for block 0xc0027d7580 env 0xc0003e23c0 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [protoutils] ValidateTransaction -> DEBU 2a5f ValidateTransactionEnvelope starts for envelope 0xc0003e23c0" +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [protoutils] ValidateTransaction -> DEBU 2a60 Header is channel_header:"\010\003\032\014\010\312\327\245\354\005\020\310\302\256\230\003\"\017businesschannel*@716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030TV\350\321\243L:\343\305fX\373\202\351\222\225\033\270\230\240\207\022$\230" " +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [protoutils] validateChannelHeader -> DEBU 2a61 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:16.913 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a62 begin" +peer0.org1.example.com | "2019-09-24 01:05:16.914 UTC [msp] GetManagerForChain -> DEBU 2a63 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:16.914 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a64 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:16.915 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a65 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:16.915 UTC [msp.identity] Verify -> DEBU 2a66 Verify: digest = 00000000 e0 f8 35 ad 30 51 bb 43 c2 4a 4f 91 93 18 65 36 |..5.0Q.C.JO...e6| +peer0.org1.example.com | 00000010 82 ac 95 13 d5 cc b4 10 07 64 48 79 81 43 d0 07 |.........dHy.C..|" +peer0.org1.example.com | "2019-09-24 01:05:16.915 UTC [msp.identity] Verify -> DEBU 2a67 Verify: sig = 00000000 30 45 02 21 00 f0 75 11 1d c1 3c 4c 4e df 7f cd |0E.!..u... DEBU 2a68 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:16.917 UTC [protoutils] validateEndorserTransaction -> DEBU 2a69 validateEndorserTransaction starts for data 0xc0039dd800, header channel_header:"\010\003\032\014\010\312\327\245\354\005\020\310\302\256\230\003\"\017businesschannel*@716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030TV\350\321\243L:\343\305fX\373\202\351\222\225\033\270\230\240\207\022$\230" " +peer0.org1.example.com | "2019-09-24 01:05:16.917 UTC [protoutils] validateEndorserTransaction -> DEBU 2a6a validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 01:05:16.918 UTC [protoutils] validateEndorserTransaction -> DEBU 2a6b validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 01:05:16.918 UTC [protoutils] ValidateTransaction -> DEBU 2a6c ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 01:05:16.918 UTC [committer.txvalidator] validateTx -> DEBU 2a6d Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:16.918 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a6e retrieveTransactionByID() - txId = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +peer0.org1.example.com | "2019-09-24 01:05:16.920 UTC [committer.txvalidator] validateTx -> DEBU 2a6f Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 01:05:16.920 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2a70 [businesschannel] VSCCValidateTx starts for bytes 0xc000241c00" +peer0.org1.example.com | "2019-09-24 01:05:16.921 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a71 constructing new query executor txid = [3c66d60d-3283-4029-9f60-c4ebc8987425]" +peer0.org1.example.com | "2019-09-24 01:05:16.921 UTC [stateleveldb] GetState -> DEBU 2a72 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:16.921 UTC [lockbasedtxmgr] Done -> DEBU 2a73 Done with transaction simulation / query execution [3c66d60d-3283-4029-9f60-c4ebc8987425]" +peer0.org1.example.com | "2019-09-24 01:05:16.922 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2a74 Validating Tx 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 01:05:16.922 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a75 constructing new query executor txid = [64ca7b1f-8493-450a-b6cf-a660a421ac14]" +peer0.org1.example.com | "2019-09-24 01:05:16.922 UTC [lockbasedtxmgr] Done -> DEBU 2a76 Done with transaction simulation / query execution [64ca7b1f-8493-450a-b6cf-a660a421ac14]" +peer0.org1.example.com | "2019-09-24 01:05:16.922 UTC [cauthdsl] func1 -> DEBU 2a77 0xc002675980 gate 1569287116922765200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:16.922 UTC [cauthdsl] func2 -> DEBU 2a78 0xc002675980 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:16.923 UTC [cauthdsl] func2 -> DEBU 2a79 0xc002675980 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:16.924 UTC [cauthdsl] func2 -> DEBU 2a7a 0xc002675980 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.926 UTC [msp] DeserializeIdentity -> DEBU 2a7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.926 UTC [gossip.comm] Send -> DEBU 2a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:16.927 UTC [msp] DeserializeIdentity -> DEBU 2a80 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.927 UTC [msp] DeserializeIdentity -> DEBU 2a81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:16.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:16.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a83 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:16.925 UTC [msp.identity] Verify -> DEBU 2a84 Verify: digest = 00000000 bc b2 0f 87 7b f7 b6 cb f3 e3 ec d3 9c 7f 7e ce |....{.........~.| +peer0.org1.example.com | 00000010 2d 6e f5 80 7b 7b 0e e7 60 f1 56 86 20 d9 c8 ef |-n..{{..`.V. ...|" +peer0.org1.example.com | "2019-09-24 01:05:16.934 UTC [msp.identity] Verify -> DEBU 2a85 Verify: sig = 00000000 30 44 02 20 71 46 df 0b 1a c9 03 c3 87 96 64 65 |0D. qF........de| +peer0.org1.example.com | 00000010 4e da b0 f6 3c dc 42 94 57 9b d4 65 d4 70 9c 92 |N...<.B.W..e.p..| +peer0.org1.example.com | 00000020 cb d4 52 66 02 20 1e 3a 0d e6 e2 db c6 e1 a8 96 |..Rf. .:........| +peer0.org1.example.com | 00000030 52 37 bd 6c c6 18 44 d1 6b 00 e6 b3 a4 72 18 ea |R7.l..D.k....r..| +peer0.org1.example.com | 00000040 81 f4 4b 6d 6a aa |..Kmj.|" +peer0.org1.example.com | "2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a86 0xc002675980 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a87 0xc002675980 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a88 0xc002675980 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a89 0xc002675980 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:16.937 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc002675980 gate 1569287116922765200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:16.937 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a8b constructing new query executor txid = [6f6cb0ba-df17-4a5d-b069-312cc98f488a]" +peer0.org1.example.com | "2019-09-24 01:05:16.937 UTC [lockbasedtxmgr] Done -> DEBU 2a8c Done with transaction simulation / query execution [6f6cb0ba-df17-4a5d-b069-312cc98f488a]" +peer0.org1.example.com | "2019-09-24 01:05:16.938 UTC [vscc] Validate -> DEBU 2a8d block 4, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 01:05:16.938 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2a8e Transaction 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b appears to be valid" +peer0.org1.example.com | "2019-09-24 01:05:16.938 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2a8f [businesschannel] VSCCValidateTx completes env bytes 0xc000241c00" +peer0.org1.example.com | "2019-09-24 01:05:16.940 UTC [committer.txvalidator] validateTx -> DEBU 2a90 [businesschannel] validateTx completes for block 0xc0027d7580 env 0xc0003e23c0 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:16.940 UTC [committer.txvalidator] Validate -> DEBU 2a91 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:05:16.940 UTC [committer.txvalidator] Validate -> INFO 2a92 [businesschannel] Validated block [4] in 29ms" +peer0.org1.example.com | "2019-09-24 01:05:16.942 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2a93 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:05:16.942 UTC [gossip.privdata] StoreBlock -> DEBU 2a94 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:05:16.942 UTC [kvledger] CommitWithPvtData -> DEBU 2a95 [businesschannel] Validating state for block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.942 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a96 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a97 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a98 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2a99 ValidateAndPrepareBatch() for block number = [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2a9a preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [valimpl] preprocessProtoBlock -> DEBU 2a9b txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [stateleveldb] GetState -> DEBU 2a9c GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [statebasedval] validateKVRead -> DEBU 2a9d Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:16.943 UTC [stateleveldb] GetState -> DEBU 2a9e GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [statebasedval] validateKVRead -> DEBU 2a9f Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [stateleveldb] GetState -> DEBU 2aa0 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [statebasedval] validateKVRead -> DEBU 2aa1 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2aa2 Block [4] Transaction index [0] TxId [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [valinternal] ApplyWriteSet -> DEBU 2aa3 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002af2800), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002af2a00)}" +peer0.org1.example.com | "2019-09-24 01:05:16.944 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa4 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:05:16.945 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa5 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:16.945 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa6 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:05:16.945 UTC [kvledger] CommitWithPvtData -> DEBU 2aa7 [businesschannel] Adding CommitHash to the block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.945 UTC [kvledger] CommitWithPvtData -> DEBU 2aa8 [businesschannel] Committing block [4] to storage" +peer0.org1.example.com | "2019-09-24 01:05:16.945 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2aa9 Writing block [4] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:05:16.947 UTC [pvtdatastorage] Prepare -> DEBU 2aaa Saved 0 private data write sets for block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aab Indexing block [blockNum=4, blockHash=[]byte{0xd5, 0x57, 0x9e, 0x19, 0x63, 0x67, 0xd5, 0xdc, 0x86, 0xc, 0xd2, 0x55, 0xe5, 0x72, 0x46, 0xfe, 0x75, 0x52, 0x23, 0xda, 0x1f, 0xf6, 0x6, 0xd2, 0x79, 0xa1, 0xba, 0xeb, 0x15, 0x73, 0xde, 0xe2} txOffsets= +peer0.org1.example.com | txId=716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b locPointer=offset=70, bytesLength=2977 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aac Adding txLoc [fileSuffixNum=0, offset=81468, bytesLength=2977] for tx ID: [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] to txid-index" +peer0.org1.example.com | "2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aad Adding txLoc [fileSuffixNum=0, offset=81468, bytesLength=2977] for tx number:[0] ID: [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:05:16.951 UTC [fsblkstorage] updateCheckpoint -> DEBU 2aae Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85417], isChainEmpty=[false], lastBlockNumber=[4]" +peer0.org1.example.com | "2019-09-24 01:05:16.951 UTC [pvtdatastorage] Commit -> DEBU 2aaf Committing private data for block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [pvtdatastorage] Commit -> DEBU 2ab0 Committed private data for block [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [kvledger] CommitWithPvtData -> DEBU 2ab1 [businesschannel] Committing block [4] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab2 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab3 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2ab4 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab5 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:16.953 UTC [stateleveldb] ApplyUpdates -> DEBU 2ab6 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 01:05:16.954 UTC [stateleveldb] ApplyUpdates -> DEBU 2ab7 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 01:05:16.955 UTC [lockbasedtxmgr] Commit -> DEBU 2ab8 Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:05:16.955 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ab9 Preparing potential purge list working-set for expiringAtBlk [5]" +peer0.org1.example.com | "2019-09-24 01:05:16.955 UTC [leveldbhelper] GetIterator -> DEBU 2aba Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:05:16.955 UTC [lockbasedtxmgr] func1 -> DEBU 2abb launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:05:16.956 UTC [kvledger] CommitWithPvtData -> DEBU 2abc [businesschannel] Committing block [4] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:05:16.956 UTC [historyleveldb] Commit -> DEBU 2abd Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:05:16.956 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2abe No expiry entry found for expiringAtBlk [5]" +peer0.org1.example.com | "2019-09-24 01:05:16.957 UTC [historyleveldb] Commit -> DEBU 2abf Channel [businesschannel]: Updates committed to history database for blockNo [4]" +peer0.org1.example.com | "2019-09-24 01:05:16.957 UTC [kvledger] CommitWithPvtData -> INFO 2ac0 [businesschannel] Committed block [4] with 1 transaction(s) in 15ms (state_validation=2ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +peer0.org1.example.com | "2019-09-24 01:05:16.958 UTC [msp] GetDefaultSigningIdentity -> DEBU 2ac1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:16.958 UTC [msp.identity] Sign -> DEBU 2ac2 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08051A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 01:05:16.958 UTC [msp.identity] Sign -> DEBU 2ac3 Sign: digest: 7CB01B921624145970E96A8D83599CD130C4E51B48EC5BF52A9E4743C7F7E8E1 " +peer0.org1.example.com | "2019-09-24 01:05:16.958 UTC [gossip.state] commitBlock -> DEBU 2ac4 [businesschannel] Committed block [4] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:05:17.272 UTC [endorser] ProcessProposal -> DEBU 2ac5 Entering: request from 172.18.0.5:49924" +peer0.org1.example.com | "2019-09-24 01:05:17.272 UTC [protoutils] ValidateProposalMessage -> DEBU 2ac6 ValidateProposalMessage starts for signed proposal 0xc0024826e0" +peer0.org1.example.com | "2019-09-24 01:05:17.272 UTC [protoutils] validateChannelHeader -> DEBU 2ac7 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:17.272 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ac8 begin" +peer0.org1.example.com | "2019-09-24 01:05:17.273 UTC [msp] GetManagerForChain -> DEBU 2ac9 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:17.273 UTC [protoutils] checkSignatureFromCreator -> DEBU 2aca creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +peer0.org1.example.com | "2019-09-24 01:05:17.273 UTC [protoutils] checkSignatureFromCreator -> DEBU 2acb creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:17.273 UTC [msp.identity] Verify -> DEBU 2acc Verify: digest = 00000000 11 ec 72 44 b9 26 f3 c3 66 7d 20 6e 35 2e 0f 59 |..rD.&..f} n5..Y| +peer0.org1.example.com | 00000010 bf 0e e1 10 81 dc 87 ab a4 c1 80 54 bb 99 e2 8b |...........T....|" +peer0.org1.example.com | "2019-09-24 01:05:17.273 UTC [msp.identity] Verify -> DEBU 2acd Verify: sig = 00000000 30 44 02 20 79 5a 9f 6a 1c fe d1 d7 1d 17 d8 6a |0D. yZ.j.......j| +peer0.org1.example.com | 00000010 3a 16 17 ae f4 93 d9 0a 80 c7 94 6d 6f a5 da 42 |:..........mo..B| +peer0.org1.example.com | 00000020 c9 a2 57 cf 02 20 07 7b 7a a1 5b e7 22 93 29 5e |..W.. .{z.[.".)^| +peer0.org1.example.com | 00000030 2c 12 ae ea e9 8d 02 d2 70 a6 a0 b3 5e b8 25 30 |,.......p...^.%0| +peer0.org1.example.com | 00000040 36 1d 23 83 b1 a8 |6.#...|" +peer0.org1.example.com | "2019-09-24 01:05:17.274 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ace exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:17.274 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2acf validateChaincodeProposalMessage starts for proposal 0xc002a280e0, header 0xc002482b90" +peer0.org1.example.com | "2019-09-24 01:05:17.274 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ad0 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.274 UTC [endorser] preProcess -> DEBU 2ad1 [businesschannel][853b34c6] processing txid: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ad2 retrieveTransactionByID() - txId = [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [aclmgmt] CheckACL -> DEBU 2ad3 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [aclmgmt] CheckACL -> DEBU 2ad4 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.276 UTC [cauthdsl] func1 -> DEBU 2ad8 0xc0027f4b30 gate 1569287117276165700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2ad9 0xc0027f4b30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2ada 0xc0027f4b30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0027f4b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0027f4b30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [cauthdsl] func1 -> DEBU 2add 0xc0027f4b30 gate 1569287117276165700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2ade Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2adf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2ae0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.277 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0027f53a0 gate 1569287117277878100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae2 0xc0027f53a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae3 0xc0027f53a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae4 0xc0027f53a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.278 UTC [msp.identity] Verify -> DEBU 2ae5 Verify: digest = 00000000 11 ec 72 44 b9 26 f3 c3 66 7d 20 6e 35 2e 0f 59 |..rD.&..f} n5..Y| +peer0.org1.example.com | 00000010 bf 0e e1 10 81 dc 87 ab a4 c1 80 54 bb 99 e2 8b |...........T....|" +peer0.org1.example.com | "2019-09-24 01:05:17.279 UTC [msp.identity] Verify -> DEBU 2ae6 Verify: sig = 00000000 30 44 02 20 79 5a 9f 6a 1c fe d1 d7 1d 17 d8 6a |0D. yZ.j.......j| +peer0.org1.example.com | 00000010 3a 16 17 ae f4 93 d9 0a 80 c7 94 6d 6f a5 da 42 |:..........mo..B| +peer0.org1.example.com | 00000020 c9 a2 57 cf 02 20 07 7b 7a a1 5b e7 22 93 29 5e |..W.. .{z.[.".)^| +peer0.org1.example.com | 00000030 2c 12 ae ea e9 8d 02 d2 70 a6 a0 b3 5e b8 25 30 |,.......p...^.%0| +peer0.org1.example.com | 00000040 36 1d 23 83 b1 a8 |6.#...|" +peer0.org1.example.com | "2019-09-24 01:05:17.279 UTC [cauthdsl] func2 -> DEBU 2ae7 0xc0027f53a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.279 UTC [cauthdsl] func1 -> DEBU 2ae8 0xc0027f53a0 gate 1569287117277878100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.279 UTC [policies] Evaluate -> DEBU 2ae9 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.279 UTC [policies] Evaluate -> DEBU 2aea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.280 UTC [policies] Evaluate -> DEBU 2aeb Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.280 UTC [policies] Evaluate -> DEBU 2aec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.280 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2aed constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:17.280 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2aee constructing new tx simulator txid = [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +peer0.org1.example.com | "2019-09-24 01:05:17.281 UTC [endorser] SimulateProposal -> DEBU 2aef [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.281 UTC [stateleveldb] GetState -> DEBU 2af0 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:17.282 UTC [ccprovider] GetChaincodeData -> DEBU 2af1 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:17.282 UTC [endorser] callChaincode -> INFO 2af2 [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.283 UTC [chaincode] Execute -> DEBU 2af3 Entry" +peer0.org1.example.com | "2019-09-24 01:05:17.284 UTC [chaincode] handleMessage -> DEBU 2af4 [853b34c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.284 UTC [chaincode] HandleTransaction -> DEBU 2af5 [853b34c6] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.284 UTC [chaincode] HandleGetState -> DEBU 2af6 [853b34c6] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.285 UTC [stateleveldb] GetState -> DEBU 2af7 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:17.285 UTC [chaincode] HandleTransaction -> DEBU 2af8 [853b34c6] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [chaincode] handleMessage -> DEBU 2af9 [853b34c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [chaincode] Notify -> DEBU 2afa [853b34c6] notifying Txid:853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [chaincode] Execute -> DEBU 2afb Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [endorser] callChaincode -> INFO 2afc [businesschannel][853b34c6] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2afd Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:17.286 UTC [lockbasedtxmgr] Done -> DEBU 2afe Done with transaction simulation / query execution [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [endorser] SimulateProposal -> DEBU 2aff [businesschannel][853b34c6] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [endorser] endorseProposal -> DEBU 2b00 [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [endorser] endorseProposal -> DEBU 2b01 [businesschannel][853b34c6] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [endorser] EndorseWithPlugin -> DEBU 2b02 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [msp.identity] Sign -> DEBU 2b03 Sign: plaintext: 0A2020931FDD4BFC044CAE8AC5435AD7...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:17.287 UTC [msp.identity] Sign -> DEBU 2b04 Sign: digest: 91D18328D7171F43B1A076E38620EEA4007DAB68806DC59F12A60DB19DC4A9E8 " +peer0.org1.example.com | "2019-09-24 01:05:17.288 UTC [endorser] EndorseWithPlugin -> DEBU 2b05 Exiting {plugin: escc, channel: businesschannel, tx: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.288 UTC [endorser] endorseProposal -> DEBU 2b06 [businesschannel][853b34c6] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.288 UTC [lockbasedtxmgr] Done -> DEBU 2b07 Done with transaction simulation / query execution [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +peer0.org1.example.com | "2019-09-24 01:05:17.288 UTC [endorser] func1 -> DEBU 2b08 Exit: request from 172.18.0.5:49924" +peer0.org1.example.com | "2019-09-24 01:05:17.288 UTC [comm.grpc.server] 1 -> INFO 2b09 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49924 grpc.code=OK grpc.call_duration=16.2646ms +peer0.org1.example.com | "2019-09-24 01:05:17.292 UTC [grpc] infof -> DEBU 2b0a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.293 UTC [grpc] infof -> DEBU 2b0b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.444 UTC [endorser] ProcessProposal -> DEBU 2b0c Entering: request from 172.18.0.5:49928" +peer0.org1.example.com | "2019-09-24 01:05:17.444 UTC [protoutils] ValidateProposalMessage -> DEBU 2b0d ValidateProposalMessage starts for signed proposal 0xc002483590" +peer0.org1.example.com | "2019-09-24 01:05:17.444 UTC [protoutils] validateChannelHeader -> DEBU 2b0e validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:17.445 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b0f begin" +peer0.org1.example.com | "2019-09-24 01:05:17.445 UTC [msp] GetManagerForChain -> DEBU 2b10 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:17.445 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b11 creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +peer0.org1.example.com | "2019-09-24 01:05:17.446 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b12 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:17.447 UTC [msp.identity] Verify -> DEBU 2b13 Verify: digest = 00000000 42 1d 0f 8b ed 7d 9a 6e f3 03 86 44 50 63 d8 1a |B....}.n...DPc..| +peer0.org1.example.com | 00000010 d7 de 10 13 b8 4a dc 42 d2 f1 d2 03 1d 13 51 d1 |.....J.B......Q.|" +peer0.org1.example.com | "2019-09-24 01:05:17.447 UTC [msp.identity] Verify -> DEBU 2b14 Verify: sig = 00000000 30 44 02 20 09 77 25 67 5e 6f 51 9f 3c e9 73 e7 |0D. .w%g^oQ.<.s.| +peer0.org1.example.com | 00000010 80 55 97 e5 f5 47 77 75 17 23 66 d2 1b 8c a8 f3 |.U...Gwu.#f.....| +peer0.org1.example.com | 00000020 9d b8 fb 68 02 20 6b d0 f1 cb ce d7 da 96 f5 49 |...h. k........I| +peer0.org1.example.com | 00000030 b5 a2 b2 04 24 78 12 97 0e 69 7f 16 9a 29 96 63 |....$x...i...).c| +peer0.org1.example.com | 00000040 6a 2e 92 10 f9 55 |j....U|" +peer0.org1.example.com | "2019-09-24 01:05:17.448 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b15 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:17.448 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b16 validateChaincodeProposalMessage starts for proposal 0xc002a28620, header 0xc0024839a0" +peer0.org1.example.com | "2019-09-24 01:05:17.448 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b17 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.448 UTC [endorser] preProcess -> DEBU 2b18 [businesschannel][074b5311] processing txid: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5" +peer0.org1.example.com | "2019-09-24 01:05:17.449 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b19 retrieveTransactionByID() - txId = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +peer0.org1.example.com | "2019-09-24 01:05:17.449 UTC [aclmgmt] CheckACL -> DEBU 2b1a acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:17.449 UTC [aclmgmt] CheckACL -> DEBU 2b1b acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:17.449 UTC [policies] Evaluate -> DEBU 2b1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [policies] Evaluate -> DEBU 2b1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [policies] Evaluate -> DEBU 2b1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [cauthdsl] func1 -> DEBU 2b1f 0xc002872710 gate 1569287117450463000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b20 0xc002872710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b21 0xc002872710 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b22 0xc002872710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.451 UTC [cauthdsl] func2 -> DEBU 2b23 0xc002872710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.451 UTC [cauthdsl] func1 -> DEBU 2b24 0xc002872710 gate 1569287117450463000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.451 UTC [policies] Evaluate -> DEBU 2b25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [policies] Evaluate -> DEBU 2b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [policies] Evaluate -> DEBU 2b27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [cauthdsl] func1 -> DEBU 2b28 0xc002872f50 gate 1569287117452257400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b29 0xc002872f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b2a 0xc002872f50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b2b 0xc002872f50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.453 UTC [msp.identity] Verify -> DEBU 2b2c Verify: digest = 00000000 42 1d 0f 8b ed 7d 9a 6e f3 03 86 44 50 63 d8 1a |B....}.n...DPc..| +peer0.org1.example.com | 00000010 d7 de 10 13 b8 4a dc 42 d2 f1 d2 03 1d 13 51 d1 |.....J.B......Q.|" +peer0.org1.example.com | "2019-09-24 01:05:17.453 UTC [msp.identity] Verify -> DEBU 2b2d Verify: sig = 00000000 30 44 02 20 09 77 25 67 5e 6f 51 9f 3c e9 73 e7 |0D. .w%g^oQ.<.s.| +peer0.org1.example.com | 00000010 80 55 97 e5 f5 47 77 75 17 23 66 d2 1b 8c a8 f3 |.U...Gwu.#f.....| +peer0.org1.example.com | 00000020 9d b8 fb 68 02 20 6b d0 f1 cb ce d7 da 96 f5 49 |...h. k........I| +peer0.org1.example.com | 00000030 b5 a2 b2 04 24 78 12 97 0e 69 7f 16 9a 29 96 63 |....$x...i...).c| +peer0.org1.example.com | 00000040 6a 2e 92 10 f9 55 |j....U|" +peer0.org1.example.com | "2019-09-24 01:05:17.453 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc002872f50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.453 UTC [cauthdsl] func1 -> DEBU 2b2f 0xc002872f50 gate 1569287117452257400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b30 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b32 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.454 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b34 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:17.455 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b35 constructing new tx simulator txid = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +peer0.org1.example.com | "2019-09-24 01:05:17.455 UTC [endorser] SimulateProposal -> DEBU 2b36 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.455 UTC [stateleveldb] GetState -> DEBU 2b37 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:17.455 UTC [ccprovider] GetChaincodeData -> DEBU 2b38 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:17.455 UTC [endorser] callChaincode -> INFO 2b39 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.456 UTC [chaincode] Execute -> DEBU 2b3a Entry" +peer0.org1.example.com | "2019-09-24 01:05:17.457 UTC [chaincode] handleMessage -> DEBU 2b3b [074b5311] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.457 UTC [chaincode] HandleTransaction -> DEBU 2b3c [074b5311] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.458 UTC [chaincode] HandleGetState -> DEBU 2b3d [074b5311] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.458 UTC [stateleveldb] GetState -> DEBU 2b3e GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:17.458 UTC [chaincode] HandleTransaction -> DEBU 2b3f [074b5311] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.459 UTC [chaincode] handleMessage -> DEBU 2b40 [074b5311] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.460 UTC [chaincode] HandleTransaction -> DEBU 2b41 [074b5311] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.460 UTC [chaincode] HandleGetState -> DEBU 2b42 [074b5311] getting state for chaincode exp02, key b, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.460 UTC [stateleveldb] GetState -> DEBU 2b43 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 01:05:17.460 UTC [chaincode] HandleTransaction -> DEBU 2b44 [074b5311] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.461 UTC [chaincode] handleMessage -> DEBU 2b45 [074b5311] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.462 UTC [chaincode] HandleTransaction -> DEBU 2b46 [074b5311] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.462 UTC [chaincode] HandleTransaction -> DEBU 2b47 [074b5311] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.463 UTC [chaincode] handleMessage -> DEBU 2b48 [074b5311] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.463 UTC [chaincode] HandleTransaction -> DEBU 2b49 [074b5311] handling PUT_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.463 UTC [chaincode] HandleTransaction -> DEBU 2b4a [074b5311] Completed PUT_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [chaincode] handleMessage -> DEBU 2b4b [074b5311] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [chaincode] Notify -> DEBU 2b4c [074b5311] notifying Txid:074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [chaincode] Execute -> DEBU 2b4d Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [endorser] callChaincode -> INFO 2b4e [businesschannel][074b5311] Exit chaincode: name:"exp02" (9ms)" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2b4f Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:17.464 UTC [lockbasedtxmgr] Done -> DEBU 2b50 Done with transaction simulation / query execution [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +peer0.org1.example.com | "2019-09-24 01:05:17.465 UTC [endorser] SimulateProposal -> DEBU 2b51 [businesschannel][074b5311] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.465 UTC [endorser] endorseProposal -> DEBU 2b52 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.465 UTC [endorser] endorseProposal -> DEBU 2b53 [businesschannel][074b5311] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:17.465 UTC [endorser] EndorseWithPlugin -> DEBU 2b54 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.465 UTC [msp.identity] Sign -> DEBU 2b55 Sign: plaintext: 0A20000E0A109C8AAC49E4731E7FE19E...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:17.466 UTC [msp.identity] Sign -> DEBU 2b56 Sign: digest: CC694F418907FBB35A81AF28EC3903AEB6210BD00D716833C1F086E586731F7B " +peer0.org1.example.com | "2019-09-24 01:05:17.467 UTC [endorser] EndorseWithPlugin -> DEBU 2b57 Exiting {plugin: escc, channel: businesschannel, tx: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.467 UTC [endorser] endorseProposal -> DEBU 2b58 [businesschannel][074b5311] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.467 UTC [lockbasedtxmgr] Done -> DEBU 2b59 Done with transaction simulation / query execution [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +peer0.org1.example.com | "2019-09-24 01:05:17.467 UTC [endorser] func1 -> DEBU 2b5a Exit: request from 172.18.0.5:49928" +peer0.org1.example.com | "2019-09-24 01:05:17.467 UTC [comm.grpc.server] 1 -> INFO 2b5b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49928 grpc.code=OK grpc.call_duration=24.4528ms +peer0.org1.example.com | "2019-09-24 01:05:17.481 UTC [grpc] infof -> DEBU 2b5c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.481 UTC [grpc] infof -> DEBU 2b5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.642 UTC [endorser] ProcessProposal -> DEBU 2b5e Entering: request from 172.18.0.5:49934" +peer0.org1.example.com | "2019-09-24 01:05:17.642 UTC [protoutils] ValidateProposalMessage -> DEBU 2b5f ValidateProposalMessage starts for signed proposal 0xc0024d1270" +peer0.org1.example.com | "2019-09-24 01:05:17.643 UTC [protoutils] validateChannelHeader -> DEBU 2b60 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b61 begin" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [msp] GetManagerForChain -> DEBU 2b62 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b63 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b64 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [msp.identity] Verify -> DEBU 2b65 Verify: digest = 00000000 1c ea bc 17 96 ea cd 37 74 96 b4 c5 51 bd cf 87 |.......7t...Q...| +peer0.org1.example.com | 00000010 e4 41 e3 38 ee 7c 17 48 2b fe 13 d8 7d 34 69 e6 |.A.8.|.H+...}4i.|" +peer0.org1.example.com | "2019-09-24 01:05:17.644 UTC [msp.identity] Verify -> DEBU 2b66 Verify: sig = 00000000 30 44 02 20 3e 5f 66 77 68 af 8f 77 3e 2c 52 5c |0D. >_fwh..w>,R\| +peer0.org1.example.com | 00000010 88 22 8d ea ab 9b 6e b5 8b 04 14 9a 04 6c 48 a7 |."....n......lH.| +peer0.org1.example.com | 00000020 18 0a ca 12 02 20 18 fc 89 9e 9f e4 bc dc 45 80 |..... ........E.| +peer0.org1.example.com | 00000030 0b fe cb b6 61 5a 6a 5b 5d 9f b3 25 ea 58 9b 90 |....aZj[]..%.X..| +peer0.org1.example.com | 00000040 62 54 84 b0 2c b4 |bT..,.|" +peer0.org1.example.com | "2019-09-24 01:05:17.645 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b67 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:17.645 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b68 validateChaincodeProposalMessage starts for proposal 0xc0029411f0, header 0xc0024d16d0" +peer0.org1.example.com | "2019-09-24 01:05:17.645 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b69 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.645 UTC [endorser] preProcess -> DEBU 2b6a [businesschannel][12e43181] processing txid: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8" +peer0.org1.example.com | "2019-09-24 01:05:17.646 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b6b retrieveTransactionByID() - txId = [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +peer0.org1.example.com | "2019-09-24 01:05:17.646 UTC [aclmgmt] CheckACL -> DEBU 2b6c acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:17.646 UTC [aclmgmt] CheckACL -> DEBU 2b6d acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:17.646 UTC [policies] Evaluate -> DEBU 2b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.646 UTC [policies] Evaluate -> DEBU 2b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.647 UTC [policies] Evaluate -> DEBU 2b70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.647 UTC [cauthdsl] func1 -> DEBU 2b71 0xc00293f770 gate 1569287117647205300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b72 0xc00293f770 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b73 0xc00293f770 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b74 0xc00293f770 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.648 UTC [msp.identity] Verify -> DEBU 2b75 Verify: digest = 00000000 1c ea bc 17 96 ea cd 37 74 96 b4 c5 51 bd cf 87 |.......7t...Q...| +peer0.org1.example.com | 00000010 e4 41 e3 38 ee 7c 17 48 2b fe 13 d8 7d 34 69 e6 |.A.8.|.H+...}4i.|" +peer0.org1.example.com | "2019-09-24 01:05:17.648 UTC [msp.identity] Verify -> DEBU 2b76 Verify: sig = 00000000 30 44 02 20 3e 5f 66 77 68 af 8f 77 3e 2c 52 5c |0D. >_fwh..w>,R\| +peer0.org1.example.com | 00000010 88 22 8d ea ab 9b 6e b5 8b 04 14 9a 04 6c 48 a7 |."....n......lH.| +peer0.org1.example.com | 00000020 18 0a ca 12 02 20 18 fc 89 9e 9f e4 bc dc 45 80 |..... ........E.| +peer0.org1.example.com | 00000030 0b fe cb b6 61 5a 6a 5b 5d 9f b3 25 ea 58 9b 90 |....aZj[]..%.X..| +peer0.org1.example.com | 00000040 62 54 84 b0 2c b4 |bT..,.|" +peer0.org1.example.com | "2019-09-24 01:05:17.648 UTC [cauthdsl] func2 -> DEBU 2b77 0xc00293f770 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.649 UTC [cauthdsl] func1 -> DEBU 2b78 0xc00293f770 gate 1569287117647205300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b79 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7b Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:17.650 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b7d constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:17.650 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b7e constructing new tx simulator txid = [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +peer0.org1.example.com | "2019-09-24 01:05:17.650 UTC [endorser] SimulateProposal -> DEBU 2b7f [businesschannel][12e43181] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.651 UTC [stateleveldb] GetState -> DEBU 2b80 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:17.651 UTC [ccprovider] GetChaincodeData -> DEBU 2b81 Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:17.651 UTC [endorser] callChaincode -> INFO 2b82 [businesschannel][12e43181] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.651 UTC [chaincode] Execute -> DEBU 2b83 Entry" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [msp] DeserializeIdentity -> DEBU 2b84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [msp] DeserializeIdentity -> DEBU 2b85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [chaincode] handleMessage -> DEBU 2b86 [12e43181] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] Send -> DEBU 2b87 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [chaincode] HandleTransaction -> DEBU 2b89 [12e43181] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [chaincode] HandleGetState -> DEBU 2b8b [12e43181] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [stateleveldb] GetState -> DEBU 2b8c GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [chaincode] HandleTransaction -> DEBU 2b8f [12e43181] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b90 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b91 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.657 UTC [chaincode] handleMessage -> DEBU 2b92 [12e43181] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:17.657 UTC [chaincode] Notify -> DEBU 2b93 [12e43181] notifying Txid:12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:17.658 UTC [chaincode] Execute -> DEBU 2b94 Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.658 UTC [endorser] callChaincode -> INFO 2b95 [businesschannel][12e43181] Exit chaincode: name:"exp02" (7ms)" +peer0.org1.example.com | "2019-09-24 01:05:17.658 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2b96 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:17.659 UTC [lockbasedtxmgr] Done -> DEBU 2b97 Done with transaction simulation / query execution [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +peer0.org1.example.com | "2019-09-24 01:05:17.659 UTC [endorser] SimulateProposal -> DEBU 2b98 [businesschannel][12e43181] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.659 UTC [endorser] endorseProposal -> DEBU 2b99 [businesschannel][12e43181] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:17.660 UTC [endorser] endorseProposal -> DEBU 2b9a [businesschannel][12e43181] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:17.660 UTC [endorser] EndorseWithPlugin -> DEBU 2b9b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.661 UTC [msp.identity] Sign -> DEBU 2b9c Sign: plaintext: 0A20C8B48950C3E0E8AF2938B290353B...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:17.661 UTC [msp.identity] Sign -> DEBU 2b9f Sign: digest: E5321B63C343224543AF972FDB8EF7317E853F3CADC176D395860AA9F8DC4062 " +peer0.org1.example.com | "2019-09-24 01:05:17.661 UTC [gossip.comm] func1 -> DEBU 2b9e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [gossip.gossip] handleMessage -> DEBU 2ba0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [endorser] EndorseWithPlugin -> DEBU 2ba1 Exiting {plugin: escc, channel: businesschannel, tx: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [endorser] endorseProposal -> DEBU 2ba3 [businesschannel][12e43181] Exit" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [lockbasedtxmgr] Done -> DEBU 2ba4 Done with transaction simulation / query execution [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [endorser] func1 -> DEBU 2ba5 Exit: request from 172.18.0.5:49934" +peer0.org1.example.com | "2019-09-24 01:05:17.663 UTC [comm.grpc.server] 1 -> INFO 2ba7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49934 grpc.code=OK grpc.call_duration=20.9171ms +peer0.org1.example.com | "2019-09-24 01:05:17.661 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.663 UTC [msp] DeserializeIdentity -> DEBU 2ba8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.664 UTC [gossip.comm] Send -> DEBU 2ba9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:17.664 UTC [msp] DeserializeIdentity -> DEBU 2baa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.664 UTC [msp] DeserializeIdentity -> DEBU 2bab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.665 UTC [gossip.comm] sendToEndpoint -> DEBU 2bac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.665 UTC [gossip.comm] sendToEndpoint -> DEBU 2bad Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [msp] DeserializeIdentity -> DEBU 2ba2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.665 UTC [msp.identity] Verify -> DEBU 2bae Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +peer0.org1.example.com | 00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2baf Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +peer0.org1.example.com | 00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +peer0.org1.example.com | 00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +peer0.org1.example.com | 00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +peer0.org1.example.com | 00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +peer0.org1.example.com | "2019-09-24 01:05:17.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bb0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bb1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.666 UTC [policies] Evaluate -> DEBU 2bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.667 UTC [policies] Evaluate -> DEBU 2bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.667 UTC [policies] Evaluate -> DEBU 2bb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.667 UTC [cauthdsl] func1 -> DEBU 2bb5 0xc0029f39d0 gate 1569287117667656400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.668 UTC [cauthdsl] func2 -> DEBU 2bb6 0xc0029f39d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.668 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0029f39d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.669 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0029f39d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.669 UTC [msp.identity] Verify -> DEBU 2bb9 Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +peer0.org1.example.com | 00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2bba Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +peer0.org1.example.com | 00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +peer0.org1.example.com | 00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +peer0.org1.example.com | 00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +peer0.org1.example.com | 00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +peer0.org1.example.com | "2019-09-24 01:05:17.670 UTC [cauthdsl] func2 -> DEBU 2bbb 0xc0029f39d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.670 UTC [cauthdsl] func1 -> DEBU 2bbc 0xc0029f39d0 gate 1569287117667656400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.670 UTC [policies] Evaluate -> DEBU 2bbd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.670 UTC [policies] Evaluate -> DEBU 2bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.671 UTC [policies] Evaluate -> DEBU 2bbf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.671 UTC [policies] Evaluate -> DEBU 2bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.671 UTC [msp] DeserializeIdentity -> DEBU 2bc1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.671 UTC [msp] DeserializeIdentity -> DEBU 2bc2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bc4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bc5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.672 UTC [gossip.comm] func1 -> DEBU 2bc6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 768 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.662 UTC [gossip.comm] func1 -> DEBU 2ba6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.672 UTC [policies] Evaluate -> DEBU 2bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.673 UTC [policies] Evaluate -> DEBU 2bca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.673 UTC [policies] Evaluate -> DEBU 2bcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.673 UTC [cauthdsl] func1 -> DEBU 2bcc 0xc002a781d0 gate 1569287117673900900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.673 UTC [gossip.comm] sendToEndpoint -> DEBU 2bc8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.682 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.673 UTC [gossip.comm] sendToEndpoint -> DEBU 2bc9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.682 UTC [gossip.comm] sendToEndpoint -> DEBU 2bce Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.674 UTC [cauthdsl] func2 -> DEBU 2bcf 0xc002a781d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc002a781d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc002a781d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc002a781d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [cauthdsl] func1 -> DEBU 2bd5 0xc002a781d0 gate 1569287117673900900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [gossip.comm] func1 -> DEBU 2bd0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [gossip.comm] func1 -> DEBU 2bd1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.688 UTC [policies] Evaluate -> DEBU 2bd6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.689 UTC [policies] Evaluate -> DEBU 2bd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.690 UTC [policies] Evaluate -> DEBU 2bd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.690 UTC [grpc] infof -> DEBU 2bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.690 UTC [cauthdsl] func1 -> DEBU 2bda 0xc002af18b0 gate 1569287117690223000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.690 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc002af18b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.691 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc002af18b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.693 UTC [cauthdsl] func2 -> DEBU 2bde 0xc002af18b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.693 UTC [msp.identity] Verify -> DEBU 2bdf Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +peer0.org1.example.com | 00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +peer0.org1.example.com | "2019-09-24 01:05:17.690 UTC [grpc] infof -> DEBU 2bdc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:17.693 UTC [msp.identity] Verify -> DEBU 2be0 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +peer0.org1.example.com | 00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +peer0.org1.example.com | 00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +peer0.org1.example.com | 00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +peer0.org1.example.com | 00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +peer0.org1.example.com | "2019-09-24 01:05:17.695 UTC [cauthdsl] func2 -> DEBU 2be1 0xc002af18b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.696 UTC [cauthdsl] func1 -> DEBU 2be2 0xc002af18b0 gate 1569287117690223000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.696 UTC [policies] Evaluate -> DEBU 2be3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.698 UTC [msp.identity] Verify -> DEBU 2be7 Verify: digest = 00000000 d6 19 6e b0 d8 cb 15 93 21 b6 85 8f e3 aa cf 32 |..n.....!......2| +peer0.org1.example.com | 00000010 5f 0d 9f b7 89 f5 c4 f4 2a ec 7b 36 ed 3c 91 e2 |_.......*.{6.<..|" +peer0.org1.example.com | "2019-09-24 01:05:17.701 UTC [msp.identity] Verify -> DEBU 2be8 Verify: sig = 00000000 30 45 02 21 00 ce 16 8c 88 7a 5d 7c f2 be bc 67 |0E.!.....z]|...g| +peer0.org1.example.com | 00000010 3d bc 97 fa e3 af 2a b1 49 ae b2 a5 6f 04 8e e5 |=.....*.I...o...| +peer0.org1.example.com | 00000020 90 b8 63 73 9c 02 20 6d 6d 97 76 19 b3 a9 38 92 |..cs.. mm.v...8.| +peer0.org1.example.com | 00000030 6b be 77 b0 46 8c f1 ca 5d 49 da d6 e9 6a bd 8a |k.w.F...]I...j..| +peer0.org1.example.com | 00000040 12 80 03 43 5a cd b8 |...CZ..|" +peer0.org1.example.com | "2019-09-24 01:05:17.703 UTC [msp] DeserializeIdentity -> DEBU 2be9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.704 UTC [msp] DeserializeIdentity -> DEBU 2bea Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2beb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bec Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bed Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bf0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.705 UTC [cauthdsl] func1 -> DEBU 2bf1 0xc0030fb7b0 gate 1569287117705937000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc0030fb7b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc0030fb7b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc0030fb7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc0030fb7b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.707 UTC [cauthdsl] func1 -> DEBU 2bf6 0xc0030fb7b0 gate 1569287117705937000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.708 UTC [cauthdsl] func1 -> DEBU 2bfa 0xc003102000 gate 1569287117708088500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfc 0xc003102000 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfd 0xc003102000 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfe 0xc003102000 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.709 UTC [msp.identity] Verify -> DEBU 2bff Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:17.709 UTC [msp.identity] Verify -> DEBU 2c00 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:17.708 UTC [msp] DeserializeIdentity -> DEBU 2bfb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.709 UTC [msp] DeserializeIdentity -> DEBU 2c01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.709 UTC [cauthdsl] func2 -> DEBU 2c03 0xc003102000 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.710 UTC [cauthdsl] func1 -> DEBU 2c04 0xc003102000 gate 1569287117708088500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c07 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.711 UTC [policies] Evaluate -> DEBU 2c08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.711 UTC [msp] DeserializeIdentity -> DEBU 2c09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.710 UTC [gossip.pull] Hello -> DEBU 2c02 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:17.711 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.712 UTC [msp] DeserializeIdentity -> DEBU 2c0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.713 UTC [policies] Evaluate -> DEBU 2c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.713 UTC [policies] Evaluate -> DEBU 2c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.712 UTC [gossip.comm] Send -> DEBU 2c0e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:17.714 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.715 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0031030f0 gate 1569287117715048000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.715 UTC [gossip.comm] sendToEndpoint -> DEBU 2c13 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.715 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0031030f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.715 UTC [cauthdsl] func2 -> DEBU 2c16 0xc0031030f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.716 UTC [cauthdsl] func2 -> DEBU 2c17 0xc0031030f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.716 UTC [cauthdsl] func2 -> DEBU 2c18 0xc0031030f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.716 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0031030f0 gate 1569287117715048000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.718 UTC [cauthdsl] func1 -> DEBU 2c1d 0xc003103930 gate 1569287117718764500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c1f 0xc003103930 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c20 0xc003103930 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c21 0xc003103930 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.719 UTC [gossip.comm] func1 -> DEBU 2c1e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.715 UTC [gossip.comm] sendToEndpoint -> DEBU 2c15 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.720 UTC [msp.identity] Verify -> DEBU 2c22 Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:17.720 UTC [msp.identity] Verify -> DEBU 2c23 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:17.720 UTC [cauthdsl] func2 -> DEBU 2c24 0xc003103930 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.721 UTC [cauthdsl] func1 -> DEBU 2c25 0xc003103930 gate 1569287117718764500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c28 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.722 UTC [policies] Evaluate -> DEBU 2c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.722 UTC [gossip.gossip] handleMessage -> DEBU 2c2a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.722 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 768 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.723 UTC [msp.identity] Verify -> DEBU 2c2c Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +peer0.org1.example.com | 00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +peer0.org1.example.com | "2019-09-24 01:05:17.723 UTC [msp.identity] Verify -> DEBU 2c2d Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +peer0.org1.example.com | 00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +peer0.org1.example.com | 00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +peer0.org1.example.com | 00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +peer0.org1.example.com | 00000040 87 b1 df 46 37 73 8c |...F7s.|" +peer0.org1.example.com | "2019-09-24 01:05:17.724 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.724 UTC [msp] DeserializeIdentity -> DEBU 2c2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c31 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c32 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [cauthdsl] func1 -> DEBU 2c36 0xc00033ba90 gate 1569287117725765100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.725 UTC [cauthdsl] func2 -> DEBU 2c37 0xc00033ba90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c38 0xc00033ba90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c39 0xc00033ba90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c3a 0xc00033ba90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.726 UTC [cauthdsl] func1 -> DEBU 2c3b 0xc00033ba90 gate 1569287117725765100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.726 UTC [policies] Evaluate -> DEBU 2c3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.727 UTC [policies] Evaluate -> DEBU 2c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.727 UTC [policies] Evaluate -> DEBU 2c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.727 UTC [cauthdsl] func1 -> DEBU 2c3f 0xc0027ae2d0 gate 1569287117727598400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c40 0xc0027ae2d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c41 0xc0027ae2d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c42 0xc0027ae2d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [msp.identity] Verify -> DEBU 2c43 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [msp.identity] Verify -> DEBU 2c44 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c45 0xc0027ae2d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.728 UTC [cauthdsl] func1 -> DEBU 2c46 0xc0027ae2d0 gate 1569287117727598400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.729 UTC [policies] Evaluate -> DEBU 2c47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.729 UTC [policies] Evaluate -> DEBU 2c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.730 UTC [policies] Evaluate -> DEBU 2c49 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.730 UTC [policies] Evaluate -> DEBU 2c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.731 UTC [msp] DeserializeIdentity -> DEBU 2c4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.732 UTC [msp] DeserializeIdentity -> DEBU 2c4c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func1 -> DEBU 2c53 0xc0027afab0 gate 1569287117734099200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c54 0xc0027afab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c55 0xc0027afab0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c56 0xc0027afab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c57 0xc0027afab0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [cauthdsl] func1 -> DEBU 2c58 0xc0027afab0 gate 1569287117734099200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.734 UTC [policies] Evaluate -> DEBU 2c59 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [policies] Evaluate -> DEBU 2c5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [policies] Evaluate -> DEBU 2c5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc003cf22f0 gate 1569287117735305800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5d 0xc003cf22f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5e 0xc003cf22f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5f 0xc003cf22f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.735 UTC [msp.identity] Verify -> DEBU 2c60 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +peer0.org1.example.com | 00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [msp.identity] Verify -> DEBU 2c61 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +peer0.org1.example.com | 00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +peer0.org1.example.com | 00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +peer0.org1.example.com | 00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +peer0.org1.example.com | 00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [cauthdsl] func2 -> DEBU 2c62 0xc003cf22f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [cauthdsl] func1 -> DEBU 2c63 0xc003cf22f0 gate 1569287117735305800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c66 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.737 UTC [msp.identity] Verify -> DEBU 2c68 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:17.737 UTC [msp.identity] Verify -> DEBU 2c69 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:17.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c6a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c6b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [cauthdsl] func1 -> DEBU 2c6f 0xc003cf3a00 gate 1569287117738430000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003cf3a00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c71 0xc003cf3a00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c72 0xc003cf3a00 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [msp.identity] Verify -> DEBU 2c73 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [msp.identity] Verify -> DEBU 2c74 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [cauthdsl] func2 -> DEBU 2c75 0xc003cf3a00 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [cauthdsl] func1 -> DEBU 2c76 0xc003cf3a00 gate 1569287117738430000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [policies] Evaluate -> DEBU 2c77 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.739 UTC [policies] Evaluate -> DEBU 2c78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [policies] Evaluate -> DEBU 2c79 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [policies] Evaluate -> DEBU 2c7a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [gossip.gossip] handleMessage -> DEBU 2c7c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [msp] DeserializeIdentity -> DEBU 2c7d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.740 UTC [msp] DeserializeIdentity -> DEBU 2c7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [msp] DeserializeIdentity -> DEBU 2c7f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c80 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c81 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c82 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [policies] Evaluate -> DEBU 2c83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.741 UTC [policies] Evaluate -> DEBU 2c84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.742 UTC [policies] Evaluate -> DEBU 2c85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.742 UTC [cauthdsl] func1 -> DEBU 2c86 0xc00295d520 gate 1569287117742339000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c87 0xc00295d520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c88 0xc00295d520 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c89 0xc00295d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [cauthdsl] func2 -> DEBU 2c8a 0xc00295d520 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [cauthdsl] func1 -> DEBU 2c8b 0xc00295d520 gate 1569287117742339000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.743 UTC [cauthdsl] func1 -> DEBU 2c8f 0xc00295dd60 gate 1569287117743984200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c90 0xc00295dd60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c91 0xc00295dd60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c92 0xc00295dd60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.744 UTC [msp.identity] Verify -> DEBU 2c93 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +peer0.org1.example.com | 00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +peer0.org1.example.com | "2019-09-24 01:05:17.744 UTC [msp.identity] Verify -> DEBU 2c94 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +peer0.org1.example.com | 00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +peer0.org1.example.com | 00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +peer0.org1.example.com | 00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +peer0.org1.example.com | 00000040 8d 8b 6c 6d ac b1 |..lm..|" +peer0.org1.example.com | "2019-09-24 01:05:17.745 UTC [cauthdsl] func2 -> DEBU 2c95 0xc00295dd60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.745 UTC [cauthdsl] func1 -> DEBU 2c96 0xc00295dd60 gate 1569287117743984200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c99 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.746 UTC [policies] Evaluate -> DEBU 2c9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.746 UTC [msp.identity] Verify -> DEBU 2c9b Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +peer0.org1.example.com | 00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2c9c Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +peer0.org1.example.com | 00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +peer0.org1.example.com | 00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +peer0.org1.example.com | 00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +peer0.org1.example.com | 00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +peer0.org1.example.com | "2019-09-24 01:05:17.747 UTC [msp.identity] Verify -> DEBU 2c9d Verify: digest = 00000000 c4 fc a7 84 80 fe c2 8f 1e f4 f1 36 8f 7e 94 e2 |...........6.~..| +peer0.org1.example.com | 00000010 e4 19 04 02 4e 55 eb 32 7d e5 c3 7e 28 54 e9 0f |....NU.2}..~(T..|" +peer0.org1.example.com | "2019-09-24 01:05:17.747 UTC [msp.identity] Verify -> DEBU 2c9e Verify: sig = 00000000 30 45 02 21 00 85 44 6f 7f 79 6b 7c de a0 c6 98 |0E.!..Do.yk|....| +peer0.org1.example.com | 00000010 ff dd a1 dc af f5 71 0f cd a6 52 02 a0 6e 29 3a |......q...R..n):| +peer0.org1.example.com | 00000020 25 6b 9d 9a 6f 02 20 7d bf 30 71 59 90 38 08 86 |%k..o. }.0qY.8..| +peer0.org1.example.com | 00000030 90 ad 0d a5 22 86 4d f0 4c f6 fd 43 19 e7 95 23 |....".M.L..C...#| +peer0.org1.example.com | 00000040 55 18 ac c5 dd 9f d8 |U......|" +peer0.org1.example.com | "2019-09-24 01:05:17.748 UTC [msp] DeserializeIdentity -> DEBU 2c9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.748 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ca1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ca2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ca3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [cauthdsl] func1 -> DEBU 2ca7 0xc003208390 gate 1569287117749473300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2ca8 0xc003208390 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2ca9 0xc003208390 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2caa 0xc003208390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2cab 0xc003208390 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [cauthdsl] func1 -> DEBU 2cac 0xc003208390 gate 1569287117749473300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2cad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2cae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2caf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [cauthdsl] func1 -> DEBU 2cb0 0xc003208be0 gate 1569287117750770000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.750 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc003208be0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb2 0xc003208be0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb3 0xc003208be0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [msp.identity] Verify -> DEBU 2cb4 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +peer0.org1.example.com | 00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [msp.identity] Verify -> DEBU 2cb5 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +peer0.org1.example.com | 00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +peer0.org1.example.com | 00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +peer0.org1.example.com | 00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +peer0.org1.example.com | 00000040 b6 66 27 b7 81 6b |.f'..k|" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb6 0xc003208be0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.751 UTC [cauthdsl] func1 -> DEBU 2cb7 0xc003208be0 gate 1569287117750770000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cba Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.753 UTC [msp] DeserializeIdentity -> DEBU 2cbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cbd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cbe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:17.753 UTC [policies] Evaluate -> DEBU 2cbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.753 UTC [policies] Evaluate -> DEBU 2cc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:17.754 UTC [policies] Evaluate -> DEBU 2cc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.754 UTC [cauthdsl] func1 -> DEBU 2cc2 0xc003209cc0 gate 1569287117754340000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.754 UTC [cauthdsl] func2 -> DEBU 2cc3 0xc003209cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.754 UTC [cauthdsl] func2 -> DEBU 2cc4 0xc003209cc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [cauthdsl] func2 -> DEBU 2cc5 0xc003209cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [cauthdsl] func2 -> DEBU 2cc6 0xc003209cc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [cauthdsl] func1 -> DEBU 2cc7 0xc003209cc0 gate 1569287117754340000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:17.756 UTC [cauthdsl] func1 -> DEBU 2ccb 0xc0026ae500 gate 1569287117756094500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2ccc 0xc0026ae500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2ccd 0xc0026ae500 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2cce 0xc0026ae500 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.756 UTC [msp.identity] Verify -> DEBU 2ccf Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +peer0.org1.example.com | 00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +peer0.org1.example.com | "2019-09-24 01:05:17.757 UTC [msp.identity] Verify -> DEBU 2cd0 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +peer0.org1.example.com | 00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +peer0.org1.example.com | 00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +peer0.org1.example.com | 00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +peer0.org1.example.com | 00000040 b6 66 27 b7 81 6b |.f'..k|" +peer0.org1.example.com | "2019-09-24 01:05:17.757 UTC [cauthdsl] func2 -> DEBU 2cd1 0xc0026ae500 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:17.757 UTC [cauthdsl] func1 -> DEBU 2cd2 0xc0026ae500 gate 1569287117756094500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:17.757 UTC [policies] Evaluate -> DEBU 2cd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.757 UTC [policies] Evaluate -> DEBU 2cd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.758 UTC [policies] Evaluate -> DEBU 2cd5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.758 UTC [policies] Evaluate -> DEBU 2cd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:17.758 UTC [gossip.gossip] handleMessage -> DEBU 2cd7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.758 UTC [gossip.gossip] handleMessage -> DEBU 2cd8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.758 UTC [msp.identity] Verify -> DEBU 2cd9 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +peer0.org1.example.com | 00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +peer0.org1.example.com | "2019-09-24 01:05:17.759 UTC [msp.identity] Verify -> DEBU 2cda Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +peer0.org1.example.com | 00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +peer0.org1.example.com | 00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +peer0.org1.example.com | 00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +peer0.org1.example.com | 00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +peer0.org1.example.com | "2019-09-24 01:05:17.759 UTC [gossip.gossip] handleMessage -> DEBU 2cdb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.759 UTC [gossip.gossip] handleMessage -> DEBU 2cdc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.759 UTC [msp.identity] Verify -> DEBU 2cdd Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +peer0.org1.example.com | 00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +peer0.org1.example.com | "2019-09-24 01:05:17.760 UTC [msp.identity] Verify -> DEBU 2cde Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +peer0.org1.example.com | 00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +peer0.org1.example.com | 00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +peer0.org1.example.com | 00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +peer0.org1.example.com | 00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +peer0.org1.example.com | "2019-09-24 01:05:17.760 UTC [msp] DeserializeIdentity -> DEBU 2cdf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.760 UTC [gossip.gossip] handleMessage -> DEBU 2ce0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.760 UTC [gossip.gossip] handleMessage -> DEBU 2ce1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.761 UTC [gossip.pull] HandleMessage -> DEBU 2ce2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.761 UTC [gossip.gossip] handleMessage -> DEBU 2ce3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.848 UTC [gossip.comm] func1 -> DEBU 2ce4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.848 UTC [gossip.gossip] handleMessage -> DEBU 2ce5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.851 UTC [msp.identity] Verify -> DEBU 2ce9 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:17.851 UTC [msp.identity] Verify -> DEBU 2cea Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:17.852 UTC [msp] DeserializeIdentity -> DEBU 2ceb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.852 UTC [gossip.gossip] handleMessage -> DEBU 2cec Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.852 UTC [gossip.gossip] handleMessage -> DEBU 2ced Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.853 UTC [msp.identity] Verify -> DEBU 2cee Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:17.853 UTC [msp.identity] Verify -> DEBU 2cef Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:17.854 UTC [msp] DeserializeIdentity -> DEBU 2cf0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.854 UTC [gossip.gossip] handleMessage -> DEBU 2cf1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.855 UTC [gossip.gossip] handleMessage -> DEBU 2cf2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.855 UTC [msp] DeserializeIdentity -> DEBU 2cf3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.856 UTC [msp] DeserializeIdentity -> DEBU 2cf4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:17.856 UTC [gossip.gossip] handleMessage -> DEBU 2cf5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.856 UTC [gossip.gossip] handleMessage -> DEBU 2cf6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.857 UTC [msp.identity] Verify -> DEBU 2cf7 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:17.857 UTC [msp.identity] Verify -> DEBU 2cf8 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:17.859 UTC [gossip.comm] func1 -> DEBU 2cf9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.860 UTC [gossip.gossip] handleMessage -> DEBU 2cfa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:17.861 UTC [gossip.gossip] handleMessage -> DEBU 2cfb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.862 UTC [gossip.pull] HandleMessage -> DEBU 2cfc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:17.862 UTC [gossip.pull] SendDigest -> DEBU 2cfd Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:17.862 UTC [gossip.gossip] handleMessage -> DEBU 2cfe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.049 UTC [gossip.comm] func1 -> DEBU 2cff Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.049 UTC [gossip.gossip] handleMessage -> DEBU 2d00 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.049 UTC [msp] DeserializeIdentity -> DEBU 2d01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.050 UTC [msp] DeserializeIdentity -> DEBU 2d02 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.050 UTC [msp] DeserializeIdentity -> DEBU 2d03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.050 UTC [gossip.gossip] handleMessage -> DEBU 2d04 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.056 UTC [gossip.comm] func1 -> DEBU 2d05 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.056 UTC [gossip.gossip] handleMessage -> DEBU 2d06 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.056 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d08 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d09 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d0a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.057 UTC [policies] Evaluate -> DEBU 2d0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.058 UTC [policies] Evaluate -> DEBU 2d0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.058 UTC [policies] Evaluate -> DEBU 2d0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.058 UTC [cauthdsl] func1 -> DEBU 2d0e 0xc0035e9030 gate 1569287118058305900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.058 UTC [cauthdsl] func2 -> DEBU 2d0f 0xc0035e9030 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.058 UTC [cauthdsl] func2 -> DEBU 2d10 0xc0035e9030 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.059 UTC [cauthdsl] func2 -> DEBU 2d11 0xc0035e9030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.060 UTC [cauthdsl] func2 -> DEBU 2d12 0xc0035e9030 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.060 UTC [cauthdsl] func1 -> DEBU 2d13 0xc0035e9030 gate 1569287118058305900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d14 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [cauthdsl] func1 -> DEBU 2d17 0xc0035e9870 gate 1569287118061626900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [cauthdsl] func2 -> DEBU 2d18 0xc0035e9870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.061 UTC [cauthdsl] func2 -> DEBU 2d19 0xc0035e9870 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.062 UTC [cauthdsl] func2 -> DEBU 2d1a 0xc0035e9870 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.062 UTC [msp.identity] Verify -> DEBU 2d1b Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:18.062 UTC [msp.identity] Verify -> DEBU 2d1c Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:18.064 UTC [cauthdsl] func2 -> DEBU 2d1d 0xc0035e9870 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.064 UTC [cauthdsl] func1 -> DEBU 2d1e 0xc0035e9870 gate 1569287118061626900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.064 UTC [gossip.comm] func1 -> DEBU 2d1f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.064 UTC [policies] Evaluate -> DEBU 2d20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.065 UTC [policies] Evaluate -> DEBU 2d21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.065 UTC [policies] Evaluate -> DEBU 2d22 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.066 UTC [policies] Evaluate -> DEBU 2d23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.066 UTC [msp] DeserializeIdentity -> DEBU 2d24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.066 UTC [gossip.gossip] handleMessage -> DEBU 2d25 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.066 UTC [gossip.gossip] handleMessage -> DEBU 2d26 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.067 UTC [msp] DeserializeIdentity -> DEBU 2d27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d28 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d29 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d2a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.068 UTC [policies] Evaluate -> DEBU 2d2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.068 UTC [policies] Evaluate -> DEBU 2d2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.069 UTC [policies] Evaluate -> DEBU 2d2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.069 UTC [cauthdsl] func1 -> DEBU 2d2e 0xc0036a7230 gate 1569287118069487300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.069 UTC [cauthdsl] func2 -> DEBU 2d2f 0xc0036a7230 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.070 UTC [cauthdsl] func2 -> DEBU 2d30 0xc0036a7230 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.072 UTC [cauthdsl] func2 -> DEBU 2d31 0xc0036a7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.073 UTC [cauthdsl] func2 -> DEBU 2d32 0xc0036a7230 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.074 UTC [cauthdsl] func1 -> DEBU 2d33 0xc0036a7230 gate 1569287118069487300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.074 UTC [policies] Evaluate -> DEBU 2d34 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.075 UTC [policies] Evaluate -> DEBU 2d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.075 UTC [policies] Evaluate -> DEBU 2d36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.075 UTC [cauthdsl] func1 -> DEBU 2d37 0xc0036a7a70 gate 1569287118075518800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.075 UTC [cauthdsl] func2 -> DEBU 2d38 0xc0036a7a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.076 UTC [cauthdsl] func2 -> DEBU 2d39 0xc0036a7a70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.076 UTC [cauthdsl] func2 -> DEBU 2d3a 0xc0036a7a70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.076 UTC [msp.identity] Verify -> DEBU 2d3b Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:18.076 UTC [msp.identity] Verify -> DEBU 2d3c Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:18.077 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc0036a7a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.077 UTC [cauthdsl] func1 -> DEBU 2d3e 0xc0036a7a70 gate 1569287118075518800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.077 UTC [policies] Evaluate -> DEBU 2d3f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d41 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.078 UTC [msp] DeserializeIdentity -> DEBU 2d43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.079 UTC [gossip.gossip] handleMessage -> DEBU 2d44 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.240 UTC [gossip.comm] func1 -> DEBU 2d45 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.241 UTC [gossip.gossip] handleMessage -> DEBU 2d46 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.241 UTC [msp] DeserializeIdentity -> DEBU 2d47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.242 UTC [msp] DeserializeIdentity -> DEBU 2d48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.242 UTC [msp] DeserializeIdentity -> DEBU 2d49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.242 UTC [gossip.gossip] handleMessage -> DEBU 2d4a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.249 UTC [gossip.comm] func1 -> DEBU 2d4b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.250 UTC [gossip.gossip] handleMessage -> DEBU 2d4c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.250 UTC [msp] DeserializeIdentity -> DEBU 2d4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d4e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d4f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d50 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func1 -> DEBU 2d54 0xc003a18130 gate 1569287118251932600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d55 0xc003a18130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d56 0xc003a18130 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d57 0xc003a18130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d58 0xc003a18130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.252 UTC [cauthdsl] func1 -> DEBU 2d59 0xc003a18130 gate 1569287118251932600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.253 UTC [cauthdsl] func1 -> DEBU 2d5d 0xc003a18970 gate 1569287118253671800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.253 UTC [cauthdsl] func2 -> DEBU 2d5e 0xc003a18970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.254 UTC [cauthdsl] func2 -> DEBU 2d5f 0xc003a18970 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.254 UTC [cauthdsl] func2 -> DEBU 2d60 0xc003a18970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.254 UTC [msp.identity] Verify -> DEBU 2d61 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +peer0.org1.example.com | 00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +peer0.org1.example.com | "2019-09-24 01:05:18.254 UTC [msp.identity] Verify -> DEBU 2d62 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +peer0.org1.example.com | 00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +peer0.org1.example.com | 00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +peer0.org1.example.com | 00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +peer0.org1.example.com | 00000040 b6 66 27 b7 81 6b |.f'..k|" +peer0.org1.example.com | "2019-09-24 01:05:18.255 UTC [cauthdsl] func2 -> DEBU 2d63 0xc003a18970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.255 UTC [cauthdsl] func1 -> DEBU 2d64 0xc003a18970 gate 1569287118253671800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d65 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d67 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.256 UTC [policies] Evaluate -> DEBU 2d68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.256 UTC [msp] DeserializeIdentity -> DEBU 2d69 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.256 UTC [gossip.gossip] handleMessage -> DEBU 2d6a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.475 UTC [gossip.comm] func1 -> DEBU 2d6b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.476 UTC [gossip.gossip] handleMessage -> DEBU 2d6c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.476 UTC [gossip.pull] HandleMessage -> DEBU 2d6d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.477 UTC [gossip.pull] SendDigest -> DEBU 2d6e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:18.477 UTC [gossip.gossip] handleMessage -> DEBU 2d6f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.483 UTC [gossip.comm] func1 -> DEBU 2d70 Got message: GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.483 UTC [gossip.gossip] handleMessage -> DEBU 2d71 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.483 UTC [gossip.gossip] handleMessage -> DEBU 2d72 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d73 Got message: GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.486 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d74 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d75 Verify: digest = 00000000 f2 63 51 48 3f 00 a2 09 39 c0 76 ca 13 92 2f 33 |.cQH?...9.v.../3| +peer0.org1.example.com | 00000010 f9 a7 6a 1b cb e0 11 ea b1 39 f6 ee 46 b3 f2 8e |..j......9..F...|" +peer0.org1.example.com | "2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d76 Verify: sig = 00000000 30 44 02 20 6e 64 d7 33 d8 94 d9 85 bd 76 20 ed |0D. nd.3.....v .| +peer0.org1.example.com | 00000010 39 ac 76 26 0e d6 ed 61 db de 84 b3 8f 27 52 90 |9.v&...a.....'R.| +peer0.org1.example.com | 00000020 06 9d 57 af 02 20 20 19 2a 3b 6c d3 33 e2 b2 69 |..W.. .*;l.3..i| +peer0.org1.example.com | 00000030 b8 c6 13 e1 89 c0 d5 72 50 23 99 01 77 cf 3b 84 |.......rP#..w.;.| +peer0.org1.example.com | 00000040 91 4b fe 1b 35 b8 |.K..5.|" +peer0.org1.example.com | "2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d77 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d78 Verify: sig = 00000000 30 44 02 20 5c b6 56 8c 56 f0 c9 d3 64 8e 9a 4f |0D. \.V.V...d..O| +peer0.org1.example.com | 00000010 e5 81 8f 3c c7 1b 12 38 77 29 9e 3e 8c b9 9c 32 |...<...8w).>...2| +peer0.org1.example.com | 00000020 74 e0 69 b7 02 20 28 56 5e 9e 0f 79 25 20 6c 02 |t.i.. (V^..y% l.| +peer0.org1.example.com | 00000030 63 1f e5 28 d6 14 8e 38 0f 57 7f a8 fa c8 d3 57 |c..(...8.W.....W| +peer0.org1.example.com | 00000040 9d 37 e9 66 67 ba |.7.fg.|" +peer0.org1.example.com | "2019-09-24 01:05:18.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d79 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:18.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.490 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d7f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d80 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.490 UTC [gossip.discovery] sendMemResponse -> DEBU 2d81 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:18.490 UTC [msp] DeserializeIdentity -> DEBU 2d82 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.491 UTC [msp] DeserializeIdentity -> DEBU 2d83 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.491 UTC [gossip.comm] Send -> DEBU 2d84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.491 UTC [gossip.discovery] sendMemResponse -> DEBU 2d85 Exiting, replying with alive:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > alive: " +peer0.org1.example.com | "2019-09-24 01:05:18.491 UTC [gossip.comm] sendToEndpoint -> DEBU 2d86 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.491 UTC [gossip.comm] sendToEndpoint -> DEBU 2d87 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.519 UTC [gossip.comm] func1 -> DEBU 2d88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.519 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.521 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.521 UTC [msp.identity] Verify -> DEBU 2d8c Verify: digest = 00000000 d1 dd 61 b5 e5 e7 32 3d 70 eb 38 ec f1 64 6e 8c |..a...2=p.8..dn.| +peer0.org1.example.com | 00000010 6c 1a 3a 05 f1 44 fe d6 88 fb a6 56 86 77 fd 4e |l.:..D.....V.w.N|" +peer0.org1.example.com | "2019-09-24 01:05:18.521 UTC [msp.identity] Verify -> DEBU 2d8d Verify: sig = 00000000 30 45 02 21 00 a5 f7 da d7 59 e1 6e fb 21 97 a6 |0E.!.....Y.n.!..| +peer0.org1.example.com | 00000010 b0 e3 2b 5d b2 21 ce 97 91 c3 56 f9 b2 19 9d bd |..+].!....V.....| +peer0.org1.example.com | 00000020 be 08 c4 b3 a0 02 20 5e 1a 6d 0d 34 33 ad 94 86 |...... ^.m.43...| +peer0.org1.example.com | 00000030 5f 8c 02 07 91 38 b3 2a 8d 99 95 28 5e f9 da 44 |_....8.*...(^..D| +peer0.org1.example.com | 00000040 4a 66 44 c3 be 5d 42 |JfD..]B|" +peer0.org1.example.com | "2019-09-24 01:05:18.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d8e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d8f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:18.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d90 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d91 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d92 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:18.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d93 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d94 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d95 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.519 UTC [gossip.gossip] handleMessage -> DEBU 2d96 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.525 UTC [msp] DeserializeIdentity -> DEBU 2d97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.526 UTC [msp] DeserializeIdentity -> DEBU 2d98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.528 UTC [msp] DeserializeIdentity -> DEBU 2d99 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.528 UTC [gossip.comm] Send -> DEBU 2d9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.528 UTC [msp] DeserializeIdentity -> DEBU 2d9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.529 UTC [gossip.comm] Send -> DEBU 2d9e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.528 UTC [gossip.comm] func1 -> DEBU 2d9b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.529 UTC [gossip.gossip] handleMessage -> DEBU 2d9f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.529 UTC [gossip.gossip] handleMessage -> DEBU 2da0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.528 UTC [gossip.comm] func1 -> DEBU 2d9c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.gossip] handleMessage -> DEBU 2da3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.gossip] handleMessage -> DEBU 2da5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2da4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.531 UTC [gossip.comm] sendToEndpoint -> DEBU 2da8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2da9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.532 UTC [gossip.comm] sendToEndpoint -> DEBU 2daa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.784 UTC [gossip.comm] func1 -> DEBU 2dab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.784 UTC [gossip.gossip] handleMessage -> DEBU 2dac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.784 UTC [gossip.pull] HandleMessage -> DEBU 2dad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2dae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2daf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2db0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.787 UTC [gossip.pull] SendDigest -> DEBU 2db4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:18.787 UTC [gossip.gossip] handleMessage -> DEBU 2db5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.798 UTC [gossip.comm] func1 -> DEBU 2db6 Got message: GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.799 UTC [gossip.gossip] handleMessage -> DEBU 2db7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.799 UTC [gossip.gossip] handleMessage -> DEBU 2db8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.799 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2db9 Got message: GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.800 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2dba Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.800 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbe Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.803 UTC [cauthdsl] func1 -> DEBU 2dc2 0xc0029904d0 gate 1569287118803096700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.803 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc0029904d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.803 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc0029904d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc0029904d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc0029904d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc0029904d0 gate 1569287118803096700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [cauthdsl] func1 -> DEBU 2dcb 0xc002990d10 gate 1569287118804833400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dcc 0xc002990d10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dcd 0xc002990d10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dce 0xc002990d10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [msp.identity] Verify -> DEBU 2dcf Verify: digest = 00000000 5e e9 43 b7 4d 33 89 fe 53 81 aa 3b 4a eb 7a 40 |^.C.M3..S..;J.z@| +peer0.org1.example.com | 00000010 23 82 30 c3 a2 a2 a9 4a 72 08 2c 39 38 06 73 71 |#.0....Jr.,98.sq|" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [msp.identity] Verify -> DEBU 2dd0 Verify: sig = 00000000 30 44 02 20 1f c0 c8 98 87 fd c0 51 50 6c 39 aa |0D. .......QPl9.| +peer0.org1.example.com | 00000010 6b 0b b4 f3 1d 76 70 58 58 82 b2 1c 77 94 2a 2f |k....vpXX...w.*/| +peer0.org1.example.com | 00000020 45 f0 11 d5 02 20 25 27 35 b7 0c 89 41 b8 e9 53 |E.... %'5...A..S| +peer0.org1.example.com | 00000030 c4 b8 94 b6 1e 8c 13 e8 12 8d 62 ab 3e 6a 39 9c |..........b.>j9.| +peer0.org1.example.com | 00000040 36 91 39 72 e5 6d |6.9r.m|" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dd1 0xc002990d10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.805 UTC [cauthdsl] func1 -> DEBU 2dd2 0xc002990d10 gate 1569287118804833400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dd7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dd8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dd9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dda Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ddb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:18.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ddc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ddd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.809 UTC [gossip.discovery] sendMemResponse -> DEBU 2dde Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:18.809 UTC [msp] DeserializeIdentity -> DEBU 2ddf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.810 UTC [msp] DeserializeIdentity -> DEBU 2de0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.810 UTC [msp] DeserializeIdentity -> DEBU 2de1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.812 UTC [gossip.comm] Send -> DEBU 2de2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.812 UTC [gossip.discovery] sendMemResponse -> DEBU 2de3 Exiting, replying with alive: alive:j9\2346\2219r\345m" > alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:18.812 UTC [gossip.comm] sendToEndpoint -> DEBU 2de4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.812 UTC [gossip.comm] sendToEndpoint -> DEBU 2de5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2de6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.836 UTC [gossip.pull] Hello -> DEBU 2de7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2de8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.pull] Hello -> DEBU 2de9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2dea Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2deb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.pull] Hello -> DEBU 2dec Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2ded Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2dee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2def Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.839 UTC [gossip.comm] func1 -> DEBU 2df3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.839 UTC [gossip.gossip] handleMessage -> DEBU 2df4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.839 UTC [gossip.pull] HandleMessage -> DEBU 2df5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.840 UTC [gossip.gossip] handleMessage -> DEBU 2df6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.843 UTC [gossip.comm] func1 -> DEBU 2df7 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.843 UTC [gossip.gossip] handleMessage -> DEBU 2df8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.843 UTC [gossip.pull] HandleMessage -> DEBU 2df9 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.845 UTC [gossip.comm] func1 -> DEBU 2dfa Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.844 UTC [gossip.gossip] handleMessage -> DEBU 2dfb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.846 UTC [gossip.gossip] handleMessage -> DEBU 2dfc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.846 UTC [gossip.pull] HandleMessage -> DEBU 2dfd GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.846 UTC [msp] DeserializeIdentity -> DEBU 2dfe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e02 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.845 UTC [gossip.comm] func1 -> DEBU 2dff Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [msp] DeserializeIdentity -> DEBU 2e03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [msp] DeserializeIdentity -> DEBU 2e04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [gossip.pull] SendDigest -> DEBU 2e05 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e06 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e07 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [gossip.pull] HandleMessage -> DEBU 2e08 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e09 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [gossip.comm] func1 -> DEBU 2e0a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [gossip.gossip] handleMessage -> DEBU 2e0b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [gossip.gossip] handleMessage -> DEBU 2e0c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e0d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e0e Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.864 UTC [msp] DeserializeIdentity -> DEBU 2e0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e10 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:18.868 UTC [msp.identity] Sign -> DEBU 2e11 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151024 " +peer0.org1.example.com | "2019-09-24 01:05:18.868 UTC [msp.identity] Sign -> DEBU 2e12 Sign: digest: C56AD14F37A626D908FA426BED596602BC39B36575A9388AFEA2F7B1B3BBE6F0 " +peer0.org1.example.com | "2019-09-24 01:05:18.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e13 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:18.869 UTC [msp.identity] Sign -> DEBU 2e14 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:18.869 UTC [msp.identity] Sign -> DEBU 2e15 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:18.870 UTC [gossip.comm] Send -> DEBU 2e16 Entering, sending GossipMessage: tag:EMPTY mem_req:\036!\255\231\213{M\005\344\247\252\354\375\020y\276\376\273|\005\002 ,\256\320\026H\215\365\035\223\254\336m\267\334,u\253\202%t\257\3065\324\374\315\262\227l\001\360\272" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.870 UTC [msp] DeserializeIdentity -> DEBU 2e17 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e19 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.871 UTC [gossip.comm] Send -> DEBU 2e1b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.873 UTC [cauthdsl] func1 -> DEBU 2e22 0xc003163fe0 gate 1569287118873775800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.873 UTC [cauthdsl] func2 -> DEBU 2e23 0xc003163fe0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.872 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2e20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.874 UTC [gossip.comm] sendToEndpoint -> DEBU 2e25 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.875 UTC [gossip.comm] Send -> DEBU 2e26 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2e21 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\036!\255\231\213{M\005\344\247\252\354\375\020y\276\376\273|\005\002 ,\256\320\026H\215\365\035\223\254\336m\267\334,u\253\202%t\257\3065\324\374\315\262\227l\001\360\272" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.873 UTC [cauthdsl] func2 -> DEBU 2e24 0xc003163fe0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2e27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.876 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2e28 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.875 UTC [cauthdsl] func2 -> DEBU 2e29 0xc003163fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.879 UTC [gossip.comm] func1 -> DEBU 2e2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.879 UTC [gossip.gossip] handleMessage -> DEBU 2e2c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.879 UTC [gossip.comm] func1 -> DEBU 2e2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.876 UTC [cauthdsl] func2 -> DEBU 2e2e 0xc003163fe0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.880 UTC [cauthdsl] func1 -> DEBU 2e2f 0xc003163fe0 gate 1569287118873775800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [cauthdsl] func1 -> DEBU 2e33 0xc0038caa70 gate 1569287118881193300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e34 0xc0038caa70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e35 0xc0038caa70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e36 0xc0038caa70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [msp.identity] Verify -> DEBU 2e37 Verify: digest = 00000000 bb c6 0c 0e 04 ce ed 43 4d 2b 49 e5 8c 93 bb 8c |.......CM+I.....| +peer0.org1.example.com | 00000010 97 74 84 4b d5 4d 3e b5 f3 ae b6 52 75 ea 81 22 |.t.K.M>....Ru.."|" +peer0.org1.example.com | "2019-09-24 01:05:18.881 UTC [msp.identity] Verify -> DEBU 2e38 Verify: sig = 00000000 30 44 02 20 74 9a 21 21 e9 6f 00 3c 21 df 4d 51 |0D. t.!!.o. DEBU 2e39 0xc0038caa70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.882 UTC [cauthdsl] func1 -> DEBU 2e3a 0xc0038caa70 gate 1569287118881193300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e40 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e41 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e42 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e43 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:18.884 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e44 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.884 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e45 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e46 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [gossip.discovery] sendMemResponse -> DEBU 2e48 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.886 UTC [gossip.comm] Send -> DEBU 2e4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [gossip.gossip] handleMessage -> DEBU 2e4c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.885 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.886 UTC [gossip.discovery] sendMemResponse -> DEBU 2e4f Exiting, replying with alive: alive:j9\2346\2219r\345m" > alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:18.886 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e50 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.886 UTC [gossip.comm] sendToEndpoint -> DEBU 2e51 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2e52 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.887 UTC [msp.identity] Verify -> DEBU 2e53 Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +peer0.org1.example.com | 00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +peer0.org1.example.com | "2019-09-24 01:05:18.887 UTC [msp.identity] Verify -> DEBU 2e54 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +peer0.org1.example.com | 00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +peer0.org1.example.com | 00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +peer0.org1.example.com | 00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +peer0.org1.example.com | 00000040 c9 99 3a 05 66 4a |..:.fJ|" +peer0.org1.example.com | "2019-09-24 01:05:18.888 UTC [msp.identity] Verify -> DEBU 2e55 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:18.888 UTC [msp.identity] Verify -> DEBU 2e56 Verify: sig = 00000000 30 45 02 21 00 e7 a4 86 21 8c 27 43 82 ba 7d 8f |0E.!....!.'C..}.| +peer0.org1.example.com | 00000010 3e 1e 21 ad 99 8b 7b 4d 05 e4 a7 aa ec fd 10 79 |>.!...{M.......y| +peer0.org1.example.com | 00000020 be fe bb 7c 05 02 20 2c ae d0 16 48 8d f5 1d 93 |...|.. ,...H....| +peer0.org1.example.com | 00000030 ac de 6d b7 dc 2c 75 ab 82 25 74 af c6 35 d4 fc |..m..,u..%t..5..| +peer0.org1.example.com | 00000040 cd b2 97 6c 01 f0 ba |...l...|" +peer0.org1.example.com | "2019-09-24 01:05:18.890 UTC [gossip.comm] func1 -> DEBU 2e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e58 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.890 UTC [gossip.discovery] isSentByMe -> DEBU 2e59 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e5a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e5d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [gossip.gossip] handleMessage -> DEBU 2e5e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [msp.identity] Verify -> DEBU 2e5f Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +peer0.org1.example.com | 00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [msp.identity] Verify -> DEBU 2e60 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +peer0.org1.example.com | 00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +peer0.org1.example.com | 00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +peer0.org1.example.com | 00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +peer0.org1.example.com | 00000040 c9 99 3a 05 66 4a |..:.fJ|" +peer0.org1.example.com | "2019-09-24 01:05:18.891 UTC [gossip.gossip] handleMessage -> DEBU 2e61 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e62 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.892 UTC [gossip.discovery] isSentByMe -> DEBU 2e63 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e64 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e65 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.892 UTC [msp] DeserializeIdentity -> DEBU 2e66 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e67 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e68 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e69 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.893 UTC [cauthdsl] func1 -> DEBU 2e6d 0xc003b94c80 gate 1569287118893869700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e6e 0xc003b94c80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e6f 0xc003b94c80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e70 0xc003b94c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e71 0xc003b94c80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.894 UTC [cauthdsl] func1 -> DEBU 2e72 0xc003b94c80 gate 1569287118893869700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [cauthdsl] func1 -> DEBU 2e76 0xc003b954c0 gate 1569287118895903300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [cauthdsl] func2 -> DEBU 2e77 0xc003b954c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.895 UTC [cauthdsl] func2 -> DEBU 2e78 0xc003b954c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.896 UTC [cauthdsl] func2 -> DEBU 2e79 0xc003b954c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.896 UTC [msp.identity] Verify -> DEBU 2e7a Verify: digest = 00000000 bb c6 0c 0e 04 ce ed 43 4d 2b 49 e5 8c 93 bb 8c |.......CM+I.....| +peer0.org1.example.com | 00000010 97 74 84 4b d5 4d 3e b5 f3 ae b6 52 75 ea 81 22 |.t.K.M>....Ru.."|" +peer0.org1.example.com | "2019-09-24 01:05:18.896 UTC [msp.identity] Verify -> DEBU 2e7b Verify: sig = 00000000 30 44 02 20 74 9a 21 21 e9 6f 00 3c 21 df 4d 51 |0D. t.!!.o. DEBU 2e7c 0xc003b954c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [cauthdsl] func1 -> DEBU 2e7d 0xc003b954c0 gate 1569287118895903300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e80 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e82 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e83 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e84 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e85 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e86 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.897 UTC [msp] DeserializeIdentity -> DEBU 2e87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e89 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.898 UTC [gossip.gossip] handleMessage -> DEBU 2e8a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e8b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:18.898 UTC [policies] Evaluate -> DEBU 2e8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [policies] Evaluate -> DEBU 2e8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [policies] Evaluate -> DEBU 2e8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [cauthdsl] func1 -> DEBU 2e8f 0xc003c7d090 gate 1569287118899451200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e90 0xc003c7d090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e91 0xc003c7d090 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e92 0xc003c7d090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e93 0xc003c7d090 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func1 -> DEBU 2e94 0xc003c7d090 gate 1569287118899451200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e95 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func1 -> DEBU 2e98 0xc003c7d8d0 gate 1569287118900759200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e99 0xc003c7d8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e9a 0xc003c7d8d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e9b 0xc003c7d8d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.900 UTC [msp.identity] Verify -> DEBU 2e9c Verify: digest = 00000000 5e e9 43 b7 4d 33 89 fe 53 81 aa 3b 4a eb 7a 40 |^.C.M3..S..;J.z@| +peer0.org1.example.com | 00000010 23 82 30 c3 a2 a2 a9 4a 72 08 2c 39 38 06 73 71 |#.0....Jr.,98.sq|" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [msp.identity] Verify -> DEBU 2e9d Verify: sig = 00000000 30 44 02 20 1f c0 c8 98 87 fd c0 51 50 6c 39 aa |0D. .......QPl9.| +peer0.org1.example.com | 00000010 6b 0b b4 f3 1d 76 70 58 58 82 b2 1c 77 94 2a 2f |k....vpXX...w.*/| +peer0.org1.example.com | 00000020 45 f0 11 d5 02 20 25 27 35 b7 0c 89 41 b8 e9 53 |E.... %'5...A..S| +peer0.org1.example.com | 00000030 c4 b8 94 b6 1e 8c 13 e8 12 8d 62 ab 3e 6a 39 9c |..........b.>j9.| +peer0.org1.example.com | 00000040 36 91 39 72 e5 6d |6.9r.m|" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [cauthdsl] func2 -> DEBU 2e9e 0xc003c7d8d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003c7d8d0 gate 1569287118900759200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.902 UTC [policies] Evaluate -> DEBU 2ea3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:18.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ea6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:18.903 UTC [msp.identity] Verify -> DEBU 2ea7 Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +peer0.org1.example.com | 00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +peer0.org1.example.com | "2019-09-24 01:05:18.903 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +peer0.org1.example.com | 00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +peer0.org1.example.com | 00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +peer0.org1.example.com | 00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +peer0.org1.example.com | 00000040 c9 99 3a 05 66 4a |..:.fJ|" +peer0.org1.example.com | "2019-09-24 01:05:18.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.904 UTC [gossip.discovery] isSentByMe -> DEBU 2eaa Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:18.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:18.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eac Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.144 UTC [gossip.comm] func1 -> DEBU 2ead Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.144 UTC [gossip.comm] func1 -> DEBU 2eae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.145 UTC [gossip.comm] func1 -> DEBU 2eaf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eb3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb4 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:19.147 UTC [msp] DeserializeIdentity -> DEBU 2eb5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.147 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2eb6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:19.147 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2eb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2eba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2ebb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.148 UTC [cauthdsl] func1 -> DEBU 2ebc 0xc003e30070 gate 1569287119148831500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebd 0xc003e30070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebe 0xc003e30070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebf 0xc003e30070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ec0 0xc003e30070 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [cauthdsl] func1 -> DEBU 2ec1 0xc003e30070 gate 1569287119148831500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:19.149 UTC [policies] Evaluate -> DEBU 2ec2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.150 UTC [policies] Evaluate -> DEBU 2ec3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.150 UTC [policies] Evaluate -> DEBU 2ec4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.150 UTC [cauthdsl] func1 -> DEBU 2ec5 0xc003e308b0 gate 1569287119150642100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.150 UTC [cauthdsl] func2 -> DEBU 2ec6 0xc003e308b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.150 UTC [cauthdsl] func2 -> DEBU 2ec7 0xc003e308b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.151 UTC [cauthdsl] func2 -> DEBU 2ec8 0xc003e308b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.151 UTC [msp.identity] Verify -> DEBU 2ec9 Verify: digest = 00000000 06 65 21 7b a0 1b 81 0c c4 9f 4d 27 77 9a 91 4c |.e!{......M'w..L| +peer0.org1.example.com | 00000010 48 f3 0a 0b 3c 74 33 c5 6c 83 7b 98 32 e6 b3 93 |H... DEBU 2eca Verify: sig = 00000000 30 45 02 21 00 bf b6 9c ee 01 80 c8 07 cd 3d 19 |0E.!..........=.| +peer0.org1.example.com | 00000010 1f 8f 62 77 95 35 f8 cd 78 cb 99 d6 48 57 e8 24 |..bw.5..x...HW.$| +peer0.org1.example.com | 00000020 3c 8f 4d 78 6e 02 20 57 2f 08 25 fc 43 8f cc f2 |<.Mxn. W/.%.C...| +peer0.org1.example.com | 00000030 52 4d f2 2f 57 0b b7 d2 2a 38 00 e5 df c7 ed 98 |RM./W...*8......| +peer0.org1.example.com | 00000040 73 fd 9c de c1 db 81 |s......|" +peer0.org1.example.com | "2019-09-24 01:05:19.152 UTC [cauthdsl] func2 -> DEBU 2ecb 0xc003e308b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.152 UTC [cauthdsl] func1 -> DEBU 2ecc 0xc003e308b0 gate 1569287119150642100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:19.152 UTC [policies] Evaluate -> DEBU 2ecd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.152 UTC [policies] Evaluate -> DEBU 2ece == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.153 UTC [policies] Evaluate -> DEBU 2ecf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.153 UTC [policies] Evaluate -> DEBU 2ed0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ed1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ed7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eda Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:19.156 UTC [msp] DeserializeIdentity -> DEBU 2edb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2edd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ede Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.158 UTC [cauthdsl] func1 -> DEBU 2ee2 0xc003e96900 gate 1569287119158098600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee3 0xc003e96900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee4 0xc003e96900 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee5 0xc003e96900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:19.159 UTC [cauthdsl] func2 -> DEBU 2ee6 0xc003e96900 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:19.159 UTC [cauthdsl] func1 -> DEBU 2ee7 0xc003e96900 gate 1569287119158098600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [cauthdsl] func1 -> DEBU 2eeb 0xc003e97140 gate 1569287119159997800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eec 0xc003e97140 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eed 0xc003e97140 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eee 0xc003e97140 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [msp.identity] Verify -> DEBU 2eef Verify: digest = 00000000 09 bb ce e1 fe 1f ac f1 08 54 c2 47 ec 18 d5 20 |.........T.G... | +peer0.org1.example.com | 00000010 5e 68 14 ce 7f c1 e9 ae bd b8 04 e6 9f 2c 0a 25 |^h...........,.%|" +peer0.org1.example.com | "2019-09-24 01:05:19.160 UTC [msp.identity] Verify -> DEBU 2ef0 Verify: sig = 00000000 30 45 02 21 00 a9 0d c9 89 d6 94 da 6c 65 6c ec |0E.!........lel.| +peer0.org1.example.com | 00000010 76 2e 7a 18 9c 3e c1 b1 ef 0e 3f e4 bb eb a1 63 |v.z..>....?....c| +peer0.org1.example.com | 00000020 a7 2d af 0e de 02 20 78 d6 0a fb 5e fa 92 16 26 |.-.... x...^...&| +peer0.org1.example.com | 00000030 09 16 e0 d6 86 a5 ca be df 41 56 c1 ea d1 8b e3 |.........AV.....| +peer0.org1.example.com | 00000040 d0 e4 c3 b7 83 86 36 |......6|" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [gossip.gossip] handleMessage -> DEBU 2ef1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [cauthdsl] func2 -> DEBU 2ef2 0xc003e97140 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [cauthdsl] func1 -> DEBU 2ef3 0xc003e97140 gate 1569287119159997800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [gossip.comm] func1 -> DEBU 2ef4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [gossip.comm] func1 -> DEBU 2ef5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [policies] Evaluate -> DEBU 2ef6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 2efa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2efc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:19.163 UTC [msp] DeserializeIdentity -> DEBU 2efd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.161 UTC [gossip.gossip] handleMessage -> DEBU 2eff Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2efe updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f01 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:19.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f02 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:19.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f03 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f04 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.163 UTC [msp] DeserializeIdentity -> DEBU 2f00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.162 UTC [gossip.comm] func1 -> DEBU 2efb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f06 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [gossip.comm] Send -> DEBU 2f09 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [gossip.comm] sendToEndpoint -> DEBU 2f0c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [gossip.comm] sendToEndpoint -> DEBU 2f0d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.167 UTC [gossip.comm] Send -> DEBU 2f0e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f0f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f10 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f11 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.168 UTC [gossip.gossip] handleMessage -> DEBU 2f12 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.168 UTC [gossip.comm] sendToEndpoint -> DEBU 2f13 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.168 UTC [gossip.comm] sendToEndpoint -> DEBU 2f14 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.168 UTC [gossip.gossip] handleMessage -> DEBU 2f15 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.169 UTC [gossip.gossip] handleMessage -> DEBU 2f16 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.169 UTC [gossip.gossip] handleMessage -> DEBU 2f17 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f18 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f19 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f20 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.181 UTC [msp] DeserializeIdentity -> DEBU 2f21 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.181 UTC [msp] DeserializeIdentity -> DEBU 2f22 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f23 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f24 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [gossip.comm] Send -> DEBU 2f28 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [gossip.comm] Send -> DEBU 2f2a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f2f Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:19.211 UTC [msp.identity] Sign -> DEBU 2f30 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151025 " +peer0.org1.example.com | "2019-09-24 01:05:19.211 UTC [msp.identity] Sign -> DEBU 2f31 Sign: digest: 331F27B99631837C1617889BF2C3534BAFCDB816E1AEA13EF3C3B0E26937A848 " +peer0.org1.example.com | "2019-09-24 01:05:19.213 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f32 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:19.213 UTC [msp.identity] Sign -> DEBU 2f33 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:19.213 UTC [msp.identity] Sign -> DEBU 2f34 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:19.213 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f35 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.217 UTC [gossip.comm] Send -> DEBU 2f39 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.217 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.218 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.217 UTC [gossip.comm] Send -> DEBU 2f3b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.218 UTC [msp] DeserializeIdentity -> DEBU 2f3d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.219 UTC [gossip.comm] Send -> DEBU 2f3e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.220 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.220 UTC [gossip.comm] sendToEndpoint -> DEBU 2f40 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.221 UTC [gossip.comm] sendToEndpoint -> DEBU 2f41 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.221 UTC [gossip.comm] sendToEndpoint -> DEBU 2f42 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2f43 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2f44 Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f47 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [cauthdsl] func1 -> DEBU 2f48 0xc0027e8ef0 gate 1569287119503494700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [cauthdsl] func2 -> DEBU 2f49 0xc0027e8ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.503 UTC [cauthdsl] func2 -> DEBU 2f4a 0xc0027e8ef0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.504 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0027e8ef0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.504 UTC [msp.identity] Verify -> DEBU 2f4c Verify: digest = 00000000 d3 71 04 c7 3d c3 26 0b 70 90 17 6e 4a 7e d5 4c |.q..=.&.p..nJ~.L| +peer0.org1.example.com | 00000010 01 f9 6e f5 b4 d5 27 ea 70 97 4d 21 49 6b a3 18 |..n...'.p.M!Ik..|" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [msp.identity] Verify -> DEBU 2f4d Verify: sig = 00000000 30 45 02 21 00 d5 95 55 36 54 5a 06 5c af 7d da |0E.!...U6TZ.\.}.| +peer0.org1.example.com | 00000010 12 0a a6 f7 4b 97 af bc a2 43 4f cc d0 99 8b 68 |....K....CO....h| +peer0.org1.example.com | 00000020 80 e1 a1 01 ce 02 20 00 e1 ff ec d3 e6 41 eb a4 |...... ......A..| +peer0.org1.example.com | 00000030 dc 54 5c bb e3 14 4a ca dd bc 38 63 08 8d dd b1 |.T\...J...8c....| +peer0.org1.example.com | 00000040 5a c7 95 49 ce b9 c5 |Z..I...|" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [cauthdsl] func2 -> DEBU 2f4e 0xc0027e8ef0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [cauthdsl] func1 -> DEBU 2f4f 0xc0027e8ef0 gate 1569287119503494700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f50 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [blocksProvider] DeliverBlocks -> DEBU 2f54 [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [gossip.state] addPayload -> DEBU 2f55 [businesschannel] Adding payload to local buffer, blockNum = [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [gossip.state] addPayload -> DEBU 2f56 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [blocksProvider] DeliverBlocks -> DEBU 2f57 [businesschannel] Gossiping block [5], peers number [3]" +peer0.org1.example.com | "2019-09-24 01:05:19.506 UTC [gossip.channel] AddToMsgStore -> DEBU 2f58 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [gossip.pull] Add -> DEBU 2f59 Added 5, total items: 5" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [gossip.state] deliverPayloads -> DEBU 2f5a [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [gossip.state] deliverPayloads -> DEBU 2f5b [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [gossip.privdata] StoreBlock -> INFO 2f5c [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [gossip.privdata] StoreBlock -> DEBU 2f5d [businesschannel] Validating block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.507 UTC [committer.txvalidator] Validate -> DEBU 2f5e [businesschannel] START Block Validation for block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [committer.txvalidator] Validate -> DEBU 2f5f expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [committer.txvalidator] validateTx -> DEBU 2f60 [businesschannel] validateTx starts for block 0xc003156280 env 0xc00290c230 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [protoutils] ValidateTransaction -> DEBU 2f61 ValidateTransactionEnvelope starts for envelope 0xc00290c230" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [protoutils] ValidateTransaction -> DEBU 2f62 Header is channel_header:"\010\003\032\014\010\315\327\245\354\005\020\364\262\307\322\001\"\017businesschannel*@074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\333\364\177K\347\263Z\271\201\264\263|\350\305\0245\320\277\331\301\216\315\264\220" " +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [protoutils] validateChannelHeader -> DEBU 2f63 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f64 begin" +peer0.org1.example.com | "2019-09-24 01:05:19.508 UTC [msp] GetManagerForChain -> DEBU 2f65 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:19.509 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f66 creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +peer0.org1.example.com | "2019-09-24 01:05:19.509 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f67 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:19.509 UTC [msp.identity] Verify -> DEBU 2f68 Verify: digest = 00000000 3b bb 85 c9 b1 26 4d ef 06 5d 74 71 84 51 0c ba |;....&M..]tq.Q..| +peer0.org1.example.com | 00000010 f4 ff 97 a0 9a 74 75 1a ed 57 e9 f4 fa ce 55 e2 |.....tu..W....U.|" +peer0.org1.example.com | "2019-09-24 01:05:19.509 UTC [msp.identity] Verify -> DEBU 2f69 Verify: sig = 00000000 30 45 02 21 00 fd a1 0a 41 10 34 78 b2 35 ea a0 |0E.!....A.4x.5..| +peer0.org1.example.com | 00000010 60 94 c5 01 ae e7 b2 c3 4c 4b 69 d7 03 98 bc 0b |`.......LKi.....| +peer0.org1.example.com | 00000020 7e c4 d0 f1 d9 02 20 7f 1b dd 4e f3 da c9 03 62 |~..... ...N....b| +peer0.org1.example.com | 00000030 53 08 49 fd d9 f2 bf 57 e1 37 ab 5a 24 b4 00 f2 |S.I....W.7.Z$...| +peer0.org1.example.com | 00000040 c0 bb be fd e2 be ad |.......|" +peer0.org1.example.com | "2019-09-24 01:05:19.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f6a exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:19.511 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6b validateEndorserTransaction starts for data 0xc003046000, header channel_header:"\010\003\032\014\010\315\327\245\354\005\020\364\262\307\322\001\"\017businesschannel*@074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\333\364\177K\347\263Z\271\201\264\263|\350\305\0245\320\277\331\301\216\315\264\220" " +peer0.org1.example.com | "2019-09-24 01:05:19.512 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6c validateEndorserTransaction info: there are 1 actions" +peer0.org1.example.com | "2019-09-24 01:05:19.512 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6d validateEndorserTransaction info: signature header is valid" +peer0.org1.example.com | "2019-09-24 01:05:19.512 UTC [protoutils] ValidateTransaction -> DEBU 2f6e ValidateTransactionEnvelope returns err %!s()" +peer0.org1.example.com | "2019-09-24 01:05:19.514 UTC [committer.txvalidator] validateTx -> DEBU 2f6f Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:19.514 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2f70 retrieveTransactionByID() - txId = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +peer0.org1.example.com | "2019-09-24 01:05:19.527 UTC [committer.txvalidator] validateTx -> DEBU 2f71 Validating transaction vscc tx validate" +peer0.org1.example.com | "2019-09-24 01:05:19.529 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2f72 [businesschannel] VSCCValidateTx starts for bytes 0xc002a30c00" +peer0.org1.example.com | "2019-09-24 01:05:19.530 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f73 constructing new query executor txid = [22ab09a7-fd84-45ca-a049-99e8c4c44a45]" +peer0.org1.example.com | "2019-09-24 01:05:19.531 UTC [stateleveldb] GetState -> DEBU 2f74 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:19.533 UTC [lockbasedtxmgr] Done -> DEBU 2f75 Done with transaction simulation / query execution [22ab09a7-fd84-45ca-a049-99e8c4c44a45]" +peer0.org1.example.com | "2019-09-24 01:05:19.534 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2f76 Validating Tx 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +peer0.org1.example.com | "2019-09-24 01:05:19.536 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f77 constructing new query executor txid = [d3391cab-bac4-4f76-8424-76c23014b1ff]" +peer0.org1.example.com | "2019-09-24 01:05:19.536 UTC [lockbasedtxmgr] Done -> DEBU 2f78 Done with transaction simulation / query execution [d3391cab-bac4-4f76-8424-76c23014b1ff]" +peer0.org1.example.com | "2019-09-24 01:05:19.537 UTC [cauthdsl] func1 -> DEBU 2f79 0xc003043ee0 gate 1569287119537196000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.537 UTC [cauthdsl] func2 -> DEBU 2f7a 0xc003043ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.538 UTC [cauthdsl] func2 -> DEBU 2f7b 0xc003043ee0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.540 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc003043ee0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.539 UTC [msp] DeserializeIdentity -> DEBU 2f7c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.541 UTC [msp] DeserializeIdentity -> DEBU 2f7e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.542 UTC [msp] DeserializeIdentity -> DEBU 2f7f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.542 UTC [msp] DeserializeIdentity -> DEBU 2f81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.542 UTC [msp.identity] Verify -> DEBU 2f80 Verify: digest = 00000000 cc 69 4f 41 89 07 fb b3 5a 81 af 28 ec 39 03 ae |.iOA....Z..(.9..| +peer0.org1.example.com | 00000010 b6 21 0b d0 0d 71 68 33 c1 f0 86 e5 86 73 1f 7b |.!...qh3.....s.{|" +peer0.org1.example.com | "2019-09-24 01:05:19.543 UTC [msp.identity] Verify -> DEBU 2f82 Verify: sig = 00000000 30 45 02 21 00 bd 00 da 09 1c 11 a0 2b 51 87 59 |0E.!........+Q.Y| +peer0.org1.example.com | 00000010 c6 2f 68 ee b6 ce 9c 36 71 27 5e 0a aa 2f 2a f8 |./h....6q'^../*.| +peer0.org1.example.com | 00000020 c3 2e 82 82 23 02 20 7e 64 5c c5 0f d5 a7 c3 93 |....#. ~d\......| +peer0.org1.example.com | 00000030 91 7a 80 54 b5 cf 14 34 6e 51 e6 42 c6 96 96 6c |.z.T...4nQ.B...l| +peer0.org1.example.com | 00000040 eb 9d 1c 67 82 f5 91 |...g...|" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f83 0xc003043ee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f84 0xc003043ee0 signed by 1 principal evaluation starts (used [true])" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f85 0xc003043ee0 skipping identity 0 because it has already been used" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [gossip.comm] Send -> DEBU 2f86 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f87 0xc003043ee0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:19.544 UTC [cauthdsl] func1 -> DEBU 2f88 0xc003043ee0 gate 1569287119537196000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f8b constructing new query executor txid = [b70c3402-77a4-4aa2-830d-470852de653d]" +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [lockbasedtxmgr] Done -> DEBU 2f8c Done with transaction simulation / query execution [b70c3402-77a4-4aa2-830d-470852de653d]" +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [vscc] Validate -> DEBU 2f8d block 5, namespace: exp02, tx 0 validation results is: " +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [msp] DeserializeIdentity -> DEBU 2f89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.546 UTC [msp] DeserializeIdentity -> DEBU 2f8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [gossip.comm] sendToEndpoint -> DEBU 2f8a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:19.546 UTC [gossip.comm] sendToEndpoint -> DEBU 2f8f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:19.545 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2f90 Transaction 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 appears to be valid" +peer0.org1.example.com | "2019-09-24 01:05:19.546 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2f91 [businesschannel] VSCCValidateTx completes env bytes 0xc002a30c00" +peer0.org1.example.com | "2019-09-24 01:05:19.547 UTC [committer.txvalidator] validateTx -> DEBU 2f92 [businesschannel] validateTx completes for block 0xc003156280 env 0xc00290c230 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:19.547 UTC [committer.txvalidator] Validate -> DEBU 2f93 got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:05:19.547 UTC [committer.txvalidator] Validate -> INFO 2f94 [businesschannel] Validated block [5] in 39ms" +peer0.org1.example.com | "2019-09-24 01:05:19.551 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2f95 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:05:19.551 UTC [gossip.privdata] StoreBlock -> DEBU 2f96 [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:05:19.553 UTC [kvledger] CommitWithPvtData -> DEBU 2f97 [businesschannel] Validating state for block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.553 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f98 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:05:19.554 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f99 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:05:19.555 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f9a Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:05:19.555 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2f9b ValidateAndPrepareBatch() for block number = [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.556 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2f9c preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:19.556 UTC [valimpl] preprocessProtoBlock -> DEBU 2f9d txType=ENDORSER_TRANSACTION" +peer0.org1.example.com | "2019-09-24 01:05:19.557 UTC [stateleveldb] GetState -> DEBU 2f9e GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:19.558 UTC [statebasedval] validateKVRead -> DEBU 2f9f Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:19.558 UTC [stateleveldb] GetState -> DEBU 2fa0 GetState(). ns=exp02, key=b" +peer0.org1.example.com | "2019-09-24 01:05:19.559 UTC [statebasedval] validateKVRead -> DEBU 2fa1 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:19.559 UTC [stateleveldb] GetState -> DEBU 2fa2 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:19.560 UTC [statebasedval] validateKVRead -> DEBU 2fa3 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +peer0.org1.example.com | "2019-09-24 01:05:19.560 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2fa4 Block [5] Transaction index [0] TxId [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:05:19.560 UTC [valinternal] ApplyWriteSet -> DEBU 2fa5 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0032ee200), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0032ee240)}" +peer0.org1.example.com | "2019-09-24 01:05:19.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa6 validating rwset..." +peer0.org1.example.com | "2019-09-24 01:05:19.561 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa7 postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:19.561 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa8 ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:05:19.561 UTC [kvledger] CommitWithPvtData -> DEBU 2fa9 [businesschannel] Adding CommitHash to the block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.561 UTC [kvledger] CommitWithPvtData -> DEBU 2faa [businesschannel] Committing block [5] to storage" +peer0.org1.example.com | "2019-09-24 01:05:19.561 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2fab Writing block [5] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:05:19.563 UTC [pvtdatastorage] Prepare -> DEBU 2fac Saved 0 private data write sets for block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.565 UTC [fsblkstorage] indexBlock -> DEBU 2fad Indexing block [blockNum=5, blockHash=[]byte{0x2, 0x38, 0x9e, 0x59, 0xf8, 0xbb, 0xfc, 0xc, 0x7e, 0x52, 0x39, 0x78, 0x2b, 0xad, 0x5f, 0x4b, 0x3f, 0x3f, 0x8b, 0x94, 0xc6, 0x52, 0x18, 0x85, 0x20, 0x20, 0xfd, 0x31, 0xe0, 0x3f, 0x7c, 0xb2} txOffsets= +peer0.org1.example.com | txId=074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 locPointer=offset=70, bytesLength=2978 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:05:19.565 UTC [fsblkstorage] indexBlock -> DEBU 2fae Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2978] for tx ID: [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] to txid-index" +peer0.org1.example.com | "2019-09-24 01:05:19.566 UTC [fsblkstorage] indexBlock -> DEBU 2faf Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2978] for tx number:[0] ID: [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:05:19.568 UTC [fsblkstorage] updateCheckpoint -> DEBU 2fb0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89438], isChainEmpty=[false], lastBlockNumber=[5]" +peer0.org1.example.com | "2019-09-24 01:05:19.568 UTC [pvtdatastorage] Commit -> DEBU 2fb1 Committing private data for block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.571 UTC [pvtdatastorage] Commit -> DEBU 2fb2 Committed private data for block [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.572 UTC [kvledger] CommitWithPvtData -> DEBU 2fb3 [businesschannel] Committing block [5] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:05:19.572 UTC [lockbasedtxmgr] Commit -> DEBU 2fb4 lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:19.573 UTC [lockbasedtxmgr] Commit -> DEBU 2fb5 Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:19.573 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2fb6 Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:05:19.574 UTC [lockbasedtxmgr] Commit -> DEBU 2fb7 Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:19.574 UTC [stateleveldb] ApplyUpdates -> DEBU 2fb8 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +peer0.org1.example.com | "2019-09-24 01:05:19.574 UTC [stateleveldb] ApplyUpdates -> DEBU 2fb9 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +peer0.org1.example.com | "2019-09-24 01:05:19.577 UTC [lockbasedtxmgr] Commit -> DEBU 2fba Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:05:19.577 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2fbb Preparing potential purge list working-set for expiringAtBlk [6]" +peer0.org1.example.com | "2019-09-24 01:05:19.577 UTC [lockbasedtxmgr] func1 -> DEBU 2fbc launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:05:19.578 UTC [kvledger] CommitWithPvtData -> DEBU 2fbd [businesschannel] Committing block [5] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:05:19.578 UTC [historyleveldb] Commit -> DEBU 2fbe Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:05:19.579 UTC [leveldbhelper] GetIterator -> DEBU 2fbf Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:05:19.579 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2fc0 No expiry entry found for expiringAtBlk [6]" +peer0.org1.example.com | "2019-09-24 01:05:19.580 UTC [historyleveldb] Commit -> DEBU 2fc1 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +peer0.org1.example.com | "2019-09-24 01:05:19.580 UTC [kvledger] CommitWithPvtData -> INFO 2fc2 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=10ms state_commit=5ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +peer0.org1.example.com | "2019-09-24 01:05:19.581 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fc3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:19.581 UTC [msp.identity] Sign -> DEBU 2fc4 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08061A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 01:05:19.581 UTC [msp.identity] Sign -> DEBU 2fc5 Sign: digest: 810F2CBA538FA6975E1660120DFFD82B522CC04EB0782A0EF140C1DE3868EBEA " +peer0.org1.example.com | "2019-09-24 01:05:19.582 UTC [gossip.state] commitBlock -> DEBU 2fc6 [businesschannel] Committed block [5] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [endorser] ProcessProposal -> DEBU 2fc7 Entering: request from 172.18.0.5:49938" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [protoutils] ValidateProposalMessage -> DEBU 2fc8 ValidateProposalMessage starts for signed proposal 0xc0029aa8c0" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [protoutils] validateChannelHeader -> DEBU 2fc9 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fca begin" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [msp] GetManagerForChain -> DEBU 2fcb Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:19.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fcc creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:19.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fcd creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:19.859 UTC [msp.identity] Verify -> DEBU 2fce Verify: digest = 00000000 4d b6 9e 09 46 b0 bd 6f c1 fe 16 71 56 6b 8f 62 |M...F..o...qVk.b| +peer0.org1.example.com | 00000010 5b 5f 04 4f 03 97 0b b9 af 6c be d3 cd c4 19 91 |[_.O.....l......|" +peer0.org1.example.com | "2019-09-24 01:05:19.859 UTC [msp.identity] Verify -> DEBU 2fcf Verify: sig = 00000000 30 45 02 21 00 ef 3e e2 28 27 c9 05 30 d0 7e c0 |0E.!..>.('..0.~.| +peer0.org1.example.com | 00000010 d4 75 77 5c 75 95 c5 ca 85 55 2e 40 7f fe 05 37 |.uw\u....U.@...7| +peer0.org1.example.com | 00000020 d3 0c 77 2e e4 02 20 16 c9 6b 43 9b bc a2 1c f3 |..w... ..kC.....| +peer0.org1.example.com | 00000030 89 59 7a db 76 27 03 7d bb 56 18 aa 39 87 1c 53 |.Yz.v'.}.V..9..S| +peer0.org1.example.com | 00000040 24 9f 5d 98 22 8d 69 |$.].".i|" +peer0.org1.example.com | "2019-09-24 01:05:19.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fd0 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:19.860 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2fd1 validateChaincodeProposalMessage starts for proposal 0xc002af9180, header 0xc0029aacd0" +peer0.org1.example.com | "2019-09-24 01:05:19.860 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2fd2 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:19.860 UTC [endorser] preProcess -> DEBU 2fd3 [businesschannel][ed0f3f8c] processing txid: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065" +peer0.org1.example.com | "2019-09-24 01:05:19.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2fd4 retrieveTransactionByID() - txId = [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +peer0.org1.example.com | "2019-09-24 01:05:19.861 UTC [aclmgmt] CheckACL -> DEBU 2fd5 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +peer0.org1.example.com | "2019-09-24 01:05:19.861 UTC [aclmgmt] CheckACL -> DEBU 2fd6 acl check(/Channel/Application/Writers)" +peer0.org1.example.com | "2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:19.863 UTC [cauthdsl] func1 -> DEBU 2fda 0xc0039c7a80 gate 1569287119863427200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:19.863 UTC [cauthdsl] func2 -> DEBU 2fdb 0xc0039c7a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:19.863 UTC [cauthdsl] func2 -> DEBU 2fdc 0xc0039c7a80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:19.864 UTC [cauthdsl] func2 -> DEBU 2fdd 0xc0039c7a80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.864 UTC [msp.identity] Verify -> DEBU 2fde Verify: digest = 00000000 4d b6 9e 09 46 b0 bd 6f c1 fe 16 71 56 6b 8f 62 |M...F..o...qVk.b| +peer0.org1.example.com | 00000010 5b 5f 04 4f 03 97 0b b9 af 6c be d3 cd c4 19 91 |[_.O.....l......|" +peer0.org1.example.com | "2019-09-24 01:05:19.864 UTC [msp.identity] Verify -> DEBU 2fdf Verify: sig = 00000000 30 45 02 21 00 ef 3e e2 28 27 c9 05 30 d0 7e c0 |0E.!..>.('..0.~.| +peer0.org1.example.com | 00000010 d4 75 77 5c 75 95 c5 ca 85 55 2e 40 7f fe 05 37 |.uw\u....U.@...7| +peer0.org1.example.com | 00000020 d3 0c 77 2e e4 02 20 16 c9 6b 43 9b bc a2 1c f3 |..w... ..kC.....| +peer0.org1.example.com | 00000030 89 59 7a db 76 27 03 7d bb 56 18 aa 39 87 1c 53 |.Yz.v'.}.V..9..S| +peer0.org1.example.com | 00000040 24 9f 5d 98 22 8d 69 |$.].".i|" +peer0.org1.example.com | "2019-09-24 01:05:19.865 UTC [cauthdsl] func2 -> DEBU 2fe0 0xc0039c7a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:19.865 UTC [cauthdsl] func1 -> DEBU 2fe1 0xc0039c7a80 gate 1569287119863427200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:19.865 UTC [policies] Evaluate -> DEBU 2fe2 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe4 Signature set satisfies policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:19.866 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fe6 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:19.866 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fe7 constructing new tx simulator txid = [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +peer0.org1.example.com | "2019-09-24 01:05:19.867 UTC [endorser] SimulateProposal -> DEBU 2fe8 [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:19.867 UTC [stateleveldb] GetState -> DEBU 2fe9 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:19.867 UTC [ccprovider] GetChaincodeData -> DEBU 2fea Getting chaincode data for from cache" +peer0.org1.example.com | "2019-09-24 01:05:19.868 UTC [endorser] callChaincode -> INFO 2feb [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:19.868 UTC [chaincode] Execute -> DEBU 2fec Entry" +peer0.org1.example.com | "2019-09-24 01:05:19.869 UTC [chaincode] handleMessage -> DEBU 2fed [ed0f3f8c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:19.870 UTC [chaincode] HandleTransaction -> DEBU 2fee [ed0f3f8c] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:19.870 UTC [chaincode] HandleGetState -> DEBU 2fef [ed0f3f8c] getting state for chaincode exp02, key a, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:19.870 UTC [stateleveldb] GetState -> DEBU 2ff0 GetState(). ns=exp02, key=a" +peer0.org1.example.com | "2019-09-24 01:05:19.870 UTC [chaincode] HandleTransaction -> DEBU 2ff1 [ed0f3f8c] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:19.871 UTC [chaincode] handleMessage -> DEBU 2ff2 [ed0f3f8c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:19.871 UTC [chaincode] Notify -> DEBU 2ff3 [ed0f3f8c] notifying Txid:ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:19.872 UTC [chaincode] Execute -> DEBU 2ff4 Exit" +peer0.org1.example.com | "2019-09-24 01:05:19.872 UTC [endorser] callChaincode -> INFO 2ff5 [businesschannel][ed0f3f8c] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-09-24 01:05:19.872 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2ff6 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:19.872 UTC [lockbasedtxmgr] Done -> DEBU 2ff7 Done with transaction simulation / query execution [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +peer0.org1.example.com | "2019-09-24 01:05:19.873 UTC [endorser] SimulateProposal -> DEBU 2ff8 [businesschannel][ed0f3f8c] Exit" +peer0.org1.example.com | "2019-09-24 01:05:19.873 UTC [endorser] endorseProposal -> DEBU 2ff9 [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-09-24 01:05:19.873 UTC [endorser] endorseProposal -> DEBU 2ffa [businesschannel][ed0f3f8c] escc for chaincode name:"exp02" is escc" +peer0.org1.example.com | "2019-09-24 01:05:19.874 UTC [endorser] EndorseWithPlugin -> DEBU 2ffb Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:19.874 UTC [msp.identity] Sign -> DEBU 2ffc Sign: plaintext: 0A20C3D903405A88BE10665DC49331A5...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:19.874 UTC [msp.identity] Sign -> DEBU 2ffd Sign: digest: 97E99B0967D2BA5008C1566C920C893C0988011221F545ED7584BB22DB90DEE9 " +peer0.org1.example.com | "2019-09-24 01:05:19.874 UTC [endorser] EndorseWithPlugin -> DEBU 2ffe Exiting {plugin: escc, channel: businesschannel, tx: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, chaincode: exp02}" +peer0.org1.example.com | "2019-09-24 01:05:19.874 UTC [endorser] endorseProposal -> DEBU 2fff [businesschannel][ed0f3f8c] Exit" +peer0.org1.example.com | "2019-09-24 01:05:19.875 UTC [lockbasedtxmgr] Done -> DEBU 3000 Done with transaction simulation / query execution [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +peer0.org1.example.com | "2019-09-24 01:05:19.875 UTC [endorser] func1 -> DEBU 3001 Exit: request from 172.18.0.5:49938" +peer0.org1.example.com | "2019-09-24 01:05:19.876 UTC [comm.grpc.server] 1 -> INFO 3002 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49938 grpc.code=OK grpc.call_duration=18.2578ms +peer0.org1.example.com | "2019-09-24 01:05:19.879 UTC [grpc] warningf -> DEBU 3003 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49938: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:19.880 UTC [grpc] infof -> DEBU 3004 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:19.881 UTC [grpc] infof -> DEBU 3005 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.300 UTC [endorser] ProcessProposal -> DEBU 3006 Entering: request from 172.18.0.5:49942" +peer0.org1.example.com | "2019-09-24 01:05:20.300 UTC [protoutils] ValidateProposalMessage -> DEBU 3007 ValidateProposalMessage starts for signed proposal 0xc002aee1e0" +peer0.org1.example.com | "2019-09-24 01:05:20.300 UTC [protoutils] validateChannelHeader -> DEBU 3008 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 3009 begin" +peer0.org1.example.com | "2019-09-24 01:05:20.301 UTC [msp] GetManagerForChain -> DEBU 300a Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 300b creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 300c creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:20.302 UTC [msp.identity] Verify -> DEBU 300d Verify: digest = 00000000 fe ec a9 fd 65 7a 3b 1a d1 9f e4 b4 4f d2 d6 6f |....ez;.....O..o| +peer0.org1.example.com | 00000010 23 1b 4c 74 97 ad fb 10 b5 8f f5 be 59 f0 aa ff |#.Lt........Y...|" +peer0.org1.example.com | "2019-09-24 01:05:20.302 UTC [msp.identity] Verify -> DEBU 300e Verify: sig = 00000000 30 45 02 21 00 ad 5d 28 02 50 f7 a6 99 0a e6 c5 |0E.!..](.P......| +peer0.org1.example.com | 00000010 b6 2c ae 13 d8 03 f0 9e 72 a4 f5 9a 58 66 4a b1 |.,......r...XfJ.| +peer0.org1.example.com | 00000020 d8 2e f2 a1 d7 02 20 7a 25 f1 49 c2 03 71 2b 31 |...... z%.I..q+1| +peer0.org1.example.com | 00000030 ef 0f cd d7 ad 0c a9 15 46 dd 03 f4 2a 6b 07 3f |........F...*k.?| +peer0.org1.example.com | 00000040 80 61 f0 dc 14 36 18 |.a...6.|" +peer0.org1.example.com | "2019-09-24 01:05:20.302 UTC [protoutils] checkSignatureFromCreator -> DEBU 300f exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:20.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3010 validateChaincodeProposalMessage starts for proposal 0xc000244620, header 0xc002aee690" +peer0.org1.example.com | "2019-09-24 01:05:20.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3011 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.303 UTC [endorser] preProcess -> DEBU 3012 [businesschannel][69107929] processing txid: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803" +peer0.org1.example.com | "2019-09-24 01:05:20.303 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3013 retrieveTransactionByID() - txId = [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +peer0.org1.example.com | "2019-09-24 01:05:20.303 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3014 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:20.303 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3015 constructing new tx simulator txid = [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +peer0.org1.example.com | "2019-09-24 01:05:20.303 UTC [endorser] SimulateProposal -> DEBU 3016 [businesschannel][69107929] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [endorser] callChaincode -> INFO 3017 [businesschannel][69107929] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [chaincode] Execute -> DEBU 3018 Entry" +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [aclmgmt] CheckACL -> DEBU 3019 acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [aclmgmt] CheckACL -> DEBU 301a acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [policies] Evaluate -> DEBU 301b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.304 UTC [policies] Evaluate -> DEBU 301c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:20.305 UTC [policies] Evaluate -> DEBU 301d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.305 UTC [cauthdsl] func1 -> DEBU 301e 0xc003e247e0 gate 1569287120305354800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:20.305 UTC [cauthdsl] func2 -> DEBU 301f 0xc003e247e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3020 0xc003e247e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3021 0xc003e247e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [msp.identity] Verify -> DEBU 3022 Verify: digest = 00000000 fe ec a9 fd 65 7a 3b 1a d1 9f e4 b4 4f d2 d6 6f |....ez;.....O..o| +peer0.org1.example.com | 00000010 23 1b 4c 74 97 ad fb 10 b5 8f f5 be 59 f0 aa ff |#.Lt........Y...|" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [msp.identity] Verify -> DEBU 3023 Verify: sig = 00000000 30 45 02 21 00 ad 5d 28 02 50 f7 a6 99 0a e6 c5 |0E.!..](.P......| +peer0.org1.example.com | 00000010 b6 2c ae 13 d8 03 f0 9e 72 a4 f5 9a 58 66 4a b1 |.,......r...XfJ.| +peer0.org1.example.com | 00000020 d8 2e f2 a1 d7 02 20 7a 25 f1 49 c2 03 71 2b 31 |...... z%.I..q+1| +peer0.org1.example.com | 00000030 ef 0f cd d7 ad 0c a9 15 46 dd 03 f4 2a 6b 07 3f |........F...*k.?| +peer0.org1.example.com | 00000040 80 61 f0 dc 14 36 18 |.a...6.|" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3024 0xc003e247e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.306 UTC [cauthdsl] func1 -> DEBU 3025 0xc003e247e0 gate 1569287120305354800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3026 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3027 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3028 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3029 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [chaincode] handleMessage -> DEBU 302a [69107929] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.307 UTC [chaincode] HandleTransaction -> DEBU 302b [69107929] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [chaincode] HandleGetState -> DEBU 302c [69107929] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [stateleveldb] GetState -> DEBU 302d GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [chaincode] HandleTransaction -> DEBU 302e [69107929] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [chaincode] handleMessage -> DEBU 302f [69107929] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [chaincode] Notify -> DEBU 3030 [69107929] notifying Txid:69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.308 UTC [chaincode] Execute -> DEBU 3031 Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [endorser] callChaincode -> INFO 3032 [businesschannel][69107929] Exit chaincode: name:"lscc" (5ms)" +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3033 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [lockbasedtxmgr] Done -> DEBU 3034 Done with transaction simulation / query execution [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [endorser] SimulateProposal -> DEBU 3035 [businesschannel][69107929] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [endorser] endorseProposal -> DEBU 3036 [businesschannel][69107929] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.309 UTC [endorser] endorseProposal -> DEBU 3037 [businesschannel][69107929] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:20.310 UTC [endorser] EndorseWithPlugin -> DEBU 3038 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.310 UTC [msp.identity] Sign -> DEBU 3039 Sign: plaintext: 0A201CCDCB180894C1BCE7C0B8CABB82...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:20.310 UTC [msp.identity] Sign -> DEBU 303a Sign: digest: 7CC02B5440B53FF9B3A5A9B8F3153933F717B7069B7CA2ABE0786044315F3748 " +peer0.org1.example.com | "2019-09-24 01:05:20.311 UTC [endorser] EndorseWithPlugin -> DEBU 303b Exiting {plugin: escc, channel: businesschannel, tx: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.311 UTC [endorser] endorseProposal -> DEBU 303c [businesschannel][69107929] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.311 UTC [lockbasedtxmgr] Done -> DEBU 303d Done with transaction simulation / query execution [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +peer0.org1.example.com | "2019-09-24 01:05:20.312 UTC [endorser] func1 -> DEBU 303e Exit: request from 172.18.0.5:49942" +peer0.org1.example.com | "2019-09-24 01:05:20.312 UTC [comm.grpc.server] 1 -> INFO 303f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49942 grpc.code=OK grpc.call_duration=11.8406ms +peer0.org1.example.com | "2019-09-24 01:05:20.316 UTC [grpc] infof -> DEBU 3040 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.316 UTC [grpc] warningf -> DEBU 3041 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49942: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:20.316 UTC [grpc] infof -> DEBU 3042 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [endorser] ProcessProposal -> DEBU 3043 Entering: request from 172.18.0.5:49946" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [protoutils] ValidateProposalMessage -> DEBU 3044 ValidateProposalMessage starts for signed proposal 0xc002b243c0" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [protoutils] validateChannelHeader -> DEBU 3045 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3046 begin" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [msp] GetManagerForChain -> DEBU 3047 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3048 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3049 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:20.481 UTC [msp.identity] Verify -> DEBU 304a Verify: digest = 00000000 d8 e1 a5 77 01 dd 6f f6 ec 58 33 e8 ec c4 5a 91 |...w..o..X3...Z.| +peer0.org1.example.com | 00000010 3c b3 af 30 b4 0f 11 8b 65 73 34 d1 c3 99 30 e2 |<..0....es4...0.|" +peer0.org1.example.com | "2019-09-24 01:05:20.481 UTC [msp.identity] Verify -> DEBU 304b Verify: sig = 00000000 30 45 02 21 00 c7 a5 64 bd 95 4e 1a a7 00 2c a6 |0E.!...d..N...,.| +peer0.org1.example.com | 00000010 2e af 68 20 d7 d1 84 12 c6 77 bc 50 5f 88 65 c0 |..h .....w.P_.e.| +peer0.org1.example.com | 00000020 09 1a 49 a4 ff 02 20 23 70 1f 39 67 0d bd 1a cc |..I... #p.9g....| +peer0.org1.example.com | 00000030 ee 7f 9a fb 11 dd be 3b 25 4e d1 d0 e5 9e fb 63 |.......;%N.....c| +peer0.org1.example.com | 00000040 1b 06 a2 f5 f5 5f 0f |....._.|" +peer0.org1.example.com | "2019-09-24 01:05:20.482 UTC [protoutils] checkSignatureFromCreator -> DEBU 304c exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:20.482 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304d validateChaincodeProposalMessage starts for proposal 0xc002af9810, header 0xc002b247d0" +peer0.org1.example.com | "2019-09-24 01:05:20.482 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304e validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.483 UTC [endorser] preProcess -> DEBU 304f [businesschannel][16316b13] processing txid: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376" +peer0.org1.example.com | "2019-09-24 01:05:20.484 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3050 retrieveTransactionByID() - txId = [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +peer0.org1.example.com | "2019-09-24 01:05:20.484 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3051 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:20.484 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3052 constructing new tx simulator txid = [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +peer0.org1.example.com | "2019-09-24 01:05:20.484 UTC [endorser] SimulateProposal -> DEBU 3053 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.485 UTC [endorser] callChaincode -> INFO 3054 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.485 UTC [chaincode] Execute -> DEBU 3055 Entry" +peer0.org1.example.com | "2019-09-24 01:05:20.485 UTC [aclmgmt] CheckACL -> DEBU 3056 acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +peer0.org1.example.com | "2019-09-24 01:05:20.485 UTC [aclmgmt] CheckACL -> DEBU 3057 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 3058 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [cauthdsl] func1 -> DEBU 305b 0xc002833c20 gate 1569287120486470900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305c 0xc002833c20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305d 0xc002833c20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305e 0xc002833c20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.487 UTC [msp.identity] Verify -> DEBU 305f Verify: digest = 00000000 d8 e1 a5 77 01 dd 6f f6 ec 58 33 e8 ec c4 5a 91 |...w..o..X3...Z.| +peer0.org1.example.com | 00000010 3c b3 af 30 b4 0f 11 8b 65 73 34 d1 c3 99 30 e2 |<..0....es4...0.|" +peer0.org1.example.com | "2019-09-24 01:05:20.487 UTC [msp.identity] Verify -> DEBU 3060 Verify: sig = 00000000 30 45 02 21 00 c7 a5 64 bd 95 4e 1a a7 00 2c a6 |0E.!...d..N...,.| +peer0.org1.example.com | 00000010 2e af 68 20 d7 d1 84 12 c6 77 bc 50 5f 88 65 c0 |..h .....w.P_.e.| +peer0.org1.example.com | 00000020 09 1a 49 a4 ff 02 20 23 70 1f 39 67 0d bd 1a cc |..I... #p.9g....| +peer0.org1.example.com | 00000030 ee 7f 9a fb 11 dd be 3b 25 4e d1 d0 e5 9e fb 63 |.......;%N.....c| +peer0.org1.example.com | 00000040 1b 06 a2 f5 f5 5f 0f |....._.|" +peer0.org1.example.com | "2019-09-24 01:05:20.487 UTC [cauthdsl] func2 -> DEBU 3061 0xc002833c20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.487 UTC [cauthdsl] func1 -> DEBU 3062 0xc002833c20 gate 1569287120486470900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:20.487 UTC [policies] Evaluate -> DEBU 3063 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3064 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3065 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3066 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.488 UTC [chaincode] handleMessage -> DEBU 3067 [16316b13] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.488 UTC [chaincode] HandleTransaction -> DEBU 3068 [16316b13] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:20.489 UTC [chaincode] HandleGetState -> DEBU 3069 [16316b13] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.490 UTC [stateleveldb] GetState -> DEBU 306a GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:20.490 UTC [chaincode] HandleTransaction -> DEBU 306b [16316b13] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:20.490 UTC [chaincode] handleMessage -> DEBU 306c [16316b13] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.491 UTC [chaincode] Notify -> DEBU 306d [16316b13] notifying Txid:16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.491 UTC [chaincode] Execute -> DEBU 306e Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.491 UTC [endorser] callChaincode -> INFO 306f [businesschannel][16316b13] Exit chaincode: name:"lscc" (6ms)" +peer0.org1.example.com | "2019-09-24 01:05:20.492 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3070 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:20.492 UTC [lockbasedtxmgr] Done -> DEBU 3071 Done with transaction simulation / query execution [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +peer0.org1.example.com | "2019-09-24 01:05:20.492 UTC [endorser] SimulateProposal -> DEBU 3072 [businesschannel][16316b13] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.492 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.492 UTC [endorser] endorseProposal -> DEBU 3074 [businesschannel][16316b13] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:20.493 UTC [endorser] EndorseWithPlugin -> DEBU 3075 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.493 UTC [msp.identity] Sign -> DEBU 3076 Sign: plaintext: 0A20EFCC11FE0B3CC76D1599E2889F7E...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:20.493 UTC [msp.identity] Sign -> DEBU 3077 Sign: digest: E3BA4759F793AFA02B25E29545094F90D26753B0A2ECAFE6DA0C2F48BB5B6C2B " +peer0.org1.example.com | "2019-09-24 01:05:20.494 UTC [endorser] EndorseWithPlugin -> DEBU 3078 Exiting {plugin: escc, channel: businesschannel, tx: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.494 UTC [endorser] endorseProposal -> DEBU 3079 [businesschannel][16316b13] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.494 UTC [lockbasedtxmgr] Done -> DEBU 307a Done with transaction simulation / query execution [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +peer0.org1.example.com | "2019-09-24 01:05:20.494 UTC [endorser] func1 -> DEBU 307b Exit: request from 172.18.0.5:49946" +peer0.org1.example.com | "2019-09-24 01:05:20.495 UTC [comm.grpc.server] 1 -> INFO 307c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49946 grpc.code=OK grpc.call_duration=15.2356ms +peer0.org1.example.com | "2019-09-24 01:05:20.497 UTC [grpc] warningf -> DEBU 307d transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49946: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:20.498 UTC [grpc] infof -> DEBU 307e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.498 UTC [grpc] infof -> DEBU 307f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.658 UTC [endorser] ProcessProposal -> DEBU 3080 Entering: request from 172.18.0.5:49950" +peer0.org1.example.com | "2019-09-24 01:05:20.658 UTC [protoutils] ValidateProposalMessage -> DEBU 3081 ValidateProposalMessage starts for signed proposal 0xc002aef680" +peer0.org1.example.com | "2019-09-24 01:05:20.658 UTC [protoutils] validateChannelHeader -> DEBU 3082 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:20.659 UTC [protoutils] checkSignatureFromCreator -> DEBU 3083 begin" +peer0.org1.example.com | "2019-09-24 01:05:20.659 UTC [msp] GetManagerForChain -> DEBU 3084 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:20.659 UTC [protoutils] checkSignatureFromCreator -> DEBU 3085 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:20.660 UTC [protoutils] checkSignatureFromCreator -> DEBU 3086 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:20.660 UTC [msp.identity] Verify -> DEBU 3087 Verify: digest = 00000000 25 96 67 53 0a 19 e6 68 7c 37 fc 1e 61 f5 9b d2 |%.gS...h|7..a...| +peer0.org1.example.com | 00000010 57 e8 53 fa 7f 5e 66 b8 ce e3 ec a3 13 a4 23 36 |W.S..^f.......#6|" +peer0.org1.example.com | "2019-09-24 01:05:20.660 UTC [msp.identity] Verify -> DEBU 3088 Verify: sig = 00000000 30 45 02 21 00 8d f2 97 dc 4f 98 52 02 51 81 97 |0E.!.....O.R.Q..| +peer0.org1.example.com | 00000010 31 12 2d 07 45 8a 26 3c 7d ca 16 06 66 f0 88 a0 |1.-.E.&<}...f...| +peer0.org1.example.com | 00000020 1b f3 44 7c 8b 02 20 14 2e 38 f2 7e 85 ed 0b 70 |..D|.. ..8.~...p| +peer0.org1.example.com | 00000030 16 26 58 fd ab e1 b6 f1 0a c8 f1 08 d2 10 ad f6 |.&X.............| +peer0.org1.example.com | 00000040 46 a7 e5 4e 45 37 e0 |F..NE7.|" +peer0.org1.example.com | "2019-09-24 01:05:20.661 UTC [protoutils] checkSignatureFromCreator -> DEBU 3089 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:20.661 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 308a validateChaincodeProposalMessage starts for proposal 0xc000244bd0, header 0xc002aefae0" +peer0.org1.example.com | "2019-09-24 01:05:20.661 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 308b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.662 UTC [endorser] preProcess -> DEBU 308c [businesschannel][ed81ee94] processing txid: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab" +peer0.org1.example.com | "2019-09-24 01:05:20.662 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 308d retrieveTransactionByID() - txId = [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +peer0.org1.example.com | "2019-09-24 01:05:20.662 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 308e constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:20.662 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 308f constructing new tx simulator txid = [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +peer0.org1.example.com | "2019-09-24 01:05:20.663 UTC [endorser] SimulateProposal -> DEBU 3090 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.663 UTC [endorser] callChaincode -> INFO 3091 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.664 UTC [chaincode] Execute -> DEBU 3092 Entry" +peer0.org1.example.com | "2019-09-24 01:05:20.664 UTC [aclmgmt] CheckACL -> DEBU 3093 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +peer0.org1.example.com | "2019-09-24 01:05:20.664 UTC [aclmgmt] CheckACL -> DEBU 3094 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3095 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3096 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:20.665 UTC [cauthdsl] func1 -> DEBU 3098 0xc003dda880 gate 1569287120665852600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 3099 0xc003dda880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 309a 0xc003dda880 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 309b 0xc003dda880 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.666 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 25 96 67 53 0a 19 e6 68 7c 37 fc 1e 61 f5 9b d2 |%.gS...h|7..a...| +peer0.org1.example.com | 00000010 57 e8 53 fa 7f 5e 66 b8 ce e3 ec a3 13 a4 23 36 |W.S..^f.......#6|" +peer0.org1.example.com | "2019-09-24 01:05:20.667 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 45 02 21 00 8d f2 97 dc 4f 98 52 02 51 81 97 |0E.!.....O.R.Q..| +peer0.org1.example.com | 00000010 31 12 2d 07 45 8a 26 3c 7d ca 16 06 66 f0 88 a0 |1.-.E.&<}...f...| +peer0.org1.example.com | 00000020 1b f3 44 7c 8b 02 20 14 2e 38 f2 7e 85 ed 0b 70 |..D|.. ..8.~...p| +peer0.org1.example.com | 00000030 16 26 58 fd ab e1 b6 f1 0a c8 f1 08 d2 10 ad f6 |.&X.............| +peer0.org1.example.com | 00000040 46 a7 e5 4e 45 37 e0 |F..NE7.|" +peer0.org1.example.com | "2019-09-24 01:05:20.667 UTC [cauthdsl] func2 -> DEBU 309e 0xc003dda880 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:20.667 UTC [cauthdsl] func1 -> DEBU 309f 0xc003dda880 gate 1569287120665852600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:20.667 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:20.668 UTC [chaincode] handleMessage -> DEBU 30a4 [ed81ee94] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.669 UTC [chaincode] HandleTransaction -> DEBU 30a5 [ed81ee94] handling GET_STATE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:20.669 UTC [chaincode] HandleGetState -> DEBU 30a6 [ed81ee94] getting state for chaincode lscc, key exp02, channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.670 UTC [stateleveldb] GetState -> DEBU 30a7 GetState(). ns=lscc, key=exp02" +peer0.org1.example.com | "2019-09-24 01:05:20.670 UTC [chaincode] HandleTransaction -> DEBU 30a8 [ed81ee94] Completed GET_STATE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:20.671 UTC [chaincode] handleMessage -> DEBU 30a9 [ed81ee94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.671 UTC [chaincode] Notify -> DEBU 30aa [ed81ee94] notifying Txid:ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.671 UTC [chaincode] Execute -> DEBU 30ab Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.671 UTC [endorser] callChaincode -> INFO 30ac [businesschannel][ed81ee94] Exit chaincode: name:"lscc" (8ms)" +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 30ad Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [lockbasedtxmgr] Done -> DEBU 30ae Done with transaction simulation / query execution [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [endorser] SimulateProposal -> DEBU 30af [businesschannel][ed81ee94] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [endorser] endorseProposal -> DEBU 30b0 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [endorser] endorseProposal -> DEBU 30b1 [businesschannel][ed81ee94] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:20.672 UTC [endorser] EndorseWithPlugin -> DEBU 30b2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.673 UTC [msp.identity] Sign -> DEBU 30b3 Sign: plaintext: 0A20A31DD82FD6C5645C384F7B126293...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:20.673 UTC [msp.identity] Sign -> DEBU 30b4 Sign: digest: EBAA872D3F2FD8E72CF24B01155D15B33669267008AA4CCB1A0D6E48AEB0C0C5 " +peer0.org1.example.com | "2019-09-24 01:05:20.673 UTC [endorser] EndorseWithPlugin -> DEBU 30b5 Exiting {plugin: escc, channel: businesschannel, tx: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.673 UTC [endorser] endorseProposal -> DEBU 30b6 [businesschannel][ed81ee94] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.673 UTC [lockbasedtxmgr] Done -> DEBU 30b7 Done with transaction simulation / query execution [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +peer0.org1.example.com | "2019-09-24 01:05:20.674 UTC [endorser] func1 -> DEBU 30b8 Exit: request from 172.18.0.5:49950" +peer0.org1.example.com | "2019-09-24 01:05:20.674 UTC [comm.grpc.server] 1 -> INFO 30b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49950 grpc.code=OK grpc.call_duration=16.2876ms +peer0.org1.example.com | "2019-09-24 01:05:20.683 UTC [grpc] infof -> DEBU 30ba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.683 UTC [grpc] infof -> DEBU 30bb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [endorser] ProcessProposal -> DEBU 30bc Entering: request from 172.18.0.5:49954" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [protoutils] ValidateProposalMessage -> DEBU 30bd ValidateProposalMessage starts for signed proposal 0xc002a7a4b0" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [protoutils] validateChannelHeader -> DEBU 30be validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 30bf begin" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [msp] GetManagerForChain -> DEBU 30c0 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:20.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c1 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:20.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c2 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:20.862 UTC [msp.identity] Verify -> DEBU 30c3 Verify: digest = 00000000 bd ce cf 31 4d be 2b 1b 24 33 ae d2 4a cd 6f 97 |...1M.+.$3..J.o.| +peer0.org1.example.com | 00000010 14 c6 a5 b9 7b e5 63 6b da 54 13 b9 7f b0 c1 42 |....{.ck.T.....B|" +peer0.org1.example.com | "2019-09-24 01:05:20.862 UTC [msp.identity] Verify -> DEBU 30c4 Verify: sig = 00000000 30 44 02 20 3a a7 8b 0f f6 bb d0 19 2f fc 2b ae |0D. :......./.+.| +peer0.org1.example.com | 00000010 8d 26 3b bb 86 b0 76 cc 75 79 ad f8 f3 2e 6b 49 |.&;...v.uy....kI| +peer0.org1.example.com | 00000020 af b3 08 9d 02 20 2e f3 33 f3 b4 81 34 8f b2 2f |..... ..3...4../| +peer0.org1.example.com | 00000030 e1 2d 87 6a c4 63 c3 f6 52 77 a7 d5 a5 e9 25 9e |.-.j.c..Rw....%.| +peer0.org1.example.com | 00000040 1e cb 2f 70 d1 c7 |../p..|" +peer0.org1.example.com | "2019-09-24 01:05:20.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c5 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:20.863 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30c6 validateChaincodeProposalMessage starts for proposal 0xc0002451f0, header 0xc002a7a8c0" +peer0.org1.example.com | "2019-09-24 01:05:20.863 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30c7 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.863 UTC [endorser] preProcess -> DEBU 30c8 [businesschannel][f9c24047] processing txid: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf" +peer0.org1.example.com | "2019-09-24 01:05:20.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30c9 retrieveTransactionByID() - txId = [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +peer0.org1.example.com | "2019-09-24 01:05:20.864 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30ca constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:20.864 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30cb constructing new tx simulator txid = [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +peer0.org1.example.com | "2019-09-24 01:05:20.864 UTC [endorser] SimulateProposal -> DEBU 30cc [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.864 UTC [endorser] callChaincode -> INFO 30cd [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.865 UTC [chaincode] Execute -> DEBU 30ce Entry" +peer0.org1.example.com | "2019-09-24 01:05:20.865 UTC [msp.identity] Verify -> DEBU 30cf Verify: digest = 00000000 bd ce cf 31 4d be 2b 1b 24 33 ae d2 4a cd 6f 97 |...1M.+.$3..J.o.| +peer0.org1.example.com | 00000010 14 c6 a5 b9 7b e5 63 6b da 54 13 b9 7f b0 c1 42 |....{.ck.T.....B|" +peer0.org1.example.com | "2019-09-24 01:05:20.865 UTC [msp.identity] Verify -> DEBU 30d0 Verify: sig = 00000000 30 44 02 20 3a a7 8b 0f f6 bb d0 19 2f fc 2b ae |0D. :......./.+.| +peer0.org1.example.com | 00000010 8d 26 3b bb 86 b0 76 cc 75 79 ad f8 f3 2e 6b 49 |.&;...v.uy....kI| +peer0.org1.example.com | 00000020 af b3 08 9d 02 20 2e f3 33 f3 b4 81 34 8f b2 2f |..... ..3...4../| +peer0.org1.example.com | 00000030 e1 2d 87 6a c4 63 c3 f6 52 77 a7 d5 a5 e9 25 9e |.-.j.c..Rw....%.| +peer0.org1.example.com | 00000040 1e cb 2f 70 d1 c7 |../p..|" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [chaincode] handleMessage -> DEBU 30d1 [f9c24047] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [chaincode] Notify -> DEBU 30d2 [f9c24047] notifying Txid:f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [chaincode] Execute -> DEBU 30d3 Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [endorser] callChaincode -> INFO 30d4 [businesschannel][f9c24047] Exit chaincode: name:"lscc" (2ms)" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 30d5 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:20.867 UTC [lockbasedtxmgr] Done -> DEBU 30d6 Done with transaction simulation / query execution [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +peer0.org1.example.com | "2019-09-24 01:05:20.868 UTC [endorser] SimulateProposal -> DEBU 30d7 [businesschannel][f9c24047] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.868 UTC [endorser] endorseProposal -> DEBU 30d8 [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:20.868 UTC [endorser] endorseProposal -> DEBU 30d9 [businesschannel][f9c24047] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:20.869 UTC [endorser] EndorseWithPlugin -> DEBU 30da Entering endorsement for {plugin: escc, channel: businesschannel, tx: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.869 UTC [msp.identity] Sign -> DEBU 30db Sign: plaintext: 0A209F91F8F8AA9A4C4625650E37F83E...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:20.869 UTC [msp.identity] Sign -> DEBU 30dc Sign: digest: 1D7D464611905C91C1A144674B60248BF5D2C2F1699723E77BDE442C2E37A1A6 " +peer0.org1.example.com | "2019-09-24 01:05:20.870 UTC [endorser] EndorseWithPlugin -> DEBU 30dd Exiting {plugin: escc, channel: businesschannel, tx: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:20.870 UTC [endorser] endorseProposal -> DEBU 30de [businesschannel][f9c24047] Exit" +peer0.org1.example.com | "2019-09-24 01:05:20.870 UTC [lockbasedtxmgr] Done -> DEBU 30df Done with transaction simulation / query execution [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +peer0.org1.example.com | "2019-09-24 01:05:20.871 UTC [endorser] func1 -> DEBU 30e0 Exit: request from 172.18.0.5:49954" +peer0.org1.example.com | "2019-09-24 01:05:20.871 UTC [comm.grpc.server] 1 -> INFO 30e1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49954 grpc.code=OK grpc.call_duration=10.5897ms +peer0.org1.example.com | "2019-09-24 01:05:20.875 UTC [grpc] infof -> DEBU 30e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:20.875 UTC [grpc] infof -> DEBU 30e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.034 UTC [endorser] ProcessProposal -> DEBU 30e4 Entering: request from 172.18.0.5:49958" +peer0.org1.example.com | "2019-09-24 01:05:21.034 UTC [protoutils] ValidateProposalMessage -> DEBU 30e5 ValidateProposalMessage starts for signed proposal 0xc002a7bea0" +peer0.org1.example.com | "2019-09-24 01:05:21.034 UTC [protoutils] validateChannelHeader -> DEBU 30e6 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:21.034 UTC [protoutils] checkSignatureFromCreator -> DEBU 30e7 begin" +peer0.org1.example.com | "2019-09-24 01:05:21.034 UTC [msp] GetManagerForChain -> DEBU 30e8 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:21.035 UTC [protoutils] checkSignatureFromCreator -> DEBU 30e9 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:21.035 UTC [protoutils] checkSignatureFromCreator -> DEBU 30ea creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:21.035 UTC [msp.identity] Verify -> DEBU 30eb Verify: digest = 00000000 06 66 21 92 72 42 8d 11 a4 46 6e 00 45 af 32 54 |.f!.rB...Fn.E.2T| +peer0.org1.example.com | 00000010 55 e5 07 20 ee 0e c9 a9 a2 3c 88 c8 86 e8 7c f5 |U.. .....<....|.|" +peer0.org1.example.com | "2019-09-24 01:05:21.035 UTC [msp.identity] Verify -> DEBU 30ec Verify: sig = 00000000 30 45 02 21 00 f1 93 be 07 32 67 fe 6c 91 20 6a |0E.!.....2g.l. j| +peer0.org1.example.com | 00000010 1b ff 6a 1d f1 a0 7d 6e ec 3d 2c 66 e3 4c 14 2b |..j...}n.=,f.L.+| +peer0.org1.example.com | 00000020 97 06 f0 e5 35 02 20 4e 58 f1 87 f1 f5 1b d7 45 |....5. NX......E| +peer0.org1.example.com | 00000030 63 a6 65 d0 d1 40 46 15 72 ca 26 88 10 bc 6a 65 |c.e..@F.r.&...je| +peer0.org1.example.com | 00000040 0b 15 5f 96 f7 b4 d4 |.._....|" +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [protoutils] checkSignatureFromCreator -> DEBU 30ed exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30ee validateChaincodeProposalMessage starts for proposal 0xc0001f20e0, header 0xc003c742d0" +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30ef validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [endorser] preProcess -> DEBU 30f0 [businesschannel][f531e761] processing txid: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4" +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30f1 retrieveTransactionByID() - txId = [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +peer0.org1.example.com | "2019-09-24 01:05:21.036 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30f2 constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:21.037 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30f3 constructing new tx simulator txid = [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +peer0.org1.example.com | "2019-09-24 01:05:21.037 UTC [endorser] SimulateProposal -> DEBU 30f4 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.037 UTC [endorser] callChaincode -> INFO 30f5 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.038 UTC [chaincode] Execute -> DEBU 30f6 Entry" +peer0.org1.example.com | "2019-09-24 01:05:21.039 UTC [aclmgmt] CheckACL -> DEBU 30f7 acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +peer0.org1.example.com | "2019-09-24 01:05:21.039 UTC [aclmgmt] CheckACL -> DEBU 30f8 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:21.039 UTC [policies] Evaluate -> DEBU 30f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.040 UTC [policies] Evaluate -> DEBU 30fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.040 UTC [policies] Evaluate -> DEBU 30fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.040 UTC [cauthdsl] func1 -> DEBU 30fc 0xc0037726a0 gate 1569287121040274500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.040 UTC [cauthdsl] func2 -> DEBU 30fd 0xc0037726a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.041 UTC [cauthdsl] func2 -> DEBU 30fe 0xc0037726a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.041 UTC [cauthdsl] func2 -> DEBU 30ff 0xc0037726a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.041 UTC [msp.identity] Verify -> DEBU 3100 Verify: digest = 00000000 06 66 21 92 72 42 8d 11 a4 46 6e 00 45 af 32 54 |.f!.rB...Fn.E.2T| +peer0.org1.example.com | 00000010 55 e5 07 20 ee 0e c9 a9 a2 3c 88 c8 86 e8 7c f5 |U.. .....<....|.|" +peer0.org1.example.com | "2019-09-24 01:05:21.041 UTC [msp.identity] Verify -> DEBU 3101 Verify: sig = 00000000 30 45 02 21 00 f1 93 be 07 32 67 fe 6c 91 20 6a |0E.!.....2g.l. j| +peer0.org1.example.com | 00000010 1b ff 6a 1d f1 a0 7d 6e ec 3d 2c 66 e3 4c 14 2b |..j...}n.=,f.L.+| +peer0.org1.example.com | 00000020 97 06 f0 e5 35 02 20 4e 58 f1 87 f1 f5 1b d7 45 |....5. NX......E| +peer0.org1.example.com | 00000030 63 a6 65 d0 d1 40 46 15 72 ca 26 88 10 bc 6a 65 |c.e..@F.r.&...je| +peer0.org1.example.com | 00000040 0b 15 5f 96 f7 b4 d4 |.._....|" +peer0.org1.example.com | "2019-09-24 01:05:21.042 UTC [cauthdsl] func2 -> DEBU 3102 0xc0037726a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.042 UTC [cauthdsl] func1 -> DEBU 3103 0xc0037726a0 gate 1569287121040274500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.042 UTC [policies] Evaluate -> DEBU 3104 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.042 UTC [policies] Evaluate -> DEBU 3105 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.043 UTC [policies] Evaluate -> DEBU 3106 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.043 UTC [policies] Evaluate -> DEBU 3107 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.043 UTC [chaincode] handleMessage -> DEBU 3108 [f531e761] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:21.043 UTC [chaincode] HandleTransaction -> DEBU 3109 [f531e761] handling GET_STATE_BY_RANGE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:21.044 UTC [leveldbhelper] GetIterator -> DEBU 310a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +peer0.org1.example.com | "2019-09-24 01:05:21.044 UTC [rwsetutil] AddResult -> DEBU 310b Adding a result" +peer0.org1.example.com | "2019-09-24 01:05:21.045 UTC [chaincode] HandleGetStateByRange -> DEBU 310c Got keys and values. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:21.045 UTC [chaincode] HandleTransaction -> DEBU 310d [f531e761] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:21.045 UTC [chaincode] handleMessage -> DEBU 310e [f531e761] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +peer0.org1.example.com | "2019-09-24 01:05:21.046 UTC [chaincode] HandleTransaction -> DEBU 310f [f531e761] handling QUERY_STATE_CLOSE from chaincode" +peer0.org1.example.com | "2019-09-24 01:05:21.046 UTC [chaincode] HandleTransaction -> DEBU 3110 [f531e761] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +peer0.org1.example.com | "2019-09-24 01:05:21.047 UTC [chaincode] handleMessage -> DEBU 3111 [f531e761] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:21.047 UTC [chaincode] Notify -> DEBU 3112 [f531e761] notifying Txid:f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:21.047 UTC [chaincode] Execute -> DEBU 3113 Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.047 UTC [endorser] callChaincode -> INFO 3114 [businesschannel][f531e761] Exit chaincode: name:"lscc" (9ms)" +peer0.org1.example.com | "2019-09-24 01:05:21.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3115 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:21.048 UTC [lockbasedtxmgr] Done -> DEBU 3116 Done with transaction simulation / query execution [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +peer0.org1.example.com | "2019-09-24 01:05:21.048 UTC [endorser] SimulateProposal -> DEBU 3117 [businesschannel][f531e761] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.048 UTC [endorser] endorseProposal -> DEBU 3118 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.048 UTC [endorser] endorseProposal -> DEBU 3119 [businesschannel][f531e761] escc for chaincode name:"lscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:21.048 UTC [endorser] EndorseWithPlugin -> DEBU 311a Entering endorsement for {plugin: escc, channel: businesschannel, tx: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [msp.identity] Sign -> DEBU 311b Sign: plaintext: 0A205E9BE16E661D4992DC3F00B99BAD...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [msp.identity] Sign -> DEBU 311c Sign: digest: F8BE741690E206D157694824EF2A7C56D820360B1127992025E5FBC2DE57DB81 " +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [endorser] EndorseWithPlugin -> DEBU 311d Exiting {plugin: escc, channel: businesschannel, tx: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, chaincode: lscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [endorser] endorseProposal -> DEBU 311e [businesschannel][f531e761] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [lockbasedtxmgr] Done -> DEBU 311f Done with transaction simulation / query execution [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [endorser] func1 -> DEBU 3120 Exit: request from 172.18.0.5:49958" +peer0.org1.example.com | "2019-09-24 01:05:21.049 UTC [comm.grpc.server] 1 -> INFO 3121 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49958 grpc.code=OK grpc.call_duration=15.8854ms +peer0.org1.example.com | "2019-09-24 01:05:21.052 UTC [grpc] warningf -> DEBU 3122 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49958: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:21.052 UTC [grpc] infof -> DEBU 3123 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.052 UTC [grpc] infof -> DEBU 3124 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [endorser] ProcessProposal -> DEBU 3125 Entering: request from 172.18.0.5:49962" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [protoutils] ValidateProposalMessage -> DEBU 3126 ValidateProposalMessage starts for signed proposal 0xc003d0a0a0" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [protoutils] validateChannelHeader -> DEBU 3127 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [protoutils] checkSignatureFromCreator -> DEBU 3128 begin" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [msp] GetManagerForChain -> DEBU 3129 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:21.457 UTC [protoutils] checkSignatureFromCreator -> DEBU 312a creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:21.458 UTC [protoutils] checkSignatureFromCreator -> DEBU 312b creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:21.458 UTC [msp.identity] Verify -> DEBU 312c Verify: digest = 00000000 12 32 f2 d5 01 ff 83 68 a9 b3 1f 9f 17 e9 0e 30 |.2.....h.......0| +peer0.org1.example.com | 00000010 8f 68 f3 49 d5 d8 18 27 58 27 6e 36 fc 19 2a 27 |.h.I...'X'n6..*'|" +peer0.org1.example.com | "2019-09-24 01:05:21.458 UTC [msp.identity] Verify -> DEBU 312d Verify: sig = 00000000 30 45 02 21 00 89 c6 c2 00 ca 7b 1e aa d9 5c 48 |0E.!......{...\H| +peer0.org1.example.com | 00000010 79 fa 1d 25 70 c5 7a 88 50 05 7c 71 03 8e 68 30 |y..%p.z.P.|q..h0| +peer0.org1.example.com | 00000020 39 23 90 e3 8e 02 20 1b ae 6f 99 9c 65 e7 6a be |9#.... ..o..e.j.| +peer0.org1.example.com | 00000030 ce b0 8c 90 72 2f 6f b3 61 fe ef c8 2d 2a 56 c7 |....r/o.a...-*V.| +peer0.org1.example.com | 00000040 44 b4 07 af 1f 04 6b |D.....k|" +peer0.org1.example.com | "2019-09-24 01:05:21.458 UTC [protoutils] checkSignatureFromCreator -> DEBU 312e exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:21.458 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 312f validateChaincodeProposalMessage starts for proposal 0xc00012bf80, header 0xc003d0a500" +peer0.org1.example.com | "2019-09-24 01:05:21.459 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3130 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.459 UTC [endorser] preProcess -> DEBU 3131 [businesschannel][87e9c255] processing txid: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54" +peer0.org1.example.com | "2019-09-24 01:05:21.459 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3132 retrieveTransactionByID() - txId = [87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54]" +peer0.org1.example.com | "2019-09-24 01:05:21.460 UTC [endorser] SimulateProposal -> DEBU 3133 [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.460 UTC [endorser] callChaincode -> INFO 3134 [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.460 UTC [chaincode] Execute -> DEBU 3135 Entry" +peer0.org1.example.com | "2019-09-24 01:05:21.460 UTC [qscc] Invoke -> DEBU 3136 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [aclmgmt] CheckACL -> DEBU 3137 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [aclmgmt] CheckACL -> DEBU 3138 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 3139 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 313a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 313b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [cauthdsl] func1 -> DEBU 313c 0xc0031d6680 gate 1569287121461668100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [cauthdsl] func2 -> DEBU 313d 0xc0031d6680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.461 UTC [cauthdsl] func2 -> DEBU 313e 0xc0031d6680 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [cauthdsl] func2 -> DEBU 313f 0xc0031d6680 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [msp.identity] Verify -> DEBU 3140 Verify: digest = 00000000 12 32 f2 d5 01 ff 83 68 a9 b3 1f 9f 17 e9 0e 30 |.2.....h.......0| +peer0.org1.example.com | 00000010 8f 68 f3 49 d5 d8 18 27 58 27 6e 36 fc 19 2a 27 |.h.I...'X'n6..*'|" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [msp.identity] Verify -> DEBU 3141 Verify: sig = 00000000 30 45 02 21 00 89 c6 c2 00 ca 7b 1e aa d9 5c 48 |0E.!......{...\H| +peer0.org1.example.com | 00000010 79 fa 1d 25 70 c5 7a 88 50 05 7c 71 03 8e 68 30 |y..%p.z.P.|q..h0| +peer0.org1.example.com | 00000020 39 23 90 e3 8e 02 20 1b ae 6f 99 9c 65 e7 6a be |9#.... ..o..e.j.| +peer0.org1.example.com | 00000030 ce b0 8c 90 72 2f 6f b3 61 fe ef c8 2d 2a 56 c7 |....r/o.a...-*V.| +peer0.org1.example.com | 00000040 44 b4 07 af 1f 04 6b |D.....k|" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [cauthdsl] func2 -> DEBU 3142 0xc0031d6680 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [cauthdsl] func1 -> DEBU 3143 0xc0031d6680 gate 1569287121461668100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [policies] Evaluate -> DEBU 3144 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.462 UTC [policies] Evaluate -> DEBU 3145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [policies] Evaluate -> DEBU 3146 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [policies] Evaluate -> DEBU 3147 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [chaincode] handleMessage -> DEBU 3148 [87e9c255] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [chaincode] Notify -> DEBU 3149 [87e9c255] notifying Txid:87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [chaincode] Execute -> DEBU 314a Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.463 UTC [endorser] callChaincode -> INFO 314b [businesschannel][87e9c255] Exit chaincode: name:"qscc" (3ms)" +peer0.org1.example.com | "2019-09-24 01:05:21.464 UTC [endorser] SimulateProposal -> DEBU 314c [businesschannel][87e9c255] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.464 UTC [endorser] endorseProposal -> DEBU 314d [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.464 UTC [endorser] endorseProposal -> DEBU 314e [businesschannel][87e9c255] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [endorser] EndorseWithPlugin -> DEBU 314f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [msp.identity] Sign -> DEBU 3150 Sign: plaintext: 0A20EE526719A97B935F8DAA6899BCB2...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [msp.identity] Sign -> DEBU 3151 Sign: digest: A102E2B21030BE17848A1423DBDDD04C7AFBA9D107FFCD4216DF820F20EF3AD0 " +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [endorser] EndorseWithPlugin -> DEBU 3152 Exiting {plugin: escc, channel: businesschannel, tx: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [endorser] endorseProposal -> DEBU 3153 [businesschannel][87e9c255] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.465 UTC [endorser] func1 -> DEBU 3154 Exit: request from 172.18.0.5:49962" +peer0.org1.example.com | "2019-09-24 01:05:21.466 UTC [comm.grpc.server] 1 -> INFO 3155 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49962 grpc.code=OK grpc.call_duration=9.4879ms +peer0.org1.example.com | "2019-09-24 01:05:21.469 UTC [grpc] infof -> DEBU 3156 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.469 UTC [grpc] infof -> DEBU 3157 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.641 UTC [endorser] ProcessProposal -> DEBU 3158 Entering: request from 172.18.0.5:49966" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] ValidateProposalMessage -> DEBU 3159 ValidateProposalMessage starts for signed proposal 0xc002b6af50" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] validateChannelHeader -> DEBU 315a validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315b begin" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [msp] GetManagerForChain -> DEBU 315c Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315d creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315e creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 72 e2 b8 d1 97 b2 b0 34 8c 64 21 88 0b 8d ab de |r......4.d!.....| +peer0.org1.example.com | 00000010 0e 9a cf 4c 33 f6 34 19 8b 75 78 3d ae 6e f3 e5 |...L3.4..ux=.n..|" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 45 02 21 00 d9 cc a7 a9 74 31 bb e2 33 0c 8e |0E.!.....t1..3..| +peer0.org1.example.com | 00000010 d8 54 74 c6 1b 2c ca a6 15 a9 49 df c2 15 10 d8 |.Tt..,....I.....| +peer0.org1.example.com | 00000020 63 7f cd b3 7e 02 20 6a ed e4 f6 8b 4a af b0 c8 |c...~. j....J...| +peer0.org1.example.com | 00000030 16 d5 02 ca 3c 8d 9e 6b 71 7d 2c ef a2 83 cb ae |....<..kq},.....| +peer0.org1.example.com | 00000040 00 7a 17 0e 0a c8 76 |.z....v|" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 3161 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3162 validateChaincodeProposalMessage starts for proposal 0xc0001695e0, header 0xc002b6b3b0" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3163 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [endorser] preProcess -> DEBU 3164 [businesschannel][2a941883] processing txid: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3165 retrieveTransactionByID() - txId = [2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e]" +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [endorser] SimulateProposal -> DEBU 3166 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.642 UTC [endorser] callChaincode -> INFO 3167 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [chaincode] Execute -> DEBU 3168 Entry" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [qscc] Invoke -> DEBU 3169 Invoke function: GetBlockByNumber on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [aclmgmt] CheckACL -> DEBU 316a acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [aclmgmt] CheckACL -> DEBU 316b acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func1 -> DEBU 316f 0xc0039f6810 gate 1569287121643448100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3170 0xc0039f6810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3171 0xc0039f6810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3172 0xc0039f6810 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [msp.identity] Verify -> DEBU 3173 Verify: digest = 00000000 72 e2 b8 d1 97 b2 b0 34 8c 64 21 88 0b 8d ab de |r......4.d!.....| +peer0.org1.example.com | 00000010 0e 9a cf 4c 33 f6 34 19 8b 75 78 3d ae 6e f3 e5 |...L3.4..ux=.n..|" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [msp.identity] Verify -> DEBU 3174 Verify: sig = 00000000 30 45 02 21 00 d9 cc a7 a9 74 31 bb e2 33 0c 8e |0E.!.....t1..3..| +peer0.org1.example.com | 00000010 d8 54 74 c6 1b 2c ca a6 15 a9 49 df c2 15 10 d8 |.Tt..,....I.....| +peer0.org1.example.com | 00000020 63 7f cd b3 7e 02 20 6a ed e4 f6 8b 4a af b0 c8 |c...~. j....J...| +peer0.org1.example.com | 00000030 16 d5 02 ca 3c 8d 9e 6b 71 7d 2c ef a2 83 cb ae |....<..kq},.....| +peer0.org1.example.com | 00000040 00 7a 17 0e 0a c8 76 |.z....v|" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3175 0xc0039f6810 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [cauthdsl] func1 -> DEBU 3176 0xc0039f6810 gate 1569287121643448100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 3177 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 3178 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [policies] Evaluate -> DEBU 3179 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [policies] Evaluate -> DEBU 317a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 317b retrieveBlockByNumber() - blockNum = [2]" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [fsblkstorage] newBlockfileStream -> DEBU 317c newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[51321]" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 317d Remaining bytes=[38117], Going to peek [8] bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 317e Returning blockbytes - length=[25515], placementInfo={fileNum=[0], startOffset=[51321], bytesOffset=[51324]}" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [chaincode] handleMessage -> DEBU 317f [2a941883] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [chaincode] Notify -> DEBU 3180 [2a941883] notifying Txid:2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [chaincode] Execute -> DEBU 3181 Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [endorser] callChaincode -> INFO 3182 [businesschannel][2a941883] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [endorser] SimulateProposal -> DEBU 3183 [businesschannel][2a941883] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [endorser] endorseProposal -> DEBU 3184 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [endorser] endorseProposal -> DEBU 3185 [businesschannel][2a941883] escc for chaincode name:"qscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [endorser] EndorseWithPlugin -> DEBU 3186 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [msp.identity] Sign -> DEBU 3187 Sign: plaintext: 0A203C3FF634082C0951010D7F6334EE...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:21.644 UTC [msp.identity] Sign -> DEBU 3188 Sign: digest: 6676A3005D0CB765F3D06BE35780B1DCD18CB1251042E9C09CA225967D1AE2FD " +peer0.org1.example.com | "2019-09-24 01:05:21.645 UTC [endorser] EndorseWithPlugin -> DEBU 3189 Exiting {plugin: escc, channel: businesschannel, tx: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, chaincode: qscc}" +peer0.org1.example.com | "2019-09-24 01:05:21.645 UTC [endorser] endorseProposal -> DEBU 318a [businesschannel][2a941883] Exit" +peer0.org1.example.com | "2019-09-24 01:05:21.645 UTC [endorser] func1 -> DEBU 318b Exit: request from 172.18.0.5:49966" +peer0.org1.example.com | "2019-09-24 01:05:21.645 UTC [comm.grpc.server] 1 -> INFO 318c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49966 grpc.code=OK grpc.call_duration=4.2149ms +peer0.org1.example.com | "2019-09-24 01:05:21.655 UTC [grpc] infof -> DEBU 318d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.655 UTC [msp] DeserializeIdentity -> DEBU 318e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.655 UTC [msp] DeserializeIdentity -> DEBU 318f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.656 UTC [gossip.comm] Send -> DEBU 3190 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3191 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3192 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3193 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3194 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.658 UTC [gossip.comm] func1 -> DEBU 3195 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.658 UTC [gossip.gossip] handleMessage -> DEBU 3196 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.658 UTC [msp] DeserializeIdentity -> DEBU 3197 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 3198 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +peer0.org1.example.com | 00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +peer0.org1.example.com | "2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 3199 Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +peer0.org1.example.com | 00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +peer0.org1.example.com | 00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +peer0.org1.example.com | 00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +peer0.org1.example.com | 00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +peer0.org1.example.com | "2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 319a Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:21.660 UTC [msp.identity] Verify -> DEBU 319b Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:21.660 UTC [msp] DeserializeIdentity -> DEBU 319c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [msp] DeserializeIdentity -> DEBU 319d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 319e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 319f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31a0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.661 UTC [cauthdsl] func1 -> DEBU 31a4 0xc0037ea870 gate 1569287121661916200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a5 0xc0037ea870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a6 0xc0037ea870 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a7 0xc0037ea870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a8 0xc0037ea870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func1 -> DEBU 31a9 0xc0037ea870 gate 1569287121661916200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.662 UTC [cauthdsl] func1 -> DEBU 31ad 0xc0037eb0b0 gate 1569287121662933700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31ae 0xc0037eb0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31af 0xc0037eb0b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31b0 0xc0037eb0b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.663 UTC [msp.identity] Verify -> DEBU 31b1 Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:21.663 UTC [msp.identity] Verify -> DEBU 31b2 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:21.664 UTC [cauthdsl] func2 -> DEBU 31b3 0xc0037eb0b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.664 UTC [cauthdsl] func1 -> DEBU 31b4 0xc0037eb0b0 gate 1569287121662933700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.664 UTC [policies] Evaluate -> DEBU 31b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.664 UTC [policies] Evaluate -> DEBU 31b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.665 UTC [policies] Evaluate -> DEBU 31b7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.665 UTC [policies] Evaluate -> DEBU 31b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.665 UTC [msp] DeserializeIdentity -> DEBU 31b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.665 UTC [msp] DeserializeIdentity -> DEBU 31ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31bc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31bd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.666 UTC [policies] Evaluate -> DEBU 31be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.666 UTC [policies] Evaluate -> DEBU 31bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.667 UTC [policies] Evaluate -> DEBU 31c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.667 UTC [cauthdsl] func1 -> DEBU 31c1 0xc0030d8880 gate 1569287121667510700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.667 UTC [cauthdsl] func2 -> DEBU 31c2 0xc0030d8880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c3 0xc0030d8880 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c4 0xc0030d8880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c5 0xc0030d8880 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.668 UTC [cauthdsl] func1 -> DEBU 31c6 0xc0030d8880 gate 1569287121667510700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.668 UTC [policies] Evaluate -> DEBU 31c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.669 UTC [policies] Evaluate -> DEBU 31c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.670 UTC [msp] DeserializeIdentity -> DEBU 31c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.670 UTC [msp] DeserializeIdentity -> DEBU 31ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.672 UTC [gossip.comm] Send -> DEBU 31cb Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:21.672 UTC [msp] DeserializeIdentity -> DEBU 31cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.672 UTC [msp] DeserializeIdentity -> DEBU 31cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.673 UTC [gossip.comm] sendToEndpoint -> DEBU 31ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.673 UTC [gossip.comm] sendToEndpoint -> DEBU 31cf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.669 UTC [policies] Evaluate -> DEBU 31d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.674 UTC [cauthdsl] func1 -> DEBU 31d4 0xc0030d90d0 gate 1569287121674866500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.675 UTC [gossip.comm] sendToEndpoint -> DEBU 31d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.686 UTC [gossip.comm] func1 -> DEBU 31d7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.675 UTC [grpc] infof -> DEBU 31d8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:21.674 UTC [cauthdsl] func2 -> DEBU 31d6 0xc0030d90d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.687 UTC [gossip.comm] sendToEndpoint -> DEBU 31d9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.687 UTC [gossip.comm] sendToEndpoint -> DEBU 31da Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.690 UTC [gossip.comm] func1 -> DEBU 31db Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.687 UTC [cauthdsl] func2 -> DEBU 31dc 0xc0030d90d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.695 UTC [cauthdsl] func2 -> DEBU 31dd 0xc0030d90d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.695 UTC [msp.identity] Verify -> DEBU 31de Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [msp.identity] Verify -> DEBU 31df Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [cauthdsl] func2 -> DEBU 31e0 0xc0030d90d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [cauthdsl] func1 -> DEBU 31e1 0xc0030d90d0 gate 1569287121674866500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.696 UTC [msp] DeserializeIdentity -> DEBU 31e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31e7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31e8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [cauthdsl] func1 -> DEBU 31ec 0xc003c363f0 gate 1569287121697277500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ed 0xc003c363f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ee 0xc003c363f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ef 0xc003c363f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31f0 0xc003c363f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.698 UTC [cauthdsl] func1 -> DEBU 31f1 0xc003c363f0 gate 1569287121697277500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.698 UTC [cauthdsl] func1 -> DEBU 31f5 0xc003c36c30 gate 1569287121698893700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f6 0xc003c36c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f7 0xc003c36c30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f8 0xc003c36c30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.699 UTC [msp.identity] Verify -> DEBU 31f9 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:21.704 UTC [msp.identity] Verify -> DEBU 31fa Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:21.705 UTC [cauthdsl] func2 -> DEBU 31fb 0xc003c36c30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.705 UTC [cauthdsl] func1 -> DEBU 31fc 0xc003c36c30 gate 1569287121698893700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31ff Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [policies] Evaluate -> DEBU 3200 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [gossip.gossip] handleMessage -> DEBU 3201 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [gossip.gossip] handleMessage -> DEBU 3202 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [msp] DeserializeIdentity -> DEBU 3203 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [msp.identity] Verify -> DEBU 3204 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +peer0.org1.example.com | 00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +peer0.org1.example.com | "2019-09-24 01:05:21.706 UTC [msp.identity] Verify -> DEBU 3205 Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +peer0.org1.example.com | 00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +peer0.org1.example.com | 00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +peer0.org1.example.com | 00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +peer0.org1.example.com | 00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +peer0.org1.example.com | "2019-09-24 01:05:21.707 UTC [msp.identity] Verify -> DEBU 3206 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +peer0.org1.example.com | 00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +peer0.org1.example.com | "2019-09-24 01:05:21.707 UTC [msp.identity] Verify -> DEBU 3207 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +peer0.org1.example.com | 00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +peer0.org1.example.com | 00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +peer0.org1.example.com | 00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +peer0.org1.example.com | 00000040 ac 07 e5 a5 67 22 a6 |....g".|" +peer0.org1.example.com | "2019-09-24 01:05:21.707 UTC [msp] DeserializeIdentity -> DEBU 3208 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [msp] DeserializeIdentity -> DEBU 3209 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [policies] Evaluate -> DEBU 320d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.708 UTC [policies] Evaluate -> DEBU 320e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 320f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3210 0xc003c49580 gate 1569287121709074800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3211 0xc003c49580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3212 0xc003c49580 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3213 0xc003c49580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3214 0xc003c49580 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3215 0xc003c49580 gate 1569287121709074800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3216 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3217 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3219 0xc003c49dc0 gate 1569287121709726200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321a 0xc003c49dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321b 0xc003c49dc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321c 0xc003c49dc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [msp.identity] Verify -> DEBU 321d Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +peer0.org1.example.com | 00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +peer0.org1.example.com | "2019-09-24 01:05:21.709 UTC [msp.identity] Verify -> DEBU 321e Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +peer0.org1.example.com | 00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +peer0.org1.example.com | 00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +peer0.org1.example.com | 00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +peer0.org1.example.com | 00000040 b6 66 27 b7 81 6b |.f'..k|" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [cauthdsl] func2 -> DEBU 321f 0xc003c49dc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [cauthdsl] func1 -> DEBU 3220 0xc003c49dc0 gate 1569287121709726200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3221 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3222 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [msp] DeserializeIdentity -> DEBU 3226 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3227 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3228 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3229 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 322a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 322b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 322c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 322d 0xc003ab9590 gate 1569287121711087600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 322e 0xc003ab9590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 322f 0xc003ab9590 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3230 0xc003ab9590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3231 0xc003ab9590 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 3232 0xc003ab9590 gate 1569287121711087600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3233 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3234 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3235 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 3236 0xc003ab9dd0 gate 1569287121711509200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3237 0xc003ab9dd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3238 0xc003ab9dd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3239 0xc003ab9dd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [msp.identity] Verify -> DEBU 323a Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [msp.identity] Verify -> DEBU 323b Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 323c 0xc003ab9dd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 323d 0xc003ab9dd0 gate 1569287121711509200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 323e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 323f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3240 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3241 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [msp] DeserializeIdentity -> DEBU 3242 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3243 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3244 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3245 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3246 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3247 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 3248 0xc003ac8eb0 gate 1569287121712533500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3249 0xc003ac8eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324a 0xc003ac8eb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324b 0xc003ac8eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324c 0xc003ac8eb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 324d 0xc003ac8eb0 gate 1569287121712533500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 324e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 324f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 3251 0xc003ac96f0 gate 1569287121712881200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3252 0xc003ac96f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3253 0xc003ac96f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [cauthdsl] func2 -> DEBU 3254 0xc003ac96f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [msp.identity] Verify -> DEBU 3255 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [msp.identity] Verify -> DEBU 3256 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [cauthdsl] func2 -> DEBU 3257 0xc003ac96f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [cauthdsl] func1 -> DEBU 3258 0xc003ac96f0 gate 1569287121712881200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 3259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [gossip.gossip] handleMessage -> DEBU 325d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [gossip.gossip] handleMessage -> DEBU 325e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.713 UTC [msp] DeserializeIdentity -> DEBU 325f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [gossip.election] waitForInterrupt -> DEBU 3260 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [gossip.election] IsLeader -> DEBU 3261 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [msp] GetDefaultSigningIdentity -> DEBU 3262 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [msp.identity] Sign -> DEBU 3263 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100C1801 " +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [msp.identity] Sign -> DEBU 3264 Sign: digest: 7D33A109E0DBBCAC69AD40B409900FF277AC1092D35623E0EAA8392753D1F9C7 " +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [gossip.election] waitForInterrupt -> DEBU 3265 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [msp] DeserializeIdentity -> DEBU 3266 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.717 UTC [msp] DeserializeIdentity -> DEBU 3267 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [gossip.pull] Hello -> DEBU 3268 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [gossip.comm] Send -> DEBU 326b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [gossip.comm] sendToEndpoint -> DEBU 326c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [gossip.comm] sendToEndpoint -> DEBU 326d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3270 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3271 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [gossip.comm] Send -> DEBU 3272 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3273 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3274 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3275 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3276 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.722 UTC [gossip.comm] func1 -> DEBU 3277 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.722 UTC [msp] DeserializeIdentity -> DEBU 3278 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3279 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 327a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 327b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 327f 0xc003b13100 gate 1569287121724091500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3280 0xc003b13100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3281 0xc003b13100 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3282 0xc003b13100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3283 0xc003b13100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 3284 0xc003b13100 gate 1569287121724091500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3285 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3286 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3287 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 3288 0xc003b13940 gate 1569287121724508000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3289 0xc003b13940 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 328a 0xc003b13940 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 328b 0xc003b13940 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [msp.identity] Verify -> DEBU 328c Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +peer0.org1.example.com | 00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +peer0.org1.example.com | "2019-09-24 01:05:21.724 UTC [msp.identity] Verify -> DEBU 328d Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +peer0.org1.example.com | 00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +peer0.org1.example.com | 00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +peer0.org1.example.com | 00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +peer0.org1.example.com | 00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [cauthdsl] func2 -> DEBU 328e 0xc003b13940 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [cauthdsl] func1 -> DEBU 328f 0xc003b13940 gate 1569287121724508000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3290 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3291 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3292 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.725 UTC [msp] DeserializeIdentity -> DEBU 3294 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.726 UTC [msp] DeserializeIdentity -> DEBU 3295 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3296 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3297 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3298 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 3299 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 329a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 329b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [cauthdsl] func1 -> DEBU 329c 0xc003d6b110 gate 1569287121727680700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [cauthdsl] func2 -> DEBU 329d 0xc003d6b110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.727 UTC [cauthdsl] func2 -> DEBU 329e 0xc003d6b110 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 329f 0xc003d6b110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a0 0xc003d6b110 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32a1 0xc003d6b110 gate 1569287121727680700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32a5 0xc003d6b950 gate 1569287121728361800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a6 0xc003d6b950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a7 0xc003d6b950 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a8 0xc003d6b950 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32a9 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +peer0.org1.example.com | 00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32aa Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +peer0.org1.example.com | 00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +peer0.org1.example.com | 00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +peer0.org1.example.com | 00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +peer0.org1.example.com | 00000040 b6 66 27 b7 81 6b |.f'..k|" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32ab 0xc003d6b950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32ac 0xc003d6b950 gate 1569287121728361800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32b1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32b2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func1 -> DEBU 32b8 0xc003b35050 gate 1569287121729251200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32b9 0xc003b35050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32ba 0xc003b35050 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32bb 0xc003b35050 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32bc Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32bd Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32be 0xc003b35050 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [cauthdsl] func1 -> DEBU 32bf 0xc003b35050 gate 1569287121729251200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32c4 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32c5 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.730 UTC [gossip.pull] HandleMessage -> DEBU 32c8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.840 UTC [gossip.comm] func1 -> DEBU 32ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.840 UTC [gossip.gossip] handleMessage -> DEBU 32cb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.843 UTC [msp] DeserializeIdentity -> DEBU 32cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.843 UTC [msp] DeserializeIdentity -> DEBU 32cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.843 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.850 UTC [gossip.comm] func1 -> DEBU 32cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.850 UTC [gossip.gossip] handleMessage -> DEBU 32d0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.850 UTC [msp.identity] Verify -> DEBU 32d1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32d2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:21.852 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.852 UTC [gossip.gossip] handleMessage -> DEBU 32d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.853 UTC [gossip.comm] func1 -> DEBU 32d5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.853 UTC [gossip.gossip] handleMessage -> DEBU 32d6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.853 UTC [msp.identity] Verify -> DEBU 32d7 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32d8 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:21.853 UTC [gossip.gossip] handleMessage -> DEBU 32d9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.854 UTC [gossip.comm] func1 -> DEBU 32da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.854 UTC [gossip.gossip] handleMessage -> DEBU 32db Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.854 UTC [msp.identity] Verify -> DEBU 32dc Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32dd Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:21.854 UTC [msp] DeserializeIdentity -> DEBU 32de Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:21.854 UTC [gossip.gossip] handleMessage -> DEBU 32df Exiting" +peer0.org1.example.com | "2019-09-24 01:05:21.860 UTC [gossip.comm] func1 -> DEBU 32e0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.860 UTC [gossip.gossip] handleMessage -> DEBU 32e1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.860 UTC [gossip.pull] HandleMessage -> DEBU 32e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:21.860 UTC [gossip.pull] SendDigest -> DEBU 32e3 Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:21.861 UTC [gossip.gossip] handleMessage -> DEBU 32e4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.040 UTC [gossip.comm] func1 -> DEBU 32e5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.040 UTC [gossip.gossip] handleMessage -> DEBU 32e6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.041 UTC [gossip.gossip] handleMessage -> DEBU 32ea Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [gossip.comm] func1 -> DEBU 32eb Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [gossip.gossip] handleMessage -> DEBU 32ec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [msp] DeserializeIdentity -> DEBU 32ed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32f0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [cauthdsl] func1 -> DEBU 32f4 0xc003c06340 gate 1569287122044616700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f5 0xc003c06340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f6 0xc003c06340 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f7 0xc003c06340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32f8 0xc003c06340 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 32f9 0xc003c06340 gate 1569287122044616700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 32fd 0xc003c06b80 gate 1569287122045263400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32fe 0xc003c06b80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32ff 0xc003c06b80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 3300 0xc003c06b80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [msp.identity] Verify -> DEBU 3301 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [msp.identity] Verify -> DEBU 3302 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 3303 0xc003c06b80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 3304 0xc003c06b80 gate 1569287122045263400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3305 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3306 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3307 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3308 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [msp] DeserializeIdentity -> DEBU 3309 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.045 UTC [gossip.gossip] handleMessage -> DEBU 330a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [gossip.comm] func1 -> DEBU 330b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [gossip.gossip] handleMessage -> DEBU 330c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [msp] DeserializeIdentity -> DEBU 330d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 330e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 330f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3310 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3311 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3312 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3313 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 3314 0xc002fc0650 gate 1569287122052012100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3315 0xc002fc0650 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3316 0xc002fc0650 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3317 0xc002fc0650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3318 0xc002fc0650 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 3319 0xc002fc0650 gate 1569287122052012100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 331d 0xc002fc0e90 gate 1569287122052590500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 331e 0xc002fc0e90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 331f 0xc002fc0e90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 3320 0xc002fc0e90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [msp.identity] Verify -> DEBU 3321 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [msp.identity] Verify -> DEBU 3322 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 3323 0xc002fc0e90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [cauthdsl] func1 -> DEBU 3324 0xc002fc0e90 gate 1569287122052590500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3325 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3327 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.054 UTC [gossip.gossip] handleMessage -> DEBU 332a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [endorser] ProcessProposal -> DEBU 332b Entering: request from 172.18.0.5:49970" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] ValidateProposalMessage -> DEBU 332c ValidateProposalMessage starts for signed proposal 0xc002fe21e0" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] validateChannelHeader -> DEBU 332d validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 332e begin" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [msp] GetManagerForChain -> DEBU 332f Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 3330 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 3331 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [msp.identity] Verify -> DEBU 3332 Verify: digest = 00000000 39 88 55 65 18 6c c9 83 48 c7 2a 31 4e a6 e9 27 |9.Ue.l..H.*1N..'| +peer0.org1.example.com | 00000010 0e a7 b1 2e 43 ba a4 ac d3 03 d7 86 55 21 7a 9f |....C.......U!z.|" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [msp.identity] Verify -> DEBU 3333 Verify: sig = 00000000 30 44 02 20 5f ca 34 e3 3c 9d 79 31 8f ae 9b ae |0D. _.4.<.y1....| +peer0.org1.example.com | 00000010 13 79 f0 ab 65 01 88 36 09 f5 d1 a2 19 b0 ea 86 |.y..e..6........| +peer0.org1.example.com | 00000020 48 62 6b ae 02 20 27 99 58 20 72 30 fe b1 88 e8 |Hbk.. '.X r0....| +peer0.org1.example.com | 00000030 ba a8 21 8a c5 b0 9c 82 0e b3 95 3c 71 45 0a e3 |..!........ DEBU 3334 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:22.127 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3335 validateChaincodeProposalMessage starts for proposal 0xc0037d8a80, header 0xc002fe25f0" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3336 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [endorser] preProcess -> DEBU 3337 [businesschannel][2284bef8] processing txid: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3338 retrieveTransactionByID() - txId = [2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748]" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [endorser] SimulateProposal -> DEBU 3339 [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [endorser] callChaincode -> INFO 333a [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [chaincode] Execute -> DEBU 333b Entry" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cscc] Invoke -> DEBU 333c Invoke function: GetConfigBlock" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [aclmgmt] CheckACL -> DEBU 333d acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [aclmgmt] CheckACL -> DEBU 333e acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 333f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 3340 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 3341 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cauthdsl] func1 -> DEBU 3342 0xc002ac3040 gate 1569287122128547000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3343 0xc002ac3040 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3344 0xc002ac3040 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3345 0xc002ac3040 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [msp.identity] Verify -> DEBU 3346 Verify: digest = 00000000 39 88 55 65 18 6c c9 83 48 c7 2a 31 4e a6 e9 27 |9.Ue.l..H.*1N..'| +peer0.org1.example.com | 00000010 0e a7 b1 2e 43 ba a4 ac d3 03 d7 86 55 21 7a 9f |....C.......U!z.|" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [msp.identity] Verify -> DEBU 3347 Verify: sig = 00000000 30 44 02 20 5f ca 34 e3 3c 9d 79 31 8f ae 9b ae |0D. _.4.<.y1....| +peer0.org1.example.com | 00000010 13 79 f0 ab 65 01 88 36 09 f5 d1 a2 19 b0 ea 86 |.y..e..6........| +peer0.org1.example.com | 00000020 48 62 6b ae 02 20 27 99 58 20 72 30 fe b1 88 e8 |Hbk.. '.X r0....| +peer0.org1.example.com | 00000030 ba a8 21 8a c5 b0 9c 82 0e b3 95 3c 71 45 0a e3 |..!........ DEBU 3348 0xc002ac3040 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [cauthdsl] func1 -> DEBU 3349 0xc002ac3040 gate 1569287122128547000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [chaincode] handleMessage -> DEBU 334e [2284bef8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [chaincode] Notify -> DEBU 334f [2284bef8] notifying Txid:2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [chaincode] Execute -> DEBU 3350 Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] callChaincode -> INFO 3351 [businesschannel][2284bef8] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] SimulateProposal -> DEBU 3352 [businesschannel][2284bef8] Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3353 [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3354 [businesschannel][2284bef8] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] EndorseWithPlugin -> DEBU 3355 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [msp.identity] Sign -> DEBU 3356 Sign: plaintext: 0A2052A6A572325076ED18A6B2EBC28D...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [msp.identity] Sign -> DEBU 3357 Sign: digest: 5AB5B4D9782CA769D92CCF4ADF6F5001F122EEB8BA38964CA3AC5A3B4E1169BA " +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] EndorseWithPlugin -> DEBU 3358 Exiting {plugin: escc, channel: businesschannel, tx: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3359 [businesschannel][2284bef8] Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.130 UTC [endorser] func1 -> DEBU 335a Exit: request from 172.18.0.5:49970" +peer0.org1.example.com | "2019-09-24 01:05:22.130 UTC [comm.grpc.server] 1 -> INFO 335b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49970 grpc.code=OK grpc.call_duration=3.0172ms +peer0.org1.example.com | "2019-09-24 01:05:22.135 UTC [grpc] infof -> DEBU 335c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:22.135 UTC [grpc] infof -> DEBU 335d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:22.241 UTC [gossip.comm] func1 -> DEBU 335e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.241 UTC [gossip.gossip] handleMessage -> DEBU 335f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.242 UTC [msp] DeserializeIdentity -> DEBU 3360 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.243 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.243 UTC [msp] DeserializeIdentity -> DEBU 3362 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.244 UTC [gossip.gossip] handleMessage -> DEBU 3363 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.246 UTC [gossip.comm] func1 -> DEBU 3364 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.246 UTC [gossip.gossip] handleMessage -> DEBU 3365 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.247 UTC [msp] DeserializeIdentity -> DEBU 3366 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3367 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3368 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3369 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.249 UTC [cauthdsl] func1 -> DEBU 336d 0xc002ae9eb0 gate 1569287122249536700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.250 UTC [cauthdsl] func2 -> DEBU 336e 0xc002ae9eb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 336f 0xc002ae9eb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 3370 0xc002ae9eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 3371 0xc002ae9eb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.252 UTC [cauthdsl] func1 -> DEBU 3372 0xc002ae9eb0 gate 1569287122249536700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.252 UTC [policies] Evaluate -> DEBU 3373 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [policies] Evaluate -> DEBU 3374 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [policies] Evaluate -> DEBU 3375 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [cauthdsl] func1 -> DEBU 3376 0xc0041426f0 gate 1569287122253343700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3377 0xc0041426f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3378 0xc0041426f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3379 0xc0041426f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.254 UTC [msp.identity] Verify -> DEBU 337a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:22.254 UTC [msp.identity] Verify -> DEBU 337b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:22.257 UTC [cauthdsl] func2 -> DEBU 337c 0xc0041426f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.257 UTC [cauthdsl] func1 -> DEBU 337d 0xc0041426f0 gate 1569287122253343700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 337e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 337f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 3380 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.258 UTC [policies] Evaluate -> DEBU 3381 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.262 UTC [msp] DeserializeIdentity -> DEBU 3382 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.262 UTC [gossip.gossip] handleMessage -> DEBU 3383 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.346 UTC [endorser] ProcessProposal -> DEBU 3384 Entering: request from 172.18.0.5:49974" +peer0.org1.example.com | "2019-09-24 01:05:22.346 UTC [protoutils] ValidateProposalMessage -> DEBU 3385 ValidateProposalMessage starts for signed proposal 0xc003c742d0" +peer0.org1.example.com | "2019-09-24 01:05:22.346 UTC [protoutils] validateChannelHeader -> DEBU 3386 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 3387 begin" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [msp] GetManagerForChain -> DEBU 3388 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 3389 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 338a creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [msp.identity] Verify -> DEBU 338b Verify: digest = 00000000 24 1c ee 74 08 eb d3 e4 99 54 d3 aa 0b 0f 2d 24 |$..t.....T....-$| +peer0.org1.example.com | 00000010 57 d8 7d 38 07 19 71 49 99 73 2b 62 42 10 f8 22 |W.}8..qI.s+bB.."|" +peer0.org1.example.com | "2019-09-24 01:05:22.347 UTC [msp.identity] Verify -> DEBU 338c Verify: sig = 00000000 30 44 02 20 7c 23 0c 52 97 21 7c 23 9e e4 3e 00 |0D. |#.R.!|#..>.| +peer0.org1.example.com | 00000010 43 e8 97 68 d8 85 22 bf a4 8d db b3 53 86 dc 57 |C..h..".....S..W| +peer0.org1.example.com | 00000020 44 ba dd e5 02 20 28 f4 20 02 23 50 bb ba f5 71 |D.... (. .#P...q| +peer0.org1.example.com | 00000030 9d 08 ca cc a5 bd 5d 42 71 e6 b2 62 61 36 33 d7 |......]Bq..ba63.| +peer0.org1.example.com | 00000040 bb 1e 3a 01 82 55 |..:..U|" +peer0.org1.example.com | "2019-09-24 01:05:22.348 UTC [protoutils] checkSignatureFromCreator -> DEBU 338d exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:22.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 338e validateChaincodeProposalMessage starts for proposal 0xc0001f2540, header 0xc003c74730" +peer0.org1.example.com | "2019-09-24 01:05:22.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 338f validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.349 UTC [endorser] preProcess -> DEBU 3390 [businesschannel][1cf7a26f] processing txid: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1" +peer0.org1.example.com | "2019-09-24 01:05:22.349 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3391 retrieveTransactionByID() - txId = [1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1]" +peer0.org1.example.com | "2019-09-24 01:05:22.349 UTC [endorser] SimulateProposal -> DEBU 3392 [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.349 UTC [endorser] callChaincode -> INFO 3393 [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.349 UTC [chaincode] Execute -> DEBU 3394 Entry" +peer0.org1.example.com | "2019-09-24 01:05:22.350 UTC [cscc] Invoke -> DEBU 3395 Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 01:05:22.350 UTC [msp.identity] Verify -> DEBU 3396 Verify: digest = 00000000 24 1c ee 74 08 eb d3 e4 99 54 d3 aa 0b 0f 2d 24 |$..t.....T....-$| +peer0.org1.example.com | 00000010 57 d8 7d 38 07 19 71 49 99 73 2b 62 42 10 f8 22 |W.}8..qI.s+bB.."|" +peer0.org1.example.com | "2019-09-24 01:05:22.350 UTC [msp.identity] Verify -> DEBU 3397 Verify: sig = 00000000 30 44 02 20 7c 23 0c 52 97 21 7c 23 9e e4 3e 00 |0D. |#.R.!|#..>.| +peer0.org1.example.com | 00000010 43 e8 97 68 d8 85 22 bf a4 8d db b3 53 86 dc 57 |C..h..".....S..W| +peer0.org1.example.com | 00000020 44 ba dd e5 02 20 28 f4 20 02 23 50 bb ba f5 71 |D.... (. .#P...q| +peer0.org1.example.com | 00000030 9d 08 ca cc a5 bd 5d 42 71 e6 b2 62 61 36 33 d7 |......]Bq..ba63.| +peer0.org1.example.com | 00000040 bb 1e 3a 01 82 55 |..:..U|" +peer0.org1.example.com | "2019-09-24 01:05:22.351 UTC [chaincode] handleMessage -> DEBU 3398 [1cf7a26f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:22.351 UTC [chaincode] Notify -> DEBU 3399 [1cf7a26f] notifying Txid:1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, channelID:businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:22.351 UTC [chaincode] Execute -> DEBU 339a Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.351 UTC [endorser] callChaincode -> INFO 339b [businesschannel][1cf7a26f] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-09-24 01:05:22.351 UTC [endorser] SimulateProposal -> DEBU 339c [businesschannel][1cf7a26f] Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.352 UTC [endorser] endorseProposal -> DEBU 339d [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:22.352 UTC [endorser] endorseProposal -> DEBU 339e [businesschannel][1cf7a26f] escc for chaincode name:"cscc" is escc" +peer0.org1.example.com | "2019-09-24 01:05:22.352 UTC [endorser] EndorseWithPlugin -> DEBU 339f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 01:05:22.353 UTC [msp.identity] Sign -> DEBU 33a0 Sign: plaintext: 0A203CD1F05BE4A3795BD98365BF1F7D...455254494649434154452D2D2D2D2D0A " +peer0.org1.example.com | "2019-09-24 01:05:22.353 UTC [msp.identity] Sign -> DEBU 33a1 Sign: digest: D288B09E043683FDDA8ADD03CC0F77AB214FA8BC368157EB9739515446495C67 " +peer0.org1.example.com | "2019-09-24 01:05:22.353 UTC [endorser] EndorseWithPlugin -> DEBU 33a2 Exiting {plugin: escc, channel: businesschannel, tx: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, chaincode: cscc}" +peer0.org1.example.com | "2019-09-24 01:05:22.353 UTC [endorser] endorseProposal -> DEBU 33a3 [businesschannel][1cf7a26f] Exit" +peer0.org1.example.com | "2019-09-24 01:05:22.353 UTC [endorser] func1 -> DEBU 33a4 Exit: request from 172.18.0.5:49974" +peer0.org1.example.com | "2019-09-24 01:05:22.354 UTC [comm.grpc.server] 1 -> INFO 33a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49974 grpc.code=OK grpc.call_duration=8.261ms +peer0.org1.example.com | "2019-09-24 01:05:22.357 UTC [grpc] warningf -> DEBU 33a6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49974: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:22.357 UTC [grpc] infof -> DEBU 33a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:22.357 UTC [grpc] infof -> DEBU 33a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:22.504 UTC [gossip.comm] func1 -> DEBU 33a9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.comm] func1 -> DEBU 33aa Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33ab Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.pull] HandleMessage -> DEBU 33ac GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.pull] SendDigest -> DEBU 33ad Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33ae Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33af Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.505 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33b2 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b3 Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +peer0.org1.example.com | 00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b4 Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +peer0.org1.example.com | 00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +peer0.org1.example.com | 00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +peer0.org1.example.com | 00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +peer0.org1.example.com | 00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b6 Verify: sig = 00000000 30 44 02 20 72 88 8c a8 26 96 de 17 55 be 48 c2 |0D. r...&...U.H.| +peer0.org1.example.com | 00000010 49 8e cd c3 9a f3 7d 06 b5 f3 92 42 17 4e c0 5e |I.....}....B.N.^| +peer0.org1.example.com | 00000020 3d 24 22 d6 02 20 6f c0 1b 4b 51 aa df 48 9f fb |=$".. o..KQ..H..| +peer0.org1.example.com | 00000030 5b a3 6c 34 0f 2c bd 17 9c c6 7a 2d 9c 8c 46 35 |[.l4.,....z-..F5| +peer0.org1.example.com | 00000040 cf ac 0a 27 1d 54 |...'.T|" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ba Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 33bd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33be Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] sendMemResponse -> DEBU 33bf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.comm] Send -> DEBU 33c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.discovery] sendMemResponse -> DEBU 33c3 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.comm] sendToEndpoint -> DEBU 33c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.507 UTC [gossip.comm] sendToEndpoint -> DEBU 33c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.783 UTC [gossip.comm] func1 -> DEBU 33c6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.784 UTC [gossip.gossip] handleMessage -> DEBU 33c7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.784 UTC [gossip.pull] HandleMessage -> DEBU 33c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.785 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.785 UTC [msp] DeserializeIdentity -> DEBU 33ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.786 UTC [msp] DeserializeIdentity -> DEBU 33cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.787 UTC [msp] DeserializeIdentity -> DEBU 33cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.787 UTC [msp] DeserializeIdentity -> DEBU 33cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.788 UTC [msp] DeserializeIdentity -> DEBU 33ce Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.788 UTC [gossip.pull] SendDigest -> DEBU 33cf Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:22.789 UTC [gossip.gossip] handleMessage -> DEBU 33d0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.801 UTC [gossip.comm] func1 -> DEBU 33d1 Got message: GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.801 UTC [gossip.gossip] handleMessage -> DEBU 33d2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.802 UTC [gossip.gossip] handleMessage -> DEBU 33d3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d4 Got message: GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33d5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.803 UTC [msp] DeserializeIdentity -> DEBU 33d6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33d8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33d9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.806 UTC [cauthdsl] func1 -> DEBU 33dd 0xc0029d8220 gate 1569287122806032000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.806 UTC [cauthdsl] func2 -> DEBU 33de 0xc0029d8220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.806 UTC [cauthdsl] func2 -> DEBU 33df 0xc0029d8220 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.807 UTC [cauthdsl] func2 -> DEBU 33e0 0xc0029d8220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.807 UTC [cauthdsl] func2 -> DEBU 33e1 0xc0029d8220 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.807 UTC [cauthdsl] func1 -> DEBU 33e2 0xc0029d8220 gate 1569287122806032000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.809 UTC [cauthdsl] func1 -> DEBU 33e6 0xc0029d8bc0 gate 1569287122809326900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.809 UTC [cauthdsl] func2 -> DEBU 33e7 0xc0029d8bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.809 UTC [cauthdsl] func2 -> DEBU 33e8 0xc0029d8bc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.810 UTC [cauthdsl] func2 -> DEBU 33e9 0xc0029d8bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.810 UTC [msp.identity] Verify -> DEBU 33ea Verify: digest = 00000000 1d a2 9c 33 5f 83 24 e0 38 13 96 71 3d e0 47 ed |...3_.$.8..q=.G.| +peer0.org1.example.com | 00000010 27 88 c0 86 10 6a 34 99 a6 c0 e5 37 87 55 af 82 |'....j4....7.U..|" +peer0.org1.example.com | "2019-09-24 01:05:22.811 UTC [msp.identity] Verify -> DEBU 33eb Verify: sig = 00000000 30 44 02 20 0f 9c e4 a5 24 f2 1e 56 62 21 94 a0 |0D. ....$..Vb!..| +peer0.org1.example.com | 00000010 1a 26 b1 3e 2f ce 4a 62 37 56 53 59 15 2f 75 18 |.&.>/.Jb7VSY./u.| +peer0.org1.example.com | 00000020 c9 b7 31 d2 02 20 6d 49 1b d5 28 b1 d7 49 d8 f1 |..1.. mI..(..I..| +peer0.org1.example.com | 00000030 2b 73 0e 04 7e c2 70 c8 35 bf 2f 44 6a 9e 68 31 |+s..~.p.5./Dj.h1| +peer0.org1.example.com | 00000040 ce 9e 6c 59 58 64 |..lYXd|" +peer0.org1.example.com | "2019-09-24 01:05:22.811 UTC [cauthdsl] func2 -> DEBU 33ec 0xc0029d8bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.812 UTC [cauthdsl] func1 -> DEBU 33ed 0xc0029d8bc0 gate 1569287122809326900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33f0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.813 UTC [policies] Evaluate -> DEBU 33f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.814 UTC [gossip.discovery] handleAliveMessage -> DEBU 33f2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.815 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:22.815 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.817 UTC [gossip.discovery] handleAliveMessage -> DEBU 33f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33f9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.817 UTC [gossip.discovery] sendMemResponse -> DEBU 33fa Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:22.818 UTC [msp] DeserializeIdentity -> DEBU 33fb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.818 UTC [msp] DeserializeIdentity -> DEBU 33fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.819 UTC [msp] DeserializeIdentity -> DEBU 33fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.819 UTC [gossip.comm] Send -> DEBU 33fe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.819 UTC [gossip.comm] sendToEndpoint -> DEBU 33ff Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3400 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.820 UTC [gossip.discovery] sendMemResponse -> DEBU 3401 Exiting, replying with alive: alive:\301\261\357\016?\344\273\353\241c\247-\257\016\336\002 x\326\n\373^\372\222\026&\t\026\340\326\206\245\312\276\337AV\301\352\321\213\343\320\344\303\267\203\2066" > alive:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > alive: " +peer0.org1.example.com | "2019-09-24 01:05:22.837 UTC [gossip.pull] Hello -> DEBU 3402 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3403 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.pull] Hello -> DEBU 3404 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3405 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.pull] Hello -> DEBU 3406 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3407 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 3408 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 3409 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 340a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 340b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.839 UTC [gossip.comm] sendToEndpoint -> DEBU 340c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.839 UTC [gossip.comm] sendToEndpoint -> DEBU 340d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.840 UTC [gossip.comm] func1 -> DEBU 340e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.840 UTC [gossip.gossip] handleMessage -> DEBU 340f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.841 UTC [gossip.pull] HandleMessage -> DEBU 3410 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.841 UTC [gossip.comm] func1 -> DEBU 3411 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.841 UTC [gossip.gossip] handleMessage -> DEBU 3412 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.842 UTC [gossip.gossip] handleMessage -> DEBU 3414 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.842 UTC [gossip.pull] HandleMessage -> DEBU 3415 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.842 UTC [gossip.gossip] handleMessage -> DEBU 3416 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.841 UTC [gossip.comm] func1 -> DEBU 3413 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.843 UTC [gossip.gossip] handleMessage -> DEBU 3417 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.843 UTC [gossip.pull] HandleMessage -> DEBU 3418 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.843 UTC [gossip.gossip] handleMessage -> DEBU 3419 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.844 UTC [gossip.comm] func1 -> DEBU 341a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.844 UTC [gossip.gossip] handleMessage -> DEBU 341b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.845 UTC [gossip.pull] HandleMessage -> DEBU 341c GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.845 UTC [msp] DeserializeIdentity -> DEBU 341d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.845 UTC [msp] DeserializeIdentity -> DEBU 341e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.846 UTC [msp] DeserializeIdentity -> DEBU 341f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.846 UTC [msp] DeserializeIdentity -> DEBU 3420 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.847 UTC [msp] DeserializeIdentity -> DEBU 3421 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.847 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.848 UTC [gossip.pull] SendDigest -> DEBU 3423 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:22.848 UTC [gossip.gossip] handleMessage -> DEBU 3424 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.863 UTC [gossip.comm] func1 -> DEBU 3425 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.863 UTC [gossip.gossip] handleMessage -> DEBU 3426 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.864 UTC [gossip.gossip] handleMessage -> DEBU 3427 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3428 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3429 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [msp] DeserializeIdentity -> DEBU 342a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 342b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 342c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 342d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.873 UTC [policies] Evaluate -> DEBU 342e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [policies] Evaluate -> DEBU 342f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [policies] Evaluate -> DEBU 3430 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func1 -> DEBU 3431 0xc002872f40 gate 1569287122874279300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3432 0xc002872f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3433 0xc002872f40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3434 0xc002872f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3435 0xc002872f40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.874 UTC [cauthdsl] func1 -> DEBU 3436 0xc002872f40 gate 1569287122874279300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3437 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3438 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3439 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.875 UTC [cauthdsl] func1 -> DEBU 343a 0xc0028737f0 gate 1569287122875894600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.875 UTC [cauthdsl] func2 -> DEBU 343b 0xc0028737f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 343c 0xc0028737f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 343d 0xc0028737f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [msp.identity] Verify -> DEBU 343e Verify: digest = 00000000 2c 1e 36 ad a5 25 a9 3b 80 6c e7 88 4f e9 13 d8 |,.6..%.;.l..O...| +peer0.org1.example.com | 00000010 3a 82 ec d7 36 24 01 c8 2f f8 c6 44 8e 70 e3 f1 |:...6$../..D.p..|" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [msp.identity] Verify -> DEBU 343f Verify: sig = 00000000 30 45 02 21 00 86 6f d9 12 d6 86 e7 67 d8 71 76 |0E.!..o.....g.qv| +peer0.org1.example.com | 00000010 a9 09 1c 32 0f 6b 24 11 ce 84 d9 7b 03 4c e5 4c |...2.k$....{.L.L| +peer0.org1.example.com | 00000020 8f af 41 6a 06 02 20 0a ec 2e f1 39 9e 83 30 88 |..Aj.. ....9..0.| +peer0.org1.example.com | 00000030 d0 d3 49 34 97 02 3c 38 ce 16 09 7f f4 60 28 6b |..I4..<8.....`(k| +peer0.org1.example.com | 00000040 c2 b8 0a 40 fc ab 2d |...@..-|" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 3440 0xc0028737f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [cauthdsl] func1 -> DEBU 3441 0xc0028737f0 gate 1569287122875894600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [policies] Evaluate -> DEBU 3442 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3443 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3444 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3445 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3446 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3447 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:22.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3448 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 3449 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 344a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 344b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 344c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 344d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [gossip.discovery] sendMemResponse -> DEBU 344e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [msp] DeserializeIdentity -> DEBU 344f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.876 UTC [msp] GetDefaultSigningIdentity -> DEBU 3450 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:22.879 UTC [msp.identity] Sign -> DEBU 3452 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151026 " +peer0.org1.example.com | "2019-09-24 01:05:22.879 UTC [msp.identity] Sign -> DEBU 3453 Sign: digest: B051FE9CE64E788203FB920315C922512F1B8A11CC28B01474981166B207EC72 " +peer0.org1.example.com | "2019-09-24 01:05:22.878 UTC [msp] DeserializeIdentity -> DEBU 3451 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [msp] DeserializeIdentity -> DEBU 3454 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [gossip.comm] Send -> DEBU 3455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [gossip.discovery] sendMemResponse -> DEBU 3456 Exiting, replying with alive: alive: alive:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > alive: " +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 3457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 3459 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.880 UTC [msp] GetDefaultSigningIdentity -> DEBU 3458 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:22.881 UTC [msp.identity] Sign -> DEBU 345a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:22.881 UTC [msp.identity] Sign -> DEBU 345b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:22.882 UTC [gossip.comm] Send -> DEBU 345c Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.882 UTC [msp] DeserializeIdentity -> DEBU 345d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.882 UTC [gossip.comm] sendToEndpoint -> DEBU 345e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.882 UTC [gossip.comm] sendToEndpoint -> DEBU 3460 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.882 UTC [gossip.comm] Send -> DEBU 345f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.883 UTC [msp] DeserializeIdentity -> DEBU 3461 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.883 UTC [gossip.comm] Send -> DEBU 3462 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3463 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3464 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3465 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.885 UTC [gossip.comm] sendToEndpoint -> DEBU 3466 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.885 UTC [gossip.comm] func1 -> DEBU 3467 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.885 UTC [gossip.gossip] handleMessage -> DEBU 3468 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.886 UTC [gossip.gossip] handleMessage -> DEBU 3469 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.886 UTC [gossip.discovery] handleMsgFromComm -> DEBU 346a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.886 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 346b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.887 UTC [msp.identity] Verify -> DEBU 346c Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +peer0.org1.example.com | 00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +peer0.org1.example.com | "2019-09-24 01:05:22.887 UTC [gossip.comm] func1 -> DEBU 346d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.895 UTC [gossip.gossip] handleMessage -> DEBU 346f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.887 UTC [gossip.comm] func1 -> DEBU 346e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.895 UTC [msp.identity] Verify -> DEBU 3470 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +peer0.org1.example.com | 00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +peer0.org1.example.com | 00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +peer0.org1.example.com | 00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +peer0.org1.example.com | 00000040 5c ba 34 3b 4a cf |\.4;J.|" +peer0.org1.example.com | "2019-09-24 01:05:22.896 UTC [msp.identity] Verify -> DEBU 3471 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:22.896 UTC [msp.identity] Verify -> DEBU 3472 Verify: sig = 00000000 30 44 02 20 7e a4 67 cd 40 36 7e 8b b1 7c d8 91 |0D. ~.g.@6~..|..| +peer0.org1.example.com | 00000010 66 c0 33 99 8b 60 97 85 65 0d 94 3f 13 da 73 59 |f.3..`..e..?..sY| +peer0.org1.example.com | 00000020 c2 2d 4b bb 02 20 2c 11 13 1e 59 3f 2f e7 e5 d0 |.-K.. ,...Y?/...| +peer0.org1.example.com | 00000030 e0 42 f5 63 6d dd a0 2c 55 24 e2 bb 40 2f 96 85 |.B.cm..,U$..@/..| +peer0.org1.example.com | 00000040 ec d5 5b 8f f1 04 |..[...|" +peer0.org1.example.com | "2019-09-24 01:05:22.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 3473 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.897 UTC [gossip.discovery] isSentByMe -> DEBU 3474 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3475 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3476 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3477 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3479 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.898 UTC [gossip.gossip] handleMessage -> DEBU 3478 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.899 UTC [gossip.gossip] handleMessage -> DEBU 347a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.899 UTC [msp] DeserializeIdentity -> DEBU 347b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 347c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.900 UTC [policies] Evaluate -> DEBU 347f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.901 UTC [policies] Evaluate -> DEBU 3480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.901 UTC [policies] Evaluate -> DEBU 3481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.901 UTC [cauthdsl] func1 -> DEBU 3482 0xc002837c40 gate 1569287122901715100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3483 0xc002837c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3484 0xc002837c40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3485 0xc002837c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.903 UTC [cauthdsl] func2 -> DEBU 3486 0xc002837c40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.903 UTC [cauthdsl] func1 -> DEBU 3487 0xc002837c40 gate 1569287122901715100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.903 UTC [policies] Evaluate -> DEBU 3488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.903 UTC [policies] Evaluate -> DEBU 3489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.904 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.904 UTC [cauthdsl] func1 -> DEBU 348b 0xc0027f4490 gate 1569287122904412200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.904 UTC [cauthdsl] func2 -> DEBU 348c 0xc0027f4490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.905 UTC [cauthdsl] func2 -> DEBU 348d 0xc0027f4490 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.905 UTC [cauthdsl] func2 -> DEBU 348e 0xc0027f4490 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.905 UTC [msp.identity] Verify -> DEBU 348f Verify: digest = 00000000 1d a2 9c 33 5f 83 24 e0 38 13 96 71 3d e0 47 ed |...3_.$.8..q=.G.| +peer0.org1.example.com | 00000010 27 88 c0 86 10 6a 34 99 a6 c0 e5 37 87 55 af 82 |'....j4....7.U..|" +peer0.org1.example.com | "2019-09-24 01:05:22.906 UTC [msp.identity] Verify -> DEBU 3490 Verify: sig = 00000000 30 44 02 20 0f 9c e4 a5 24 f2 1e 56 62 21 94 a0 |0D. ....$..Vb!..| +peer0.org1.example.com | 00000010 1a 26 b1 3e 2f ce 4a 62 37 56 53 59 15 2f 75 18 |.&.>/.Jb7VSY./u.| +peer0.org1.example.com | 00000020 c9 b7 31 d2 02 20 6d 49 1b d5 28 b1 d7 49 d8 f1 |..1.. mI..(..I..| +peer0.org1.example.com | 00000030 2b 73 0e 04 7e c2 70 c8 35 bf 2f 44 6a 9e 68 31 |+s..~.p.5./Dj.h1| +peer0.org1.example.com | 00000040 ce 9e 6c 59 58 64 |..lYXd|" +peer0.org1.example.com | "2019-09-24 01:05:22.906 UTC [cauthdsl] func2 -> DEBU 3491 0xc0027f4490 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.906 UTC [cauthdsl] func1 -> DEBU 3492 0xc0027f4490 gate 1569287122904412200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3495 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 3497 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 3498 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3499 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.909 UTC [msp.identity] Verify -> DEBU 349a Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +peer0.org1.example.com | 00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +peer0.org1.example.com | "2019-09-24 01:05:22.909 UTC [msp.identity] Verify -> DEBU 349b Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +peer0.org1.example.com | 00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +peer0.org1.example.com | 00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +peer0.org1.example.com | 00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +peer0.org1.example.com | 00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +peer0.org1.example.com | "2019-09-24 01:05:22.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 349c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 349d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 349e Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.911 UTC [msp.identity] Verify -> DEBU 349f Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +peer0.org1.example.com | 00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +peer0.org1.example.com | "2019-09-24 01:05:22.911 UTC [msp.identity] Verify -> DEBU 34a0 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +peer0.org1.example.com | 00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +peer0.org1.example.com | 00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +peer0.org1.example.com | 00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +peer0.org1.example.com | 00000040 5c ba 34 3b 4a cf |\.4;J.|" +peer0.org1.example.com | "2019-09-24 01:05:22.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.911 UTC [gossip.discovery] isSentByMe -> DEBU 34a2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34a6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.913 UTC [gossip.gossip] handleMessage -> DEBU 34a7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.914 UTC [msp.identity] Verify -> DEBU 34a8 Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +peer0.org1.example.com | 00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +peer0.org1.example.com | "2019-09-24 01:05:22.914 UTC [msp.identity] Verify -> DEBU 34a9 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +peer0.org1.example.com | 00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +peer0.org1.example.com | 00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +peer0.org1.example.com | 00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +peer0.org1.example.com | 00000040 5c ba 34 3b 4a cf |\.4;J.|" +peer0.org1.example.com | "2019-09-24 01:05:22.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 34aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.915 UTC [gossip.discovery] isSentByMe -> DEBU 34ab Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ac Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34ad Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.916 UTC [msp] DeserializeIdentity -> DEBU 34ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.918 UTC [cauthdsl] func1 -> DEBU 34b5 0xc002762120 gate 1569287122918744300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.918 UTC [cauthdsl] func2 -> DEBU 34b6 0xc002762120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b7 0xc002762120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b8 0xc002762120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b9 0xc002762120 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.920 UTC [cauthdsl] func1 -> DEBU 34ba 0xc002762120 gate 1569287122918744300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:22.921 UTC [cauthdsl] func1 -> DEBU 34be 0xc0027629e0 gate 1569287122921352000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:22.921 UTC [cauthdsl] func2 -> DEBU 34bf 0xc0027629e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:22.921 UTC [cauthdsl] func2 -> DEBU 34c0 0xc0027629e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:22.922 UTC [cauthdsl] func2 -> DEBU 34c1 0xc0027629e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.922 UTC [msp.identity] Verify -> DEBU 34c2 Verify: digest = 00000000 2c 1e 36 ad a5 25 a9 3b 80 6c e7 88 4f e9 13 d8 |,.6..%.;.l..O...| +peer0.org1.example.com | 00000010 3a 82 ec d7 36 24 01 c8 2f f8 c6 44 8e 70 e3 f1 |:...6$../..D.p..|" +peer0.org1.example.com | "2019-09-24 01:05:22.922 UTC [msp.identity] Verify -> DEBU 34c3 Verify: sig = 00000000 30 45 02 21 00 86 6f d9 12 d6 86 e7 67 d8 71 76 |0E.!..o.....g.qv| +peer0.org1.example.com | 00000010 a9 09 1c 32 0f 6b 24 11 ce 84 d9 7b 03 4c e5 4c |...2.k$....{.L.L| +peer0.org1.example.com | 00000020 8f af 41 6a 06 02 20 0a ec 2e f1 39 9e 83 30 88 |..Aj.. ....9..0.| +peer0.org1.example.com | 00000030 d0 d3 49 34 97 02 3c 38 ce 16 09 7f f4 60 28 6b |..I4..<8.....`(k| +peer0.org1.example.com | 00000040 c2 b8 0a 40 fc ab 2d |...@..-|" +peer0.org1.example.com | "2019-09-24 01:05:22.923 UTC [cauthdsl] func2 -> DEBU 34c4 0xc0027629e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:22.923 UTC [cauthdsl] func1 -> DEBU 34c5 0xc0027629e0 gate 1569287122921352000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:22.923 UTC [policies] Evaluate -> DEBU 34c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.924 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.924 UTC [policies] Evaluate -> DEBU 34c8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.925 UTC [policies] Evaluate -> DEBU 34c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:22.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 34cb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34cc Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:22.926 UTC [msp.identity] Verify -> DEBU 34cd Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +peer0.org1.example.com | 00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +peer0.org1.example.com | "2019-09-24 01:05:22.927 UTC [msp.identity] Verify -> DEBU 34ce Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +peer0.org1.example.com | 00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +peer0.org1.example.com | 00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +peer0.org1.example.com | 00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +peer0.org1.example.com | 00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +peer0.org1.example.com | "2019-09-24 01:05:22.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 34cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:22.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:22.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.514 UTC [gossip.comm] func1 -> DEBU 34d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.514 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.514 UTC [gossip.gossip] handleMessage -> DEBU 34d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.516 UTC [gossip.comm] func1 -> DEBU 34d7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34d8 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:23.517 UTC [msp.identity] Verify -> DEBU 34d9 Verify: digest = 00000000 70 7a c9 73 7a 3f 46 1d 7c 8b 81 bd d4 8c 33 74 |pz.sz?F.|.....3t| +peer0.org1.example.com | 00000010 6c c1 fd 4f ba db f0 fa de 29 db 96 18 9c d8 74 |l..O.....).....t|" +peer0.org1.example.com | "2019-09-24 01:05:23.517 UTC [msp.identity] Verify -> DEBU 34db Verify: sig = 00000000 30 45 02 21 00 e2 9f a1 4f 10 cd 17 d7 51 99 bc |0E.!....O....Q..| +peer0.org1.example.com | 00000010 b2 e6 29 97 e7 0a d7 53 84 21 0c 76 1a 44 e8 8a |..)....S.!.v.D..| +peer0.org1.example.com | 00000020 73 80 8e 41 1a 02 20 56 0b ea f4 31 3a b3 8e 29 |s..A.. V...1:..)| +peer0.org1.example.com | 00000030 74 ab 88 0d b2 3c ea 8b ee 78 7c db e2 8c f2 7e |t....<...x|....~| +peer0.org1.example.com | 00000040 8a fb 4d 0c 3b dd d1 |..M.;..|" +peer0.org1.example.com | "2019-09-24 01:05:23.516 UTC [gossip.gossip] handleMessage -> DEBU 34da Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.514 UTC [gossip.comm] func1 -> DEBU 34d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 34dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 34dd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:23.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 34de updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:23.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 34df Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 34e0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 34e1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] handleAliveMessage -> DEBU 34e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34ea Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.527 UTC [msp] DeserializeIdentity -> DEBU 34eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:23.527 UTC [msp] DeserializeIdentity -> DEBU 34ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:23.528 UTC [gossip.comm] Send -> DEBU 34ed Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:23.529 UTC [msp] DeserializeIdentity -> DEBU 34ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:23.530 UTC [gossip.comm] Send -> DEBU 34f0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:23.529 UTC [gossip.comm] sendToEndpoint -> DEBU 34ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.530 UTC [gossip.comm] sendToEndpoint -> DEBU 34f1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:23.531 UTC [gossip.comm] sendToEndpoint -> DEBU 34f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:23.531 UTC [gossip.comm] sendToEndpoint -> DEBU 34f3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.136 UTC [gossip.comm] func1 -> DEBU 34f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.136 UTC [gossip.gossip] handleMessage -> DEBU 34f5 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.136 UTC [gossip.gossip] handleMessage -> DEBU 34f9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.144 UTC [gossip.gossip] handleMessage -> DEBU 34fa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.145 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34fc Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:24.145 UTC [msp] DeserializeIdentity -> DEBU 34fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ff Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3500 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:24.146 UTC [policies] Evaluate -> DEBU 3501 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.149 UTC [policies] Evaluate -> DEBU 3503 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:24.149 UTC [policies] Evaluate -> DEBU 3504 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.149 UTC [cauthdsl] func1 -> DEBU 3505 0xc002675240 gate 1569287124149903900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:24.149 UTC [cauthdsl] func2 -> DEBU 3506 0xc002675240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3507 0xc002675240 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3508 0xc002675240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:24.149 UTC [gossip.comm] func1 -> DEBU 3502 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3509 0xc002675240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:24.154 UTC [cauthdsl] func1 -> DEBU 350a 0xc002675240 gate 1569287124149903900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:24.154 UTC [policies] Evaluate -> DEBU 350b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.154 UTC [policies] Evaluate -> DEBU 350c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.155 UTC [policies] Evaluate -> DEBU 350d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.155 UTC [cauthdsl] func1 -> DEBU 350e 0xc002675a80 gate 1569287124155141500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 350f 0xc002675a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 3510 0xc002675a80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 3511 0xc002675a80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:24.158 UTC [gossip.comm] func1 -> DEBU 3512 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.156 UTC [msp.identity] Verify -> DEBU 3513 Verify: digest = 00000000 51 7f dd 77 51 60 4f 4c d6 11 0f 13 07 3a 33 9f |Q..wQ`OL.....:3.| +peer0.org1.example.com | 00000010 3b 07 81 29 a1 5f a1 0f 35 3a 6f a8 64 28 33 72 |;..)._..5:o.d(3r|" +peer0.org1.example.com | "2019-09-24 01:05:24.158 UTC [msp.identity] Verify -> DEBU 3514 Verify: sig = 00000000 30 45 02 21 00 df ba 94 a7 91 29 30 e9 5b d1 a7 |0E.!......)0.[..| +peer0.org1.example.com | 00000010 a5 4b 7d 4b 61 d4 b6 9c 0f 24 c9 40 72 c4 7c ab |.K}Ka....$.@r.|.| +peer0.org1.example.com | 00000020 5c b1 ff 3e 10 02 20 18 de 36 96 6c 26 90 4b 96 |\..>.. ..6.l&.K.| +peer0.org1.example.com | 00000030 61 92 79 6a 82 02 63 de de 73 f6 be 6c b7 50 89 |a.yj..c..s..l.P.| +peer0.org1.example.com | 00000040 cd 24 29 d0 0a c1 fc |.$)....|" +peer0.org1.example.com | "2019-09-24 01:05:24.159 UTC [cauthdsl] func2 -> DEBU 3515 0xc002675a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:24.159 UTC [cauthdsl] func1 -> DEBU 3516 0xc002675a80 gate 1569287124155141500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:24.160 UTC [policies] Evaluate -> DEBU 3517 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.160 UTC [policies] Evaluate -> DEBU 3518 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.161 UTC [policies] Evaluate -> DEBU 3519 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.163 UTC [policies] Evaluate -> DEBU 351a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 351b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 351c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:24.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 351d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:24.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 351e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:24.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 351f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:24.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 3520 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3521 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3522 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.167 UTC [gossip.gossip] handleMessage -> DEBU 3523 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.167 UTC [gossip.gossip] handleMessage -> DEBU 3524 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3526 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:24.167 UTC [msp] DeserializeIdentity -> DEBU 3527 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3528 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3529 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 352a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 352e 0xc00266bb90 gate 1569287124169400900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 352f 0xc00266bb90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3530 0xc00266bb90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3531 0xc00266bb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3532 0xc00266bb90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 3533 0xc00266bb90 gate 1569287124169400900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3534 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3536 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 3537 0xc0026404a0 gate 1569287124169659900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 3539 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.172 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.174 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.175 UTC [msp] DeserializeIdentity -> DEBU 3541 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.175 UTC [gossip.comm] Send -> DEBU 3542 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3538 0xc0026404a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:24.180 UTC [cauthdsl] func2 -> DEBU 3547 0xc0026404a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:24.180 UTC [cauthdsl] func2 -> DEBU 3548 0xc0026404a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:24.181 UTC [msp.identity] Verify -> DEBU 3549 Verify: digest = 00000000 54 5a b6 9e 78 d3 d6 b9 c5 72 e8 6d 99 bb 71 71 |TZ..x....r.m..qq| +peer0.org1.example.com | 00000010 1d 57 60 91 eb 63 40 a4 c4 f0 12 b4 ab e7 6c 89 |.W`..c@.......l.|" +peer0.org1.example.com | "2019-09-24 01:05:24.182 UTC [msp.identity] Verify -> DEBU 354a Verify: sig = 00000000 30 44 02 20 64 09 01 58 97 a8 18 ba 55 15 07 2f |0D. d..X....U../| +peer0.org1.example.com | 00000010 da 92 52 75 24 4e 5a 41 5f 68 79 4b 9a c2 3b 3f |..Ru$NZA_hyK..;?| +peer0.org1.example.com | 00000020 5d c9 d6 e6 02 20 68 49 83 27 59 89 a6 07 16 7f |].... hI.'Y.....| +peer0.org1.example.com | 00000030 3c 24 c5 1f 8c 67 29 b6 70 b0 c1 71 81 c3 55 8a |<$...g).p..q..U.| +peer0.org1.example.com | 00000040 8c bd 70 79 10 f1 |..py..|" +peer0.org1.example.com | "2019-09-24 01:05:24.184 UTC [cauthdsl] func2 -> DEBU 354b 0xc0026404a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:24.184 UTC [cauthdsl] func1 -> DEBU 354c 0xc0026404a0 gate 1569287124169659900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.186 UTC [policies] Evaluate -> DEBU 3550 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:24.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3551 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:24.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:24.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 3554 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:24.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 3555 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:24.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 3556 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 3557 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3558 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.203 UTC [gossip.gossip] handleMessage -> DEBU 3559 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.204 UTC [gossip.gossip] handleMessage -> DEBU 355a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.206 UTC [gossip.gossip] handleMessage -> DEBU 355d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.207 UTC [gossip.gossip] handleMessage -> DEBU 355e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3560 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.208 UTC [gossip.gossip] handleMessage -> DEBU 3561 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.208 UTC [gossip.gossip] handleMessage -> DEBU 3562 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3563 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3564 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3565 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3566 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3567 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3568 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3569 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.209 UTC [gossip.comm] Send -> DEBU 356a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.210 UTC [msp] DeserializeIdentity -> DEBU 356b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.210 UTC [gossip.comm] Send -> DEBU 356c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 3570 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.217 UTC [msp] GetDefaultSigningIdentity -> DEBU 3571 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3572 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151027 " +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3573 Sign: digest: 52293E4BDFB62DE3177E5E322DD07855E065E87E552F03C97A56954DABAD5EEB " +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [msp] GetDefaultSigningIdentity -> DEBU 3574 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3575 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3576 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3577 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3578 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3579 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.220 UTC [gossip.gossip] handleMessage -> DEBU 357b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.220 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 357d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 357e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [gossip.comm] Send -> DEBU 357f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 3580 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [gossip.comm] Send -> DEBU 3581 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 3582 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:24.244 UTC [gossip.comm] sendToEndpoint -> DEBU 3583 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.244 UTC [gossip.comm] sendToEndpoint -> DEBU 3584 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.265 UTC [gossip.comm] Send -> DEBU 3585 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:24.267 UTC [gossip.comm] sendToEndpoint -> DEBU 3586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.267 UTC [gossip.comm] sendToEndpoint -> DEBU 3587 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.268 UTC [gossip.comm] func1 -> DEBU 3588 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.269 UTC [gossip.gossip] handleMessage -> DEBU 3589 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.269 UTC [gossip.gossip] handleMessage -> DEBU 358a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.269 UTC [gossip.discovery] handleMsgFromComm -> DEBU 358b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.270 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:24.270 UTC [msp.identity] Verify -> DEBU 358d Verify: digest = 00000000 52 29 3e 4b df b6 2d e3 17 7e 5e 32 2d d0 78 55 |R)>K..-..~^2-.xU| +peer0.org1.example.com | 00000010 e0 65 e8 7e 55 2f 03 c9 7a 56 95 4d ab ad 5e eb |.e.~U/..zV.M..^.|" +peer0.org1.example.com | "2019-09-24 01:05:24.271 UTC [msp.identity] Verify -> DEBU 358e Verify: sig = 00000000 30 44 02 20 45 0a f6 b1 c7 8a 74 a8 5f 32 8d c2 |0D. E.....t._2..| +peer0.org1.example.com | 00000010 f1 4d c1 2d 10 31 f2 c3 60 f8 b5 64 62 21 1e 65 |.M.-.1..`..db!.e| +peer0.org1.example.com | 00000020 2f e4 75 49 02 20 65 70 4f 0c 9c d0 a8 6e 7d c5 |/.uI. epO....n}.| +peer0.org1.example.com | 00000030 1a d8 f8 5b bb 5d a4 9e 3e 40 e4 d3 4b d8 1c 95 |...[.]..>@..K...| +peer0.org1.example.com | 00000040 9f 38 4a ec 65 c9 |.8J.e.|" +peer0.org1.example.com | "2019-09-24 01:05:24.271 UTC [gossip.discovery] isSentByMe -> DEBU 358f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.272 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3590 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3591 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.273 UTC [gossip.comm] sendToEndpoint -> DEBU 3592 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.277 UTC [gossip.comm] func1 -> DEBU 3593 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.278 UTC [gossip.gossip] handleMessage -> DEBU 3594 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.278 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:24.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.279 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3597 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:24.279 UTC [msp.identity] Verify -> DEBU 3598 Verify: digest = 00000000 52 29 3e 4b df b6 2d e3 17 7e 5e 32 2d d0 78 55 |R)>K..-..~^2-.xU| +peer0.org1.example.com | 00000010 e0 65 e8 7e 55 2f 03 c9 7a 56 95 4d ab ad 5e eb |.e.~U/..zV.M..^.|" +peer0.org1.example.com | "2019-09-24 01:05:24.279 UTC [msp.identity] Verify -> DEBU 3599 Verify: sig = 00000000 30 44 02 20 45 0a f6 b1 c7 8a 74 a8 5f 32 8d c2 |0D. E.....t._2..| +peer0.org1.example.com | 00000010 f1 4d c1 2d 10 31 f2 c3 60 f8 b5 64 62 21 1e 65 |.M.-.1..`..db!.e| +peer0.org1.example.com | 00000020 2f e4 75 49 02 20 65 70 4f 0c 9c d0 a8 6e 7d c5 |/.uI. epO....n}.| +peer0.org1.example.com | 00000030 1a d8 f8 5b bb 5d a4 9e 3e 40 e4 d3 4b d8 1c 95 |...[.]..>@..K...| +peer0.org1.example.com | 00000040 9f 38 4a ec 65 c9 |.8J.e.|" +peer0.org1.example.com | "2019-09-24 01:05:24.280 UTC [gossip.discovery] isSentByMe -> DEBU 359a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:24.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.653 UTC [msp] DeserializeIdentity -> DEBU 359c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] Send -> DEBU 359e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 359f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [gossip.comm] func1 -> DEBU 35a5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [gossip.gossip] handleMessage -> DEBU 35a6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [gossip.comm] func1 -> DEBU 35aa Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.655 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ac Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ad Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35b1 0xc0025f7ec0 gate 1569287125656415500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b2 0xc0025f7ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b3 0xc0025f7ec0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b4 0xc0025f7ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b5 0xc0025f7ec0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35b6 0xc0025f7ec0 gate 1569287125656415500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35ba 0xc0025e07a0 gate 1569287125656864600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bb 0xc0025e07a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bc 0xc0025e07a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bd 0xc0025e07a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35be Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35bf Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [cauthdsl] func2 -> DEBU 35c0 0xc0025e07a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [cauthdsl] func1 -> DEBU 35c1 0xc0025e07a0 gate 1569287125656864600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c6 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c7 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c8 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 35c9 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp] DeserializeIdentity -> DEBU 35ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.657 UTC [msp] DeserializeIdentity -> DEBU 35cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35d2 0xc002592ef0 gate 1569287125658193300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d3 0xc002592ef0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d4 0xc002592ef0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d5 0xc002592ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d6 0xc002592ef0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35d7 0xc002592ef0 gate 1569287125658193300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35db 0xc0025937b0 gate 1569287125658442200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35dc 0xc0025937b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0025937b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35de 0xc0025937b0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [msp.identity] Verify -> DEBU 35df Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [msp.identity] Verify -> DEBU 35e0 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35e1 0xc0025937b0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35e2 0xc0025937b0 gate 1569287125658442200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [gossip.gossip] handleMessage -> DEBU 35e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [gossip.gossip] handleMessage -> DEBU 35e8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.658 UTC [msp] DeserializeIdentity -> DEBU 35ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [msp] DeserializeIdentity -> DEBU 35eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ed Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ee Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [gossip.comm] func1 -> DEBU 35f1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35f3 0xc00257f910 gate 1569287125659309000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f4 0xc00257f910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f5 0xc00257f910 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f6 0xc00257f910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f7 0xc00257f910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35f8 0xc00257f910 gate 1569287125659309000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35fc 0xc00256e1d0 gate 1569287125659553500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35fd 0xc00256e1d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35fe 0xc00256e1d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35ff 0xc00256e1d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [msp.identity] Verify -> DEBU 3600 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [msp.identity] Verify -> DEBU 3601 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 3602 0xc00256e1d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 3603 0xc00256e1d0 gate 1569287125659553500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 3604 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 3605 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [policies] Evaluate -> DEBU 3606 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [policies] Evaluate -> DEBU 3607 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 3608 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 3609 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 360a Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 360b Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [msp] DeserializeIdentity -> DEBU 360c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [msp] DeserializeIdentity -> DEBU 360d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 360f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3610 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3614 0xc0024ea8a0 gate 1569287125661087800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3615 0xc0024ea8a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3616 0xc0024ea8a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3617 0xc0024ea8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3618 0xc0024ea8a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3619 0xc0024ea8a0 gate 1569287125661087800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 361d 0xc0024eb0e0 gate 1569287125661327800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 361e 0xc0024eb0e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 361f 0xc0024eb0e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3620 0xc0024eb0e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 3621 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 3622 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3623 0xc0024eb0e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3624 0xc0024eb0e0 gate 1569287125661327800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3627 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [gossip.gossip] handleMessage -> DEBU 3629 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [gossip.gossip] handleMessage -> DEBU 362a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 362b Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 362c Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [msp] DeserializeIdentity -> DEBU 362f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [msp] DeserializeIdentity -> DEBU 3630 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3631 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3632 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3633 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3634 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3635 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [cauthdsl] func1 -> DEBU 3637 0xc0024df9d0 gate 1569287125662890900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 3638 0xc0024df9d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 3639 0xc0024df9d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 363a 0xc0024df9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 363b 0xc0024df9d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 363c 0xc0024df9d0 gate 1569287125662890900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3640 0xc0024d2320 gate 1569287125663133200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3641 0xc0024d2320 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3642 0xc0024d2320 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3643 0xc0024d2320 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [msp.identity] Verify -> DEBU 3644 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [msp.identity] Verify -> DEBU 3645 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3646 0xc0024d2320 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3647 0xc0024d2320 gate 1569287125663133200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3648 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3649 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 364a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 364b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [msp] DeserializeIdentity -> DEBU 364c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [msp] DeserializeIdentity -> DEBU 364d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 364e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 364f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3650 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3651 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3652 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3653 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3654 0xc0024d3af0 gate 1569287125663969500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3655 0xc0024d3af0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3656 0xc0024d3af0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3657 0xc0024d3af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3658 0xc0024d3af0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 3659 0xc0024d3af0 gate 1569287125663969500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 365d 0xc0024c4340 gate 1569287125664335500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 365e 0xc0024c4340 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 365f 0xc0024c4340 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3660 0xc0024c4340 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [msp.identity] Verify -> DEBU 3661 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [msp.identity] Verify -> DEBU 3662 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3663 0xc0024c4340 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 3664 0xc0024c4340 gate 1569287125664335500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3665 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3666 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3667 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3668 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:25.664 UTC [gossip.gossip] handleMessage -> DEBU 3669 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.686 UTC [gossip.privdata] run -> DEBU 366a Start reconcile missing private info" +peer0.org1.example.com | "2019-09-24 01:05:25.686 UTC [leveldbhelper] GetIterator -> DEBU 366b Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +peer0.org1.example.com | "2019-09-24 01:05:25.686 UTC [gossip.privdata] reconcile -> DEBU 366c Reconciliation cycle finished successfully. no items to reconcile" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 366d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [gossip.pull] Hello -> DEBU 366f Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 3670 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 3671 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [gossip.comm] Send -> DEBU 3672 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3673 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3674 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.720 UTC [gossip.comm] func1 -> DEBU 3675 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.720 UTC [gossip.gossip] handleMessage -> DEBU 3676 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.720 UTC [gossip.pull] HandleMessage -> DEBU 3677 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.720 UTC [gossip.gossip] handleMessage -> DEBU 3678 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.838 UTC [gossip.comm] func1 -> DEBU 3679 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.838 UTC [gossip.gossip] handleMessage -> DEBU 367a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.838 UTC [msp] DeserializeIdentity -> DEBU 367b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.838 UTC [msp] DeserializeIdentity -> DEBU 367c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:25.838 UTC [gossip.gossip] handleMessage -> DEBU 367d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:25.861 UTC [gossip.comm] func1 -> DEBU 367e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.861 UTC [gossip.gossip] handleMessage -> DEBU 367f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.861 UTC [gossip.pull] HandleMessage -> DEBU 3680 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:25.861 UTC [gossip.pull] SendDigest -> DEBU 3681 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:25.861 UTC [gossip.gossip] handleMessage -> DEBU 3682 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [gossip.comm] func1 -> DEBU 3683 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [gossip.gossip] handleMessage -> DEBU 3684 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3685 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3686 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3687 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.041 UTC [gossip.gossip] handleMessage -> DEBU 3688 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.241 UTC [gossip.comm] func1 -> DEBU 3689 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.241 UTC [gossip.gossip] handleMessage -> DEBU 368a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.242 UTC [gossip.gossip] handleMessage -> DEBU 368e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.483 UTC [gossip.comm] func1 -> DEBU 368f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.483 UTC [gossip.gossip] handleMessage -> DEBU 3690 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.483 UTC [gossip.pull] HandleMessage -> DEBU 3691 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.483 UTC [gossip.pull] SendDigest -> DEBU 3692 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:26.483 UTC [gossip.gossip] handleMessage -> DEBU 3693 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.487 UTC [gossip.comm] func1 -> DEBU 3694 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [gossip.gossip] handleMessage -> DEBU 3695 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [gossip.gossip] handleMessage -> DEBU 3696 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3697 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3698 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 3699 Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +peer0.org1.example.com | 00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369a Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +peer0.org1.example.com | 00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +peer0.org1.example.com | 00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +peer0.org1.example.com | 00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +peer0.org1.example.com | 00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369c Verify: sig = 00000000 30 45 02 21 00 c1 be d3 05 e1 60 17 b9 99 a9 d9 |0E.!......`.....| +peer0.org1.example.com | 00000010 b0 e2 2f f9 41 90 a7 9f c6 4a 4c 94 c4 e2 09 c4 |../.A....JL.....| +peer0.org1.example.com | 00000020 0d 97 6a 0a 02 02 20 2c b6 bd df f0 33 e8 f7 1b |..j... ,....3...| +peer0.org1.example.com | 00000030 c4 a9 4b 2c b3 ec 4d 4c 6b ea 3a e1 98 3c d2 94 |..K,..MLk.:..<..| +peer0.org1.example.com | 00000040 95 cf 85 3a f1 02 8a |...:...|" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] handleAliveMessage -> DEBU 369d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] sendMemResponse -> DEBU 36a5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [msp] DeserializeIdentity -> DEBU 36a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.comm] Send -> DEBU 36a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.discovery] sendMemResponse -> DEBU 36a9 Exiting, replying with alive: > alive:@\344\323K\330\034\225\2378J\354e\311" > " +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.489 UTC [gossip.comm] sendToEndpoint -> DEBU 36ab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.718 UTC [gossip.election] waitForInterrupt -> DEBU 36ac d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.718 UTC [gossip.election] IsLeader -> DEBU 36ad d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:26.718 UTC [msp] GetDefaultSigningIdentity -> DEBU 36ae Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:26.719 UTC [msp.identity] Sign -> DEBU 36af Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100D1801 " +peer0.org1.example.com | "2019-09-24 01:05:26.719 UTC [msp.identity] Sign -> DEBU 36b0 Sign: digest: 4DD8F1ECB91763A4BE4D5B744D96A25BC50A62EB5B8531897BD750AC927040E0 " +peer0.org1.example.com | "2019-09-24 01:05:26.720 UTC [gossip.election] waitForInterrupt -> DEBU 36b1 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [gossip.comm] Send -> DEBU 36b6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.725 UTC [gossip.comm] sendToEndpoint -> DEBU 36b9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.725 UTC [gossip.comm] sendToEndpoint -> DEBU 36ba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.785 UTC [gossip.comm] func1 -> DEBU 36bb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.786 UTC [gossip.gossip] handleMessage -> DEBU 36bc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.786 UTC [gossip.pull] HandleMessage -> DEBU 36bd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.786 UTC [msp] DeserializeIdentity -> DEBU 36be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.786 UTC [msp] DeserializeIdentity -> DEBU 36bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.788 UTC [msp] DeserializeIdentity -> DEBU 36c3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.788 UTC [gossip.pull] SendDigest -> DEBU 36c4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:26.789 UTC [gossip.gossip] handleMessage -> DEBU 36c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.802 UTC [gossip.comm] func1 -> DEBU 36c6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.802 UTC [gossip.gossip] handleMessage -> DEBU 36c7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.804 UTC [gossip.gossip] handleMessage -> DEBU 36c8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36c9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36ca Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.806 UTC [msp] DeserializeIdentity -> DEBU 36cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:26.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.810 UTC [cauthdsl] func1 -> DEBU 36d2 0xc000390d40 gate 1569287126810148500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d3 0xc000390d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d4 0xc000390d40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d5 0xc000390d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:26.811 UTC [cauthdsl] func2 -> DEBU 36d6 0xc000390d40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.811 UTC [cauthdsl] func1 -> DEBU 36d7 0xc000390d40 gate 1569287126810148500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.811 UTC [policies] Evaluate -> DEBU 36d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.811 UTC [policies] Evaluate -> DEBU 36d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.814 UTC [policies] Evaluate -> DEBU 36da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.816 UTC [cauthdsl] func1 -> DEBU 36db 0xc000391580 gate 1569287126816349700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.816 UTC [cauthdsl] func2 -> DEBU 36dc 0xc000391580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.816 UTC [cauthdsl] func2 -> DEBU 36dd 0xc000391580 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.817 UTC [cauthdsl] func2 -> DEBU 36de 0xc000391580 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.817 UTC [msp.identity] Verify -> DEBU 36df Verify: digest = 00000000 35 95 ca b1 a5 fd eb ed 53 7c c4 72 9a 62 85 2a |5.......S|.r.b.*| +peer0.org1.example.com | 00000010 db 60 0a 99 2f a2 ca 21 28 19 ed 39 73 ce b9 42 |.`../..!(..9s..B|" +peer0.org1.example.com | "2019-09-24 01:05:26.817 UTC [msp.identity] Verify -> DEBU 36e0 Verify: sig = 00000000 30 44 02 20 5e b5 c6 3d 09 8e 1c 51 23 45 96 01 |0D. ^..=...Q#E..| +peer0.org1.example.com | 00000010 5d 4f c2 d2 04 9f d7 f0 aa 78 76 88 fc e0 37 0d |]O.......xv...7.| +peer0.org1.example.com | 00000020 66 a9 5b d2 02 20 40 0b 3d 98 ba 23 5f fd b0 44 |f.[.. @.=..#_..D| +peer0.org1.example.com | 00000030 0d 44 1c 88 4c 88 a9 de ac 03 a4 e2 75 a3 0a d8 |.D..L.......u...| +peer0.org1.example.com | 00000040 f1 ef dd 3c 34 97 |...<4.|" +peer0.org1.example.com | "2019-09-24 01:05:26.818 UTC [cauthdsl] func2 -> DEBU 36e1 0xc000391580 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.818 UTC [cauthdsl] func1 -> DEBU 36e2 0xc000391580 gate 1569287126816349700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.819 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.819 UTC [gossip.discovery] handleAliveMessage -> DEBU 36e7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 36e8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36e9 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36ea Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36eb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36ec Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 36ed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36ee Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.821 UTC [gossip.discovery] sendMemResponse -> DEBU 36ef Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:26.822 UTC [msp] DeserializeIdentity -> DEBU 36f0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.822 UTC [msp] DeserializeIdentity -> DEBU 36f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.824 UTC [msp] DeserializeIdentity -> DEBU 36f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.825 UTC [gossip.comm] Send -> DEBU 36f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.825 UTC [gossip.comm] sendToEndpoint -> DEBU 36f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.825 UTC [gossip.comm] sendToEndpoint -> DEBU 36f5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.826 UTC [gossip.discovery] sendMemResponse -> DEBU 36f6 Exiting, replying with alive: alive: alive: alive:@\344\323K\330\034\225\2378J\354e\311" > " +peer0.org1.example.com | "2019-09-24 01:05:26.838 UTC [gossip.pull] Hello -> DEBU 36f7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:26.839 UTC [gossip.comm] Send -> DEBU 36f8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.839 UTC [gossip.pull] Hello -> DEBU 36f9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:26.840 UTC [gossip.comm] Send -> DEBU 36fa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.841 UTC [gossip.pull] Hello -> DEBU 36fb Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:26.842 UTC [gossip.comm] Send -> DEBU 36fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.842 UTC [gossip.comm] sendToEndpoint -> DEBU 36fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.842 UTC [gossip.comm] sendToEndpoint -> DEBU 36fe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 36ff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3700 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3701 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3702 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [gossip.comm] func1 -> DEBU 3703 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [gossip.gossip] handleMessage -> DEBU 3704 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [gossip.pull] HandleMessage -> DEBU 3705 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3706 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3707 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3708 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 3709 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 370a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 370b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.848 UTC [gossip.pull] SendDigest -> DEBU 370c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:26.848 UTC [gossip.gossip] handleMessage -> DEBU 370d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.849 UTC [gossip.comm] func1 -> DEBU 370e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.849 UTC [gossip.gossip] handleMessage -> DEBU 370f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.849 UTC [gossip.pull] HandleMessage -> DEBU 3710 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.850 UTC [gossip.gossip] handleMessage -> DEBU 3711 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.851 UTC [gossip.comm] func1 -> DEBU 3712 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.851 UTC [gossip.gossip] handleMessage -> DEBU 3713 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.851 UTC [gossip.pull] HandleMessage -> DEBU 3714 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.851 UTC [gossip.gossip] handleMessage -> DEBU 3715 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.852 UTC [gossip.comm] func1 -> DEBU 3716 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.852 UTC [gossip.gossip] handleMessage -> DEBU 3717 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.853 UTC [gossip.pull] HandleMessage -> DEBU 3718 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.853 UTC [gossip.gossip] handleMessage -> DEBU 3719 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.868 UTC [gossip.comm] func1 -> DEBU 371a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.869 UTC [gossip.gossip] handleMessage -> DEBU 371b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.869 UTC [gossip.gossip] handleMessage -> DEBU 371c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 371d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 371e Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.870 UTC [msp] DeserializeIdentity -> DEBU 371f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3720 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:26.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3721 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3722 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.871 UTC [policies] Evaluate -> DEBU 3723 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.871 UTC [policies] Evaluate -> DEBU 3724 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:26.872 UTC [policies] Evaluate -> DEBU 3725 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.872 UTC [cauthdsl] func1 -> DEBU 3726 0xc0003f8220 gate 1569287126872369700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.872 UTC [cauthdsl] func2 -> DEBU 3727 0xc0003f8220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.872 UTC [cauthdsl] func2 -> DEBU 3728 0xc0003f8220 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.873 UTC [cauthdsl] func2 -> DEBU 3729 0xc0003f8220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:26.873 UTC [cauthdsl] func2 -> DEBU 372a 0xc0003f8220 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.873 UTC [cauthdsl] func1 -> DEBU 372b 0xc0003f8220 gate 1569287126872369700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.873 UTC [policies] Evaluate -> DEBU 372c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.874 UTC [policies] Evaluate -> DEBU 372d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.874 UTC [policies] Evaluate -> DEBU 372e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.874 UTC [cauthdsl] func1 -> DEBU 372f 0xc0003f8a70 gate 1569287126874614400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.874 UTC [cauthdsl] func2 -> DEBU 3730 0xc0003f8a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.875 UTC [cauthdsl] func2 -> DEBU 3731 0xc0003f8a70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.875 UTC [cauthdsl] func2 -> DEBU 3732 0xc0003f8a70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.875 UTC [msp.identity] Verify -> DEBU 3733 Verify: digest = 00000000 88 64 10 77 0c 76 79 07 2b 24 1e e0 2b 19 6a c0 |.d.w.vy.+$..+.j.| +peer0.org1.example.com | 00000010 ed bd ec c6 a1 1b d3 80 f8 9c b9 a5 04 28 34 60 |.............(4`|" +peer0.org1.example.com | "2019-09-24 01:05:26.876 UTC [msp.identity] Verify -> DEBU 3734 Verify: sig = 00000000 30 44 02 20 3f 35 c6 87 57 dd 59 db c4 e1 d8 c4 |0D. ?5..W.Y.....| +peer0.org1.example.com | 00000010 19 24 d2 a2 59 af 90 e8 88 8a 7a 52 a0 28 7f ae |.$..Y.....zR.(..| +peer0.org1.example.com | 00000020 98 6d 15 e2 02 20 2f 87 43 67 c3 91 45 58 3b e9 |.m... /.Cg..EX;.| +peer0.org1.example.com | 00000030 fe b5 bd 8d c8 67 2d 95 dd ca c2 18 06 a3 e3 78 |.....g-........x| +peer0.org1.example.com | 00000040 b9 ef 3b f1 77 84 |..;.w.|" +peer0.org1.example.com | "2019-09-24 01:05:26.876 UTC [cauthdsl] func2 -> DEBU 3735 0xc0003f8a70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.876 UTC [cauthdsl] func1 -> DEBU 3736 0xc0003f8a70 gate 1569287126874614400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:26.876 UTC [policies] Evaluate -> DEBU 3737 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 3738 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 3739 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 373a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 373b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373d updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373e Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:26.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 3740 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 3741 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3742 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.879 UTC [gossip.discovery] sendMemResponse -> DEBU 3743 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3744 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3746 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.880 UTC [gossip.comm] Send -> DEBU 3747 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.881 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.881 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.882 UTC [gossip.discovery] sendMemResponse -> DEBU 374a Exiting, replying with alive: alive: alive: alive:@\344\323K\330\034\225\2378J\354e\311" > " +peer0.org1.example.com | "2019-09-24 01:05:26.885 UTC [msp] GetDefaultSigningIdentity -> DEBU 374b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:26.886 UTC [msp.identity] Sign -> DEBU 374c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151028 " +peer0.org1.example.com | "2019-09-24 01:05:26.886 UTC [msp.identity] Sign -> DEBU 374d Sign: digest: 61A074C76E9F0A554F260C0AD0EC04E376AF871C95F33338DDB16C704EB1CFC1 " +peer0.org1.example.com | "2019-09-24 01:05:26.887 UTC [msp] GetDefaultSigningIdentity -> DEBU 374e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:26.887 UTC [msp.identity] Sign -> DEBU 374f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:26.887 UTC [msp.identity] Sign -> DEBU 3750 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:26.887 UTC [msp] DeserializeIdentity -> DEBU 3751 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.888 UTC [gossip.comm] Send -> DEBU 3752 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [msp] DeserializeIdentity -> DEBU 3753 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [gossip.comm] Send -> DEBU 3754 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [gossip.comm] Send -> DEBU 3755 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3756 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3757 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3758 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3759 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 375a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 375b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.899 UTC [gossip.comm] func1 -> DEBU 375c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.900 UTC [gossip.gossip] handleMessage -> DEBU 375d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.900 UTC [gossip.gossip] handleMessage -> DEBU 375e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 375f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3760 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.901 UTC [msp.identity] Verify -> DEBU 3761 Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +peer0.org1.example.com | 00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +peer0.org1.example.com | "2019-09-24 01:05:26.901 UTC [msp.identity] Verify -> DEBU 3762 Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +peer0.org1.example.com | 00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +peer0.org1.example.com | 00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +peer0.org1.example.com | 00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +peer0.org1.example.com | 00000040 ac c2 c9 2b 34 c2 |...+4.|" +peer0.org1.example.com | "2019-09-24 01:05:26.902 UTC [msp.identity] Verify -> DEBU 3763 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:26.903 UTC [msp.identity] Verify -> DEBU 3764 Verify: sig = 00000000 30 44 02 20 33 69 14 14 24 b7 6a 85 bd 82 ec ba |0D. 3i..$.j.....| +peer0.org1.example.com | 00000010 6e fe 6f 45 1c d0 43 f2 2a 0d 80 82 66 8f 68 f8 |n.oE..C.*...f.h.| +peer0.org1.example.com | 00000020 06 53 b3 a4 02 20 7a 07 fb 2f 4e 51 ab aa 59 76 |.S... z../NQ..Yv| +peer0.org1.example.com | 00000030 f1 d5 6b 85 18 e2 f7 b8 86 eb 28 cb 7b 24 c3 c1 |..k.......(.{$..| +peer0.org1.example.com | 00000040 0f 2b b2 db 10 d5 |.+....|" +peer0.org1.example.com | "2019-09-24 01:05:26.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3765 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.903 UTC [gossip.discovery] isSentByMe -> DEBU 3766 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3767 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3768 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.905 UTC [gossip.comm] func1 -> DEBU 3769 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.905 UTC [gossip.gossip] handleMessage -> DEBU 376a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.905 UTC [gossip.gossip] handleMessage -> DEBU 376b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 376c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 376d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.906 UTC [msp.identity] Verify -> DEBU 376e Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +peer0.org1.example.com | 00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +peer0.org1.example.com | "2019-09-24 01:05:26.906 UTC [msp.identity] Verify -> DEBU 376f Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +peer0.org1.example.com | 00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +peer0.org1.example.com | 00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +peer0.org1.example.com | 00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +peer0.org1.example.com | 00000040 ac c2 c9 2b 34 c2 |...+4.|" +peer0.org1.example.com | "2019-09-24 01:05:26.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 3770 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.909 UTC [gossip.discovery] isSentByMe -> DEBU 3772 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 3773 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.909 UTC [gossip.comm] func1 -> DEBU 3771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3774 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.911 UTC [msp] DeserializeIdentity -> DEBU 3775 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3776 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:26.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3777 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3779 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 377d 0xc000383df0 gate 1569287126913553100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 377e 0xc000383df0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 377f 0xc000383df0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3780 0xc000383df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3781 0xc000383df0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 3782 0xc000383df0 gate 1569287126913553100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3783 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3784 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3785 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 3786 0xc00030c5a0 gate 1569287126913911900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3787 0xc00030c5a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 3788 0xc00030c5a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 3789 0xc00030c5a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [msp.identity] Verify -> DEBU 378a Verify: digest = 00000000 88 64 10 77 0c 76 79 07 2b 24 1e e0 2b 19 6a c0 |.d.w.vy.+$..+.j.| +peer0.org1.example.com | 00000010 ed bd ec c6 a1 1b d3 80 f8 9c b9 a5 04 28 34 60 |.............(4`|" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [msp.identity] Verify -> DEBU 378b Verify: sig = 00000000 30 44 02 20 3f 35 c6 87 57 dd 59 db c4 e1 d8 c4 |0D. ?5..W.Y.....| +peer0.org1.example.com | 00000010 19 24 d2 a2 59 af 90 e8 88 8a 7a 52 a0 28 7f ae |.$..Y.....zR.(..| +peer0.org1.example.com | 00000020 98 6d 15 e2 02 20 2f 87 43 67 c3 91 45 58 3b e9 |.m... /.Cg..EX;.| +peer0.org1.example.com | 00000030 fe b5 bd 8d c8 67 2d 95 dd ca c2 18 06 a3 e3 78 |.....g-........x| +peer0.org1.example.com | 00000040 b9 ef 3b f1 77 84 |..;.w.|" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 378c 0xc00030c5a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [cauthdsl] func1 -> DEBU 378d 0xc00030c5a0 gate 1569287126913911900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 378e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 378f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 3790 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 3791 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 3792 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 3793 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.911 UTC [gossip.gossip] handleMessage -> DEBU 3778 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3794 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.920 UTC [msp.identity] Verify -> DEBU 3795 Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +peer0.org1.example.com | 00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +peer0.org1.example.com | "2019-09-24 01:05:26.920 UTC [msp.identity] Verify -> DEBU 3796 Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +peer0.org1.example.com | 00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +peer0.org1.example.com | 00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +peer0.org1.example.com | 00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +peer0.org1.example.com | 00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +peer0.org1.example.com | "2019-09-24 01:05:26.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 3797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 3798 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3799 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 379a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 379b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.929 UTC [msp.identity] Verify -> DEBU 379c Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +peer0.org1.example.com | 00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +peer0.org1.example.com | "2019-09-24 01:05:26.929 UTC [msp.identity] Verify -> DEBU 379d Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +peer0.org1.example.com | 00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +peer0.org1.example.com | 00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +peer0.org1.example.com | 00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +peer0.org1.example.com | 00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +peer0.org1.example.com | "2019-09-24 01:05:26.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 379e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 379f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.930 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.930 UTC [msp.identity] Verify -> DEBU 37a1 Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +peer0.org1.example.com | 00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +peer0.org1.example.com | "2019-09-24 01:05:26.930 UTC [msp.identity] Verify -> DEBU 37a2 Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +peer0.org1.example.com | 00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +peer0.org1.example.com | 00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +peer0.org1.example.com | 00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +peer0.org1.example.com | 00000040 ac c2 c9 2b 34 c2 |...+4.|" +peer0.org1.example.com | "2019-09-24 01:05:26.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [gossip.discovery] isSentByMe -> DEBU 37a4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a6 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [msp] DeserializeIdentity -> DEBU 37a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:26.931 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37aa Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37ae 0xc00035ecb0 gate 1569287126932452200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37af 0xc00035ecb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b0 0xc00035ecb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00035ecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00035ecb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37b3 0xc00035ecb0 gate 1569287126932452200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37b7 0xc00035f520 gate 1569287126932907600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b8 0xc00035f520 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37b9 0xc00035f520 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00035f520 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [msp.identity] Verify -> DEBU 37bb Verify: digest = 00000000 35 95 ca b1 a5 fd eb ed 53 7c c4 72 9a 62 85 2a |5.......S|.r.b.*| +peer0.org1.example.com | 00000010 db 60 0a 99 2f a2 ca 21 28 19 ed 39 73 ce b9 42 |.`../..!(..9s..B|" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [msp.identity] Verify -> DEBU 37bc Verify: sig = 00000000 30 44 02 20 5e b5 c6 3d 09 8e 1c 51 23 45 96 01 |0D. ^..=...Q#E..| +peer0.org1.example.com | 00000010 5d 4f c2 d2 04 9f d7 f0 aa 78 76 88 fc e0 37 0d |]O.......xv...7.| +peer0.org1.example.com | 00000020 66 a9 5b d2 02 20 40 0b 3d 98 ba 23 5f fd b0 44 |f.[.. @.=..#_..D| +peer0.org1.example.com | 00000030 0d 44 1c 88 4c 88 a9 de ac 03 a4 e2 75 a3 0a d8 |.D..L.......u...| +peer0.org1.example.com | 00000040 f1 ef dd 3c 34 97 |...<4.|" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37bd 0xc00035f520 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [cauthdsl] func1 -> DEBU 37be 0xc00035f520 gate 1569287126932907600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:26.933 UTC [gossip.gossip] handleMessage -> DEBU 37c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.comm] func1 -> DEBU 37c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.gossip] handleMessage -> DEBU 37c8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.gossip] handleMessage -> DEBU 37c9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37ca Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37cb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [msp.identity] Verify -> DEBU 37cc Verify: digest = 00000000 69 68 fa 3d 4f b8 70 97 62 b8 99 20 da 87 40 87 |ih.=O.p.b.. ..@.| +peer0.org1.example.com | 00000010 94 62 67 7c e1 80 ed 7c ad 5d 57 10 df 8e 6d eb |.bg|...|.]W...m.|" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [msp.identity] Verify -> DEBU 37cd Verify: sig = 00000000 30 44 02 20 26 32 bd 49 e2 64 ff 25 0b 51 fc 84 |0D. &2.I.d.%.Q..| +peer0.org1.example.com | 00000010 6f 84 bb f9 c7 94 f7 46 03 77 25 1e de 70 be 71 |o......F.w%..p.q| +peer0.org1.example.com | 00000020 d1 9c df a9 02 20 2a 26 59 e8 9e 00 81 ff 85 2d |..... *&Y......-| +peer0.org1.example.com | 00000030 ad 6e d4 b8 28 41 a2 1f f7 68 a2 7a e3 5a f7 12 |.n..(A...h.z.Z..| +peer0.org1.example.com | 00000040 89 cb bd 23 fb 5b |...#.[|" +peer0.org1.example.com | "2019-09-24 01:05:28.516 UTC [gossip.discovery] handleAliveMessage -> DEBU 37ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37cf Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d0 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d1 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.518 UTC [gossip.comm] func1 -> DEBU 37d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.518 UTC [gossip.gossip] handleMessage -> DEBU 37d7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.518 UTC [gossip.gossip] handleMessage -> DEBU 37d8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37da Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37db Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:28.520 UTC [gossip.comm] Send -> DEBU 37dd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:28.520 UTC [gossip.comm] Send -> DEBU 37df Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.522 UTC [gossip.comm] sendToEndpoint -> DEBU 37e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.527 UTC [gossip.comm] func1 -> DEBU 37e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.527 UTC [gossip.gossip] handleMessage -> DEBU 37e5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.527 UTC [gossip.gossip] handleMessage -> DEBU 37e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:28.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:28.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.140 UTC [gossip.comm] func1 -> DEBU 37e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [gossip.gossip] handleMessage -> DEBU 37eb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37ed Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [msp] DeserializeIdentity -> DEBU 37ee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37f5 0xc002a622a0 gate 1569287129141491200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f6 0xc002a622a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f7 0xc002a622a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f8 0xc002a622a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f9 0xc002a622a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37fa 0xc002a622a0 gate 1569287129141491200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37fe 0xc002a62b10 gate 1569287129141736900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37ff 0xc002a62b10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 3800 0xc002a62b10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 3801 0xc002a62b10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [msp.identity] Verify -> DEBU 3802 Verify: digest = 00000000 18 00 51 24 30 bc af 02 c8 ae 98 d5 bf 5a 38 43 |..Q$0........Z8C| +peer0.org1.example.com | 00000010 45 6a 87 fd 5f aa cf 29 07 73 55 de 82 b0 78 27 |Ej.._..).sU...x'|" +peer0.org1.example.com | "2019-09-24 01:05:29.141 UTC [msp.identity] Verify -> DEBU 3803 Verify: sig = 00000000 30 44 02 20 3d 09 67 ae 26 9e a4 9f 70 c3 18 41 |0D. =.g.&...p..A| +peer0.org1.example.com | 00000010 db fc 59 58 6d 55 04 ff 6f aa a9 55 b1 91 fb 63 |..YXmU..o..U...c| +peer0.org1.example.com | 00000020 1d 60 f1 72 02 20 3e fb ca 23 d3 0f 74 c7 86 1e |.`.r. >..#..t...| +peer0.org1.example.com | 00000030 ab 6a 1c 9b 2c 06 b4 27 1d 10 ed dc 06 34 4c 0b |.j..,..'.....4L.| +peer0.org1.example.com | 00000040 ce fa 0b 10 ee 87 |......|" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [cauthdsl] func2 -> DEBU 3804 0xc002a62b10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [cauthdsl] func1 -> DEBU 3805 0xc002a62b10 gate 1569287129141736900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3806 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3808 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3809 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 380a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 3810 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3811 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.comm] func1 -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.gossip] handleMessage -> DEBU 3813 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.gossip] handleMessage -> DEBU 3814 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3815 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3816 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3817 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3818 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3819 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] Send -> DEBU 381e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3820 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] Send -> DEBU 3821 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3823 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3824 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3825 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [gossip.comm] func1 -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [gossip.gossip] handleMessage -> DEBU 3827 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [gossip.gossip] handleMessage -> DEBU 3828 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 382a Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [msp] DeserializeIdentity -> DEBU 382b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 382c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 382f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 3830 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 3831 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.162 UTC [cauthdsl] func1 -> DEBU 3832 0xc00303b370 gate 1569287129162959500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3833 0xc00303b370 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3834 0xc00303b370 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3835 0xc00303b370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3836 0xc00303b370 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 3837 0xc00303b370 gate 1569287129162959500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3838 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 383a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 383b 0xc00303bbb0 gate 1569287129163215800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383c 0xc00303bbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383d 0xc00303bbb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383e 0xc00303bbb0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [msp.identity] Verify -> DEBU 383f Verify: digest = 00000000 c9 1d cc 76 7e 19 60 f1 d9 94 58 7f 4d e3 f8 db |...v~.`...X.M...| +peer0.org1.example.com | 00000010 c6 fb 89 aa 29 21 b4 67 1d 89 ef ac 5a 8c 8f 1f |....)!.g....Z...|" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [msp.identity] Verify -> DEBU 3840 Verify: sig = 00000000 30 44 02 20 5c 6c ba d9 84 b5 76 07 10 d8 59 5f |0D. \l....v...Y_| +peer0.org1.example.com | 00000010 d7 f0 79 8e 88 fe 1c cd 5e 9f eb f1 5b d8 20 2b |..y.....^...[. +| +peer0.org1.example.com | 00000020 99 65 65 df 02 20 7a d8 b4 b1 bb 57 e5 fa d1 f3 |.ee.. z....W....| +peer0.org1.example.com | 00000030 83 fc ea 93 b7 13 b9 14 a9 ad ee 41 04 8f 20 30 |...........A.. 0| +peer0.org1.example.com | 00000040 9a aa cd 94 21 1d |....!.|" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3841 0xc00303bbb0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 3842 0xc00303bbb0 gate 1569287129163215800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3843 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3845 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3846 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3847 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 384d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.164 UTC [gossip.comm] func1 -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.164 UTC [gossip.gossip] handleMessage -> DEBU 3850 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.164 UTC [gossip.gossip] handleMessage -> DEBU 3851 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3852 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3853 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.165 UTC [gossip.comm] func1 -> DEBU 3854 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.165 UTC [gossip.gossip] handleMessage -> DEBU 3855 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.165 UTC [gossip.gossip] handleMessage -> DEBU 3856 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3857 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3858 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [gossip.comm] Send -> DEBU 3860 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 3861 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.166 UTC [gossip.comm] Send -> DEBU 3862 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3864 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3865 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3866 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp] GetDefaultSigningIdentity -> DEBU 3867 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 3868 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151029 " +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 3869 Sign: digest: 4DB399D3A632DB710FB1BCD19DCADD015529367B51EB21776A6917868289931B " +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp] GetDefaultSigningIdentity -> DEBU 386a Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 386b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 386c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:29.219 UTC [gossip.discovery] periodicalSendAlive -> DEBU 386d Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 386e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 386f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3870 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 3871 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3872 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 3873 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3874 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3875 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3876 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3877 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.221 UTC [gossip.comm] sendToEndpoint -> DEBU 3878 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3879 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 387a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.654 UTC [msp] DeserializeIdentity -> DEBU 387b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.656 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.657 UTC [gossip.comm] Send -> DEBU 387d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 387f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 387e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.660 UTC [gossip.comm] sendToEndpoint -> DEBU 3881 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 3880 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.660 UTC [gossip.comm] sendToEndpoint -> DEBU 3882 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.662 UTC [gossip.comm] func1 -> DEBU 3883 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.662 UTC [gossip.gossip] handleMessage -> DEBU 3884 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.663 UTC [msp] DeserializeIdentity -> DEBU 3885 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.663 UTC [msp] DeserializeIdentity -> DEBU 3886 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.664 UTC [msp] DeserializeIdentity -> DEBU 3887 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 3888 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.665 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3889 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.665 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 388b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 388c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.667 UTC [policies] Evaluate -> DEBU 388d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.665 UTC [gossip.comm] func1 -> DEBU 388a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.667 UTC [policies] Evaluate -> DEBU 388e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.668 UTC [policies] Evaluate -> DEBU 388f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.669 UTC [cauthdsl] func1 -> DEBU 3890 0xc0031de260 gate 1569287129669355500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.669 UTC [cauthdsl] func2 -> DEBU 3891 0xc0031de260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.669 UTC [cauthdsl] func2 -> DEBU 3892 0xc0031de260 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.670 UTC [cauthdsl] func2 -> DEBU 3893 0xc0031de260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.670 UTC [cauthdsl] func2 -> DEBU 3894 0xc0031de260 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.670 UTC [cauthdsl] func1 -> DEBU 3895 0xc0031de260 gate 1569287129669355500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3896 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3897 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3898 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.671 UTC [cauthdsl] func1 -> DEBU 3899 0xc0031deaa0 gate 1569287129671924800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.672 UTC [cauthdsl] func2 -> DEBU 389a 0xc0031deaa0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.672 UTC [cauthdsl] func2 -> DEBU 389b 0xc0031deaa0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.673 UTC [cauthdsl] func2 -> DEBU 389c 0xc0031deaa0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.673 UTC [msp.identity] Verify -> DEBU 389d Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:29.673 UTC [msp.identity] Verify -> DEBU 389e Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [cauthdsl] func2 -> DEBU 389f 0xc0031deaa0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [cauthdsl] func1 -> DEBU 38a0 0xc0031deaa0 gate 1569287129671924800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a5 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a6 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a7 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 38a8 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [msp] DeserializeIdentity -> DEBU 38a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [msp] DeserializeIdentity -> DEBU 38aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ac Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ad Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.681 UTC [cauthdsl] func1 -> DEBU 38b1 0xc0032b3180 gate 1569287129675786800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.683 UTC [cauthdsl] func2 -> DEBU 38b2 0xc0032b3180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.685 UTC [cauthdsl] func2 -> DEBU 38b4 0xc0032b3180 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.685 UTC [cauthdsl] func2 -> DEBU 38b5 0xc0032b3180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.686 UTC [cauthdsl] func2 -> DEBU 38b6 0xc0032b3180 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.686 UTC [cauthdsl] func1 -> DEBU 38b7 0xc0032b3180 gate 1569287129675786800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.685 UTC [gossip.comm] func1 -> DEBU 38b3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.686 UTC [policies] Evaluate -> DEBU 38b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.687 UTC [policies] Evaluate -> DEBU 38b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.687 UTC [policies] Evaluate -> DEBU 38ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.687 UTC [cauthdsl] func1 -> DEBU 38bb 0xc0032b3a10 gate 1569287129687908000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38bc 0xc0032b3a10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38bd 0xc0032b3a10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38be 0xc0032b3a10 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.689 UTC [msp.identity] Verify -> DEBU 38bf Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:29.690 UTC [msp.identity] Verify -> DEBU 38c0 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:29.691 UTC [cauthdsl] func2 -> DEBU 38c1 0xc0032b3a10 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.691 UTC [cauthdsl] func1 -> DEBU 38c2 0xc0032b3a10 gate 1569287129687908000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.692 UTC [policies] Evaluate -> DEBU 38c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.693 UTC [policies] Evaluate -> DEBU 38c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.693 UTC [policies] Evaluate -> DEBU 38c5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.694 UTC [policies] Evaluate -> DEBU 38c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.694 UTC [gossip.gossip] handleMessage -> DEBU 38c7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.694 UTC [gossip.gossip] handleMessage -> DEBU 38c8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.695 UTC [msp] DeserializeIdentity -> DEBU 38c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.695 UTC [msp] DeserializeIdentity -> DEBU 38ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.696 UTC [msp] DeserializeIdentity -> DEBU 38cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38cd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ce Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func1 -> DEBU 38d2 0xc0032bf640 gate 1569287129697585800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d3 0xc0032bf640 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d4 0xc0032bf640 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d5 0xc0032bf640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d6 0xc0032bf640 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.697 UTC [cauthdsl] func1 -> DEBU 38d7 0xc0032bf640 gate 1569287129697585800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func1 -> DEBU 38db 0xc0032bfe80 gate 1569287129698108200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38dc 0xc0032bfe80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38dd 0xc0032bfe80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38de 0xc0032bfe80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38df Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e0 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38e1 0xc0032bfe80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [cauthdsl] func1 -> DEBU 38e2 0xc0032bfe80 gate 1569287129698108200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e7 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e8 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e9 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 38ea Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:29.699 UTC [msp] DeserializeIdentity -> DEBU 38eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.699 UTC [msp] DeserializeIdentity -> DEBU 38ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.701 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.701 UTC [policies] Evaluate -> DEBU 38f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.702 UTC [policies] Evaluate -> DEBU 38f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.702 UTC [cauthdsl] func1 -> DEBU 38f3 0xc00333c630 gate 1569287129702566900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.702 UTC [cauthdsl] func2 -> DEBU 38f4 0xc00333c630 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f5 0xc00333c630 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f6 0xc00333c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f7 0xc00333c630 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.704 UTC [cauthdsl] func1 -> DEBU 38f8 0xc00333c630 gate 1569287129702566900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.704 UTC [policies] Evaluate -> DEBU 38f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.704 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.705 UTC [policies] Evaluate -> DEBU 38fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.705 UTC [cauthdsl] func1 -> DEBU 38fc 0xc00333cea0 gate 1569287129705460500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.705 UTC [cauthdsl] func2 -> DEBU 38fd 0xc00333cea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.706 UTC [cauthdsl] func2 -> DEBU 38fe 0xc00333cea0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.706 UTC [cauthdsl] func2 -> DEBU 38ff 0xc00333cea0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.706 UTC [msp.identity] Verify -> DEBU 3900 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:29.706 UTC [msp.identity] Verify -> DEBU 3901 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:29.707 UTC [cauthdsl] func2 -> DEBU 3902 0xc00333cea0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.707 UTC [cauthdsl] func1 -> DEBU 3903 0xc00333cea0 gate 1569287129705460500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.707 UTC [policies] Evaluate -> DEBU 3904 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3905 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3906 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3907 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.708 UTC [gossip.gossip] handleMessage -> DEBU 3908 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.708 UTC [gossip.gossip] handleMessage -> DEBU 3909 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.709 UTC [msp.identity] Verify -> DEBU 390a Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 390b Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:29.710 UTC [msp.identity] Verify -> DEBU 390c Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:29.710 UTC [msp.identity] Verify -> DEBU 390d Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:29.711 UTC [msp] DeserializeIdentity -> DEBU 390e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.711 UTC [msp] DeserializeIdentity -> DEBU 390f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3910 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3911 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3912 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3913 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3914 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3915 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 3916 0xc0033738f0 gate 1569287129712680200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3917 0xc0033738f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3918 0xc0033738f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3919 0xc0033738f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 391a 0xc0033738f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 391b 0xc0033738f0 gate 1569287129712680200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 391f 0xc0033c6190 gate 1569287129712936600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3920 0xc0033c6190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3921 0xc0033c6190 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3922 0xc0033c6190 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [msp.identity] Verify -> DEBU 3923 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [msp.identity] Verify -> DEBU 3924 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3925 0xc0033c6190 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func1 -> DEBU 3926 0xc0033c6190 gate 1569287129712936600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3927 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3929 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 392a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 392d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 392e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 392f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3932 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func1 -> DEBU 3933 0xc0033c7a90 gate 1569287129713687300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3934 0xc0033c7a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3935 0xc0033c7a90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.714 UTC [cauthdsl] func2 -> DEBU 3936 0xc0033c7a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:29.714 UTC [cauthdsl] func2 -> DEBU 3937 0xc0033c7a90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.715 UTC [cauthdsl] func1 -> DEBU 3938 0xc0033c7a90 gate 1569287129713687300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:29.716 UTC [policies] Evaluate -> DEBU 3939 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.717 UTC [policies] Evaluate -> DEBU 393a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.717 UTC [policies] Evaluate -> DEBU 393b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:29.717 UTC [cauthdsl] func1 -> DEBU 393c 0xc0034022d0 gate 1569287129717501700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:29.717 UTC [cauthdsl] func2 -> DEBU 393d 0xc0034022d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:29.717 UTC [cauthdsl] func2 -> DEBU 393e 0xc0034022d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [cauthdsl] func2 -> DEBU 393f 0xc0034022d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [msp.identity] Verify -> DEBU 3940 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [msp.identity] Verify -> DEBU 3941 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [cauthdsl] func2 -> DEBU 3942 0xc0034022d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [cauthdsl] func1 -> DEBU 3943 0xc0034022d0 gate 1569287129717501700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3944 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3946 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:29.719 UTC [gossip.gossip] handleMessage -> DEBU 3948 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.719 UTC [msp] DeserializeIdentity -> DEBU 3949 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.720 UTC [msp] DeserializeIdentity -> DEBU 394a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.720 UTC [gossip.pull] Hello -> DEBU 394b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:29.720 UTC [msp] DeserializeIdentity -> DEBU 394c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.721 UTC [msp] DeserializeIdentity -> DEBU 394d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.721 UTC [gossip.comm] Send -> DEBU 394e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:29.721 UTC [gossip.comm] sendToEndpoint -> DEBU 394f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3950 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.723 UTC [gossip.comm] func1 -> DEBU 3951 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.723 UTC [gossip.gossip] handleMessage -> DEBU 3952 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.724 UTC [gossip.pull] HandleMessage -> DEBU 3953 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.724 UTC [gossip.gossip] handleMessage -> DEBU 3954 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.839 UTC [gossip.comm] func1 -> DEBU 3955 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.840 UTC [gossip.gossip] handleMessage -> DEBU 3956 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.841 UTC [msp] DeserializeIdentity -> DEBU 3957 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.841 UTC [msp] DeserializeIdentity -> DEBU 3958 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:29.842 UTC [gossip.gossip] handleMessage -> DEBU 3959 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:29.862 UTC [gossip.comm] func1 -> DEBU 395a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.863 UTC [gossip.gossip] handleMessage -> DEBU 395b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.864 UTC [gossip.pull] HandleMessage -> DEBU 395c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:29.864 UTC [gossip.pull] SendDigest -> DEBU 395d Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:29.864 UTC [gossip.gossip] handleMessage -> DEBU 395e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.040 UTC [gossip.comm] func1 -> DEBU 395f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.041 UTC [gossip.gossip] handleMessage -> DEBU 3960 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.041 UTC [msp] DeserializeIdentity -> DEBU 3961 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.042 UTC [msp] DeserializeIdentity -> DEBU 3962 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.042 UTC [msp] DeserializeIdentity -> DEBU 3963 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.042 UTC [gossip.gossip] handleMessage -> DEBU 3964 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.240 UTC [gossip.comm] func1 -> DEBU 3965 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.241 UTC [gossip.gossip] handleMessage -> DEBU 3966 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.241 UTC [msp] DeserializeIdentity -> DEBU 3967 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.242 UTC [msp] DeserializeIdentity -> DEBU 3968 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.244 UTC [msp] DeserializeIdentity -> DEBU 3969 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.245 UTC [gossip.gossip] handleMessage -> DEBU 396a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.483 UTC [gossip.comm] func1 -> DEBU 396b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.484 UTC [gossip.gossip] handleMessage -> DEBU 396c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.484 UTC [gossip.pull] HandleMessage -> DEBU 396d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.485 UTC [gossip.pull] SendDigest -> DEBU 396e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:30.485 UTC [gossip.gossip] handleMessage -> DEBU 396f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.490 UTC [gossip.comm] func1 -> DEBU 3970 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.490 UTC [gossip.gossip] handleMessage -> DEBU 3971 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.490 UTC [gossip.gossip] handleMessage -> DEBU 3972 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3973 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.491 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3974 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.491 UTC [msp.identity] Verify -> DEBU 3975 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +peer0.org1.example.com | 00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +peer0.org1.example.com | "2019-09-24 01:05:30.492 UTC [msp.identity] Verify -> DEBU 3976 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +peer0.org1.example.com | 00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +peer0.org1.example.com | 00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +peer0.org1.example.com | 00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +peer0.org1.example.com | 00000040 c8 31 d2 9b c5 d3 |.1....|" +peer0.org1.example.com | "2019-09-24 01:05:30.492 UTC [msp.identity] Verify -> DEBU 3977 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:30.493 UTC [msp.identity] Verify -> DEBU 3978 Verify: sig = 00000000 30 45 02 21 00 f2 56 af a2 31 20 31 a4 04 4f e6 |0E.!..V..1 1..O.| +peer0.org1.example.com | 00000010 03 f6 26 d2 83 04 ae 42 f9 d0 87 49 ea 2c 79 6a |..&....B...I.,yj| +peer0.org1.example.com | 00000020 15 c1 42 18 0f 02 20 7a b2 64 da 27 09 e4 f1 c3 |..B... z.d.'....| +peer0.org1.example.com | 00000030 08 4e 8b 3f 7a c2 7e f0 09 38 ad 43 05 e3 2e 3d |.N.?z.~..8.C...=| +peer0.org1.example.com | 00000040 22 a4 dd 47 c0 22 72 |"..G."r|" +peer0.org1.example.com | "2019-09-24 01:05:30.494 UTC [gossip.discovery] handleAliveMessage -> DEBU 3979 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.494 UTC [gossip.discovery] learnExistingMembers -> DEBU 397a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:30.494 UTC [gossip.discovery] learnExistingMembers -> DEBU 397b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 397f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.496 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3980 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.496 UTC [gossip.discovery] sendMemResponse -> DEBU 3981 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:30.496 UTC [msp] DeserializeIdentity -> DEBU 3982 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.497 UTC [msp] DeserializeIdentity -> DEBU 3983 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.497 UTC [gossip.comm] Send -> DEBU 3984 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.497 UTC [gossip.comm] sendToEndpoint -> DEBU 3986 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.498 UTC [gossip.comm] sendToEndpoint -> DEBU 3987 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.497 UTC [gossip.discovery] sendMemResponse -> DEBU 3985 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:30.785 UTC [gossip.comm] func1 -> DEBU 3988 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.786 UTC [gossip.gossip] handleMessage -> DEBU 3989 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.786 UTC [gossip.pull] HandleMessage -> DEBU 398a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.786 UTC [msp] DeserializeIdentity -> DEBU 398b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.788 UTC [msp] DeserializeIdentity -> DEBU 398f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.788 UTC [msp] DeserializeIdentity -> DEBU 3990 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.789 UTC [gossip.pull] SendDigest -> DEBU 3991 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:30.790 UTC [gossip.gossip] handleMessage -> DEBU 3992 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.800 UTC [gossip.comm] func1 -> DEBU 3993 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.802 UTC [gossip.gossip] handleMessage -> DEBU 3994 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.802 UTC [gossip.gossip] handleMessage -> DEBU 3995 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.803 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3996 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.803 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3997 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.803 UTC [msp] DeserializeIdentity -> DEBU 3998 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3999 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:30.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.805 UTC [policies] Evaluate -> DEBU 399c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.806 UTC [policies] Evaluate -> DEBU 399d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:30.806 UTC [policies] Evaluate -> DEBU 399e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.807 UTC [cauthdsl] func1 -> DEBU 399f 0xc003482800 gate 1569287130807262400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.807 UTC [cauthdsl] func2 -> DEBU 39a0 0xc003482800 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.808 UTC [cauthdsl] func2 -> DEBU 39a1 0xc003482800 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.808 UTC [cauthdsl] func2 -> DEBU 39a2 0xc003482800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39a3 0xc003482800 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39a4 0xc003482800 gate 1569287130807262400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39a8 0xc003483060 gate 1569287130809182800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39a9 0xc003483060 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39aa 0xc003483060 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39ab 0xc003483060 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [msp.identity] Verify -> DEBU 39ac Verify: digest = 00000000 26 d6 45 45 11 c7 e9 8e 6a 9e 80 0b 9f fa b7 08 |&.EE....j.......| +peer0.org1.example.com | 00000010 82 00 e0 f5 f8 90 8e 8e 40 ff a7 fc ca c7 d3 a7 |........@.......|" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [msp.identity] Verify -> DEBU 39ad Verify: sig = 00000000 30 45 02 21 00 9e 0e 3a 7b ab f6 01 24 60 a6 37 |0E.!...:{...$`.7| +peer0.org1.example.com | 00000010 eb 53 13 0c 2d f9 f9 8f cc cc 41 f3 0c 9a 14 ea |.S..-.....A.....| +peer0.org1.example.com | 00000020 98 6e d7 1f b7 02 20 53 30 91 02 da 56 9c 80 00 |.n.... S0...V...| +peer0.org1.example.com | 00000030 c7 89 85 62 c7 cc 2b 95 cd fb 72 10 ed 2d 39 37 |...b..+...r..-97| +peer0.org1.example.com | 00000040 f5 df 91 6c 59 c7 8b |...lY..|" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39ae 0xc003483060 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39af 0xc003483060 gate 1569287130809182800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 39b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 39ba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39bb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [gossip.discovery] sendMemResponse -> DEBU 39bc Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:30.809 UTC [msp] DeserializeIdentity -> DEBU 39bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [msp] DeserializeIdentity -> DEBU 39be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [msp] DeserializeIdentity -> DEBU 39bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [gossip.comm] Send -> DEBU 39c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [gossip.discovery] sendMemResponse -> DEBU 39c1 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [gossip.comm] sendToEndpoint -> DEBU 39c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.810 UTC [gossip.comm] sendToEndpoint -> DEBU 39c3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [gossip.comm] func1 -> DEBU 39c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [gossip.gossip] handleMessage -> DEBU 39c5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [gossip.pull] HandleMessage -> DEBU 39c6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39ca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39cb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.847 UTC [gossip.pull] SendDigest -> DEBU 39cd Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.gossip] handleMessage -> DEBU 39ce Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39cf Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39d1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39d3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39da Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39db Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39dc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39dd GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39de Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39df Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39e1 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39e3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39e5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.869 UTC [gossip.comm] func1 -> DEBU 39e7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.871 UTC [gossip.gossip] handleMessage -> DEBU 39e8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.871 UTC [gossip.gossip] handleMessage -> DEBU 39e9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ea Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39eb Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.871 UTC [msp] DeserializeIdentity -> DEBU 39ec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ee Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ef Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39f3 0xc0034da8c0 gate 1569287130872188100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f4 0xc0034da8c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f5 0xc0034da8c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f6 0xc0034da8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f7 0xc0034da8c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39f8 0xc0034da8c0 gate 1569287130872188100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39fc 0xc0034db1e0 gate 1569287130872518800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39fd 0xc0034db1e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39fe 0xc0034db1e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39ff 0xc0034db1e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [msp.identity] Verify -> DEBU 3a00 Verify: digest = 00000000 7f 79 b1 3b 80 6e 8e 43 43 92 4b e4 95 cd 9c 01 |.y.;.n.CC.K.....| +peer0.org1.example.com | 00000010 c5 75 7a 23 33 50 13 f4 3e f2 74 b9 30 94 d0 40 |.uz#3P..>.t.0..@|" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [msp.identity] Verify -> DEBU 3a01 Verify: sig = 00000000 30 44 02 20 26 32 1b df 52 3c 19 69 e4 fa 91 13 |0D. &2..R<.i....| +peer0.org1.example.com | 00000010 58 2e e5 89 3a 78 57 4e a9 b2 c3 d2 61 a1 5a 6e |X...:xWN....a.Zn| +peer0.org1.example.com | 00000020 94 b7 ed 2e 02 20 4c 2d 8c 8a 41 ef d2 6f 8e 86 |..... L-..A..o..| +peer0.org1.example.com | 00000030 ed 20 9f 8f e3 0a 1e 6c 9d 94 f5 4c 63 eb 6d 1f |. .....l...Lc.m.| +peer0.org1.example.com | 00000040 38 5f 40 cd 16 06 |8_@...|" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 3a02 0xc0034db1e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 3a03 0xc0034db1e0 gate 1569287130872518800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a04 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a06 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a08 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a09 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a0f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] sendMemResponse -> DEBU 3a10 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.comm] Send -> DEBU 3a14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.discovery] sendMemResponse -> DEBU 3a15 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3a16 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3a17 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.889 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a18 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:30.889 UTC [msp.identity] Sign -> DEBU 3a19 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315102A " +peer0.org1.example.com | "2019-09-24 01:05:30.889 UTC [msp.identity] Sign -> DEBU 3a1a Sign: digest: DBFF47F58609B1794808192A67EDAAD9A6E563BDE48A337FD01E8CFA5CD6C23C " +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a1b Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [msp.identity] Sign -> DEBU 3a1c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [msp.identity] Sign -> DEBU 3a1d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a1e Entering, sending GossipMessage: tag:EMPTY mem_req:h\023\313" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a20 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [msp] DeserializeIdentity -> DEBU 3a21 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a22 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a23 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a24 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:h\023\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a26 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.891 UTC [gossip.comm] sendToEndpoint -> DEBU 3a27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.891 UTC [gossip.comm] sendToEndpoint -> DEBU 3a28 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [gossip.comm] func1 -> DEBU 3a29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [gossip.gossip] handleMessage -> DEBU 3a2a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [gossip.gossip] handleMessage -> DEBU 3a2b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a2d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.894 UTC [msp] DeserializeIdentity -> DEBU 3a2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a30 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a31 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [cauthdsl] func1 -> DEBU 3a35 0xc003549cf0 gate 1569287130895861300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a36 0xc003549cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a37 0xc003549cf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a38 0xc003549cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a39 0xc003549cf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a3a 0xc003549cf0 gate 1569287130895861300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a3e 0xc003562530 gate 1569287130896141600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a3f 0xc003562530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a40 0xc003562530 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a41 0xc003562530 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [msp.identity] Verify -> DEBU 3a42 Verify: digest = 00000000 7f 79 b1 3b 80 6e 8e 43 43 92 4b e4 95 cd 9c 01 |.y.;.n.CC.K.....| +peer0.org1.example.com | 00000010 c5 75 7a 23 33 50 13 f4 3e f2 74 b9 30 94 d0 40 |.uz#3P..>.t.0..@|" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [msp.identity] Verify -> DEBU 3a43 Verify: sig = 00000000 30 44 02 20 26 32 1b df 52 3c 19 69 e4 fa 91 13 |0D. &2..R<.i....| +peer0.org1.example.com | 00000010 58 2e e5 89 3a 78 57 4e a9 b2 c3 d2 61 a1 5a 6e |X...:xWN....a.Zn| +peer0.org1.example.com | 00000020 94 b7 ed 2e 02 20 4c 2d 8c 8a 41 ef d2 6f 8e 86 |..... L-..A..o..| +peer0.org1.example.com | 00000030 ed 20 9f 8f e3 0a 1e 6c 9d 94 f5 4c 63 eb 6d 1f |. .....l...Lc.m.| +peer0.org1.example.com | 00000040 38 5f 40 cd 16 06 |8_@...|" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a44 0xc003562530 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a45 0xc003562530 gate 1569287130896141600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [gossip.comm] func1 -> DEBU 3a46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.897 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a49 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a4d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a4e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a4f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a50 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +peer0.org1.example.com | 00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a51 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +peer0.org1.example.com | 00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +peer0.org1.example.com | 00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +peer0.org1.example.com | 00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +peer0.org1.example.com | 00000040 c8 31 d2 9b c5 d3 |.1....|" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a53 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a54 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a55 Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +peer0.org1.example.com | 00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a56 Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +peer0.org1.example.com | 00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a57 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] isSentByMe -> DEBU 3a58 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a59 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a5a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.gossip] handleMessage -> DEBU 3a5b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.gossip] handleMessage -> DEBU 3a5c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5e Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [msp.identity] Verify -> DEBU 3a5f Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +peer0.org1.example.com | 00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [msp.identity] Verify -> DEBU 3a60 Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +peer0.org1.example.com | 00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a61 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.discovery] isSentByMe -> DEBU 3a62 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a63 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a64 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [msp] DeserializeIdentity -> DEBU 3a65 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a67 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a68 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [cauthdsl] func1 -> DEBU 3a6c 0xc0036042c0 gate 1569287130902916500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [cauthdsl] func2 -> DEBU 3a6d 0xc0036042c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.902 UTC [cauthdsl] func2 -> DEBU 3a6e 0xc0036042c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a6f 0xc0036042c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a70 0xc0036042c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a71 0xc0036042c0 gate 1569287130902916500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a75 0xc003604bc0 gate 1569287130903177700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a76 0xc003604bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a77 0xc003604bc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a78 0xc003604bc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a79 Verify: digest = 00000000 26 d6 45 45 11 c7 e9 8e 6a 9e 80 0b 9f fa b7 08 |&.EE....j.......| +peer0.org1.example.com | 00000010 82 00 e0 f5 f8 90 8e 8e 40 ff a7 fc ca c7 d3 a7 |........@.......|" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a7a Verify: sig = 00000000 30 45 02 21 00 9e 0e 3a 7b ab f6 01 24 60 a6 37 |0E.!...:{...$`.7| +peer0.org1.example.com | 00000010 eb 53 13 0c 2d f9 f9 8f cc cc 41 f3 0c 9a 14 ea |.S..-.....A.....| +peer0.org1.example.com | 00000020 98 6e d7 1f b7 02 20 53 30 91 02 da 56 9c 80 00 |.n.... S0...V...| +peer0.org1.example.com | 00000030 c7 89 85 62 c7 cc 2b 95 cd fb 72 10 ed 2d 39 37 |...b..+...r..-97| +peer0.org1.example.com | 00000040 f5 df 91 6c 59 c7 8b |...lY..|" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a7b 0xc003604bc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a7c 0xc003604bc0 gate 1569287130903177700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a81 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a82 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a83 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a84 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +peer0.org1.example.com | 00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a85 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +peer0.org1.example.com | 00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +peer0.org1.example.com | 00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +peer0.org1.example.com | 00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +peer0.org1.example.com | 00000040 c8 31 d2 9b c5 d3 |.1....|" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a86 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a87 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a88 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.gossip] handleMessage -> DEBU 3a8a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a8b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8c Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +peer0.org1.example.com | 00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8d Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +peer0.org1.example.com | 00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a8e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8f Verify: sig = 00000000 30 44 02 20 47 eb be 85 98 9c 9d cc 66 b3 7b a6 |0D. G.......f.{.| +peer0.org1.example.com | 00000010 af 47 be 25 02 ad 5c b5 71 07 50 fe 6e 03 42 54 |.G.%..\.q.P.n.BT| +peer0.org1.example.com | 00000020 d4 95 51 a9 02 20 4a 64 0f c3 f0 e0 29 31 cf f0 |..Q.. Jd....)1..| +peer0.org1.example.com | 00000030 af 68 40 26 11 56 7f 1e 04 f9 1f af 3a 68 9e 79 |.h@&.V......:h.y| +peer0.org1.example.com | 00000040 8e 16 3e 68 13 cb |..>h..|" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a90 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.discovery] isSentByMe -> DEBU 3a91 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a92 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:30.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a93 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:31.720 UTC [gossip.election] waitForInterrupt -> DEBU 3a94 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:31.720 UTC [gossip.election] IsLeader -> DEBU 3a95 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:31.721 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a96 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:31.721 UTC [msp.identity] Sign -> DEBU 3a97 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100E1801 " +peer0.org1.example.com | "2019-09-24 01:05:31.721 UTC [msp.identity] Sign -> DEBU 3a98 Sign: digest: 69ADDF10A0E196DE8523CFAE8052AD658226FD437222E9F29FBD8DA9A51627BA " +peer0.org1.example.com | "2019-09-24 01:05:31.721 UTC [gossip.election] waitForInterrupt -> DEBU 3a99 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.731 UTC [gossip.comm] Send -> DEBU 3a9e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:31.731 UTC [msp] DeserializeIdentity -> DEBU 3a9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.731 UTC [msp] DeserializeIdentity -> DEBU 3aa0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:31.731 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:31.731 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.513 UTC [gossip.comm] func1 -> DEBU 3aa3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.513 UTC [gossip.gossip] handleMessage -> DEBU 3aa4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.514 UTC [gossip.gossip] handleMessage -> DEBU 3aa5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3aa6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.515 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3aa7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:33.516 UTC [msp.identity] Verify -> DEBU 3aa8 Verify: digest = 00000000 dc c1 4c 3b d3 b7 06 df ce 3b 0b af 2a 8a d5 fa |..L;.....;..*...| +peer0.org1.example.com | 00000010 0d 1a 8e c6 44 6f 13 7a ce 52 1b 7d 80 2d 29 08 |....Do.z.R.}.-).|" +peer0.org1.example.com | "2019-09-24 01:05:33.516 UTC [msp.identity] Verify -> DEBU 3aa9 Verify: sig = 00000000 30 44 02 20 06 e6 cf 33 c6 0a b6 bb 34 7d f3 d3 |0D. ...3....4}..| +peer0.org1.example.com | 00000010 14 d5 08 01 40 b4 68 70 9c 2d b5 5b a6 8b 43 62 |....@.hp.-.[..Cb| +peer0.org1.example.com | 00000020 4b b0 5e 03 02 20 29 f7 99 cd 8a f2 99 9b 64 22 |K.^.. ).......d"| +peer0.org1.example.com | 00000030 b6 16 5b fc 79 64 69 61 ad 97 b4 c5 0d 28 a8 e2 |..[.ydia.....(..| +peer0.org1.example.com | 00000040 17 28 7e 00 91 af |.(~...|" +peer0.org1.example.com | "2019-09-24 01:05:33.516 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aaa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:33.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aac updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aad Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aaf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ab0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.520 UTC [gossip.comm] func1 -> DEBU 3ab2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.520 UTC [gossip.gossip] handleMessage -> DEBU 3ab3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.520 UTC [gossip.gossip] handleMessage -> DEBU 3ab4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.521 UTC [msp] DeserializeIdentity -> DEBU 3ab7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.521 UTC [msp] DeserializeIdentity -> DEBU 3ab8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.522 UTC [msp] DeserializeIdentity -> DEBU 3ab9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.524 UTC [gossip.comm] Send -> DEBU 3aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:33.524 UTC [msp] DeserializeIdentity -> DEBU 3abb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.524 UTC [gossip.comm] Send -> DEBU 3abc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:33.525 UTC [gossip.comm] sendToEndpoint -> DEBU 3abd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.525 UTC [gossip.comm] sendToEndpoint -> DEBU 3abe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3abf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.527 UTC [gossip.comm] func1 -> DEBU 3ac1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.528 UTC [gossip.gossip] handleMessage -> DEBU 3ac2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.528 UTC [gossip.gossip] handleMessage -> DEBU 3ac3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [msp] DeserializeIdentity -> DEBU 3ac6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [msp] DeserializeIdentity -> DEBU 3ac7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] Send -> DEBU 3ac8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3aca Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3ace Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [gossip.comm] func1 -> DEBU 3acf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [gossip.gossip] handleMessage -> DEBU 3ad0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3ad2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad3 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad4 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [msp] DeserializeIdentity -> DEBU 3ad5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.655 UTC [msp] DeserializeIdentity -> DEBU 3ad6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ad7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3ada == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3adb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3adc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func1 -> DEBU 3add 0xc0037d0d20 gate 1569287133656777500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ade 0xc0037d0d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3adf 0xc0037d0d20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ae0 0xc0037d0d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ae1 0xc0037d0d20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.656 UTC [cauthdsl] func1 -> DEBU 3ae2 0xc0037d0d20 gate 1569287133656777500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func1 -> DEBU 3ae6 0xc0037d1560 gate 1569287133657111000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae7 0xc0037d1560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae8 0xc0037d1560 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae9 0xc0037d1560 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [msp.identity] Verify -> DEBU 3aea Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [msp.identity] Verify -> DEBU 3aeb Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3aec 0xc0037d1560 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [cauthdsl] func1 -> DEBU 3aed 0xc0037d1560 gate 1569287133657111000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3aee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3aef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [msp] DeserializeIdentity -> DEBU 3af2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [msp] DeserializeIdentity -> DEBU 3af3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3af4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3afa 0xc003882d40 gate 1569287133658024100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afb 0xc003882d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afc 0xc003882d40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afd 0xc003882d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afe 0xc003882d40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3aff 0xc003882d40 gate 1569287133658024100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3b03 0xc0038835c0 gate 1569287133658359000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b04 0xc0038835c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b05 0xc0038835c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b06 0xc0038835c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b09 0xc0038835c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3b0a 0xc0038835c0 gate 1569287133658359000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.658 UTC [gossip.gossip] handleMessage -> DEBU 3b0f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.661 UTC [gossip.comm] func1 -> DEBU 3b10 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.661 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b12 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b13 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b16 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b17 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.662 UTC [policies] Evaluate -> DEBU 3b18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [policies] Evaluate -> DEBU 3b19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [policies] Evaluate -> DEBU 3b1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [cauthdsl] func1 -> DEBU 3b1b 0xc003895270 gate 1569287133663491400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1c 0xc003895270 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1d 0xc003895270 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1e 0xc003895270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1f 0xc003895270 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [cauthdsl] func1 -> DEBU 3b20 0xc003895270 gate 1569287133663491400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [cauthdsl] func1 -> DEBU 3b24 0xc003895ab0 gate 1569287133664531300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [cauthdsl] func2 -> DEBU 3b25 0xc003895ab0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.664 UTC [cauthdsl] func2 -> DEBU 3b26 0xc003895ab0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.665 UTC [cauthdsl] func2 -> DEBU 3b27 0xc003895ab0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.666 UTC [msp.identity] Verify -> DEBU 3b28 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:33.667 UTC [msp.identity] Verify -> DEBU 3b29 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:33.667 UTC [cauthdsl] func2 -> DEBU 3b2a 0xc003895ab0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.668 UTC [cauthdsl] func1 -> DEBU 3b2c 0xc003895ab0 gate 1569287133664531300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.668 UTC [policies] Evaluate -> DEBU 3b2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.668 UTC [policies] Evaluate -> DEBU 3b2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.669 UTC [policies] Evaluate -> DEBU 3b2f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.669 UTC [policies] Evaluate -> DEBU 3b30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.668 UTC [gossip.comm] func1 -> DEBU 3b2b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.670 UTC [msp.identity] Verify -> DEBU 3b31 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:33.670 UTC [msp.identity] Verify -> DEBU 3b32 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:33.671 UTC [msp.identity] Verify -> DEBU 3b33 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3b34 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:33.672 UTC [msp] DeserializeIdentity -> DEBU 3b35 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.672 UTC [msp] DeserializeIdentity -> DEBU 3b36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b38 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b39 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func1 -> DEBU 3b3d 0xc0038ba110 gate 1569287133673171800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b3e 0xc0038ba110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b3f 0xc0038ba110 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b40 0xc0038ba110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b41 0xc0038ba110 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [cauthdsl] func1 -> DEBU 3b42 0xc0038ba110 gate 1569287133673171800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func1 -> DEBU 3b46 0xc0038baa50 gate 1569287133673968900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b47 0xc0038baa50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b48 0xc0038baa50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b49 0xc0038baa50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [msp.identity] Verify -> DEBU 3b4a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [msp.identity] Verify -> DEBU 3b4b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b4c 0xc0038baa50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [cauthdsl] func1 -> DEBU 3b4d 0xc0038baa50 gate 1569287133673968900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [policies] Evaluate -> DEBU 3b4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.674 UTC [policies] Evaluate -> DEBU 3b4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.675 UTC [policies] Evaluate -> DEBU 3b50 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.675 UTC [policies] Evaluate -> DEBU 3b51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.675 UTC [gossip.gossip] handleMessage -> DEBU 3b52 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [gossip.gossip] handleMessage -> DEBU 3b53 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b54 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b56 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b58 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b59 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b5d 0xc00390c560 gate 1569287133676534900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b5e 0xc00390c560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b5f 0xc00390c560 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b60 0xc00390c560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b61 0xc00390c560 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b62 0xc00390c560 gate 1569287133676534900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b66 0xc00390cda0 gate 1569287133676828300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b67 0xc00390cda0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b68 0xc00390cda0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [cauthdsl] func2 -> DEBU 3b69 0xc00390cda0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b6a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b6b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [cauthdsl] func2 -> DEBU 3b6c 0xc00390cda0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [cauthdsl] func1 -> DEBU 3b6d 0xc00390cda0 gate 1569287133676828300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b70 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b72 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b73 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:33.678 UTC [msp.identity] Verify -> DEBU 3b74 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3b75 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [msp] DeserializeIdentity -> DEBU 3b76 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [msp] DeserializeIdentity -> DEBU 3b77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b79 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [cauthdsl] func1 -> DEBU 3b7e 0xc0039433c0 gate 1569287133679560300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b7f 0xc0039433c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b80 0xc0039433c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b81 0xc0039433c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b82 0xc0039433c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func1 -> DEBU 3b83 0xc0039433c0 gate 1569287133679560300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b84 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func1 -> DEBU 3b87 0xc003943d20 gate 1569287133680490900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b88 0xc003943d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b89 0xc003943d20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b8a 0xc003943d20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [msp.identity] Verify -> DEBU 3b8b Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:33.680 UTC [msp.identity] Verify -> DEBU 3b8c Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [cauthdsl] func2 -> DEBU 3b8d 0xc003943d20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [cauthdsl] func1 -> DEBU 3b8e 0xc003943d20 gate 1569287133680490900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b91 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:33.681 UTC [gossip.gossip] handleMessage -> DEBU 3b93 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.722 UTC [msp] DeserializeIdentity -> DEBU 3b94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.722 UTC [msp] DeserializeIdentity -> DEBU 3b95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.722 UTC [gossip.pull] Hello -> DEBU 3b96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:33.723 UTC [msp] DeserializeIdentity -> DEBU 3b97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.723 UTC [msp] DeserializeIdentity -> DEBU 3b98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.723 UTC [gossip.comm] Send -> DEBU 3b99 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:33.723 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.723 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.726 UTC [gossip.comm] func1 -> DEBU 3b9c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.726 UTC [gossip.gossip] handleMessage -> DEBU 3b9d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.728 UTC [gossip.pull] HandleMessage -> DEBU 3b9e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.728 UTC [gossip.gossip] handleMessage -> DEBU 3b9f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.798 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3ba0 Sleeping 25s" +peer0.org1.example.com | "2019-09-24 01:05:33.845 UTC [gossip.comm] func1 -> DEBU 3ba1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.845 UTC [gossip.gossip] handleMessage -> DEBU 3ba2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.845 UTC [msp] DeserializeIdentity -> DEBU 3ba3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.846 UTC [msp] DeserializeIdentity -> DEBU 3ba4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:33.846 UTC [gossip.gossip] handleMessage -> DEBU 3ba5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:33.863 UTC [gossip.comm] func1 -> DEBU 3ba6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.864 UTC [gossip.gossip] handleMessage -> DEBU 3ba7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.866 UTC [gossip.pull] HandleMessage -> DEBU 3ba8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:33.866 UTC [gossip.pull] SendDigest -> DEBU 3ba9 Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:33.866 UTC [gossip.gossip] handleMessage -> DEBU 3baa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [gossip.comm] func1 -> DEBU 3bab Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [gossip.gossip] handleMessage -> DEBU 3bac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3bad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3bae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3baf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.042 UTC [gossip.gossip] handleMessage -> DEBU 3bb0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.142 UTC [gossip.comm] func1 -> DEBU 3bb1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.142 UTC [gossip.gossip] handleMessage -> DEBU 3bb2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.142 UTC [gossip.gossip] handleMessage -> DEBU 3bb3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bb5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [msp] DeserializeIdentity -> DEBU 3bb6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bb7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bbd 0xc003965660 gate 1569287134143356000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bbe 0xc003965660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bbf 0xc003965660 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc0 0xc003965660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc1 0xc003965660 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bc2 0xc003965660 gate 1569287134143356000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bc6 0xc003965ee0 gate 1569287134143627600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc7 0xc003965ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc8 0xc003965ee0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc9 0xc003965ee0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [msp.identity] Verify -> DEBU 3bca Verify: digest = 00000000 8d d3 91 56 17 16 4f ab 4a 01 9d 31 d1 06 89 04 |...V..O.J..1....| +peer0.org1.example.com | 00000010 ab 31 cc 07 2a e9 07 38 f7 b4 65 a3 84 97 09 d7 |.1..*..8..e.....|" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [msp.identity] Verify -> DEBU 3bcb Verify: sig = 00000000 30 45 02 21 00 a6 15 f8 dd 67 b2 50 90 ed 38 25 |0E.!.....g.P..8%| +peer0.org1.example.com | 00000010 ca cf 1c e8 af 50 1c 8e 12 8a de 68 b4 3f 3f 05 |.....P.....h.??.| +peer0.org1.example.com | 00000020 f6 14 e2 59 38 02 20 77 b2 e0 a3 f1 40 88 14 a3 |...Y8. w....@...| +peer0.org1.example.com | 00000030 13 e3 66 4f 56 d6 ef f3 e9 c6 e8 79 2a 32 36 41 |..fOV......y*26A| +peer0.org1.example.com | 00000040 de 51 71 58 a1 9f 01 |.QqX...|" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [cauthdsl] func2 -> DEBU 3bcc 0xc003965ee0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [cauthdsl] func1 -> DEBU 3bcd 0xc003965ee0 gate 1569287134143627600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bd0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.148 UTC [gossip.comm] func1 -> DEBU 3bda Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bdb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.gossip] handleMessage -> DEBU 3bdc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.gossip] handleMessage -> DEBU 3bdd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bde Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bdf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.comm] Send -> DEBU 3bea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3beb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [cauthdsl] func1 -> DEBU 3bef 0xc003a022e0 gate 1569287134156942500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [cauthdsl] func2 -> DEBU 3bf0 0xc003a022e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf1 0xc003a022e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.156 UTC [gossip.comm] Send -> DEBU 3bf2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf3 0xc003a022e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf4 0xc003a022e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func1 -> DEBU 3bf5 0xc003a022e0 gate 1569287134156942500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bfa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func1 -> DEBU 3bfb 0xc003a02b20 gate 1569287134157635100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bfc 0xc003a02b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bfd 0xc003a02b20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bfe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bff 0xc003a02b20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3c00 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [msp.identity] Verify -> DEBU 3c01 Verify: digest = 00000000 4f a3 f8 cd 1d 6d ae e9 8d e4 f4 ad 77 63 a8 ae |O....m......wc..| +peer0.org1.example.com | 00000010 3a bb fb 89 52 47 f9 ab 69 ca 91 9e e9 5b 3c 32 |:...RG..i....[<2|" +peer0.org1.example.com | "2019-09-24 01:05:34.157 UTC [msp.identity] Verify -> DEBU 3c02 Verify: sig = 00000000 30 44 02 20 23 6a a4 ea 4f 2a ca 12 bf 54 d8 ac |0D. #j..O*...T..| +peer0.org1.example.com | 00000010 15 84 63 0f 16 b6 3b 31 44 3b e2 82 98 3e 3a 2a |..c...;1D;...>:*| +peer0.org1.example.com | 00000020 07 c9 c8 ed 02 20 0e aa ae 14 74 b3 9a 37 a7 fc |..... ....t..7..| +peer0.org1.example.com | 00000030 df 08 d0 ad 98 a5 2b ad b0 35 80 c4 41 f7 fa 38 |......+..5..A..8| +peer0.org1.example.com | 00000040 ff 05 f7 4f 75 18 |...Ou.|" +peer0.org1.example.com | "2019-09-24 01:05:34.161 UTC [gossip.comm] func1 -> DEBU 3c03 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.162 UTC [gossip.gossip] handleMessage -> DEBU 3c04 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.171 UTC [gossip.comm] func1 -> DEBU 3c05 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.179 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003a02b20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.179 UTC [gossip.comm] func1 -> DEBU 3c07 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.180 UTC [cauthdsl] func1 -> DEBU 3c08 0xc003a02b20 gate 1569287134157635100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.181 UTC [policies] Evaluate -> DEBU 3c09 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.181 UTC [policies] Evaluate -> DEBU 3c0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.182 UTC [policies] Evaluate -> DEBU 3c0b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.182 UTC [policies] Evaluate -> DEBU 3c0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c0e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c0f updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c10 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c11 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c12 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c13 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c14 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c15 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c16 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c17 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c18 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c19 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c1f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.187 UTC [gossip.comm] func1 -> DEBU 3c20 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.188 UTC [gossip.gossip] handleMessage -> DEBU 3c21 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.188 UTC [gossip.gossip] handleMessage -> DEBU 3c22 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c23 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c24 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.202 UTC [msp] DeserializeIdentity -> DEBU 3c25 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.203 UTC [msp] DeserializeIdentity -> DEBU 3c26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.203 UTC [msp] DeserializeIdentity -> DEBU 3c27 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.205 UTC [msp] DeserializeIdentity -> DEBU 3c28 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c29 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c2a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.206 UTC [gossip.comm] Send -> DEBU 3c2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.207 UTC [msp] DeserializeIdentity -> DEBU 3c2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.207 UTC [gossip.comm] Send -> DEBU 3c2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.207 UTC [gossip.comm] sendToEndpoint -> DEBU 3c2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.207 UTC [gossip.comm] sendToEndpoint -> DEBU 3c30 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.208 UTC [gossip.comm] sendToEndpoint -> DEBU 3c31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.209 UTC [gossip.comm] sendToEndpoint -> DEBU 3c32 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.228 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c33 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.229 UTC [msp.identity] Sign -> DEBU 3c34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315102B " +peer0.org1.example.com | "2019-09-24 01:05:34.229 UTC [msp.identity] Sign -> DEBU 3c35 Sign: digest: A0C83A504A8E825B736337AB9A6D109FDC4A7039C108F42FB3ECE1D930617225 " +peer0.org1.example.com | "2019-09-24 01:05:34.230 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c36 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.230 UTC [msp.identity] Sign -> DEBU 3c37 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:34.231 UTC [msp.identity] Sign -> DEBU 3c38 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:34.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3c39 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:34.236 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3c3a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.236 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3c3b Got block validation policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.237 UTC [policies] Evaluate -> DEBU 3c3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +peer0.org1.example.com | "2019-09-24 01:05:34.238 UTC [policies] Evaluate -> DEBU 3c3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.245 UTC [policies] Evaluate -> DEBU 3c40 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.245 UTC [cauthdsl] func1 -> DEBU 3c41 0xc003ba1ca0 gate 1569287134245719100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.242 UTC [msp] DeserializeIdentity -> DEBU 3c3e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.242 UTC [gossip.comm] func1 -> DEBU 3c3f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.245 UTC [cauthdsl] func2 -> DEBU 3c42 0xc003ba1ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.246 UTC [msp] DeserializeIdentity -> DEBU 3c43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.247 UTC [gossip.gossip] handleMessage -> DEBU 3c44 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.247 UTC [cauthdsl] func2 -> DEBU 3c45 0xc003ba1ca0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [cauthdsl] func2 -> DEBU 3c48 0xc003ba1ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c49 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [msp.identity] Verify -> DEBU 3c4a Verify: digest = 00000000 1b 37 c0 9e 55 ed 9d 02 98 21 e5 75 f2 c2 0e 50 |.7..U....!.u...P| +peer0.org1.example.com | 00000010 76 ec 4e e0 9a 1a 73 f9 d4 48 aa 9e de 15 87 20 |v.N...s..H..... |" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c4b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [msp.identity] Verify -> DEBU 3c4c Verify: sig = 00000000 30 45 02 21 00 88 34 ba 98 e0 b6 ea 22 09 d5 e1 |0E.!..4....."...| +peer0.org1.example.com | 00000010 f2 a6 30 92 d0 95 21 72 ce a1 5b b7 43 09 8b fb |..0...!r..[.C...| +peer0.org1.example.com | 00000020 25 41 f0 ad 0e 02 20 7d 7d e0 b2 d8 5a 59 0a d2 |%A.... }}...ZY..| +peer0.org1.example.com | 00000030 57 15 06 d5 35 a5 aa 07 3f ad 09 17 01 19 6a 79 |W...5...?.....jy| +peer0.org1.example.com | 00000040 5c c9 9f 41 2f 81 e6 |\..A/..|" +peer0.org1.example.com | "2019-09-24 01:05:34.248 UTC [gossip.gossip] handleMessage -> DEBU 3c4d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.247 UTC [gossip.comm] Send -> DEBU 3c46 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.251 UTC [cauthdsl] func2 -> DEBU 3c4e 0xc003ba1ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.251 UTC [cauthdsl] func1 -> DEBU 3c4f 0xc003ba1ca0 gate 1569287134245719100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c50 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c51 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c52 Signature set satisfies policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:34.253 UTC [gossip.comm] sendToEndpoint -> DEBU 3c55 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.253 UTC [blocksProvider] DeliverBlocks -> DEBU 3c56 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.254 UTC [gossip.state] addPayload -> DEBU 3c58 [businesschannel] Adding payload to local buffer, blockNum = [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.254 UTC [gossip.state] addPayload -> DEBU 3c59 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +peer0.org1.example.com | "2019-09-24 01:05:34.254 UTC [blocksProvider] DeliverBlocks -> DEBU 3c5a [businesschannel] Gossiping block [6], peers number [3]" +peer0.org1.example.com | "2019-09-24 01:05:34.256 UTC [gossip.channel] AddToMsgStore -> DEBU 3c5b Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes to the block puller" +peer0.org1.example.com | "2019-09-24 01:05:34.257 UTC [gossip.pull] Add -> DEBU 3c5c Added 6, total items: 6" +peer0.org1.example.com | "2019-09-24 01:05:34.260 UTC [gossip.state] deliverPayloads -> DEBU 3c5d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.262 UTC [gossip.state] deliverPayloads -> DEBU 3c5e [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +peer0.org1.example.com | "2019-09-24 01:05:34.263 UTC [gossip.privdata] StoreBlock -> INFO 3c5f [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-09-24 01:05:34.264 UTC [gossip.privdata] StoreBlock -> DEBU 3c60 [businesschannel] Validating block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.251 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.264 UTC [committer.txvalidator] Validate -> DEBU 3c61 [businesschannel] START Block Validation for block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.267 UTC [committer.txvalidator] Validate -> DEBU 3c62 expecting 1 block validation responses" +peer0.org1.example.com | "2019-09-24 01:05:34.267 UTC [committer.txvalidator] validateTx -> DEBU 3c63 [businesschannel] validateTx starts for block 0xc0026d2740 env 0xc000361360 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:34.267 UTC [protoutils] ValidateTransaction -> DEBU 3c65 ValidateTransactionEnvelope starts for envelope 0xc000361360" +peer0.org1.example.com | "2019-09-24 01:05:34.268 UTC [protoutils] ValidateTransaction -> DEBU 3c66 Header is channel_header:"\010\001\032\006\010\336\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030M\243\211\350u\336Q\364\206N\031\242Yx\245\327$K\2515\217\246\361\241" " +peer0.org1.example.com | "2019-09-24 01:05:34.269 UTC [protoutils] validateChannelHeader -> DEBU 3c67 validateChannelHeader info: header type 1" +peer0.org1.example.com | "2019-09-24 01:05:34.269 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c68 begin" +peer0.org1.example.com | "2019-09-24 01:05:34.271 UTC [msp] GetManagerForChain -> DEBU 3c69 Returning existing manager for channel 'businesschannel'" +peer0.org1.example.com | "2019-09-24 01:05:34.265 UTC [gossip.comm] Send -> DEBU 3c64 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.253 UTC [gossip.comm] sendToEndpoint -> DEBU 3c57 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.273 UTC [msp] DeserializeIdentity -> DEBU 3c6a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.277 UTC [gossip.comm] Send -> DEBU 3c6c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.273 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.278 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.278 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.272 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c70 creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +peer0.org1.example.com | "2019-09-24 01:05:34.280 UTC [msp] Validate -> DEBU 3c71 MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c72 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:34.282 UTC [msp.identity] Verify -> DEBU 3c73 Verify: digest = 00000000 e8 3b 6c b0 cb 64 33 1c 60 2e dc 16 9a 72 c7 7e |.;l..d3.`....r.~| +peer0.org1.example.com | 00000010 b5 7c 91 3f f2 9c 89 14 9e af 22 4b d7 b4 1d 39 |.|.?......"K...9|" +peer0.org1.example.com | "2019-09-24 01:05:34.284 UTC [msp.identity] Verify -> DEBU 3c74 Verify: sig = 00000000 30 45 02 21 00 c2 c4 e5 1d c9 50 29 43 06 ff 62 |0E.!......P)C..b| +peer0.org1.example.com | 00000010 a2 4d 31 63 8f d4 19 45 73 28 e7 aa 84 be 07 cb |.M1c...Es(......| +peer0.org1.example.com | 00000020 7a 8b 70 c7 0d 02 20 43 38 d8 58 1a 1f 12 97 1d |z.p... C8.X.....| +peer0.org1.example.com | 00000030 b9 9a 26 76 46 99 eb a4 61 0a f0 b7 be bc b1 cb |..&vF...a.......| +peer0.org1.example.com | 00000040 18 c1 b7 68 5e f4 30 |...h^.0|" +peer0.org1.example.com | "2019-09-24 01:05:34.286 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c75 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:34.286 UTC [protoutils] validateConfigTransaction -> DEBU 3c76 validateConfigTransaction starts for data 0xc003aee000, header channel_header:"\010\001\032\006\010\336\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030M\243\211\350u\336Q\364\206N\031\242Yx\245\327$K\2515\217\246\361\241" " +peer0.org1.example.com | "2019-09-24 01:05:34.286 UTC [committer.txvalidator] validateTx -> DEBU 3c77 Transaction is for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.286 UTC [common.configtx] addToMap -> DEBU 3c78 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7b Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7c Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7d Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c7e Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c7f Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c80 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c81 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.289 UTC [common.configtx] addToMap -> DEBU 3c82 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.286 UTC [gossip.comm] func1 -> DEBU 3c79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.289 UTC [gossip.gossip] handleMessage -> DEBU 3c83 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.290 UTC [gossip.gossip] handleMessage -> DEBU 3c84 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.289 UTC [common.configtx] addToMap -> DEBU 3c85 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.292 UTC [common.configtx] addToMap -> DEBU 3c86 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.293 UTC [common.configtx] addToMap -> DEBU 3c87 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c89 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.294 UTC [common.configtx] addToMap -> DEBU 3c8a Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.293 UTC [msp.identity] Verify -> DEBU 3c8b Verify: digest = 00000000 a0 c8 3a 50 4a 8e 82 5b 73 63 37 ab 9a 6d 10 9f |..:PJ..[sc7..m..| +peer0.org1.example.com | 00000010 dc 4a 70 39 c1 08 f4 2f b3 ec e1 d9 30 61 72 25 |.Jp9.../....0ar%|" +peer0.org1.example.com | "2019-09-24 01:05:34.296 UTC [msp.identity] Verify -> DEBU 3c8d Verify: sig = 00000000 30 44 02 20 4a 5d 21 ee 71 e1 5b 93 b2 bb b4 a8 |0D. J]!.q.[.....| +peer0.org1.example.com | 00000010 8c 22 b4 e5 2f ea 9d 25 25 71 5e ab 27 41 eb f0 |."../..%%q^.'A..| +peer0.org1.example.com | 00000020 0c 3b a5 7f 02 20 1c d7 a6 15 25 9d 23 92 74 be |.;... ....%.#.t.| +peer0.org1.example.com | 00000030 97 ab 57 da 09 71 26 3b 0e 69 b3 3f 00 96 1c 19 |..W..q&;.i.?....| +peer0.org1.example.com | 00000040 e8 68 88 5c e0 5e |.h.\.^|" +peer0.org1.example.com | "2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c8f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c90 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.298 UTC [msp] DeserializeIdentity -> DEBU 3c92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.298 UTC [gossip.discovery] isSentByMe -> DEBU 3c91 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.298 UTC [gossip.comm] Send -> DEBU 3c93 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.298 UTC [msp] DeserializeIdentity -> DEBU 3c94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.299 UTC [msp] DeserializeIdentity -> DEBU 3c95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3c96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c97 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3c98 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.294 UTC [common.configtx] addToMap -> DEBU 3c8c Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.287 UTC [gossip.comm] func1 -> DEBU 3c7a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.301 UTC [common.configtx] addToMap -> DEBU 3c99 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.301 UTC [gossip.gossip] handleMessage -> DEBU 3c9a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.302 UTC [comm.grpc.server] 1 -> INFO 3c9b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.301Z grpc.peer_address=172.18.0.9:51538 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=223µs +peer0.org1.example.com | "2019-09-24 01:05:34.303 UTC [common.configtx] addToMap -> DEBU 3c9c Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.304 UTC [gossip.gossip] handleMessage -> DEBU 3c9e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.305 UTC [common.configtx] addToMap -> DEBU 3c9d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3c9f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3ca0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3ca1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca3 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:05:34.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca5 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca6 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.308 UTC [common.configtx] addToMap -> DEBU 3ca7 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.309 UTC [common.configtx] addToMap -> DEBU 3ca8 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.309 UTC [common.configtx] addToMap -> DEBU 3ca9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.325 UTC [common.configtx] addToMap -> DEBU 3cac Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.309 UTC [msp.identity] Verify -> DEBU 3caa Verify: digest = 00000000 a0 c8 3a 50 4a 8e 82 5b 73 63 37 ab 9a 6d 10 9f |..:PJ..[sc7..m..| +peer0.org1.example.com | 00000010 dc 4a 70 39 c1 08 f4 2f b3 ec e1 d9 30 61 72 25 |.Jp9.../....0ar%|" +peer0.org1.example.com | "2019-09-24 01:05:34.313 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cab Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.327 UTC [common.configtx] addToMap -> DEBU 3cad Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.329 UTC [msp.identity] Verify -> DEBU 3cae Verify: sig = 00000000 30 44 02 20 4a 5d 21 ee 71 e1 5b 93 b2 bb b4 a8 |0D. J]!.q.[.....| +peer0.org1.example.com | 00000010 8c 22 b4 e5 2f ea 9d 25 25 71 5e ab 27 41 eb f0 |."../..%%q^.'A..| +peer0.org1.example.com | 00000020 0c 3b a5 7f 02 20 1c d7 a6 15 25 9d 23 92 74 be |.;... ....%.#.t.| +peer0.org1.example.com | 00000030 97 ab 57 da 09 71 26 3b 0e 69 b3 3f 00 96 1c 19 |..W..q&;.i.?....| +peer0.org1.example.com | 00000040 e8 68 88 5c e0 5e |.h.\.^|" +peer0.org1.example.com | "2019-09-24 01:05:34.330 UTC [gossip.discovery] isSentByMe -> DEBU 3cb1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.329 UTC [msp.identity] Sign -> DEBU 3caf Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.330 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.332 UTC [msp.identity] Sign -> DEBU 3cb3 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.332 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.334 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.337 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb6 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb8 Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [common.configtx] policyForItem -> DEBU 3cb9 Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [policies] Manager -> DEBU 3cba Manager Channel looking up path []" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [policies] Manager -> DEBU 3cbb Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbc Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.338 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cbd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51538" +peer0.org1.example.com | "2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbe Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbf Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cc0 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc1 Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc2 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc3 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.341 UTC [policies] Evaluate -> DEBU 3cc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | "2019-09-24 01:05:34.341 UTC [policies] Evaluate -> DEBU 3cc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.343 UTC [policies] Evaluate -> DEBU 3cc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 01:05:34.344 UTC [cauthdsl] deduplicate -> WARN 3cc7 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer0.org1.example.com | "2019-09-24 01:05:34.345 UTC [cauthdsl] func1 -> DEBU 3cc8 0xc0034977d0 gate 1569287134345069100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.345 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc0034977d0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-09-24 01:05:34.345 UTC [cauthdsl] func2 -> DEBU 3cca 0xc0034977d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.346 UTC [cauthdsl] func2 -> DEBU 3ccb 0xc0034977d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.346 UTC [cauthdsl] func2 -> DEBU 3ccc 0xc0034977d0 processing identity 1 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.346 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3ccd Checking if identity has been named explicitly as an admin for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.347 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3cce Checking if identity carries the admin ou for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.347 UTC [msp] Validate -> DEBU 3ccf MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.347 UTC [msp] getCertificationChain -> DEBU 3cd0 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.348 UTC [msp] hasOURole -> DEBU 3cd1 MSP Org2MSP checking if the identity is a client" +peer0.org1.example.com | "2019-09-24 01:05:34.349 UTC [msp] getCertificationChain -> DEBU 3cd2 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.349 UTC [cauthdsl] func2 -> DEBU 3cd3 0xc0034977d0 principal matched by identity 1" +peer0.org1.example.com | "2019-09-24 01:05:34.349 UTC [msp.identity] Verify -> DEBU 3cd4 Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 3cd5 Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +peer0.org1.example.com | 00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +peer0.org1.example.com | 00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +peer0.org1.example.com | 00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +peer0.org1.example.com | 00000040 c9 eb 2b ab e2 96 |..+...|" +peer0.org1.example.com | "2019-09-24 01:05:34.350 UTC [cauthdsl] func2 -> DEBU 3cd6 0xc0034977d0 principal evaluation succeeds for identity 1" +peer0.org1.example.com | "2019-09-24 01:05:34.350 UTC [cauthdsl] func1 -> DEBU 3cd7 0xc0034977d0 gate 1569287134345069100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.350 UTC [policies] Evaluate -> DEBU 3cd8 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.350 UTC [policies] Evaluate -> DEBU 3cd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.351 UTC [policies] Evaluate -> DEBU 3cda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | "2019-09-24 01:05:34.351 UTC [cauthdsl] deduplicate -> WARN 3cdb De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +peer0.org1.example.com | "2019-09-24 01:05:34.352 UTC [cauthdsl] func1 -> DEBU 3cdc 0xc0034c0180 gate 1569287134352213400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cdd 0xc0034c0180 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | "2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cde 0xc0034c0180 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc0034c0180 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.353 UTC [msp.identity] Verify -> DEBU 3ce0 Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +peer0.org1.example.com | 00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +peer0.org1.example.com | "2019-09-24 01:05:34.353 UTC [msp.identity] Verify -> DEBU 3ce1 Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +peer0.org1.example.com | 00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +peer0.org1.example.com | 00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +peer0.org1.example.com | 00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +peer0.org1.example.com | 00000040 31 77 20 8d 0c 60 |1w ..`|" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [cauthdsl] func2 -> DEBU 3ce2 0xc0034c0180 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [cauthdsl] func1 -> DEBU 3ce3 0xc0034c0180 gate 1569287134352213400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce6 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.355 UTC [common.configtx] verifyDeltaSet -> DEBU 3ce8 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3ce9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3cea Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3ceb Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3cec Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.358 UTC [common.configtx] recurseConfigMap -> DEBU 3ced Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.358 UTC [common.configtx] recurseConfigMap -> DEBU 3cee Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cef Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cf0 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cf1 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf3 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf5 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf6 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf8 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf9 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfa Setting policy for key LifecycleEndorsement to " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfb Setting policy for key Readers to " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfc Setting policy for key Writers to " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfd Setting policy for key Admins to " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfe Setting policy for key Endorsement to " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cff Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3d00 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3d01 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3d02 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d03 Processing field: HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d04 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d05 Processing field: OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d06 Processing field: Consortium" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d07 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3d08 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d09 Processing field: ACLs" +peer0.org1.example.com | "2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d0a Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.362 UTC [common.channelconfig] NewStandardValues -> DEBU 3d0b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d0c Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51538" +peer0.org1.example.com | "2019-09-24 01:05:34.367 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.369 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.369 UTC [msp] DeserializeIdentity -> DEBU 3d0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.369 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.370 UTC [msp] DeserializeIdentity -> DEBU 3d11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d13 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d14 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [cauthdsl] func1 -> DEBU 3d18 0xc003f38970 gate 1569287134371476400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [cauthdsl] func2 -> DEBU 3d19 0xc003f38970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.371 UTC [cauthdsl] func2 -> DEBU 3d1a 0xc003f38970 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d1b 0xc003f38970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003f38970 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func1 -> DEBU 3d1d 0xc003f38970 gate 1569287134371476400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func1 -> DEBU 3d21 0xc003f391d0 gate 1569287134372689900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d22 0xc003f391d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d23 0xc003f391d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.373 UTC [cauthdsl] func2 -> DEBU 3d24 0xc003f391d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.373 UTC [msp.identity] Verify -> DEBU 3d25 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3d26 Verify: sig = 00000000 30 44 02 20 74 85 ee 55 7f 98 9f f8 ac 4a 1b ee |0D. t..U.....J..| +peer0.org1.example.com | 00000010 8f 77 44 fb 31 ec 7d 60 f2 0a 2d e4 6e 62 8b 79 |.wD.1.}`..-.nb.y| +peer0.org1.example.com | 00000020 f5 a0 28 c2 02 20 79 55 37 f5 2e 2d 1c 20 ee 06 |..(.. yU7..-. ..| +peer0.org1.example.com | 00000030 4e f9 26 d5 88 11 84 a2 03 03 70 05 77 14 92 0e |N.&.......p.w...| +peer0.org1.example.com | 00000040 82 7c be 74 01 a4 |.|.t..|" +peer0.org1.example.com | "2019-09-24 01:05:34.376 UTC [cauthdsl] func2 -> DEBU 3d27 0xc003f391d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.379 UTC [cauthdsl] func1 -> DEBU 3d28 0xc003f391d0 gate 1569287134372689900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.381 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d2d Authenticated 172.18.0.9:51538" +peer0.org1.example.com | "2019-09-24 01:05:34.382 UTC [gossip.comm] GossipStream -> DEBU 3d2e Servicing 172.18.0.9:51538" +peer0.org1.example.com | "2019-09-24 01:05:34.383 UTC [gossip.comm] writeToStream -> DEBU 3d2f Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.383 UTC [gossip.comm] serviceConnection -> DEBU 3d30 Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:05:34.390 UTC [gossip.comm] readFromStream -> DEBU 3d31 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:05:34.395 UTC [comm.grpc.server] 1 -> INFO 3d32 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.395Z grpc.peer_address=172.18.0.8:35478 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.7µs +peer0.org1.example.com | "2019-09-24 01:05:34.398 UTC [grpc] infof -> DEBU 3d33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.399 UTC [gossip.comm] readFromStream -> DEBU 3d34 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:05:34.399 UTC [gossip.comm] func2 -> DEBU 3d35 Client 172.18.0.9:51538 disconnected" +peer0.org1.example.com | "2019-09-24 01:05:34.399 UTC [comm.grpc.server] 1 -> INFO 3d36 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.313Z grpc.peer_address=172.18.0.9:51538 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=86.6244ms +peer0.org1.example.com | "2019-09-24 01:05:34.402 UTC [grpc] infof -> DEBU 3d37 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.402 UTC [gossip.comm] writeToStream -> DEBU 3d38 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d39 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:05:34.403 UTC [common.channelconfig] NewStandardValues -> DEBU 3d3a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d3b Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.405 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d3c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.405 UTC [msp.identity] Sign -> DEBU 3d3d Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.405 UTC [msp.identity] Sign -> DEBU 3d3e Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.406 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d3f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:35478" +peer0.org1.example.com | "2019-09-24 01:05:34.407 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d40 Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35478" +peer0.org1.example.com | "2019-09-24 01:05:34.407 UTC [msp] DeserializeIdentity -> DEBU 3d41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.407 UTC [msp] DeserializeIdentity -> DEBU 3d43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.408 UTC [common.channelconfig] Validate -> DEBU 3d44 Anchor peers for org Org3MSP are " +peer0.org1.example.com | "2019-09-24 01:05:34.408 UTC [common.channelconfig] validateMSP -> DEBU 3d45 Setting up MSP for org Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.408 UTC [msp] newBccspMsp -> DEBU 3d46 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.409 UTC [msp] DeserializeIdentity -> DEBU 3d48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d4b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.411 UTC [comm.grpc.server] 1 -> INFO 3d4d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.41Z grpc.peer_address=172.18.0.9:51546 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=758.9µs +peer0.org1.example.com | "2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d4c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.413 UTC [cauthdsl] func1 -> DEBU 3d51 0xc003f97a90 gate 1569287134413084700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.413 UTC [cauthdsl] func2 -> DEBU 3d52 0xc003f97a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.408 UTC [msp] New -> DEBU 3d49 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.414 UTC [msp] Setup -> DEBU 3d53 Setting up MSP instance Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.415 UTC [msp.identity] newIdentity -> DEBU 3d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +peer0.org1.example.com | eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +peer0.org1.example.com | qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +peer0.org1.example.com | dYwS3hhngHiwgZ04VycGu5gUPC+j +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.416 UTC [common.channelconfig] NewStandardValues -> DEBU 3d55 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.417 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d56 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:05:34.417 UTC [common.channelconfig] NewStandardValues -> DEBU 3d57 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d58 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.418 UTC [common.channelconfig] Validate -> DEBU 3d59 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 01:05:34.418 UTC [common.channelconfig] validateMSP -> DEBU 3d5a Setting up MSP for org Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.418 UTC [msp] newBccspMsp -> DEBU 3d5b Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.419 UTC [msp] New -> DEBU 3d5c Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.419 UTC [msp] Setup -> DEBU 3d5d Setting up MSP instance Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.421 UTC [msp.identity] newIdentity -> DEBU 3d5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +peer0.org1.example.com | I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +peer0.org1.example.com | VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +peer0.org1.example.com | zeuAMdERG0OX6tpsU+PcrCZVqBE= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.423 UTC [common.channelconfig] NewStandardValues -> DEBU 3d5f Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d60 Processing field: AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:05:34.423 UTC [common.channelconfig] NewStandardValues -> DEBU 3d61 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d62 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.424 UTC [common.channelconfig] Validate -> DEBU 3d63 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | "2019-09-24 01:05:34.424 UTC [common.channelconfig] validateMSP -> DEBU 3d64 Setting up MSP for org Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.424 UTC [msp] newBccspMsp -> DEBU 3d65 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.424 UTC [msp] New -> DEBU 3d66 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.424 UTC [msp] Setup -> DEBU 3d67 Setting up MSP instance Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.425 UTC [msp.identity] newIdentity -> DEBU 3d68 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +peer0.org1.example.com | p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +peer0.org1.example.com | a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +peer0.org1.example.com | cdBU5LLvZghoy+5fBvp98DMbKf0= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.427 UTC [common.channelconfig] NewStandardValues -> DEBU 3d69 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6a Processing field: ConsensusType" +peer0.org1.example.com | "2019-09-24 01:05:34.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6b Processing field: BatchSize" +peer0.org1.example.com | "2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d70 Processing field: BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d71 Processing field: KafkaBrokers" +peer0.org1.example.com | "2019-09-24 01:05:34.429 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d6c Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.429 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc003f97a90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.431 UTC [msp.identity] Sign -> DEBU 3d73 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.431 UTC [msp.identity] Sign -> DEBU 3d74 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.431 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003f97a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.431 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003f97a90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [cauthdsl] func1 -> DEBU 3d77 0xc003f97a90 gate 1569287134413084700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [cauthdsl] func1 -> DEBU 3d7b 0xc003703cc0 gate 1569287134432844600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7c 0xc003703cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003703cc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003703cc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.433 UTC [msp.identity] Verify -> DEBU 3d7f Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:05:34.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d80 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51546" +peer0.org1.example.com | "2019-09-24 01:05:34.433 UTC [msp.identity] Verify -> DEBU 3d81 Verify: sig = 00000000 30 44 02 20 3e 94 d9 7d 59 74 a0 04 84 5f 87 33 |0D. >..}Yt..._.3| +peer0.org1.example.com | 00000010 60 ea cf 83 a9 01 c0 0d 4b 4d 4d 4f 1f dc d0 fc |`.......KMMO....| +peer0.org1.example.com | 00000020 2e ff 1e 27 02 20 6b 1b 05 b5 ac 49 51 17 29 7e |...'. k....IQ.)~| +peer0.org1.example.com | 00000030 45 b1 e1 56 57 36 4f ec 88 5a 90 9b 92 1d d6 67 |E..VW6O..Z.....g| +peer0.org1.example.com | 00000040 c7 a5 63 be 32 0d |..c.2.|" +peer0.org1.example.com | "2019-09-24 01:05:34.434 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d82 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51546" +peer0.org1.example.com | "2019-09-24 01:05:34.434 UTC [msp] DeserializeIdentity -> DEBU 3d83 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.437 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.438 UTC [msp] DeserializeIdentity -> DEBU 3d86 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.435 UTC [cauthdsl] func2 -> DEBU 3d84 0xc003703cc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d72 Processing field: ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:05:34.429 UTC [gossip.comm] func1 -> DEBU 3d6e Got message: GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.430 UTC [grpc] infof -> DEBU 3d6f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.439 UTC [cauthdsl] func1 -> DEBU 3d87 0xc003703cc0 gate 1569287134432844600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.440 UTC [policies] Evaluate -> DEBU 3d8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.440 UTC [policies] Evaluate -> DEBU 3d8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.441 UTC [policies] Evaluate -> DEBU 3d8c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.441 UTC [policies] Evaluate -> DEBU 3d8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.441 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8e Authenticated 172.18.0.8:35478" +peer0.org1.example.com | "2019-09-24 01:05:34.441 UTC [gossip.comm] GossipStream -> DEBU 3d8f Servicing 172.18.0.8:35478" +peer0.org1.example.com | "2019-09-24 01:05:34.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d88 Processing field: Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.442 UTC [common.channelconfig] NewStandardValues -> DEBU 3d90 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d91 Processing field: Endpoints" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [common.channelconfig] NewStandardValues -> DEBU 3d92 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d93 Processing field: MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [common.channelconfig] validateMSP -> DEBU 3d94 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [msp] newBccspMsp -> DEBU 3d95 Creating BCCSP-based MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [msp] New -> DEBU 3d96 Creating Cache-MSP instance" +peer0.org1.example.com | "2019-09-24 01:05:34.443 UTC [msp] Setup -> DEBU 3d97 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | "2019-09-24 01:05:34.444 UTC [msp.identity] newIdentity -> DEBU 3d98 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +peer0.org1.example.com | 54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +peer0.org1.example.com | GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +peer0.org1.example.com | RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +peer0.org1.example.com | 1g== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.446 UTC [msp.identity] newIdentity -> DEBU 3d99 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +peer0.org1.example.com | SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +peer0.org1.example.com | Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +peer0.org1.example.com | BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +peer0.org1.example.com | 7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +peer0.org1.example.com | W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.446 UTC [msp] Validate -> DEBU 3d9b MSP OrdererMSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [msp] Setup -> DEBU 3d9c Setting up the MSP manager (4 msps)" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [msp] Setup -> DEBU 3d9d MSP manager setup complete, setup 4 msps" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3d9e Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3d9f Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3da0 Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3da1 Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da2 Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da3 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da4 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da5 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.446 UTC [msp] DeserializeIdentity -> DEBU 3da6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [policies] NewManagerImpl -> DEBU 3da7 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.451 UTC [policies] NewManagerImpl -> DEBU 3dad Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3dae Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3daf Proposed new policy Admins for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3db2 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db5 Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db6 Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3db8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3db9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dba Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbb Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbc Proposed new policy Admins for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbd Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbe Proposed new policy Admins for Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbf Proposed new policy Readers for Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [policies] NewManagerImpl -> DEBU 3dc0 Proposed new policy Writers for Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc1 Adding to config map: [Group] /Channel" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc2 Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc3 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc4 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc9 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dca Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dcb Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dcc Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dcd Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dce Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dcf Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd6 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | "2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd8 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd9 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dda Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddb Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddd Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dd7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [gossip.comm] writeToStream -> DEBU 3da8 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [gossip.comm] serviceConnection -> DEBU 3ddf Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [gossip.comm] readFromStream -> DEBU 3da9 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [gossip.comm] readFromStream -> DEBU 3daa Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [gossip.comm] func2 -> DEBU 3dab Client 172.18.0.8:35478 disconnected" +peer0.org1.example.com | "2019-09-24 01:05:34.460 UTC [comm.grpc.server] 1 -> INFO 3de0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.405Z grpc.peer_address=172.18.0.8:35478 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.4815ms +peer0.org1.example.com | "2019-09-24 01:05:34.450 UTC [grpc] infof -> DEBU 3dac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3dde Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3de1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.460 UTC [common.configtx] addToMap -> DEBU 3de2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org1.example.com | "2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3dea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org1.example.com | "2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3deb Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | "2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3dec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org1.example.com | "2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3ded Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3dee Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3def Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df0 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df1 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df2 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | "2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df4 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | "2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df5 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | "2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df6 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df7 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | "2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df8 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | "2019-09-24 01:05:34.465 UTC [common.channelconfig] LogSanityChecks -> DEBU 3df9 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | "2019-09-24 01:05:34.465 UTC [common.channelconfig] LogSanityChecks -> DEBU 3dfa As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | "2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfb Manager Channel looking up path [Application]" +peer0.org1.example.com | "2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfc Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfd Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3dfe Manager Channel/Application looking up path []" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3dff Manager Channel/Application has managers Org3MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e00 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e01 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e02 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e03 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e04 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e05 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e06 Manager Channel has managers Application" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e07 Manager Channel has managers Orderer" +peer0.org1.example.com | "2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e08 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [policies] Manager -> DEBU 3e09 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0b As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0c As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0d As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.capabilities] Supported -> DEBU 3e0e Application capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [common.capabilities] Supported -> DEBU 3e0f Channel capability V1_4_3 is supported and is enabled" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3e10 Processing new config for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.467 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3e11 Calling out because config was updated for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e12 Org3MSP anchor peers: []" +peer0.org1.example.com | "2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e13 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e14 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +peer0.org1.example.com | "2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e15 Creating state provider for chainID businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [msp] DeserializeIdentity -> DEBU 3e16 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e17 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e18 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.471 UTC [cauthdsl] func1 -> DEBU 3e1c 0xc003ab9560 gate 1569287134471059300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1d 0xc003ab9560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1e 0xc003ab9560 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1f 0xc003ab9560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e20 0xc003ab9560 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [cauthdsl] func1 -> DEBU 3e21 0xc003ab9560 gate 1569287134471059300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [cauthdsl] func1 -> DEBU 3e25 0xc003ab9da0 gate 1569287134472648500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [cauthdsl] func2 -> DEBU 3e26 0xc003ab9da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.472 UTC [cauthdsl] func2 -> DEBU 3e27 0xc003ab9da0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.473 UTC [cauthdsl] func2 -> DEBU 3e28 0xc003ab9da0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.473 UTC [msp.identity] Verify -> DEBU 3e29 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:34.473 UTC [msp.identity] Verify -> DEBU 3e2a Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:34.473 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc003ab9da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [cauthdsl] func1 -> DEBU 3e2c 0xc003ab9da0 gate 1569287134472648500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.463 UTC [policies] Evaluate -> DEBU 3e2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e31 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.475 UTC [policies] Evaluate -> DEBU 3e33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.475 UTC [msp] DeserializeIdentity -> DEBU 3e34 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e37 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e38 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.476 UTC [policies] Evaluate -> DEBU 3e39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.475 UTC [cauthdsl] func1 -> DEBU 3e35 0xc002f9ff20 gate 1569287134475579800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.460 UTC [gossip.comm] writeToStream -> DEBU 3de3 Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.475 UTC [comm.grpc.server] 1 -> INFO 3e36 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.473Z grpc.peer_address=172.18.0.6:44168 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=93.4µs +peer0.org1.example.com | "2019-09-24 01:05:34.440 UTC [gossip.gossip] handleMessage -> DEBU 3d89 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.476 UTC [policies] Evaluate -> DEBU 3e3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.477 UTC [cauthdsl] func2 -> DEBU 3e3b 0xc002f9ff20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e3f 0xc002f9ff20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e40 0xc002f9ff20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e41 0xc002f9ff20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [cauthdsl] func1 -> DEBU 3e42 0xc002f9ff20 gate 1569287134475579800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [policies] Evaluate -> DEBU 3e43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.479 UTC [policies] Evaluate -> DEBU 3e44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.479 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.479 UTC [cauthdsl] func1 -> DEBU 3e46 0xc003b34b90 gate 1569287134479849300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.479 UTC [cauthdsl] func2 -> DEBU 3e47 0xc003b34b90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.480 UTC [cauthdsl] func2 -> DEBU 3e48 0xc003b34b90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.480 UTC [cauthdsl] func2 -> DEBU 3e49 0xc003b34b90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.480 UTC [msp.identity] Verify -> DEBU 3e4a Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3e4b Verify: sig = 00000000 30 45 02 21 00 9c 0e 1a 1f bc 46 02 71 e4 9b db |0E.!......F.q...| +peer0.org1.example.com | 00000010 82 6b 4d 5a 8f 61 91 f8 fb b6 25 87 a4 ad 6a 5d |.kMZ.a....%...j]| +peer0.org1.example.com | 00000020 82 4f f0 7d 81 02 20 60 14 7d 48 5e 63 33 05 28 |.O.}.. `.}H^c3.(| +peer0.org1.example.com | 00000030 5c fc d2 92 34 26 1b 47 f7 4e 9d ce a4 e9 7e 68 |\...4&.G.N....~h| +peer0.org1.example.com | 00000040 ec 6d 10 58 f8 7a 31 |.m.X.z1|" +peer0.org1.example.com | "2019-09-24 01:05:34.481 UTC [cauthdsl] func2 -> DEBU 3e4c 0xc003b34b90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.481 UTC [cauthdsl] func1 -> DEBU 3e4d 0xc003b34b90 gate 1569287134479849300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.481 UTC [policies] Evaluate -> DEBU 3e4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.481 UTC [policies] Evaluate -> DEBU 3e4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [policies] Evaluate -> DEBU 3e50 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [policies] Evaluate -> DEBU 3e51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e52 Authenticated 172.18.0.9:51546" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [gossip.comm] GossipStream -> DEBU 3e53 Servicing 172.18.0.9:51546" +peer0.org1.example.com | "2019-09-24 01:05:34.477 UTC [gossip.gossip] handleMessage -> DEBU 3e3c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e3d Got message: GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e54 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.482 UTC [msp] DeserializeIdentity -> DEBU 3e55 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e57 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e58 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.485 UTC [cauthdsl] func1 -> DEBU 3e5c 0xc002fc0560 gate 1569287134485898200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.486 UTC [cauthdsl] func2 -> DEBU 3e5d 0xc002fc0560 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.486 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc002fc0560 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.487 UTC [cauthdsl] func2 -> DEBU 3e5f 0xc002fc0560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.487 UTC [cauthdsl] func2 -> DEBU 3e60 0xc002fc0560 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.487 UTC [cauthdsl] func1 -> DEBU 3e61 0xc002fc0560 gate 1569287134485898200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.487 UTC [policies] Evaluate -> DEBU 3e62 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.487 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.488 UTC [policies] Evaluate -> DEBU 3e64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.488 UTC [cauthdsl] func1 -> DEBU 3e65 0xc002fc0da0 gate 1569287134488442600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.488 UTC [cauthdsl] func2 -> DEBU 3e66 0xc002fc0da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.488 UTC [cauthdsl] func2 -> DEBU 3e67 0xc002fc0da0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.489 UTC [cauthdsl] func2 -> DEBU 3e68 0xc002fc0da0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.489 UTC [msp.identity] Verify -> DEBU 3e69 Verify: digest = 00000000 23 59 88 31 b1 9a f0 09 8e 1e aa ff dc 72 61 bb |#Y.1.........ra.| +peer0.org1.example.com | 00000010 d6 23 b9 1c 82 58 fd 38 b8 6e 22 41 ed 6b fb a1 |.#...X.8.n"A.k..|" +peer0.org1.example.com | "2019-09-24 01:05:34.490 UTC [msp.identity] Verify -> DEBU 3e6a Verify: sig = 00000000 30 45 02 21 00 f5 19 5d 0d b3 ef 5e e8 7e 36 db |0E.!...]...^.~6.| +peer0.org1.example.com | 00000010 ef 3b 6b 1f 8b a7 be a8 5d 52 68 45 39 7a 2c a1 |.;k.....]RhE9z,.| +peer0.org1.example.com | 00000020 f2 f7 81 c3 b8 02 20 0a 1a a6 fe 97 24 1d c0 f2 |...... .....$...| +peer0.org1.example.com | 00000030 0d 12 8f 2d 6e 70 a3 27 60 19 99 88 83 c4 44 9e |...-np.'`.....D.| +peer0.org1.example.com | 00000040 b1 19 b4 c8 01 da 14 |.......|" +peer0.org1.example.com | "2019-09-24 01:05:34.491 UTC [cauthdsl] func2 -> DEBU 3e6b 0xc002fc0da0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.491 UTC [cauthdsl] func1 -> DEBU 3e6c 0xc002fc0da0 gate 1569287134488442600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.491 UTC [policies] Evaluate -> DEBU 3e6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e6f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.492 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e71 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e72 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e73 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e74 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.493 UTC [gossip.gossip] handleMessage -> DEBU 3e75 Entering, 172.18.0.9:51546 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:17384056206916090620 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e76 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.478 UTC [policies] Evaluate -> DEBU 3e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.494 UTC [cauthdsl] func1 -> DEBU 3e77 0xc003b21050 gate 1569287134493991000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.494 UTC [cauthdsl] func2 -> DEBU 3e79 0xc003b21050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.494 UTC [cauthdsl] func2 -> DEBU 3e7a 0xc003b21050 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.495 UTC [cauthdsl] func2 -> DEBU 3e7b 0xc003b21050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e78 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e7d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.495 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.495 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7f Got message: GossipMessage: nonce:17384056206916090620 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.496 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e80 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.496 UTC [msp] DeserializeIdentity -> DEBU 3e81 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e82 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e83 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.495 UTC [cauthdsl] func2 -> DEBU 3e7c 0xc003b21050 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.497 UTC [cauthdsl] func1 -> DEBU 3e84 0xc003b21050 gate 1569287134493991000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.497 UTC [policies] Evaluate -> DEBU 3e85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.497 UTC [policies] Evaluate -> DEBU 3e86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [policies] Evaluate -> DEBU 3e87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [cauthdsl] func1 -> DEBU 3e88 0xc003b21890 gate 1569287134498243700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8a 0xc003b21890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8c 0xc003b21890 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc003b21890 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [msp.identity] Verify -> DEBU 3e8e Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [msp.identity] Verify -> DEBU 3e8f Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [cauthdsl] func2 -> DEBU 3e90 0xc003b21890 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [cauthdsl] func1 -> DEBU 3e91 0xc003b21890 gate 1569287134498243700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [gossip.discovery] sendMemResponse -> DEBU 3e94 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e95 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.500 UTC [policies] Evaluate -> DEBU 3e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.498 UTC [gossip.gossip] handleMessage -> DEBU 3e8b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.497 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e89 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.501 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.505 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e9b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.500 UTC [gossip.comm] func1 -> DEBU 3e97 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [cauthdsl] func1 -> DEBU 3e9f 0xc00414a8f0 gate 1569287134506196300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea1 0xc00414a8f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea2 0xc00414a8f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea3 0xc00414a8f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.499 UTC [msp] DeserializeIdentity -> DEBU 3e96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.507 UTC [gossip.pull] HandleMessage -> DEBU 3ea5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.507 UTC [msp] DeserializeIdentity -> DEBU 3ea6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.508 UTC [msp] DeserializeIdentity -> DEBU 3ea7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.510 UTC [gossip.comm] Send -> DEBU 3ea9 Entering, sending GossipMessage: Channel: , nonce: 6659362410494176684, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.511 UTC [gossip.discovery] sendMemResponse -> DEBU 3eaa Exiting, replying with alive: alive::*\007\311\310\355\002 \016\252\256\024t\263\2327\247\374\337\010\320\255\230\245+\255\2605\200\304A\367\3728\377\005\367Ou\030" > alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.501 UTC [policies] Evaluate -> DEBU 3e9a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.507 UTC [gossip.pull] SendDigest -> DEBU 3ea8 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:34.506 UTC [msp.identity] Verify -> DEBU 3ea4 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3eab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.512 UTC [policies] Evaluate -> DEBU 3eaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.512 UTC [cauthdsl] func1 -> DEBU 3eb0 0xc004143720 gate 1569287134512590900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.512 UTC [cauthdsl] func2 -> DEBU 3eb1 0xc004143720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb2 0xc004143720 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb3 0xc004143720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb4 0xc004143720 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [cauthdsl] func1 -> DEBU 3eb5 0xc004143720 gate 1569287134512590900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.513 UTC [cauthdsl] func1 -> DEBU 3eb9 0xc004143f60 gate 1569287134513913000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3eba 0xc004143f60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3ebb 0xc004143f60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3ebc 0xc004143f60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.515 UTC [msp.identity] Verify -> DEBU 3ebd Verify: digest = 00000000 0d a2 d4 e5 36 a1 95 e8 f5 4f 50 2f 8e 75 11 6b |....6....OP/.u.k| +peer0.org1.example.com | 00000010 40 4b c8 39 dc 56 e0 49 06 7a 9e 3e 5c ba 8c ce |@K.9.V.I.z.>\...|" +peer0.org1.example.com | "2019-09-24 01:05:34.515 UTC [msp.identity] Verify -> DEBU 3ebe Verify: sig = 00000000 30 45 02 21 00 86 97 71 0c cf 55 f1 30 37 45 6e |0E.!...q..U.07En| +peer0.org1.example.com | 00000010 d5 5a 2c 3c 4f 93 26 1e 9b 1a ce 3b 68 cd 6f f0 |.Z, DEBU 3ebf 0xc004143f60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.516 UTC [cauthdsl] func1 -> DEBU 3ec0 0xc004143f60 gate 1569287134513913000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.516 UTC [policies] Evaluate -> DEBU 3ec1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.511 UTC [gossip.gossip] handleMessage -> DEBU 3eac Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.511 UTC [gossip.comm] sendToEndpoint -> DEBU 3ead Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6659362410494176684, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.517 UTC [gossip.comm] createConnection -> DEBU 3ec4 Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [grpc] DialContext -> DEBU 3ec5 parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [grpc] DialContext -> DEBU 3ec6 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ec9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eca updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecb Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ece Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ecf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.519 UTC [grpc] watcher -> DEBU 3ed0 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [grpc] switchBalancer -> DEBU 3ed1 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [gossip.discovery] sendMemResponse -> DEBU 3ed2 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [grpc] HandleSubConnStateChange -> DEBU 3ed3 pickfirstBalancer: HandleSubConnStateChange: 0xc0039d6b60, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:05:34.512 UTC [msp.identity] Verify -> DEBU 3eae Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:34.520 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.521 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.521 UTC [cauthdsl] func2 -> DEBU 3ed6 0xc00414a8f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.521 UTC [cauthdsl] func1 -> DEBU 3ed7 0xc00414a8f0 gate 1569287134506196300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3ed8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.521 UTC [msp] DeserializeIdentity -> DEBU 3ed9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3edb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.526 UTC [gossip.comm] Send -> DEBU 3edc Entering, sending GossipMessage: Channel: , nonce: 17384056206916090620, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.526 UTC [gossip.gossip] JoinChan -> INFO 3ede Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-09-24 01:05:34.526 UTC [gossip.gossip] learnAnchorPeers -> INFO 3edf Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 01:05:34.527 UTC [gossip.discovery] sendMemResponse -> DEBU 3ee0 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.527 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee1 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-09-24 01:05:34.528 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee2 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-09-24 01:05:34.527 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17384056206916090620, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.528 UTC [gossip.discovery] Connect -> DEBU 3ee5 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +peer0.org1.example.com | "2019-09-24 01:05:34.529 UTC [gossip.discovery] Connect -> DEBU 3ee6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.529 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee7 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-09-24 01:05:34.529 UTC [gossip.service] updateEndpoints -> DEBU 3ee8 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +peer0.org1.example.com | "2019-09-24 01:05:34.530 UTC [msp] DeserializeIdentity -> DEBU 3ee9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.531 UTC [gossip.comm] func1 -> DEBU 3eea Got message: GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.531 UTC [gossip.gossip] handleMessage -> DEBU 3eec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eeb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.531 UTC [msp] DeserializeIdentity -> DEBU 3eee Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef1 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.534 UTC [msp.identity] Verify -> DEBU 3ef2 Verify: digest = 00000000 e1 10 87 0d 6d e5 0a cd cf 2b 08 98 eb dc 8f 62 |....m....+.....b| +peer0.org1.example.com | 00000010 c6 f6 58 8b 86 ef f7 e0 10 68 7f 86 cc 21 15 24 |..X......h...!.$|" +peer0.org1.example.com | "2019-09-24 01:05:34.534 UTC [msp.identity] Verify -> DEBU 3ef3 Verify: sig = 00000000 30 44 02 20 49 1f 7a fb 91 b8 ee 32 8c 25 20 71 |0D. I.z....2.% q| +peer0.org1.example.com | 00000010 e3 9c e1 8d e1 1d 88 df b2 e1 21 42 50 9c f7 6c |..........!BP..l| +peer0.org1.example.com | 00000020 7e fc 28 a8 02 20 3a f5 31 14 e4 5e 5b c7 66 e2 |~.(.. :.1..^[.f.| +peer0.org1.example.com | 00000030 05 b1 fa ff 00 dd 68 d2 bb 56 4c bf 01 fa 42 b4 |......h..VL...B.| +peer0.org1.example.com | 00000040 9f 93 3d 66 91 33 |..=f.3|" +peer0.org1.example.com | "2019-09-24 01:05:34.535 UTC [msp.identity] Verify -> DEBU 3ef4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:34.535 UTC [msp.identity] Verify -> DEBU 3ef5 Verify: sig = 00000000 30 44 02 20 3e 0c b2 dc 41 74 f7 51 43 df 7f 86 |0D. >...At.QC...| +peer0.org1.example.com | 00000010 6e eb 52 e2 fa 79 27 70 77 b8 b7 83 2d fe f0 d5 |n.R..y'pw...-...| +peer0.org1.example.com | 00000020 9c 06 95 26 02 20 02 3f 21 c4 02 1c a9 4b 03 56 |...&. .?!....K.V| +peer0.org1.example.com | 00000030 10 7c f5 af 94 45 06 7f 02 ec 9e 3a 78 08 53 01 |.|...E.....:x.S.| +peer0.org1.example.com | 00000040 a0 b2 18 f7 c9 cd |......|" +peer0.org1.example.com | "2019-09-24 01:05:34.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef8 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3efa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.528 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 3efb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3efd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.540 UTC [grpc] DialContext -> DEBU 3efe parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:05:34.541 UTC [grpc] DialContext -> DEBU 3eff scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:05:34.542 UTC [grpc] watcher -> DEBU 3f00 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:05:34.542 UTC [grpc] switchBalancer -> DEBU 3f01 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:05:34.543 UTC [grpc] HandleSubConnStateChange -> DEBU 3f02 pickfirstBalancer: HandleSubConnStateChange: 0xc0039d6b60, READY" +peer0.org1.example.com | "2019-09-24 01:05:34.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.544 UTC [peer] updateTrustedRoots -> DEBU 3f03 Updating trusted root authorities for channel businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.551 UTC [gossip.discovery] sendMemResponse -> DEBU 3f04 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:34.556 UTC [msp] DeserializeIdentity -> DEBU 3f05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f06 updating root CAs for channel [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f07 adding app root CAs for MSP [Org1MSP]" +peer0.org1.example.com | "2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f08 adding app root CAs for MSP [Org2MSP]" +peer0.org1.example.com | "2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f09 adding orderer root CAs for MSP [OrdererMSP]" +peer0.org1.example.com | "2019-09-24 01:05:34.560 UTC [peer] buildTrustedRootsForChain -> DEBU 3f0a adding app root CAs for MSP [Org3MSP]" +peer0.org1.example.com | "2019-09-24 01:05:34.559 UTC [msp] DeserializeIdentity -> DEBU 3f0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.560 UTC [committer.txvalidator] validateTx -> DEBU 3f0c config transaction received for chain businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:34.560 UTC [committer.txvalidator] validateTx -> DEBU 3f0d [businesschannel] validateTx completes for block 0xc0026d2740 env 0xc000361360 txn 0" +peer0.org1.example.com | "2019-09-24 01:05:34.561 UTC [committer.txvalidator] Validate -> DEBU 3f0e got result for idx 0, code 0" +peer0.org1.example.com | "2019-09-24 01:05:34.561 UTC [committer.txvalidator] Validate -> INFO 3f0f [businesschannel] Validated block [6] in 296ms" +peer0.org1.example.com | "2019-09-24 01:05:34.560 UTC [msp] DeserializeIdentity -> DEBU 3f10 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.563 UTC [msp.identity] newIdentity -> DEBU 3f15 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +peer0.org1.example.com | S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +peer0.org1.example.com | dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +peer0.org1.example.com | sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.564 UTC [gossip.comm] Send -> DEBU 3f16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.565 UTC [gossip.discovery] sendMemResponse -> DEBU 3f17 Exiting, replying with alive:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.561 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3f11 Retrieving private write sets for 0 transactions from transient store" +peer0.org1.example.com | "2019-09-24 01:05:34.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f12 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.569 UTC [msp.identity] Sign -> DEBU 3f19 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.570 UTC [msp.identity] Sign -> DEBU 3f1a Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.569 UTC [gossip.privdata] StoreBlock -> DEBU 3f1b [businesschannel] No missing collection private write sets to fetch from remote peers" +peer0.org1.example.com | "2019-09-24 01:05:34.570 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f1c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.571 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f1d Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.571 UTC [msp] DeserializeIdentity -> DEBU 3f1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.571 UTC [msp] Validate -> DEBU 3f1f MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.572 UTC [msp] getCertificationChain -> DEBU 3f21 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.572 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f22 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.572 UTC [msp] DeserializeIdentity -> DEBU 3f23 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.571 UTC [committer] preCommit -> DEBU 3f20 Received configuration update, calling CSCC ConfigUpdate" +peer0.org1.example.com | "2019-09-24 01:05:34.574 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.575 UTC [kvledger] CommitWithPvtData -> DEBU 3f25 [businesschannel] Validating state for block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.575 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f27 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +peer0.org1.example.com | "2019-09-24 01:05:34.576 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f28 lock acquired on oldBlockCommit for validating read set version against the committed version" +peer0.org1.example.com | "2019-09-24 01:05:34.576 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f29 Validating new block with num trans = [1]" +peer0.org1.example.com | "2019-09-24 01:05:34.577 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f2a ValidateAndPrepareBatch() for block number = [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.577 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f2b preprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:34.578 UTC [valimpl] preprocessProtoBlock -> DEBU 3f2c txType=CONFIG" +peer0.org1.example.com | "2019-09-24 01:05:34.578 UTC [valimpl] processNonEndorserTx -> DEBU 3f2d Performing custom processing for transaction [txid=], [txType=CONFIG]" +peer0.org1.example.com | "2019-09-24 01:05:34.579 UTC [valimpl] processNonEndorserTx -> DEBU 3f2e Processor for custom tx processing:&peer.configtxProcessor{}" +peer0.org1.example.com | "2019-09-24 01:05:34.580 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3f2f constructing new tx simulator" +peer0.org1.example.com | "2019-09-24 01:05:34.581 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3f30 constructing new tx simulator txid = []" +peer0.org1.example.com | "2019-09-24 01:05:34.582 UTC [peer] GenerateSimulationResults -> DEBU 3f31 Processing CONFIG" +peer0.org1.example.com | "2019-09-24 01:05:34.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f14 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.582 UTC [msp.identity] Sign -> DEBU 3f32 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.582 UTC [msp.identity] Sign -> DEBU 3f33 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.583 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f34 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:44168" +peer0.org1.example.com | "2019-09-24 01:05:34.584 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f35 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44168" +peer0.org1.example.com | "2019-09-24 01:05:34.584 UTC [msp.identity] Verify -> DEBU 3f36 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:05:34.584 UTC [msp.identity] Verify -> DEBU 3f37 Verify: sig = 00000000 30 45 02 21 00 ac 24 e4 61 e8 28 56 54 67 14 52 |0E.!..$.a.(VTg.R| +peer0.org1.example.com | 00000010 e7 ae e0 4d b1 05 13 67 b3 d0 71 4c 57 af 60 d2 |...M...g..qLW.`.| +peer0.org1.example.com | 00000020 c7 f1 94 ee fc 02 20 62 6d 1f 5a 3d d2 df f5 8f |...... bm.Z=....| +peer0.org1.example.com | 00000030 aa 20 27 7f 7c 90 3a 22 a8 7e b1 e2 22 7b 30 54 |. '.|.:".~.."{0T| +peer0.org1.example.com | 00000040 91 db ba fc 99 d4 81 |.......|" +peer0.org1.example.com | "2019-09-24 01:05:34.585 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f38 Authenticated 172.18.0.6:44168" +peer0.org1.example.com | "2019-09-24 01:05:34.585 UTC [gossip.comm] GossipStream -> DEBU 3f39 Servicing 172.18.0.6:44168" +peer0.org1.example.com | "2019-09-24 01:05:34.568 UTC [gossip.comm] sendToEndpoint -> DEBU 3f18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.586 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.586 UTC [gossip.comm] writeToStream -> DEBU 3f3b Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.586 UTC [gossip.comm] serviceConnection -> DEBU 3f3c Closing reading from stream" +peer0.org1.example.com | "2019-09-24 01:05:34.587 UTC [gossip.comm] readFromStream -> DEBU 3f3d 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +peer0.org1.example.com | "2019-09-24 01:05:34.543 UTC [grpc] HandleSubConnStateChange -> DEBU 3f13 pickfirstBalancer: HandleSubConnStateChange: 0xc003b49890, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:05:34.587 UTC [grpc] HandleSubConnStateChange -> DEBU 3f3e pickfirstBalancer: HandleSubConnStateChange: 0xc003b49890, READY" +peer0.org1.example.com | "2019-09-24 01:05:34.588 UTC [peer] processChannelConfigTx -> DEBU 3f3f channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +peer0.org1.example.com | "2019-09-24 01:05:34.594 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3f42 Simulation completed, getting simulation results" +peer0.org1.example.com | "2019-09-24 01:05:34.575 UTC [msp] DeserializeIdentity -> DEBU 3f26 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.588 UTC [grpc] infof -> DEBU 3f40 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f41 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [gossip.comm] readFromStream -> DEBU 3f43 Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [gossip.comm] func2 -> DEBU 3f44 Client 172.18.0.6:44168 disconnected" +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [comm.grpc.server] 1 -> INFO 3f49 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.561Z grpc.peer_address=172.18.0.6:44168 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.5047ms +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [grpc] infof -> DEBU 3f45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [lockbasedtxmgr] Done -> DEBU 3f46 Done with transaction simulation / query execution []" +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3f4a Block [6] Transaction index [0] TxId [] marked as valid by state validator" +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [gossip.comm] writeToStream -> DEBU 3f4b Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [valinternal] ApplyWriteSet -> DEBU 3f4c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0033555c0)}" +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4d validating rwset..." +peer0.org1.example.com | "2019-09-24 01:05:34.598 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4e postprocessing ProtoBlock..." +peer0.org1.example.com | "2019-09-24 01:05:34.599 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4f ValidateAndPrepareBatch() complete" +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f51 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f52 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.597 UTC [msp.identity] Sign -> DEBU 3f48 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.599 UTC [kvledger] CommitWithPvtData -> DEBU 3f50 [businesschannel] Adding CommitHash to the block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.600 UTC [policies] Evaluate -> DEBU 3f53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.601 UTC [msp.identity] Sign -> DEBU 3f54 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.602 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f57 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.602 UTC [kvledger] CommitWithPvtData -> DEBU 3f55 [businesschannel] Committing block [6] to storage" +peer0.org1.example.com | "2019-09-24 01:05:34.606 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3f59 Writing block [6] to pvt block store" +peer0.org1.example.com | "2019-09-24 01:05:34.610 UTC [pvtdatastorage] Prepare -> DEBU 3f5a Saved 0 private data write sets for block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.611 UTC [gossip.comm] readFromStream -> DEBU 3f5b Got error, aborting: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | "2019-09-24 01:05:34.611 UTC [gossip.comm] func2 -> DEBU 3f5c Client 172.18.0.9:51546 disconnected" +peer0.org1.example.com | "2019-09-24 01:05:34.612 UTC [comm.grpc.server] 1 -> INFO 3f5d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51546 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=183.3098ms +peer0.org1.example.com | "2019-09-24 01:05:34.613 UTC [grpc] infof -> DEBU 3f5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.613 UTC [gossip.comm] writeToStream -> DEBU 3f5f Closing writing to stream" +peer0.org1.example.com | "2019-09-24 01:05:34.602 UTC [policies] Evaluate -> DEBU 3f56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [policies] Evaluate -> DEBU 3f60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [cauthdsl] func1 -> DEBU 3f61 0xc003612d60 gate 1569287134614306800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f62 0xc003612d60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f63 0xc003612d60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f64 0xc003612d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f65 0xc003612d60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [cauthdsl] func1 -> DEBU 3f66 0xc003612d60 gate 1569287134614306800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f67 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [cauthdsl] func1 -> DEBU 3f6a 0xc0036135c0 gate 1569287134615552700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.615 UTC [cauthdsl] func2 -> DEBU 3f6b 0xc0036135c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.616 UTC [cauthdsl] func2 -> DEBU 3f6c 0xc0036135c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.617 UTC [fsblkstorage] indexBlock -> DEBU 3f6d Indexing block [blockNum=6, blockHash=[]byte{0x46, 0x52, 0x27, 0x1b, 0xc, 0xf, 0xee, 0x5b, 0x83, 0xd9, 0x75, 0x78, 0x16, 0xfe, 0x4a, 0x8a, 0xe, 0x49, 0x25, 0x33, 0x16, 0xa2, 0x38, 0x7a, 0x1c, 0x12, 0xa6, 0x93, 0x54, 0xce, 0xb5, 0x65} txOffsets= +peer0.org1.example.com | txId=ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085 locPointer=offset=71, bytesLength=37480 +peer0.org1.example.com | ]" +peer0.org1.example.com | "2019-09-24 01:05:34.617 UTC [fsblkstorage] indexBlock -> DEBU 3f6e Adding txLoc [fileSuffixNum=0, offset=89509, bytesLength=37480] for tx ID: [ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085] to txid-index" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [fsblkstorage] indexBlock -> DEBU 3f6f Adding txLoc [fileSuffixNum=0, offset=89509, bytesLength=37480] for tx number:[0] ID: [ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085] to blockNumTranNum index" +peer0.org1.example.com | "2019-09-24 01:05:34.616 UTC [cauthdsl] func2 -> DEBU 3f70 0xc0036135c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f71 0xc0036135c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func1 -> DEBU 3f72 0xc0036135c0 gate 1569287134615552700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func1 -> DEBU 3f76 0xc003613e20 gate 1569287134618444800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f77 0xc003613e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f78 0xc003613e20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f79 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [msp] Validate -> DEBU 3f7a MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [msp] getCertificationChain -> DEBU 3f7b MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f7c 0xc003613e20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [msp.identity] Verify -> DEBU 3f7d Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +peer0.org1.example.com | 00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [msp.identity] Verify -> DEBU 3f7e Verify: sig = 00000000 30 45 02 21 00 b7 94 8b 6d 0b 5f 7d 34 2e f6 9c |0E.!....m._}4...| +peer0.org1.example.com | 00000010 12 7d f5 d8 e2 51 7b e7 b7 14 f7 aa ef 9a c1 b0 |.}...Q{.........| +peer0.org1.example.com | 00000020 af 92 14 91 6a 02 20 03 f9 95 74 89 6f 4b b4 e0 |....j. ...t.oK..| +peer0.org1.example.com | 00000030 88 23 42 db 47 91 f7 26 70 21 e1 02 c3 f1 95 88 |.#B.G..&p!......| +peer0.org1.example.com | 00000040 87 89 df 80 c2 46 94 |.....F.|" +peer0.org1.example.com | "2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f7f 0xc003613e20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [cauthdsl] func1 -> DEBU 3f80 0xc003613e20 gate 1569287134618444800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f83 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f85 Authenticated 172.18.0.8:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [gossip.comm] createConnection -> DEBU 3f86 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [gossip.comm] sendToEndpoint -> DEBU 3f87 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.606 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f58 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f89 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp.identity] newIdentity -> DEBU 3f8a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +peer0.org1.example.com | VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +peer0.org1.example.com | AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +peer0.org1.example.com | FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp] Validate -> DEBU 3f8b MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp] getCertificationChain -> DEBU 3f8c MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f8d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f8e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f8f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f92 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f93 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.621 UTC [cauthdsl] func1 -> DEBU 3f97 0xc0038a14a0 gate 1569287134621048300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f98 0xc0038a14a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f99 0xc0038a14a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f9a 0xc0038a14a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f9b 0xc0038a14a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.622 UTC [cauthdsl] func1 -> DEBU 3f9c 0xc0038a14a0 gate 1569287134621048300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.622 UTC [policies] Evaluate -> DEBU 3f9d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.623 UTC [policies] Evaluate -> DEBU 3f9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.623 UTC [policies] Evaluate -> DEBU 3fa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.623 UTC [comm.grpc.server] 1 -> INFO 3fa1 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.622Z grpc.peer_address=172.18.0.6:44178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=758.5µs +peer0.org1.example.com | "2019-09-24 01:05:34.623 UTC [cauthdsl] func1 -> DEBU 3fa2 0xc0038a1d00 gate 1569287134623844400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.624 UTC [cauthdsl] func2 -> DEBU 3fa3 0xc0038a1d00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa4 0xc0038a1d00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa5 0xc0038a1d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa6 0xc0038a1d00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.625 UTC [cauthdsl] func1 -> DEBU 3fa7 0xc0038a1d00 gate 1569287134623844400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.622 UTC [fsblkstorage] updateCheckpoint -> DEBU 3f9e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127962], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org1.example.com | "2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3fa8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3faa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3fab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.626 UTC [cauthdsl] func1 -> DEBU 3fac 0xc0034794e0 gate 1569287134626807000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.627 UTC [cauthdsl] func2 -> DEBU 3fad 0xc0034794e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.626 UTC [pvtdatastorage] Commit -> DEBU 3fa9 Committing private data for block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.627 UTC [cauthdsl] func2 -> DEBU 3fae 0xc0034794e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.627 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3faf Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | "2019-09-24 01:05:34.627 UTC [msp] Validate -> DEBU 3fb0 MSP Org2MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:34.627 UTC [msp] getCertificationChain -> DEBU 3fb1 MSP Org2MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:34.628 UTC [cauthdsl] func2 -> DEBU 3fb2 0xc0034794e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.628 UTC [msp.identity] Verify -> DEBU 3fb3 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3fb4 Verify: sig = 00000000 30 45 02 21 00 b7 bb 93 2b 82 a9 e9 31 2e f6 5b |0E.!....+...1..[| +peer0.org1.example.com | 00000010 08 cb db 8b 37 e9 2d ad 90 26 41 76 b3 e7 21 11 |....7.-..&Av..!.| +peer0.org1.example.com | 00000020 a4 4c e9 4b 88 02 20 18 79 44 e5 ce 01 ab 99 1f |.L.K.. .yD......| +peer0.org1.example.com | 00000030 bd 2d 5e 3e 9f 3f 55 36 4b 08 6f a2 20 46 ba bf |.-^>.?U6K.o. F..| +peer0.org1.example.com | 00000040 0c 5d f0 b6 8c 47 35 |.]...G5|" +peer0.org1.example.com | "2019-09-24 01:05:34.628 UTC [pvtdatastorage] Commit -> DEBU 3fb5 Committed private data for block [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.629 UTC [cauthdsl] func2 -> DEBU 3fb6 0xc0034794e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.629 UTC [cauthdsl] func1 -> DEBU 3fb7 0xc0034794e0 gate 1569287134626807000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.629 UTC [policies] Evaluate -> DEBU 3fb9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.630 UTC [policies] Evaluate -> DEBU 3fba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.629 UTC [kvledger] CommitWithPvtData -> DEBU 3fb8 [businesschannel] Committing block [6] transactions to state database" +peer0.org1.example.com | "2019-09-24 01:05:34.630 UTC [lockbasedtxmgr] Commit -> DEBU 3fbc lock acquired on oldBlockCommit for committing regular updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:34.630 UTC [lockbasedtxmgr] Commit -> DEBU 3fbd Committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3fbe Building the expiry schedules based on the update batch" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [lockbasedtxmgr] Commit -> DEBU 3fbf Write lock acquired for committing updates to state database" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [stateleveldb] ApplyUpdates -> DEBU 3fc0 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +peer0.org1.example.com | "2019-09-24 01:05:34.630 UTC [policies] Evaluate -> DEBU 3fbb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [policies] Evaluate -> DEBU 3fc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fc2 Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [msp] DeserializeIdentity -> DEBU 3fc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.631 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fc4 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151030 " +peer0.org1.example.com | "2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc6 Sign: digest: 0E6D9B59A7264475C570D0873D3F530AB52B325846D56195E30A016EB4D80FF4 " +peer0.org1.example.com | "2019-09-24 01:05:34.632 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fc7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:34.633 UTC [msp.identity] Sign -> DEBU 3fc9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:34.633 UTC [lockbasedtxmgr] Commit -> DEBU 3fca Updates committed to state database and the write lock is released" +peer0.org1.example.com | "2019-09-24 01:05:34.634 UTC [msp] DeserializeIdentity -> DEBU 3fcb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.635 UTC [gossip.comm] Send -> DEBU 3fcf Entering, sending GossipMessage: nonce:5460388262505425325 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.634 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3fcc Preparing potential purge list working-set for expiringAtBlk [7]" +peer0.org1.example.com | "2019-09-24 01:05:34.634 UTC [lockbasedtxmgr] func1 -> DEBU 3fcd launched the background routine for preparing keys to purge with the next block" +peer0.org1.example.com | "2019-09-24 01:05:34.634 UTC [grpc] infof -> DEBU 3fce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:34.636 UTC [leveldbhelper] GetIterator -> DEBU 3fd0 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +peer0.org1.example.com | "2019-09-24 01:05:34.636 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3fd2 No expiry entry found for expiringAtBlk [7]" +peer0.org1.example.com | "2019-09-24 01:05:34.636 UTC [kvledger] CommitWithPvtData -> DEBU 3fd1 [businesschannel] Committing block [6] transactions to history database" +peer0.org1.example.com | "2019-09-24 01:05:34.637 UTC [historyleveldb] Commit -> DEBU 3fd3 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +peer0.org1.example.com | "2019-09-24 01:05:34.637 UTC [historyleveldb] Commit -> DEBU 3fd4 Skipping transaction [0] since it is not an endorsement transaction" +peer0.org1.example.com | "2019-09-24 01:05:34.638 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:5460388262505425325 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.638 UTC [gossip.comm] createConnection -> DEBU 3fd6 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:34.639 UTC [historyleveldb] Commit -> DEBU 3fd7 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +peer0.org1.example.com | "2019-09-24 01:05:34.639 UTC [kvledger] CommitWithPvtData -> INFO 3fd8 [businesschannel] Committed block [6] with 1 transaction(s) in 63ms (state_validation=23ms block_and_pvtdata_commit=30ms state_commit=6ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +peer0.org1.example.com | "2019-09-24 01:05:34.639 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fd9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.639 UTC [msp.identity] Sign -> DEBU 3fda Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08071A0C0A0565787030321203312E30 " +peer0.org1.example.com | "2019-09-24 01:05:34.639 UTC [msp.identity] Sign -> DEBU 3fdb Sign: digest: 0C345A82CB3BA959A79E2BEEF1B03DD9E33445AC70CE28B55B926D0270C6E052 " +peer0.org1.example.com | "2019-09-24 01:05:34.640 UTC [gossip.state] commitBlock -> DEBU 3fdc [businesschannel] Committed block [6] with 1 transaction(s)" +peer0.org1.example.com | "2019-09-24 01:05:34.641 UTC [grpc] DialContext -> DEBU 3fdd parsed scheme: """ +peer0.org1.example.com | "2019-09-24 01:05:34.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fde Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.643 UTC [msp.identity] Sign -> DEBU 3fdf Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.643 UTC [msp.identity] Sign -> DEBU 3fe0 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.643 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:44178" +peer0.org1.example.com | "2019-09-24 01:05:34.644 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe2 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44178" +peer0.org1.example.com | "2019-09-24 01:05:34.642 UTC [grpc] DialContext -> DEBU 3fe3 scheme "" not registered, fallback to default scheme" +peer0.org1.example.com | "2019-09-24 01:05:34.644 UTC [grpc] watcher -> DEBU 3fe4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +peer0.org1.example.com | "2019-09-24 01:05:34.644 UTC [grpc] switchBalancer -> DEBU 3fe5 ClientConn switching balancer to "pick_first"" +peer0.org1.example.com | "2019-09-24 01:05:34.645 UTC [grpc] HandleSubConnStateChange -> DEBU 3fe6 pickfirstBalancer: HandleSubConnStateChange: 0xc003afeb30, CONNECTING" +peer0.org1.example.com | "2019-09-24 01:05:34.646 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +peer0.org1.example.com | 00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +peer0.org1.example.com | "2019-09-24 01:05:34.646 UTC [msp.identity] Verify -> DEBU 3fe8 Verify: sig = 00000000 30 45 02 21 00 9c 0f 4b 87 3d a3 42 92 e9 7c 00 |0E.!...K.=.B..|.| +peer0.org1.example.com | 00000010 24 93 26 19 08 a1 8e b0 9e 36 9f da 1e 13 ab 48 |$.&......6.....H| +peer0.org1.example.com | 00000020 d1 88 2e 93 b7 02 20 2d 3f d4 eb f2 40 45 59 4d |...... -?...@EYM| +peer0.org1.example.com | 00000030 c3 52 d5 d6 86 83 45 c1 87 55 d9 16 b1 23 89 27 |.R....E..U...#.'| +peer0.org1.example.com | 00000040 52 59 05 a6 76 a7 56 |RY..v.V|" +peer0.org1.example.com | "2019-09-24 01:05:34.650 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe9 Authenticated 172.18.0.6:44178" +peer0.org1.example.com | "2019-09-24 01:05:34.650 UTC [gossip.comm] GossipStream -> DEBU 3fea Servicing 172.18.0.6:44178" +peer0.org1.example.com | "2019-09-24 01:05:34.659 UTC [grpc] HandleSubConnStateChange -> DEBU 3feb pickfirstBalancer: HandleSubConnStateChange: 0xc003afeb30, READY" +peer0.org1.example.com | "2019-09-24 01:05:34.659 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:5039172424698439220 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.661 UTC [gossip.gossip] handleMessage -> DEBU 3fed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.661 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fee Got message: GossipMessage: nonce:5039172424698439220 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.661 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fef Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff0 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +peer0.org1.example.com | 00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +peer0.org1.example.com | "2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff1 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +peer0.org1.example.com | 00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +peer0.org1.example.com | 00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +peer0.org1.example.com | 00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +peer0.org1.example.com | 00000040 3b c2 e4 93 49 47 |;...IG|" +peer0.org1.example.com | "2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff3 Verify: sig = 00000000 30 45 02 21 00 c1 c8 7d 84 08 9e 2b 82 79 de 62 |0E.!...}...+.y.b| +peer0.org1.example.com | 00000010 09 7d 64 f3 f6 5e 83 57 93 fb b3 23 e3 64 24 5c |.}d..^.W...#.d$\| +peer0.org1.example.com | 00000020 66 b6 2c ae bd 02 20 57 5e c0 38 9f 5a 4e 09 73 |f.,... W^.8.ZN.s| +peer0.org1.example.com | 00000030 25 60 66 d9 f8 21 cb 2e 91 6c ca 81 07 c3 d7 38 |%`f..!...l.....8| +peer0.org1.example.com | 00000040 c2 8b e4 a3 ea 5c e4 |.....\.|" +peer0.org1.example.com | "2019-09-24 01:05:34.663 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff6 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff7 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ffb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.664 UTC [gossip.discovery] sendMemResponse -> DEBU 3ffc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:34.665 UTC [msp] DeserializeIdentity -> DEBU 3ffd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.665 UTC [msp] DeserializeIdentity -> DEBU 3ffe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.666 UTC [gossip.comm] Send -> DEBU 3fff Entering, sending GossipMessage: Channel: , nonce: 5039172424698439220, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.666 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.666 UTC [gossip.comm] sendToEndpoint -> DEBU 4001 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5039172424698439220, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.666 UTC [gossip.comm] sendToEndpoint -> DEBU 4002 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.668 UTC [msp] GetDefaultSigningIdentity -> DEBU 4003 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.668 UTC [msp.identity] Sign -> DEBU 4004 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +peer0.org1.example.com | "2019-09-24 01:05:34.668 UTC [msp.identity] Sign -> DEBU 4005 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +peer0.org1.example.com | "2019-09-24 01:05:34.668 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4006 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4007 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.671 UTC [msp] DeserializeIdentity -> DEBU 4008 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4009 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.672 UTC [msp] DeserializeIdentity -> DEBU 400a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.673 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.674 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.678 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.678 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.679 UTC [cauthdsl] func1 -> DEBU 4013 0xc003e336a0 gate 1569287134678908900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.679 UTC [cauthdsl] func2 -> DEBU 4014 0xc003e336a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4015 0xc003e336a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4016 0xc003e336a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4017 0xc003e336a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.681 UTC [cauthdsl] func1 -> DEBU 4018 0xc003e336a0 gate 1569287134678908900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.682 UTC [cauthdsl] func1 -> DEBU 401c 0xc003e33ee0 gate 1569287134682274100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.682 UTC [cauthdsl] func2 -> DEBU 401d 0xc003e33ee0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.682 UTC [cauthdsl] func2 -> DEBU 401e 0xc003e33ee0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.683 UTC [cauthdsl] func2 -> DEBU 401f 0xc003e33ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.683 UTC [cauthdsl] func2 -> DEBU 4020 0xc003e33ee0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.684 UTC [cauthdsl] func1 -> DEBU 4021 0xc003e33ee0 gate 1569287134682274100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.684 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.685 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.685 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.685 UTC [cauthdsl] func1 -> DEBU 4025 0xc003f40720 gate 1569287134685463000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.685 UTC [cauthdsl] func2 -> DEBU 4026 0xc003f40720 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.686 UTC [cauthdsl] func2 -> DEBU 4027 0xc003f40720 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.686 UTC [cauthdsl] func2 -> DEBU 4028 0xc003f40720 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.686 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 402a Verify: sig = 00000000 30 44 02 20 2b cf 40 2a 67 f9 af 3b 4b 81 13 6e |0D. +.@*g..;K..n| +peer0.org1.example.com | 00000010 c4 b7 f5 4a 83 dc a5 e1 20 f7 7f a8 34 48 19 97 |...J.... ...4H..| +peer0.org1.example.com | 00000020 f2 a9 29 a5 02 20 01 4d db 28 41 27 25 1e 73 ce |..).. .M.(A'%.s.| +peer0.org1.example.com | 00000030 94 a7 81 7e 67 83 28 44 a2 2d 2f c3 07 91 42 af |...~g.(D.-/...B.| +peer0.org1.example.com | 00000040 bb ca a0 cf 07 50 |.....P|" +peer0.org1.example.com | "2019-09-24 01:05:34.687 UTC [cauthdsl] func2 -> DEBU 402b 0xc003f40720 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.687 UTC [cauthdsl] func1 -> DEBU 402c 0xc003f40720 gate 1569287134685463000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.689 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4031 Authenticated 172.18.0.9:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.689 UTC [gossip.comm] createConnection -> DEBU 4032 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.689 UTC [gossip.comm] sendToEndpoint -> DEBU 4033 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.694 UTC [gossip.comm] func1 -> DEBU 4034 Got message: GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.694 UTC [gossip.gossip] handleMessage -> DEBU 4035 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.695 UTC [gossip.gossip] handleMessage -> DEBU 4036 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.695 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4037 Got message: GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.695 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4038 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.696 UTC [msp.identity] Verify -> DEBU 4039 Verify: digest = 00000000 0e 6d 9b 59 a7 26 44 75 c5 70 d0 87 3d 3f 53 0a |.m.Y.&Du.p..=?S.| +peer0.org1.example.com | 00000010 b5 2b 32 58 46 d5 61 95 e3 0a 01 6e b4 d8 0f f4 |.+2XF.a....n....|" +peer0.org1.example.com | "2019-09-24 01:05:34.696 UTC [msp.identity] Verify -> DEBU 403a Verify: sig = 00000000 30 44 02 20 43 d4 a5 ec b1 da b7 1c a2 02 c5 31 |0D. C..........1| +peer0.org1.example.com | 00000010 5b 85 d9 ea 66 3a ec 7a 00 34 e6 fa 7c 0d f5 c5 |[...f:.z.4..|...| +peer0.org1.example.com | 00000020 89 2b 26 0d 02 20 2c 2e 54 8e 2e 1d e9 e4 5f 39 |.+&.. ,.T....._9| +peer0.org1.example.com | 00000030 fa 43 6e 7c fe 0a 4b b2 af 35 d6 db 2a 10 c6 af |.Cn|..K..5..*...| +peer0.org1.example.com | 00000040 34 a9 30 77 76 6b |4.0wvk|" +peer0.org1.example.com | "2019-09-24 01:05:34.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 403b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.696 UTC [gossip.discovery] isSentByMe -> DEBU 403c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 403d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 403e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.697 UTC [msp] DeserializeIdentity -> DEBU 403f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4041 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4042 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.698 UTC [cauthdsl] func1 -> DEBU 4046 0xc00412f150 gate 1569287134698754900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.698 UTC [cauthdsl] func2 -> DEBU 4047 0xc00412f150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.699 UTC [cauthdsl] func2 -> DEBU 4048 0xc00412f150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.699 UTC [cauthdsl] func2 -> DEBU 4049 0xc00412f150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.700 UTC [cauthdsl] func2 -> DEBU 404a 0xc00412f150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.700 UTC [cauthdsl] func1 -> DEBU 404b 0xc00412f150 gate 1569287134698754900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.700 UTC [policies] Evaluate -> DEBU 404c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [policies] Evaluate -> DEBU 404d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [policies] Evaluate -> DEBU 404e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [cauthdsl] func1 -> DEBU 404f 0xc00412f990 gate 1569287134701178900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4050 0xc00412f990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4051 0xc00412f990 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4052 0xc00412f990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.702 UTC [cauthdsl] func2 -> DEBU 4053 0xc00412f990 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.702 UTC [cauthdsl] func1 -> DEBU 4054 0xc00412f990 gate 1569287134701178900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4055 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4056 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4057 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.703 UTC [cauthdsl] func1 -> DEBU 4058 0xc0030861d0 gate 1569287134703305300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 4059 0xc0030861d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 405a 0xc0030861d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 405b 0xc0030861d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.704 UTC [msp.identity] Verify -> DEBU 405c Verify: digest = 00000000 23 59 88 31 b1 9a f0 09 8e 1e aa ff dc 72 61 bb |#Y.1.........ra.| +peer0.org1.example.com | 00000010 d6 23 b9 1c 82 58 fd 38 b8 6e 22 41 ed 6b fb a1 |.#...X.8.n"A.k..|" +peer0.org1.example.com | "2019-09-24 01:05:34.704 UTC [msp.identity] Verify -> DEBU 405d Verify: sig = 00000000 30 45 02 21 00 f5 19 5d 0d b3 ef 5e e8 7e 36 db |0E.!...]...^.~6.| +peer0.org1.example.com | 00000010 ef 3b 6b 1f 8b a7 be a8 5d 52 68 45 39 7a 2c a1 |.;k.....]RhE9z,.| +peer0.org1.example.com | 00000020 f2 f7 81 c3 b8 02 20 0a 1a a6 fe 97 24 1d c0 f2 |...... .....$...| +peer0.org1.example.com | 00000030 0d 12 8f 2d 6e 70 a3 27 60 19 99 88 83 c4 44 9e |...-np.'`.....D.| +peer0.org1.example.com | 00000040 b1 19 b4 c8 01 da 14 |.......|" +peer0.org1.example.com | "2019-09-24 01:05:34.704 UTC [cauthdsl] func2 -> DEBU 405e 0xc0030861d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.704 UTC [cauthdsl] func1 -> DEBU 405f 0xc0030861d0 gate 1569287134703305300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4060 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4061 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4062 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.706 UTC [policies] Evaluate -> DEBU 4063 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4064 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4065 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.706 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4066 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [msp.identity] Verify -> DEBU 4067 Verify: digest = 00000000 e1 10 87 0d 6d e5 0a cd cf 2b 08 98 eb dc 8f 62 |....m....+.....b| +peer0.org1.example.com | 00000010 c6 f6 58 8b 86 ef f7 e0 10 68 7f 86 cc 21 15 24 |..X......h...!.$|" +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [msp.identity] Verify -> DEBU 4068 Verify: sig = 00000000 30 44 02 20 49 1f 7a fb 91 b8 ee 32 8c 25 20 71 |0D. I.z....2.% q| +peer0.org1.example.com | 00000010 e3 9c e1 8d e1 1d 88 df b2 e1 21 42 50 9c f7 6c |..........!BP..l| +peer0.org1.example.com | 00000020 7e fc 28 a8 02 20 3a f5 31 14 e4 5e 5b c7 66 e2 |~.(.. :.1..^[.f.| +peer0.org1.example.com | 00000030 05 b1 fa ff 00 dd 68 d2 bb 56 4c bf 01 fa 42 b4 |......h..VL...B.| +peer0.org1.example.com | 00000040 9f 93 3d 66 91 33 |..=f.3|" +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 4069 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 406a endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" lastAliveTS: 1569287058522105000, 55 but got ts: inc_num:1569287058522105000 seq_num:53 " +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 406b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 406c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.788 UTC [gossip.comm] func1 -> DEBU 406d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.789 UTC [gossip.gossip] handleMessage -> DEBU 406e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.790 UTC [gossip.pull] HandleMessage -> DEBU 406f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.790 UTC [msp] DeserializeIdentity -> DEBU 4070 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.791 UTC [msp] DeserializeIdentity -> DEBU 4071 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.792 UTC [msp] DeserializeIdentity -> DEBU 4072 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.792 UTC [msp] DeserializeIdentity -> DEBU 4073 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.793 UTC [msp] DeserializeIdentity -> DEBU 4074 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.793 UTC [msp] DeserializeIdentity -> DEBU 4075 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.793 UTC [gossip.pull] SendDigest -> DEBU 4076 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:34.793 UTC [gossip.gossip] handleMessage -> DEBU 4077 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.805 UTC [gossip.comm] func1 -> DEBU 4078 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.805 UTC [gossip.gossip] handleMessage -> DEBU 4079 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.805 UTC [gossip.gossip] handleMessage -> DEBU 407a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.806 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.806 UTC [msp] DeserializeIdentity -> DEBU 407d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 407e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 407f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4080 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.807 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.808 UTC [policies] Evaluate -> DEBU 4082 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.808 UTC [policies] Evaluate -> DEBU 4083 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.808 UTC [cauthdsl] func1 -> DEBU 4084 0xc0031295d0 gate 1569287134808618600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.809 UTC [cauthdsl] func2 -> DEBU 4085 0xc0031295d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4086 0xc0031295d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4087 0xc0031295d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4088 0xc0031295d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.810 UTC [cauthdsl] func1 -> DEBU 4089 0xc0031295d0 gate 1569287134808618600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.811 UTC [cauthdsl] func1 -> DEBU 408d 0xc003129e10 gate 1569287134811860000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.812 UTC [cauthdsl] func2 -> DEBU 408e 0xc003129e10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.812 UTC [cauthdsl] func2 -> DEBU 408f 0xc003129e10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.813 UTC [cauthdsl] func2 -> DEBU 4090 0xc003129e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.813 UTC [cauthdsl] func2 -> DEBU 4091 0xc003129e10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.813 UTC [cauthdsl] func1 -> DEBU 4092 0xc003129e10 gate 1569287134811860000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4093 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4094 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.815 UTC [cauthdsl] func1 -> DEBU 4096 0xc003ba3d20 gate 1569287134815063300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.815 UTC [cauthdsl] func2 -> DEBU 4097 0xc003ba3d20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.815 UTC [cauthdsl] func2 -> DEBU 4098 0xc003ba3d20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.816 UTC [cauthdsl] func2 -> DEBU 4099 0xc003ba3d20 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.816 UTC [msp.identity] Verify -> DEBU 409a Verify: digest = 00000000 96 a5 34 6c aa cc 71 70 31 d3 5a 1d 95 4e 89 b7 |..4l..qp1.Z..N..| +peer0.org1.example.com | 00000010 f9 52 af 80 ae 9b 70 50 12 7c db d6 71 11 96 ea |.R....pP.|..q...|" +peer0.org1.example.com | "2019-09-24 01:05:34.817 UTC [msp.identity] Verify -> DEBU 409b Verify: sig = 00000000 30 44 02 20 1f 40 05 e3 e2 e8 58 a8 4f 89 ad 1b |0D. .@....X.O...| +peer0.org1.example.com | 00000010 91 42 f2 61 39 f7 e2 26 8d f4 0b c9 c7 4f d1 33 |.B.a9..&.....O.3| +peer0.org1.example.com | 00000020 6c 79 03 96 02 20 26 a4 c6 c3 fd 38 ce 72 95 cb |ly... &....8.r..| +peer0.org1.example.com | 00000030 45 31 ba 19 5a 42 19 cd cb 89 ee 9b d6 78 e7 6c |E1..ZB.......x.l| +peer0.org1.example.com | 00000040 cd 76 91 81 14 c3 |.v....|" +peer0.org1.example.com | "2019-09-24 01:05:34.817 UTC [cauthdsl] func2 -> DEBU 409c 0xc003ba3d20 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.818 UTC [cauthdsl] func1 -> DEBU 409d 0xc003ba3d20 gate 1569287134815063300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.818 UTC [policies] Evaluate -> DEBU 409e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.818 UTC [policies] Evaluate -> DEBU 409f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.819 UTC [policies] Evaluate -> DEBU 40a0 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.820 UTC [policies] Evaluate -> DEBU 40a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.824 UTC [gossip.discovery] sendMemResponse -> DEBU 40a9 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:34.825 UTC [msp] DeserializeIdentity -> DEBU 40aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.826 UTC [msp] DeserializeIdentity -> DEBU 40ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.828 UTC [msp] DeserializeIdentity -> DEBU 40ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.829 UTC [gossip.comm] Send -> DEBU 40ad Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.830 UTC [gossip.discovery] sendMemResponse -> DEBU 40ae Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.830 UTC [gossip.comm] sendToEndpoint -> DEBU 40af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.831 UTC [gossip.comm] sendToEndpoint -> DEBU 40b0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.831 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40b1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.848 UTC [gossip.comm] func1 -> DEBU 40b2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.848 UTC [gossip.gossip] handleMessage -> DEBU 40b3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.848 UTC [gossip.pull] HandleMessage -> DEBU 40b4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.848 UTC [msp] DeserializeIdentity -> DEBU 40b5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.850 UTC [msp] DeserializeIdentity -> DEBU 40ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.850 UTC [gossip.pull] SendDigest -> DEBU 40bb Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:34.850 UTC [gossip.gossip] handleMessage -> DEBU 40bc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.860 UTC [gossip.pull] Hello -> DEBU 40bd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.861 UTC [gossip.comm] Send -> DEBU 40be Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.861 UTC [gossip.pull] Hello -> DEBU 40bf Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.862 UTC [gossip.comm] Send -> DEBU 40c0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.862 UTC [gossip.pull] Hello -> DEBU 40c1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:34.863 UTC [gossip.comm] Send -> DEBU 40c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.864 UTC [gossip.comm] sendToEndpoint -> DEBU 40c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.864 UTC [gossip.comm] sendToEndpoint -> DEBU 40c4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.865 UTC [gossip.comm] sendToEndpoint -> DEBU 40c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.865 UTC [gossip.comm] sendToEndpoint -> DEBU 40c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.870 UTC [gossip.comm] func1 -> DEBU 40c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.870 UTC [gossip.comm] sendToEndpoint -> DEBU 40c8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.870 UTC [gossip.gossip] handleMessage -> DEBU 40c9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.871 UTC [gossip.comm] sendToEndpoint -> DEBU 40ca Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.871 UTC [gossip.gossip] handleMessage -> DEBU 40cb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40cc Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.872 UTC [gossip.comm] func1 -> DEBU 40cd Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40cf Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [gossip.pull] HandleMessage -> DEBU 40d0 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40d1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.872 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40ce Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40d4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40d5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.874 UTC [cauthdsl] func1 -> DEBU 40d9 0xc003cfb010 gate 1569287134874413500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40da Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.875 UTC [gossip.pull] HandleMessage -> DEBU 40dc GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.875 UTC [gossip.comm] func1 -> DEBU 40dd Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.875 UTC [gossip.gossip] handleMessage -> DEBU 40de Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.876 UTC [gossip.gossip] handleMessage -> DEBU 40df Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.874 UTC [cauthdsl] func2 -> DEBU 40db 0xc003cfb010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.877 UTC [gossip.pull] HandleMessage -> DEBU 40e0 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.877 UTC [gossip.gossip] handleMessage -> DEBU 40e2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.877 UTC [cauthdsl] func2 -> DEBU 40e1 0xc003cfb010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.878 UTC [cauthdsl] func2 -> DEBU 40e3 0xc003cfb010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.878 UTC [cauthdsl] func2 -> DEBU 40e4 0xc003cfb010 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.878 UTC [cauthdsl] func1 -> DEBU 40e5 0xc003cfb010 gate 1569287134874413500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.878 UTC [policies] Evaluate -> DEBU 40e6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.878 UTC [policies] Evaluate -> DEBU 40e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.879 UTC [policies] Evaluate -> DEBU 40e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.879 UTC [cauthdsl] func1 -> DEBU 40e9 0xc00359c1b0 gate 1569287134879612100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.879 UTC [cauthdsl] func2 -> DEBU 40ea 0xc00359c1b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40eb 0xc00359c1b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40ec 0xc00359c1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40ed 0xc00359c1b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.880 UTC [cauthdsl] func1 -> DEBU 40ee 0xc00359c1b0 gate 1569287134879612100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.881 UTC [policies] Evaluate -> DEBU 40ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.881 UTC [policies] Evaluate -> DEBU 40f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.882 UTC [policies] Evaluate -> DEBU 40f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.882 UTC [cauthdsl] func1 -> DEBU 40f2 0xc00359c9f0 gate 1569287134882296900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.882 UTC [cauthdsl] func2 -> DEBU 40f3 0xc00359c9f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.882 UTC [cauthdsl] func2 -> DEBU 40f4 0xc00359c9f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.883 UTC [cauthdsl] func2 -> DEBU 40f5 0xc00359c9f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.883 UTC [msp.identity] Verify -> DEBU 40f6 Verify: digest = 00000000 bb 82 94 62 28 99 6b 88 70 81 47 91 98 49 db cd |...b(.k.p.G..I..| +peer0.org1.example.com | 00000010 75 6d b5 5c 75 33 27 87 8e 6c 1b de 6c 08 f9 71 |um.\u3'..l..l..q|" +peer0.org1.example.com | "2019-09-24 01:05:34.883 UTC [msp.identity] Verify -> DEBU 40f7 Verify: sig = 00000000 30 44 02 20 45 2e 8b 4b d3 dc 19 66 f2 2e 9a be |0D. E..K...f....| +peer0.org1.example.com | 00000010 b1 af b6 23 e2 67 80 71 a5 2c 72 dd 9f 86 8d 78 |...#.g.q.,r....x| +peer0.org1.example.com | 00000020 68 c5 f5 72 02 20 30 0d 50 6a cf bc 11 5a af 20 |h..r. 0.Pj...Z. | +peer0.org1.example.com | 00000030 52 b5 8f 5c e6 f3 11 39 78 73 44 34 b2 14 4f 3a |R..\...9xsD4..O:| +peer0.org1.example.com | 00000040 d8 75 65 ef fe fb |.ue...|" +peer0.org1.example.com | "2019-09-24 01:05:34.884 UTC [cauthdsl] func2 -> DEBU 40f8 0xc00359c9f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.884 UTC [cauthdsl] func1 -> DEBU 40f9 0xc00359c9f0 gate 1569287134882296900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.884 UTC [policies] Evaluate -> DEBU 40fa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.884 UTC [policies] Evaluate -> DEBU 40fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.885 UTC [policies] Evaluate -> DEBU 40fc Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.885 UTC [policies] Evaluate -> DEBU 40fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.885 UTC [gossip.discovery] handleAliveMessage -> DEBU 40fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 40ff Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:34.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 4100 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4101 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4102 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4103 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 4104 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4105 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.887 UTC [gossip.discovery] sendMemResponse -> DEBU 4106 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:34.887 UTC [msp] DeserializeIdentity -> DEBU 4107 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.888 UTC [msp] DeserializeIdentity -> DEBU 4108 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.888 UTC [msp] DeserializeIdentity -> DEBU 4109 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.888 UTC [gossip.comm] Send -> DEBU 410a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.888 UTC [gossip.discovery] sendMemResponse -> DEBU 410b Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU 410c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU 410d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.891 UTC [msp] GetDefaultSigningIdentity -> DEBU 410e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.891 UTC [msp.identity] Sign -> DEBU 410f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151031 " +peer0.org1.example.com | "2019-09-24 01:05:34.892 UTC [msp.identity] Sign -> DEBU 4110 Sign: digest: 3E18310DCF123BA3EA00C62F129C57F66C9F2692380DC79BE0CE010D87881164 " +peer0.org1.example.com | "2019-09-24 01:05:34.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 4111 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:34.893 UTC [msp.identity] Sign -> DEBU 4112 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:34.893 UTC [msp.identity] Sign -> DEBU 4113 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:34.893 UTC [gossip.comm] Send -> DEBU 4114 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [msp] DeserializeIdentity -> DEBU 4115 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [gossip.comm] Send -> DEBU 4116 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [msp] DeserializeIdentity -> DEBU 4118 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [gossip.comm] Send -> DEBU 4119 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 411a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.895 UTC [gossip.comm] sendToEndpoint -> DEBU 411c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 411b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.895 UTC [gossip.comm] sendToEndpoint -> DEBU 411d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4117 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.897 UTC [gossip.comm] sendToEndpoint -> DEBU 4120 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.896 UTC [gossip.comm] func1 -> DEBU 411e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.896 UTC [gossip.comm] func1 -> DEBU 411f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.899 UTC [gossip.gossip] handleMessage -> DEBU 4121 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.900 UTC [gossip.gossip] handleMessage -> DEBU 4122 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.900 UTC [gossip.gossip] handleMessage -> DEBU 4123 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4124 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4125 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.902 UTC [msp.identity] Verify -> DEBU 4126 Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +peer0.org1.example.com | 00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +peer0.org1.example.com | "2019-09-24 01:05:34.902 UTC [msp.identity] Verify -> DEBU 4127 Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +peer0.org1.example.com | 00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +peer0.org1.example.com | 00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +peer0.org1.example.com | 00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +peer0.org1.example.com | 00000040 94 30 09 2e e0 64 |.0...d|" +peer0.org1.example.com | "2019-09-24 01:05:34.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4128 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.903 UTC [gossip.discovery] isSentByMe -> DEBU 4129 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 412a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 412b Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.903 UTC [msp] DeserializeIdentity -> DEBU 412c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 412d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4130 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4131 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4132 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [cauthdsl] func1 -> DEBU 4133 0xc0037a3740 gate 1569287134905634000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [cauthdsl] func2 -> DEBU 4134 0xc0037a3740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.905 UTC [cauthdsl] func2 -> DEBU 4135 0xc0037a3740 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [cauthdsl] func2 -> DEBU 4136 0xc0037a3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [cauthdsl] func2 -> DEBU 4137 0xc0037a3740 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [cauthdsl] func1 -> DEBU 4138 0xc0037a3740 gate 1569287134905634000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 4139 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 413a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 413b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.907 UTC [cauthdsl] func1 -> DEBU 413c 0xc0037a3f80 gate 1569287134906895500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413d 0xc0037a3f80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413e 0xc0037a3f80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413f 0xc0037a3f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 4140 0xc0037a3f80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.908 UTC [cauthdsl] func1 -> DEBU 4141 0xc0037a3f80 gate 1569287134906895500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.908 UTC [policies] Evaluate -> DEBU 4142 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.909 UTC [policies] Evaluate -> DEBU 4143 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.911 UTC [policies] Evaluate -> DEBU 4144 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.911 UTC [cauthdsl] func1 -> DEBU 4145 0xc00380a7c0 gate 1569287134911550300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4146 0xc00380a7c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4147 0xc00380a7c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4148 0xc00380a7c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.912 UTC [msp.identity] Verify -> DEBU 4149 Verify: digest = 00000000 96 a5 34 6c aa cc 71 70 31 d3 5a 1d 95 4e 89 b7 |..4l..qp1.Z..N..| +peer0.org1.example.com | 00000010 f9 52 af 80 ae 9b 70 50 12 7c db d6 71 11 96 ea |.R....pP.|..q...|" +peer0.org1.example.com | "2019-09-24 01:05:34.913 UTC [msp.identity] Verify -> DEBU 414a Verify: sig = 00000000 30 44 02 20 1f 40 05 e3 e2 e8 58 a8 4f 89 ad 1b |0D. .@....X.O...| +peer0.org1.example.com | 00000010 91 42 f2 61 39 f7 e2 26 8d f4 0b c9 c7 4f d1 33 |.B.a9..&.....O.3| +peer0.org1.example.com | 00000020 6c 79 03 96 02 20 26 a4 c6 c3 fd 38 ce 72 95 cb |ly... &....8.r..| +peer0.org1.example.com | 00000030 45 31 ba 19 5a 42 19 cd cb 89 ee 9b d6 78 e7 6c |E1..ZB.......x.l| +peer0.org1.example.com | 00000040 cd 76 91 81 14 c3 |.v....|" +peer0.org1.example.com | "2019-09-24 01:05:34.913 UTC [cauthdsl] func2 -> DEBU 414b 0xc00380a7c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.913 UTC [cauthdsl] func1 -> DEBU 414c 0xc00380a7c0 gate 1569287134911550300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.913 UTC [policies] Evaluate -> DEBU 414d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.913 UTC [policies] Evaluate -> DEBU 414e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.914 UTC [policies] Evaluate -> DEBU 414f Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.914 UTC [policies] Evaluate -> DEBU 4150 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 4151 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 4152 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4153 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.915 UTC [msp.identity] Verify -> DEBU 4154 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +peer0.org1.example.com | 00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +peer0.org1.example.com | "2019-09-24 01:05:34.915 UTC [msp.identity] Verify -> DEBU 4155 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +peer0.org1.example.com | 00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +peer0.org1.example.com | 00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +peer0.org1.example.com | 00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +peer0.org1.example.com | 00000040 3b c2 e4 93 49 47 |;...IG|" +peer0.org1.example.com | "2019-09-24 01:05:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4156 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4157 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4158 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.916 UTC [gossip.gossip] handleMessage -> DEBU 4159 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.916 UTC [gossip.gossip] handleMessage -> DEBU 415a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 415b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 415c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.918 UTC [msp.identity] Verify -> DEBU 415d Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +peer0.org1.example.com | 00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +peer0.org1.example.com | "2019-09-24 01:05:34.918 UTC [msp.identity] Verify -> DEBU 415e Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +peer0.org1.example.com | 00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +peer0.org1.example.com | 00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +peer0.org1.example.com | 00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +peer0.org1.example.com | 00000040 94 30 09 2e e0 64 |.0...d|" +peer0.org1.example.com | "2019-09-24 01:05:34.919 UTC [msp.identity] Verify -> DEBU 415f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:34.919 UTC [msp.identity] Verify -> DEBU 4160 Verify: sig = 00000000 30 45 02 21 00 e6 6e 33 66 7b 99 14 63 71 59 ff |0E.!..n3f{..cqY.| +peer0.org1.example.com | 00000010 d6 c7 9f 46 33 b4 8a dc d6 1f 3f 17 3d 3c 1b a4 |...F3.....?.=<..| +peer0.org1.example.com | 00000020 48 e9 22 38 4d 02 20 76 c3 22 43 38 96 87 e6 d5 |H."8M. v."C8....| +peer0.org1.example.com | 00000030 5f ad f5 60 2c de 08 cd b9 d7 e0 84 a0 0d f3 ce |_..`,...........| +peer0.org1.example.com | 00000040 d7 1f e4 be c4 80 eb |.......|" +peer0.org1.example.com | "2019-09-24 01:05:34.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4161 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.919 UTC [gossip.discovery] isSentByMe -> DEBU 4162 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 4163 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4164 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.920 UTC [gossip.gossip] handleMessage -> DEBU 4165 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4166 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4167 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.921 UTC [msp.identity] Verify -> DEBU 4168 Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +peer0.org1.example.com | 00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +peer0.org1.example.com | "2019-09-24 01:05:34.921 UTC [msp.identity] Verify -> DEBU 4169 Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +peer0.org1.example.com | 00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +peer0.org1.example.com | 00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +peer0.org1.example.com | 00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +peer0.org1.example.com | 00000040 94 30 09 2e e0 64 |.0...d|" +peer0.org1.example.com | "2019-09-24 01:05:34.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 416a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.922 UTC [gossip.discovery] isSentByMe -> DEBU 416b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 416c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 416d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.922 UTC [msp] DeserializeIdentity -> DEBU 416e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 416f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4170 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4171 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4172 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4173 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4174 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [cauthdsl] func1 -> DEBU 4175 0xc003b94cd0 gate 1569287134923849100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.923 UTC [cauthdsl] func2 -> DEBU 4176 0xc003b94cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4177 0xc003b94cd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4178 0xc003b94cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4179 0xc003b94cd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.926 UTC [cauthdsl] func1 -> DEBU 417a 0xc003b94cd0 gate 1569287134923849100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.926 UTC [policies] Evaluate -> DEBU 417b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.927 UTC [policies] Evaluate -> DEBU 417c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.927 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.928 UTC [cauthdsl] func1 -> DEBU 417e 0xc003b95510 gate 1569287134928027200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 417f 0xc003b95510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4180 0xc003b95510 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4181 0xc003b95510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4182 0xc003b95510 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.929 UTC [cauthdsl] func1 -> DEBU 4183 0xc003b95510 gate 1569287134928027200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:34.929 UTC [cauthdsl] func1 -> DEBU 4187 0xc003b95d50 gate 1569287134929959800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 4188 0xc003b95d50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 4189 0xc003b95d50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 418a 0xc003b95d50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.930 UTC [msp.identity] Verify -> DEBU 418b Verify: digest = 00000000 bb 82 94 62 28 99 6b 88 70 81 47 91 98 49 db cd |...b(.k.p.G..I..| +peer0.org1.example.com | 00000010 75 6d b5 5c 75 33 27 87 8e 6c 1b de 6c 08 f9 71 |um.\u3'..l..l..q|" +peer0.org1.example.com | "2019-09-24 01:05:34.930 UTC [msp.identity] Verify -> DEBU 418c Verify: sig = 00000000 30 44 02 20 45 2e 8b 4b d3 dc 19 66 f2 2e 9a be |0D. E..K...f....| +peer0.org1.example.com | 00000010 b1 af b6 23 e2 67 80 71 a5 2c 72 dd 9f 86 8d 78 |...#.g.q.,r....x| +peer0.org1.example.com | 00000020 68 c5 f5 72 02 20 30 0d 50 6a cf bc 11 5a af 20 |h..r. 0.Pj...Z. | +peer0.org1.example.com | 00000030 52 b5 8f 5c e6 f3 11 39 78 73 44 34 b2 14 4f 3a |R..\...9xsD4..O:| +peer0.org1.example.com | 00000040 d8 75 65 ef fe fb |.ue...|" +peer0.org1.example.com | "2019-09-24 01:05:34.931 UTC [cauthdsl] func2 -> DEBU 418d 0xc003b95d50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:34.931 UTC [cauthdsl] func1 -> DEBU 418e 0xc003b95d50 gate 1569287134929959800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:34.931 UTC [policies] Evaluate -> DEBU 418f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.931 UTC [policies] Evaluate -> DEBU 4190 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.932 UTC [policies] Evaluate -> DEBU 4191 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.932 UTC [policies] Evaluate -> DEBU 4192 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 4193 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 4194 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4195 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:34.934 UTC [msp.identity] Verify -> DEBU 4196 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +peer0.org1.example.com | 00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +peer0.org1.example.com | "2019-09-24 01:05:34.934 UTC [msp.identity] Verify -> DEBU 4197 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +peer0.org1.example.com | 00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +peer0.org1.example.com | 00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +peer0.org1.example.com | 00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +peer0.org1.example.com | 00000040 3b c2 e4 93 49 47 |;...IG|" +peer0.org1.example.com | "2019-09-24 01:05:34.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 4198 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:34.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 4199 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:34.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 419a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:36.724 UTC [gossip.election] waitForInterrupt -> DEBU 419b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:36.726 UTC [gossip.election] IsLeader -> DEBU 419c d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:36.726 UTC [msp] GetDefaultSigningIdentity -> DEBU 419d Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:36.727 UTC [msp.identity] Sign -> DEBU 419e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100F1801 " +peer0.org1.example.com | "2019-09-24 01:05:36.727 UTC [msp.identity] Sign -> DEBU 419f Sign: digest: 25E6710B6A606F669F8E569B4F527E9039BEB0E41278D76D09C1FDC807AE2883 " +peer0.org1.example.com | "2019-09-24 01:05:36.727 UTC [gossip.election] waitForInterrupt -> DEBU 41a0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:36.730 UTC [msp] DeserializeIdentity -> DEBU 41a1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:36.731 UTC [msp] DeserializeIdentity -> DEBU 41a2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:36.732 UTC [msp] DeserializeIdentity -> DEBU 41a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:36.732 UTC [msp] DeserializeIdentity -> DEBU 41a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:36.733 UTC [gossip.comm] Send -> DEBU 41a5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:36.734 UTC [gossip.comm] sendToEndpoint -> DEBU 41a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:36.734 UTC [gossip.comm] sendToEndpoint -> DEBU 41a7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:36.733 UTC [msp] DeserializeIdentity -> DEBU 41a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:36.736 UTC [msp] DeserializeIdentity -> DEBU 41a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.655 UTC [msp] DeserializeIdentity -> DEBU 41aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.657 UTC [msp] DeserializeIdentity -> DEBU 41ab Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.658 UTC [msp] DeserializeIdentity -> DEBU 41ac Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.658 UTC [msp] DeserializeIdentity -> DEBU 41ad Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.661 UTC [gossip.comm] Send -> DEBU 41ae Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:37.659 UTC [gossip.comm] Send -> DEBU 41af Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:37.663 UTC [msp] DeserializeIdentity -> DEBU 41b3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.663 UTC [msp] DeserializeIdentity -> DEBU 41b4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.674 UTC [gossip.comm] func1 -> DEBU 41b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.674 UTC [gossip.gossip] handleMessage -> DEBU 41b9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.674 UTC [msp] DeserializeIdentity -> DEBU 41ba Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.674 UTC [msp.identity] Verify -> DEBU 41bb Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +peer0.org1.example.com | 00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +peer0.org1.example.com | "2019-09-24 01:05:37.674 UTC [msp.identity] Verify -> DEBU 41bc Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +peer0.org1.example.com | 00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +peer0.org1.example.com | 00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +peer0.org1.example.com | 00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +peer0.org1.example.com | 00000040 97 6e f4 01 e7 8c |.n....|" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [msp.identity] Verify -> DEBU 41bd Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 41be Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [msp] DeserializeIdentity -> DEBU 41bf Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [msp] DeserializeIdentity -> DEBU 41c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41c2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41c3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.693 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.693 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.694 UTC [cauthdsl] func1 -> DEBU 41c9 0xc002996160 gate 1569287137675727100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41cd 0xc002996160 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41ce 0xc002996160 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41cf 0xc002996160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d0 0xc002996160 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41d1 0xc002996160 gate 1569287137675727100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41d5 0xc002982ec0 gate 1569287137695418500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d6 0xc002982ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d7 0xc002982ec0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d8 0xc002982ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d9 0xc002982ec0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41da 0xc002982ec0 gate 1569287137695418500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41de 0xc002983700 gate 1569287137695815400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41df 0xc002983700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41e0 0xc002983700 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41e1 0xc002983700 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.695 UTC [msp.identity] Verify -> DEBU 41e2 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [msp.identity] Verify -> DEBU 41e3 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [cauthdsl] func2 -> DEBU 41e4 0xc002983700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [cauthdsl] func1 -> DEBU 41e5 0xc002983700 gate 1569287137695815400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e8 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [msp] DeserializeIdentity -> DEBU 41ea Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [msp] DeserializeIdentity -> DEBU 41eb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ed Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [cauthdsl] func1 -> DEBU 41f2 0xc002b16ed0 gate 1569287137696924300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.696 UTC [cauthdsl] func2 -> DEBU 41f3 0xc002b16ed0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.697 UTC [cauthdsl] func2 -> DEBU 41f4 0xc002b16ed0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.697 UTC [gossip.comm] sendToEndpoint -> DEBU 41f6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.694 UTC [gossip.comm] func1 -> DEBU 41ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.694 UTC [gossip.comm] func1 -> DEBU 41cb Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.694 UTC [gossip.comm] sendToEndpoint -> DEBU 41cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.698 UTC [gossip.comm] sendToEndpoint -> DEBU 41f7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.698 UTC [gossip.comm] sendToEndpoint -> DEBU 41f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.697 UTC [cauthdsl] func2 -> DEBU 41f5 0xc002b16ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.699 UTC [cauthdsl] func2 -> DEBU 41f9 0xc002b16ed0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.700 UTC [cauthdsl] func1 -> DEBU 41fa 0xc002b16ed0 gate 1569287137696924300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.700 UTC [policies] Evaluate -> DEBU 41fb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.700 UTC [policies] Evaluate -> DEBU 41fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.701 UTC [policies] Evaluate -> DEBU 41fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.701 UTC [cauthdsl] func1 -> DEBU 41fe 0xc002996da0 gate 1569287137701751100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 41ff 0xc002996da0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 4200 0xc002996da0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 4201 0xc002996da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.703 UTC [cauthdsl] func2 -> DEBU 4202 0xc002996da0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.703 UTC [cauthdsl] func1 -> DEBU 4203 0xc002996da0 gate 1569287137701751100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4204 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4205 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4206 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.704 UTC [cauthdsl] func1 -> DEBU 4207 0xc0029975e0 gate 1569287137704683400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.704 UTC [cauthdsl] func2 -> DEBU 4208 0xc0029975e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.705 UTC [cauthdsl] func2 -> DEBU 4209 0xc0029975e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.705 UTC [cauthdsl] func2 -> DEBU 420a 0xc0029975e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.705 UTC [msp.identity] Verify -> DEBU 420b Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:37.705 UTC [msp.identity] Verify -> DEBU 420c Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 420d 0xc0029975e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 420e 0xc0029975e0 gate 1569287137704683400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4211 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4212 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [msp] DeserializeIdentity -> DEBU 4213 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4214 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4215 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4219 0xc002b546c0 gate 1569287137706378500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421a 0xc002b546c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421b 0xc002b546c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421c 0xc002b546c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421d 0xc002b546c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 421e 0xc002b546c0 gate 1569287137706378500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 421f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4222 0xc002b54f00 gate 1569287137706627700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4223 0xc002b54f00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4224 0xc002b54f00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4225 0xc002b54f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4226 0xc002b54f00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4227 0xc002b54f00 gate 1569287137706627700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4228 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 422a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 422b 0xc002b55740 gate 1569287137706884700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422c 0xc002b55740 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422d 0xc002b55740 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422e 0xc002b55740 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.706 UTC [msp.identity] Verify -> DEBU 422f Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 4230 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [cauthdsl] func2 -> DEBU 4231 0xc002b55740 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [cauthdsl] func1 -> DEBU 4232 0xc002b55740 gate 1569287137706884700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4233 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4234 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4235 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4236 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 4237 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 4238 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 4239 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423a Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp] DeserializeIdentity -> DEBU 423b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 423c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423e Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423f Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:37.707 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.708 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.714 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.714 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.714 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.716 UTC [msp] DeserializeIdentity -> DEBU 4245 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4246 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4248 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 4249 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 424a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 424b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [cauthdsl] func1 -> DEBU 424c 0xc002a320a0 gate 1569287137718859400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424d 0xc002a320a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424e 0xc002a320a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424f 0xc002a320a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 4250 0xc002a320a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4251 0xc002a320a0 gate 1569287137718859400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4252 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4253 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4254 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4255 0xc002a328e0 gate 1569287137719107500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4256 0xc002a328e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4257 0xc002a328e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4258 0xc002a328e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4259 0xc002a328e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 425a 0xc002a328e0 gate 1569287137719107500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 425e 0xc002a33120 gate 1569287137719348100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 425f 0xc002a33120 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4260 0xc002a33120 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4261 0xc002a33120 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [msp.identity] Verify -> DEBU 4262 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [msp.identity] Verify -> DEBU 4263 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4264 0xc002a33120 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4265 0xc002a33120 gate 1569287137719348100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4266 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4267 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4268 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4269 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [msp] DeserializeIdentity -> DEBU 426a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.719 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 426c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 426f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4270 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4271 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 4272 0xc002b308f0 gate 1569287137720545200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4273 0xc002b308f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4274 0xc002b308f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4275 0xc002b308f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4276 0xc002b308f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 4277 0xc002b308f0 gate 1569287137720545200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4278 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 427a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 427b 0xc002b31130 gate 1569287137720866900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427c 0xc002b31130 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427d 0xc002b31130 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427e 0xc002b31130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427f 0xc002b31130 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 4280 0xc002b31130 gate 1569287137720866900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4281 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4282 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4283 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 4284 0xc002b31970 gate 1569287137721109800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4285 0xc002b31970 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4286 0xc002b31970 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4287 0xc002b31970 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4288 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +peer0.org1.example.com | 00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4289 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +peer0.org1.example.com | 00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +peer0.org1.example.com | 00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +peer0.org1.example.com | 00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +peer0.org1.example.com | 00000040 84 81 aa 39 f4 ef 17 |...9...|" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 428a 0xc002b31970 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 428b 0xc002b31970 gate 1569287137721109800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4290 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4291 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:37.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4292 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4293 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4294 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4295 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4296 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.724 UTC [msp] DeserializeIdentity -> DEBU 4298 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.724 UTC [msp] DeserializeIdentity -> DEBU 4297 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.725 UTC [msp] DeserializeIdentity -> DEBU 4299 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.726 UTC [gossip.pull] Hello -> DEBU 429a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:37.727 UTC [msp] DeserializeIdentity -> DEBU 429b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.727 UTC [msp] DeserializeIdentity -> DEBU 429c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.728 UTC [gossip.comm] Send -> DEBU 429d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:37.728 UTC [gossip.comm] sendToEndpoint -> DEBU 429e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.729 UTC [gossip.comm] sendToEndpoint -> DEBU 429f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.730 UTC [msp.identity] newIdentity -> DEBU 42a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +peer0.org1.example.com | 3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +peer0.org1.example.com | iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +peer0.org1.example.com | QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:37.731 UTC [cauthdsl] func1 -> DEBU 42a1 0xc002b3f070 gate 1569287137731422400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.731 UTC [cauthdsl] func2 -> DEBU 42a2 0xc002b3f070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.732 UTC [cauthdsl] func2 -> DEBU 42a3 0xc002b3f070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.732 UTC [cauthdsl] func2 -> DEBU 42a4 0xc002b3f070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.733 UTC [cauthdsl] func2 -> DEBU 42a5 0xc002b3f070 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.733 UTC [cauthdsl] func1 -> DEBU 42a6 0xc002b3f070 gate 1569287137731422400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.735 UTC [cauthdsl] func1 -> DEBU 42aa 0xc0031c21f0 gate 1569287137735023700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.735 UTC [cauthdsl] func2 -> DEBU 42ab 0xc0031c21f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.735 UTC [cauthdsl] func2 -> DEBU 42ac 0xc0031c21f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.735 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42ad Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:37.735 UTC [msp] Validate -> DEBU 42ae MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:37.736 UTC [msp] getCertificationChain -> DEBU 42af MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:37.736 UTC [cauthdsl] func2 -> DEBU 42b0 0xc0031c21f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.737 UTC [msp.identity] Verify -> DEBU 42b1 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:37.737 UTC [msp.identity] Verify -> DEBU 42b2 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:37.738 UTC [cauthdsl] func2 -> DEBU 42b3 0xc0031c21f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.738 UTC [cauthdsl] func1 -> DEBU 42b4 0xc0031c21f0 gate 1569287137735023700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.738 UTC [policies] Evaluate -> DEBU 42b5 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.738 UTC [policies] Evaluate -> DEBU 42b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.739 UTC [policies] Evaluate -> DEBU 42b7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.739 UTC [policies] Evaluate -> DEBU 42b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.739 UTC [msp.identity] Verify -> DEBU 42b9 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:37.740 UTC [msp.identity] Verify -> DEBU 42ba Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:37.740 UTC [gossip.gossip] handleMessage -> DEBU 42bb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.740 UTC [gossip.gossip] handleMessage -> DEBU 42bc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.741 UTC [msp] DeserializeIdentity -> DEBU 42bd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.741 UTC [msp.identity] Verify -> DEBU 42be Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 42bf Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +peer0.org1.example.com | 00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +peer0.org1.example.com | 00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +peer0.org1.example.com | 00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +peer0.org1.example.com | 00000040 be 8d b4 c0 20 4c |.... L|" +peer0.org1.example.com | "2019-09-24 01:05:37.742 UTC [msp] DeserializeIdentity -> DEBU 42c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.742 UTC [msp] DeserializeIdentity -> DEBU 42c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.748 UTC [policies] Evaluate -> DEBU 42c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.748 UTC [policies] Evaluate -> DEBU 42c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.749 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.749 UTC [cauthdsl] func1 -> DEBU 42c8 0xc0039e8ec0 gate 1569287137749409100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.749 UTC [cauthdsl] func2 -> DEBU 42c9 0xc0039e8ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42ca 0xc0039e8ec0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0039e8ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0039e8ec0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42cd 0xc0039e8ec0 gate 1569287137749409100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42d1 0xc0039e9700 gate 1569287137750585200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d2 0xc0039e9700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d3 0xc0039e9700 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0039e9700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0039e9700 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42d6 0xc0039e9700 gate 1569287137750585200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42da 0xc0039e9f40 gate 1569287137750835300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42db 0xc0039e9f40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42dc 0xc0039e9f40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0039e9f40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [msp.identity] Verify -> DEBU 42de Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +peer0.org1.example.com | 00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +peer0.org1.example.com | "2019-09-24 01:05:37.750 UTC [msp.identity] Verify -> DEBU 42df Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +peer0.org1.example.com | 00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +peer0.org1.example.com | 00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +peer0.org1.example.com | 00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +peer0.org1.example.com | 00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42e0 0xc0039e9f40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42e1 0xc0039e9f40 gate 1569287137750835300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [msp] DeserializeIdentity -> DEBU 42e6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [msp] DeserializeIdentity -> DEBU 42e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e9 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ea Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42ee 0xc003c33710 gate 1569287137751654000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42ef 0xc003c33710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f0 0xc003c33710 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f1 0xc003c33710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f2 0xc003c33710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42f3 0xc003c33710 gate 1569287137751654000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42f7 0xc003c33f50 gate 1569287137751892900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f8 0xc003c33f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f9 0xc003c33f50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42fa 0xc003c33f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 42fb 0xc003c33f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 42fc 0xc003c33f50 gate 1569287137751892900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42fd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4300 0xc0028bc790 gate 1569287137752137500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4301 0xc0028bc790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4302 0xc0028bc790 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4303 0xc0028bc790 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [msp.identity] Verify -> DEBU 4304 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [msp.identity] Verify -> DEBU 4305 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4306 0xc0028bc790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4307 0xc0028bc790 gate 1569287137752137500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4308 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4309 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430a Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [msp] DeserializeIdentity -> DEBU 430c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4310 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4312 0xc0028bd870 gate 1569287137752744600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4313 0xc0028bd870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4314 0xc0028bd870 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4315 0xc0028bd870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4316 0xc0028bd870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4317 0xc0028bd870 gate 1569287137752744600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4318 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4319 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 431a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 431b 0xc0028cc0b0 gate 1569287137752991700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431c 0xc0028cc0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431d 0xc0028cc0b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431e 0xc0028cc0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431f 0xc0028cc0b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 4320 0xc0028cc0b0 gate 1569287137752991700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4321 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4322 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4323 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 4324 0xc0028cc8f0 gate 1569287137753268700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4325 0xc0028cc8f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4326 0xc0028cc8f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4327 0xc0028cc8f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4328 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4329 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 432a 0xc0028cc8f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 432b 0xc0028cc8f0 gate 1569287137753268700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4330 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:37.754 UTC [msp.identity] Verify -> DEBU 4331 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4332 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4333 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.754 UTC [gossip.pull] HandleMessage -> DEBU 4334 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4335 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.841 UTC [gossip.gossip] handleMessage -> DEBU 4336 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.841 UTC [msp] DeserializeIdentity -> DEBU 4337 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.841 UTC [msp] DeserializeIdentity -> DEBU 4338 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.842 UTC [gossip.gossip] handleMessage -> DEBU 4339 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 433b Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 433c Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [gossip.comm] func1 -> DEBU 433e Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 4340 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:37.847 UTC [msp.identity] Verify -> DEBU 4341 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:37.847 UTC [msp] DeserializeIdentity -> DEBU 4342 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.847 UTC [gossip.gossip] handleMessage -> DEBU 4343 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.854 UTC [gossip.comm] func1 -> DEBU 4344 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.854 UTC [gossip.gossip] handleMessage -> DEBU 4345 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.855 UTC [msp.identity] Verify -> DEBU 4346 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:37.855 UTC [msp.identity] Verify -> DEBU 4347 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:37.855 UTC [msp] DeserializeIdentity -> DEBU 4348 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:37.855 UTC [gossip.gossip] handleMessage -> DEBU 4349 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:37.864 UTC [gossip.gossip] handleMessage -> DEBU 434a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.864 UTC [gossip.pull] HandleMessage -> DEBU 434b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:37.864 UTC [gossip.pull] SendDigest -> DEBU 434c Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:37.864 UTC [gossip.gossip] handleMessage -> DEBU 434d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.041 UTC [gossip.comm] func1 -> DEBU 434e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.041 UTC [gossip.gossip] handleMessage -> DEBU 434f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.041 UTC [msp] DeserializeIdentity -> DEBU 4350 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.042 UTC [msp] DeserializeIdentity -> DEBU 4351 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.042 UTC [msp] DeserializeIdentity -> DEBU 4352 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.042 UTC [gossip.gossip] handleMessage -> DEBU 4353 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [gossip.comm] func1 -> DEBU 4354 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [gossip.gossip] handleMessage -> DEBU 4355 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [msp] DeserializeIdentity -> DEBU 4356 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4357 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4358 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4359 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 435d 0xc003141cc0 gate 1569287138046592900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 435e 0xc003141cc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 435f 0xc003141cc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 4360 0xc003141cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 4361 0xc003141cc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 4362 0xc003141cc0 gate 1569287138046592900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4363 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4364 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4365 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 4366 0xc0036d8500 gate 1569287138046937400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4367 0xc0036d8500 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4368 0xc0036d8500 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4369 0xc0036d8500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 436a 0xc0036d8500 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 436b 0xc0036d8500 gate 1569287138046937400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 436f 0xc0036d8d40 gate 1569287138047281300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4370 0xc0036d8d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4371 0xc0036d8d40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4372 0xc0036d8d40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [msp.identity] Verify -> DEBU 4373 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [msp.identity] Verify -> DEBU 4374 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4375 0xc0036d8d40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 4376 0xc0036d8d40 gate 1569287138047281300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4377 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4378 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4379 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 437a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [msp] DeserializeIdentity -> DEBU 437b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.047 UTC [gossip.gossip] handleMessage -> DEBU 437c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [gossip.comm] func1 -> DEBU 437d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [gossip.gossip] handleMessage -> DEBU 437e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [msp] DeserializeIdentity -> DEBU 437f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4380 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4381 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4382 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4383 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4384 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4385 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [cauthdsl] func1 -> DEBU 4386 0xc003cb8810 gate 1569287138055812300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4387 0xc003cb8810 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4388 0xc003cb8810 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4389 0xc003cb8810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 438a 0xc003cb8810 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 438b 0xc003cb8810 gate 1569287138055812300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 438f 0xc003cb9050 gate 1569287138056195100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4390 0xc003cb9050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4391 0xc003cb9050 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4392 0xc003cb9050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4393 0xc003cb9050 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 4394 0xc003cb9050 gate 1569287138056195100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4395 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4397 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 4398 0xc003cb9890 gate 1569287138056528300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4399 0xc003cb9890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 439a 0xc003cb9890 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 439b 0xc003cb9890 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.056 UTC [msp.identity] Verify -> DEBU 439c Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [msp.identity] Verify -> DEBU 439d Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [cauthdsl] func2 -> DEBU 439e 0xc003cb9890 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [cauthdsl] func1 -> DEBU 439f 0xc003cb9890 gate 1569287138056528300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a2 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [msp] DeserializeIdentity -> DEBU 43a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.057 UTC [gossip.gossip] handleMessage -> DEBU 43a5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.240 UTC [gossip.comm] func1 -> DEBU 43a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.241 UTC [gossip.gossip] handleMessage -> DEBU 43a7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.241 UTC [msp] DeserializeIdentity -> DEBU 43a8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.242 UTC [msp] DeserializeIdentity -> DEBU 43a9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.242 UTC [msp] DeserializeIdentity -> DEBU 43aa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.242 UTC [gossip.gossip] handleMessage -> DEBU 43ab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [gossip.comm] func1 -> DEBU 43ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [gossip.gossip] handleMessage -> DEBU 43ad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [msp] DeserializeIdentity -> DEBU 43ae Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43b0 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43b1 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [policies] Evaluate -> DEBU 43b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.247 UTC [policies] Evaluate -> DEBU 43b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [policies] Evaluate -> DEBU 43b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func1 -> DEBU 43b5 0xc003cc9360 gate 1569287138248100800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b6 0xc003cc9360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b7 0xc003cc9360 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b8 0xc003cc9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b9 0xc003cc9360 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.248 UTC [cauthdsl] func1 -> DEBU 43ba 0xc003cc9360 gate 1569287138248100800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.249 UTC [policies] Evaluate -> DEBU 43bb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.249 UTC [policies] Evaluate -> DEBU 43bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.250 UTC [policies] Evaluate -> DEBU 43bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.251 UTC [cauthdsl] func1 -> DEBU 43be 0xc003cc9ba0 gate 1569287138251818100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.251 UTC [cauthdsl] func2 -> DEBU 43bf 0xc003cc9ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c0 0xc003cc9ba0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c1 0xc003cc9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c2 0xc003cc9ba0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [cauthdsl] func1 -> DEBU 43c3 0xc003cc9ba0 gate 1569287138251818100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.252 UTC [cauthdsl] func1 -> DEBU 43c7 0xc003dc03e0 gate 1569287138252873900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43c8 0xc003dc03e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43c9 0xc003dc03e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43ca 0xc003dc03e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [msp.identity] Verify -> DEBU 43cb Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [msp.identity] Verify -> DEBU 43cc Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43cd 0xc003dc03e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [cauthdsl] func1 -> DEBU 43ce 0xc003dc03e0 gate 1569287138252873900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43cf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d1 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.253 UTC [msp] DeserializeIdentity -> DEBU 43d3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.255 UTC [gossip.gossip] handleMessage -> DEBU 43d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.491 UTC [gossip.gossip] handleMessage -> DEBU 43d5 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.492 UTC [gossip.pull] HandleMessage -> DEBU 43d6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.492 UTC [gossip.pull] SendDigest -> DEBU 43d7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:38.492 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.521 UTC [gossip.gossip] handleMessage -> DEBU 43d9 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.521 UTC [gossip.gossip] handleMessage -> DEBU 43da Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43db Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43dc Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [msp.identity] Verify -> DEBU 43dd Verify: digest = 00000000 f9 43 50 94 f4 8c 2e 05 a3 d0 8e 8d 2e c5 44 ba |.CP...........D.| +peer0.org1.example.com | 00000010 d9 b6 46 d8 45 80 55 f7 eb ad 1e 65 fb 06 43 dc |..F.E.U....e..C.|" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [msp.identity] Verify -> DEBU 43de Verify: sig = 00000000 30 45 02 21 00 c0 9b 50 4f a3 15 fa 5b 2a 76 6c |0E.!...PO...[*vl| +peer0.org1.example.com | 00000010 f1 6b 4d 79 32 89 c3 e3 27 7a ce d2 2e 37 c3 84 |.kMy2...'z...7..| +peer0.org1.example.com | 00000020 3e 38 08 b0 53 02 20 61 a3 e5 98 12 c3 5f 1c fe |>8..S. a....._..| +peer0.org1.example.com | 00000030 95 b9 50 b8 7c 1f 6f b8 4c 53 9b 9a 9a d2 bb 2d |..P.|.o.LS.....-| +peer0.org1.example.com | 00000040 b6 1a 4e 60 55 59 e3 |..N`UY.|" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 43df Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:38.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.524 UTC [gossip.gossip] handleMessage -> DEBU 43e2 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e3 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:38.524 UTC [gossip.comm] func1 -> DEBU 43e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 43e7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43e8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43e9 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43eb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.528 UTC [msp.identity] Verify -> DEBU 43ec Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +peer0.org1.example.com | 00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +peer0.org1.example.com | "2019-09-24 01:05:38.528 UTC [msp.identity] Verify -> DEBU 43ed Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +peer0.org1.example.com | 00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +peer0.org1.example.com | 00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +peer0.org1.example.com | 00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +peer0.org1.example.com | 00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +peer0.org1.example.com | "2019-09-24 01:05:38.527 UTC [gossip.gossip] handleMessage -> DEBU 43ea Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.529 UTC [msp.identity] Verify -> DEBU 43ee Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:38.531 UTC [gossip.gossip] handleMessage -> DEBU 43ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.531 UTC [msp.identity] Verify -> DEBU 43f0 Verify: sig = 00000000 30 44 02 20 32 db da 7b ef d1 81 60 d0 e2 9c a7 |0D. 2..{...`....| +peer0.org1.example.com | 00000010 cf b6 00 7b 1e dd 9a 9c a5 78 33 21 1c fa 67 6c |...{.....x3!..gl| +peer0.org1.example.com | 00000020 33 c6 6f d4 02 20 3c 28 eb f9 bd 9b bb 7a 09 57 |3.o.. <(.....z.W| +peer0.org1.example.com | 00000030 c6 30 5a 99 c6 e3 9b a5 be b5 4b 72 ad 02 c3 e5 |.0Z.......Kr....| +peer0.org1.example.com | 00000040 0a 2c 09 92 86 83 |.,....|" +peer0.org1.example.com | "2019-09-24 01:05:38.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.533 UTC [gossip.comm] func1 -> DEBU 43f2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:38.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43f9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.536 UTC [gossip.discovery] sendMemResponse -> DEBU 43fa Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:38.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43fd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.537 UTC [gossip.gossip] handleMessage -> DEBU 43fc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.538 UTC [gossip.gossip] handleMessage -> DEBU 43fe Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.538 UTC [gossip.gossip] handleMessage -> DEBU 43ff Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4400 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4401 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.540 UTC [msp] DeserializeIdentity -> DEBU 4402 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.540 UTC [msp] DeserializeIdentity -> DEBU 4403 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.540 UTC [gossip.comm] Send -> DEBU 4404 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.541 UTC [gossip.comm] sendToEndpoint -> DEBU 4405 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.541 UTC [gossip.comm] sendToEndpoint -> DEBU 4406 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.541 UTC [gossip.discovery] sendMemResponse -> DEBU 4407 Exiting, replying with alive: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 4408 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 4409 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 440a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.544 UTC [gossip.comm] Send -> DEBU 440b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.544 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.545 UTC [gossip.comm] Send -> DEBU 440e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.546 UTC [gossip.comm] sendToEndpoint -> DEBU 440f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.546 UTC [gossip.comm] sendToEndpoint -> DEBU 4410 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.545 UTC [gossip.comm] sendToEndpoint -> DEBU 440d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.547 UTC [gossip.comm] sendToEndpoint -> DEBU 4411 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.786 UTC [gossip.comm] func1 -> DEBU 4412 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.786 UTC [gossip.gossip] handleMessage -> DEBU 4413 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.787 UTC [gossip.pull] HandleMessage -> DEBU 4414 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.787 UTC [msp] DeserializeIdentity -> DEBU 4415 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.787 UTC [msp] DeserializeIdentity -> DEBU 4416 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.788 UTC [msp] DeserializeIdentity -> DEBU 4417 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.788 UTC [msp] DeserializeIdentity -> DEBU 4418 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.789 UTC [msp] DeserializeIdentity -> DEBU 4419 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.789 UTC [msp] DeserializeIdentity -> DEBU 441a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.790 UTC [gossip.pull] SendDigest -> DEBU 441b Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:38.791 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.804 UTC [gossip.comm] func1 -> DEBU 441d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.804 UTC [gossip.gossip] handleMessage -> DEBU 441e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.805 UTC [gossip.gossip] handleMessage -> DEBU 441f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4420 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4421 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.805 UTC [msp] DeserializeIdentity -> DEBU 4422 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4423 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4424 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4425 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4426 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4427 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 4429 0xc0024fe180 gate 1569287138806374700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442a 0xc0024fe180 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442b 0xc0024fe180 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442c 0xc0024fe180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442d 0xc0024fe180 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 442e 0xc0024fe180 gate 1569287138806374700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 442f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4430 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4431 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 4432 0xc0024fe9c0 gate 1569287138806858800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4433 0xc0024fe9c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4434 0xc0024fe9c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4435 0xc0024fe9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4436 0xc0024fe9c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 4437 0xc0024fe9c0 gate 1569287138806858800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4438 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4439 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 443a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 443b 0xc0024ff200 gate 1569287138807303700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443c 0xc0024ff200 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443d 0xc0024ff200 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443e 0xc0024ff200 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [msp.identity] Verify -> DEBU 443f Verify: digest = 00000000 cc 9c dc 03 6f 9c 5c a5 68 52 33 e0 b4 6e 52 e1 |....o.\.hR3..nR.| +peer0.org1.example.com | 00000010 87 9f 17 53 34 90 73 8b 52 20 a1 ca 64 9e 50 20 |...S4.s.R ..d.P |" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [msp.identity] Verify -> DEBU 4440 Verify: sig = 00000000 30 45 02 21 00 9a 84 47 2b 0f 2f d9 fb e4 db 31 |0E.!...G+./....1| +peer0.org1.example.com | 00000010 eb 37 e5 c1 09 19 54 3d 92 57 ff 7a c8 09 b4 ec |.7....T=.W.z....| +peer0.org1.example.com | 00000020 49 83 a0 fa 2c 02 20 2b 7e 93 60 7a ab 87 e9 00 |I...,. +~.`z....| +peer0.org1.example.com | 00000030 07 68 53 57 71 c9 e0 a5 30 07 57 31 ac 45 38 09 |.hSWq...0.W1.E8.| +peer0.org1.example.com | 00000040 2c fd d0 61 f0 32 b9 |,..a.2.|" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4441 0xc0024ff200 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 4442 0xc0024ff200 gate 1569287138807303700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4443 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.808 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.808 UTC [gossip.discovery] handleAliveMessage -> DEBU 4447 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 4448 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 4449 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 444d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [gossip.discovery] sendMemResponse -> DEBU 444f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [msp] DeserializeIdentity -> DEBU 4450 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.809 UTC [msp] DeserializeIdentity -> DEBU 4451 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.810 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.810 UTC [gossip.comm] Send -> DEBU 4453 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.810 UTC [gossip.discovery] sendMemResponse -> DEBU 4454 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:38.810 UTC [gossip.comm] sendToEndpoint -> DEBU 4455 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.810 UTC [gossip.comm] sendToEndpoint -> DEBU 4456 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.846 UTC [gossip.comm] func1 -> DEBU 4457 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.847 UTC [gossip.gossip] handleMessage -> DEBU 4458 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.848 UTC [gossip.pull] HandleMessage -> DEBU 4459 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.848 UTC [msp] DeserializeIdentity -> DEBU 445a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.849 UTC [msp] DeserializeIdentity -> DEBU 445b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.849 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.850 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.850 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.851 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.852 UTC [gossip.pull] SendDigest -> DEBU 4460 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:38.852 UTC [gossip.gossip] handleMessage -> DEBU 4461 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.864 UTC [gossip.pull] Hello -> DEBU 4462 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:38.865 UTC [gossip.comm] Send -> DEBU 4463 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4464 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4465 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.869 UTC [gossip.gossip] handleMessage -> DEBU 4466 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.870 UTC [gossip.pull] HandleMessage -> DEBU 4467 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.871 UTC [gossip.comm] func1 -> DEBU 4468 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.865 UTC [gossip.pull] Hello -> DEBU 4469 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:38.872 UTC [gossip.comm] Send -> DEBU 446a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.873 UTC [gossip.pull] Hello -> DEBU 446b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:38.873 UTC [gossip.comm] sendToEndpoint -> DEBU 446c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.873 UTC [gossip.comm] sendToEndpoint -> DEBU 446d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.873 UTC [gossip.comm] Send -> DEBU 446e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.873 UTC [gossip.gossip] handleMessage -> DEBU 446f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.gossip] handleMessage -> DEBU 4471 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.comm] sendToEndpoint -> DEBU 4470 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.comm] sendToEndpoint -> DEBU 4472 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4473 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4474 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [msp] DeserializeIdentity -> DEBU 4475 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4476 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4477 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4478 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4479 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 447a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 447b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func1 -> DEBU 447c 0xc003d82490 gate 1569287138875544700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447d 0xc003d82490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447e 0xc003d82490 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447f 0xc003d82490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 4480 0xc003d82490 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [cauthdsl] func1 -> DEBU 4481 0xc003d82490 gate 1569287138875544700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4482 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4483 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 4484 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 4485 0xc003d82cd0 gate 1569287138876133500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4486 0xc003d82cd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4487 0xc003d82cd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4488 0xc003d82cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4489 0xc003d82cd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 448a 0xc003d82cd0 gate 1569287138876133500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 448e 0xc003d83510 gate 1569287138876735400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 448f 0xc003d83510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4490 0xc003d83510 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [cauthdsl] func2 -> DEBU 4491 0xc003d83510 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [msp.identity] Verify -> DEBU 4492 Verify: digest = 00000000 4b 45 6f ef 1f 37 66 69 3c 76 f7 5c 7d 4d eb 42 |KEo..7fi DEBU 4493 Verify: sig = 00000000 30 45 02 21 00 99 a6 3f 69 be 48 7f a7 b5 db e6 |0E.!...?i.H.....| +peer0.org1.example.com | 00000010 f2 79 63 62 92 ca 62 8f 36 a0 52 e4 8e 2d 2d 8a |.ycb..b.6.R..--.| +peer0.org1.example.com | 00000020 42 d5 f7 7e 80 02 20 0a b7 50 e2 5d d0 0b ad 0c |B..~.. ..P.]....| +peer0.org1.example.com | 00000030 10 ef 8d f5 ca 36 53 85 24 b5 eb 64 da 88 8e c6 |.....6S.$..d....| +peer0.org1.example.com | 00000040 44 34 94 a9 b2 15 d4 |D4.....|" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [cauthdsl] func2 -> DEBU 4494 0xc003d83510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [cauthdsl] func1 -> DEBU 4495 0xc003d83510 gate 1569287138876735400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4496 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4498 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4499 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 449a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 44a0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44a1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.discovery] sendMemResponse -> DEBU 44a2 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.878 UTC [gossip.comm] Send -> DEBU 44a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.879 UTC [gossip.discovery] sendMemResponse -> DEBU 44a7 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:38.874 UTC [gossip.gossip] handleMessage -> DEBU 44a8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 44a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 44aa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.879 UTC [gossip.comm] func1 -> DEBU 44ab Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.879 UTC [gossip.gossip] handleMessage -> DEBU 44ac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.880 UTC [gossip.pull] HandleMessage -> DEBU 44ad GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.880 UTC [gossip.gossip] handleMessage -> DEBU 44ae Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.880 UTC [gossip.comm] func1 -> DEBU 44af Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.881 UTC [gossip.gossip] handleMessage -> DEBU 44b0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.881 UTC [gossip.pull] HandleMessage -> DEBU 44b1 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.881 UTC [gossip.gossip] handleMessage -> DEBU 44b2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.901 UTC [msp] GetDefaultSigningIdentity -> DEBU 44b3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:38.906 UTC [msp.identity] Sign -> DEBU 44b4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151032 " +peer0.org1.example.com | "2019-09-24 01:05:38.906 UTC [msp.identity] Sign -> DEBU 44b5 Sign: digest: 65D0A0CBB8501BC902FBAF68B7A12E9BC04B6A9EB5C04CAC0092A15DE680DDA4 " +peer0.org1.example.com | "2019-09-24 01:05:38.907 UTC [msp] GetDefaultSigningIdentity -> DEBU 44b6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:38.907 UTC [msp.identity] Sign -> DEBU 44b7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:38.907 UTC [msp.identity] Sign -> DEBU 44b8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:38.908 UTC [msp] DeserializeIdentity -> DEBU 44b9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.908 UTC [gossip.comm] Send -> DEBU 44ba Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.909 UTC [msp] DeserializeIdentity -> DEBU 44bb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.909 UTC [gossip.comm] Send -> DEBU 44bc Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44bd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44be Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44c0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.910 UTC [gossip.comm] Send -> DEBU 44c1 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 h\023\024\262f\371\327\340\376\001\214M\276I\r\310\264\002\t\333\020a)\327\265{\337\276\036\217\266\264" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:38.913 UTC [gossip.comm] func1 -> DEBU 44c2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.914 UTC [gossip.gossip] handleMessage -> DEBU 44c3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.913 UTC [gossip.comm] sendToEndpoint -> DEBU 44c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 h\023\024\262f\371\327\340\376\001\214M\276I\r\310\264\002\t\333\020a)\327\265{\337\276\036\217\266\264" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.914 UTC [gossip.comm] sendToEndpoint -> DEBU 44c7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.915 UTC [gossip.comm] func1 -> DEBU 44c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.916 UTC [msp.identity] Verify -> DEBU 44ca Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +peer0.org1.example.com | 00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +peer0.org1.example.com | "2019-09-24 01:05:38.917 UTC [msp.identity] Verify -> DEBU 44cb Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +peer0.org1.example.com | 00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +peer0.org1.example.com | 00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +peer0.org1.example.com | 00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +peer0.org1.example.com | 00000040 18 72 92 68 59 fd |.r.hY.|" +peer0.org1.example.com | "2019-09-24 01:05:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 44cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.917 UTC [gossip.discovery] isSentByMe -> DEBU 44cd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ce Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44cf Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.918 UTC [msp] DeserializeIdentity -> DEBU 44d0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d2 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d3 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [cauthdsl] func1 -> DEBU 44d7 0xc003d3f870 gate 1569287138919520100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44d8 0xc003d3f870 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44d9 0xc003d3f870 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44da 0xc003d3f870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44db 0xc003d3f870 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44dc 0xc003d3f870 gate 1569287138919520100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44dd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44e0 0xc003eae0b0 gate 1569287138920448900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e1 0xc003eae0b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e2 0xc003eae0b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e3 0xc003eae0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e4 0xc003eae0b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44e5 0xc003eae0b0 gate 1569287138920448900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [policies] Evaluate -> DEBU 44e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [cauthdsl] func1 -> DEBU 44e9 0xc003eae8f0 gate 1569287138921128900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44ea 0xc003eae8f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44eb 0xc003eae8f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44ec 0xc003eae8f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.921 UTC [msp.identity] Verify -> DEBU 44ed Verify: digest = 00000000 4b 45 6f ef 1f 37 66 69 3c 76 f7 5c 7d 4d eb 42 |KEo..7fi DEBU 44ee Verify: sig = 00000000 30 45 02 21 00 99 a6 3f 69 be 48 7f a7 b5 db e6 |0E.!...?i.H.....| +peer0.org1.example.com | 00000010 f2 79 63 62 92 ca 62 8f 36 a0 52 e4 8e 2d 2d 8a |.ycb..b.6.R..--.| +peer0.org1.example.com | 00000020 42 d5 f7 7e 80 02 20 0a b7 50 e2 5d d0 0b ad 0c |B..~.. ..P.]....| +peer0.org1.example.com | 00000030 10 ef 8d f5 ca 36 53 85 24 b5 eb 64 da 88 8e c6 |.....6S.$..d....| +peer0.org1.example.com | 00000040 44 34 94 a9 b2 15 d4 |D4.....|" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [cauthdsl] func2 -> DEBU 44ef 0xc003eae8f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [cauthdsl] func1 -> DEBU 44f0 0xc003eae8f0 gate 1569287138921128900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f3 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44f7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [msp.identity] Verify -> DEBU 44f8 Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +peer0.org1.example.com | 00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [msp.identity] Verify -> DEBU 44f9 Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +peer0.org1.example.com | 00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +peer0.org1.example.com | 00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +peer0.org1.example.com | 00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +peer0.org1.example.com | 00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44fc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.914 UTC [gossip.gossip] handleMessage -> DEBU 44c5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [gossip.gossip] handleMessage -> DEBU 44fd Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [gossip.gossip] handleMessage -> DEBU 44fe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44ff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4500 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [msp.identity] Verify -> DEBU 4501 Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +peer0.org1.example.com | 00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +peer0.org1.example.com | "2019-09-24 01:05:38.924 UTC [msp.identity] Verify -> DEBU 4502 Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +peer0.org1.example.com | 00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +peer0.org1.example.com | 00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +peer0.org1.example.com | 00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +peer0.org1.example.com | 00000040 18 72 92 68 59 fd |.r.hY.|" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [msp.identity] Verify -> DEBU 4503 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [msp.identity] Verify -> DEBU 4504 Verify: sig = 00000000 30 45 02 21 00 ca f7 d6 bf 1a 76 b5 cf e8 ac f3 |0E.!......v.....| +peer0.org1.example.com | 00000010 22 e0 d2 13 22 ab 1c aa dd d8 04 7a 64 ee 89 e7 |"..."......zd...| +peer0.org1.example.com | 00000020 15 58 30 72 3e 02 20 68 13 14 b2 66 f9 d7 e0 fe |.X0r>. h...f....| +peer0.org1.example.com | 00000030 01 8c 4d be 49 0d c8 b4 02 09 db 10 61 29 d7 b5 |..M.I.......a)..| +peer0.org1.example.com | 00000040 7b df be 1e 8f b6 b4 |{......|" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4505 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [gossip.discovery] isSentByMe -> DEBU 4506 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4507 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4508 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.931 UTC [gossip.gossip] handleMessage -> DEBU 4509 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 450b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 450c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.933 UTC [msp.identity] Verify -> DEBU 450d Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +peer0.org1.example.com | 00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +peer0.org1.example.com | "2019-09-24 01:05:38.933 UTC [msp.identity] Verify -> DEBU 450e Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +peer0.org1.example.com | 00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +peer0.org1.example.com | 00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +peer0.org1.example.com | 00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +peer0.org1.example.com | 00000040 18 72 92 68 59 fd |.r.hY.|" +peer0.org1.example.com | "2019-09-24 01:05:38.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 450f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.935 UTC [gossip.discovery] isSentByMe -> DEBU 4510 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 4511 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4512 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.936 UTC [msp] DeserializeIdentity -> DEBU 4513 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:38.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4514 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:38.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4515 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4516 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4517 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4518 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4519 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.939 UTC [cauthdsl] func1 -> DEBU 451a 0xc003d23070 gate 1569287138939855000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.940 UTC [cauthdsl] func2 -> DEBU 451b 0xc003d23070 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.940 UTC [cauthdsl] func2 -> DEBU 451c 0xc003d23070 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.941 UTC [cauthdsl] func2 -> DEBU 451d 0xc003d23070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.941 UTC [cauthdsl] func2 -> DEBU 451e 0xc003d23070 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.941 UTC [cauthdsl] func1 -> DEBU 451f 0xc003d23070 gate 1569287138939855000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.942 UTC [policies] Evaluate -> DEBU 4520 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.942 UTC [policies] Evaluate -> DEBU 4521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.943 UTC [policies] Evaluate -> DEBU 4522 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.943 UTC [cauthdsl] func1 -> DEBU 4523 0xc003d238b0 gate 1569287138943650400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4524 0xc003d238b0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4525 0xc003d238b0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4526 0xc003d238b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:38.945 UTC [cauthdsl] func2 -> DEBU 4527 0xc003d238b0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.945 UTC [cauthdsl] func1 -> DEBU 4528 0xc003d238b0 gate 1569287138943650400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:38.945 UTC [policies] Evaluate -> DEBU 4529 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.946 UTC [policies] Evaluate -> DEBU 452a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.946 UTC [policies] Evaluate -> DEBU 452b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:38.946 UTC [cauthdsl] func1 -> DEBU 452c 0xc003f9c0f0 gate 1569287138946963500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:38.947 UTC [cauthdsl] func2 -> DEBU 452d 0xc003f9c0f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:38.947 UTC [cauthdsl] func2 -> DEBU 452e 0xc003f9c0f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:38.948 UTC [cauthdsl] func2 -> DEBU 452f 0xc003f9c0f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.948 UTC [msp.identity] Verify -> DEBU 4530 Verify: digest = 00000000 cc 9c dc 03 6f 9c 5c a5 68 52 33 e0 b4 6e 52 e1 |....o.\.hR3..nR.| +peer0.org1.example.com | 00000010 87 9f 17 53 34 90 73 8b 52 20 a1 ca 64 9e 50 20 |...S4.s.R ..d.P |" +peer0.org1.example.com | "2019-09-24 01:05:38.948 UTC [msp.identity] Verify -> DEBU 4531 Verify: sig = 00000000 30 45 02 21 00 9a 84 47 2b 0f 2f d9 fb e4 db 31 |0E.!...G+./....1| +peer0.org1.example.com | 00000010 eb 37 e5 c1 09 19 54 3d 92 57 ff 7a c8 09 b4 ec |.7....T=.W.z....| +peer0.org1.example.com | 00000020 49 83 a0 fa 2c 02 20 2b 7e 93 60 7a ab 87 e9 00 |I...,. +~.`z....| +peer0.org1.example.com | 00000030 07 68 53 57 71 c9 e0 a5 30 07 57 31 ac 45 38 09 |.hSWq...0.W1.E8.| +peer0.org1.example.com | 00000040 2c fd d0 61 f0 32 b9 |,..a.2.|" +peer0.org1.example.com | "2019-09-24 01:05:38.948 UTC [cauthdsl] func2 -> DEBU 4532 0xc003f9c0f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:38.949 UTC [cauthdsl] func1 -> DEBU 4533 0xc003f9c0f0 gate 1569287138946963500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:38.931 UTC [gossip.gossip] handleMessage -> DEBU 450a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4534 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4536 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.953 UTC [policies] Evaluate -> DEBU 4537 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4538 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4539 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 453a Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:38.954 UTC [msp.identity] Verify -> DEBU 453b Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +peer0.org1.example.com | 00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +peer0.org1.example.com | "2019-09-24 01:05:38.954 UTC [msp.identity] Verify -> DEBU 453c Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +peer0.org1.example.com | 00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +peer0.org1.example.com | 00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +peer0.org1.example.com | 00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +peer0.org1.example.com | 00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +peer0.org1.example.com | "2019-09-24 01:05:38.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 453d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:38.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 453e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:38.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 453f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.141 UTC [gossip.comm] func1 -> DEBU 4540 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.142 UTC [gossip.gossip] handleMessage -> DEBU 4541 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.143 UTC [gossip.gossip] handleMessage -> DEBU 4542 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.143 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4543 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.146 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4544 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:39.146 UTC [msp] DeserializeIdentity -> DEBU 4545 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.147 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4546 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:39.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4547 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:39.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4548 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:39.148 UTC [policies] Evaluate -> DEBU 4549 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.149 UTC [policies] Evaluate -> DEBU 454a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:39.150 UTC [policies] Evaluate -> DEBU 454b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.150 UTC [cauthdsl] func1 -> DEBU 454c 0xc003d39850 gate 1569287139150867200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.152 UTC [cauthdsl] func2 -> DEBU 454d 0xc003d39850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.152 UTC [cauthdsl] func2 -> DEBU 454e 0xc003d39850 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.153 UTC [cauthdsl] func2 -> DEBU 454f 0xc003d39850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:39.153 UTC [cauthdsl] func2 -> DEBU 4550 0xc003d39850 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.154 UTC [cauthdsl] func1 -> DEBU 4551 0xc003d39850 gate 1569287139150867200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.155 UTC [policies] Evaluate -> DEBU 4552 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.158 UTC [policies] Evaluate -> DEBU 4553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.158 UTC [policies] Evaluate -> DEBU 4554 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.159 UTC [cauthdsl] func1 -> DEBU 4555 0xc003fbe090 gate 1569287139158935800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.159 UTC [cauthdsl] func2 -> DEBU 4556 0xc003fbe090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4557 0xc003fbe090 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4558 0xc003fbe090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4559 0xc003fbe090 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.161 UTC [cauthdsl] func1 -> DEBU 455a 0xc003fbe090 gate 1569287139158935800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.161 UTC [policies] Evaluate -> DEBU 455b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.162 UTC [policies] Evaluate -> DEBU 455c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.162 UTC [policies] Evaluate -> DEBU 455d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.163 UTC [cauthdsl] func1 -> DEBU 455e 0xc003fbe8d0 gate 1569287139163410800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.163 UTC [cauthdsl] func2 -> DEBU 455f 0xc003fbe8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.164 UTC [cauthdsl] func2 -> DEBU 4560 0xc003fbe8d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.164 UTC [cauthdsl] func2 -> DEBU 4561 0xc003fbe8d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:39.164 UTC [msp.identity] Verify -> DEBU 4562 Verify: digest = 00000000 98 86 81 1c a3 fa ac 03 00 85 76 a2 41 0c 21 e3 |..........v.A.!.| +peer0.org1.example.com | 00000010 30 46 ef e2 31 ba 8c 7d 22 37 c8 e7 d4 ac bf ea |0F..1..}"7......|" +peer0.org1.example.com | "2019-09-24 01:05:39.165 UTC [msp.identity] Verify -> DEBU 4563 Verify: sig = 00000000 30 45 02 21 00 de 95 5e 95 e9 14 4a 0e 98 38 60 |0E.!...^...J..8`| +peer0.org1.example.com | 00000010 f5 d0 b2 ba 30 66 5d 6b 4b ad 60 8e 48 6e 37 70 |....0f]kK.`.Hn7p| +peer0.org1.example.com | 00000020 7c f5 e9 04 ae 02 20 2c 91 f5 44 0c 2f ed 09 83 ||..... ,..D./...| +peer0.org1.example.com | 00000030 d8 14 19 39 fe 96 c2 4f 13 9b 82 59 5c 5f 13 6a |...9...O...Y\_.j| +peer0.org1.example.com | 00000040 1b 78 d2 55 47 0e 6b |.x.UG.k|" +peer0.org1.example.com | "2019-09-24 01:05:39.166 UTC [cauthdsl] func2 -> DEBU 4564 0xc003fbe8d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:39.166 UTC [cauthdsl] func1 -> DEBU 4565 0xc003fbe8d0 gate 1569287139163410800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:39.166 UTC [policies] Evaluate -> DEBU 4566 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.166 UTC [policies] Evaluate -> DEBU 4567 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.167 UTC [policies] Evaluate -> DEBU 4568 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.167 UTC [policies] Evaluate -> DEBU 4569 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 456a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 456b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456c updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456d Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:39.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 456f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 4570 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4571 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4572 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4575 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4576 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4577 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [gossip.comm] Send -> DEBU 4578 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4579 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 457a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] Send -> DEBU 457b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 457c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 457d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 457e Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 4580 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4581 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 4582 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4583 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 4584 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4585 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4586 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [msp] DeserializeIdentity -> DEBU 4587 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [gossip.comm] func1 -> DEBU 4588 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4589 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:39.171 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 458f 0xc003df2bc0 gate 1569287139172148000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4590 0xc003df2bc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4591 0xc003df2bc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4592 0xc003df2bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4593 0xc003df2bc0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 4594 0xc003df2bc0 gate 1569287139172148000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4595 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4596 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 4598 0xc003df3400 gate 1569287139172405900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4599 0xc003df3400 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459a 0xc003df3400 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459b 0xc003df3400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459c 0xc003df3400 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 459d 0xc003df3400 gate 1569287139172405900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 459e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 459f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 45a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 45a1 0xc003df3c40 gate 1569287139172649000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 45a2 0xc003df3c40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:39.180 UTC [cauthdsl] func2 -> DEBU 45a6 0xc003df3c40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:39.177 UTC [gossip.comm] func1 -> DEBU 45a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.178 UTC [gossip.comm] func1 -> DEBU 45a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.179 UTC [gossip.gossip] handleMessage -> DEBU 45a5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.182 UTC [gossip.gossip] handleMessage -> DEBU 45a7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.182 UTC [cauthdsl] func2 -> DEBU 45a8 0xc003df3c40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:39.182 UTC [msp.identity] Verify -> DEBU 45a9 Verify: digest = 00000000 17 80 38 45 ea c9 00 09 d9 8e d0 e0 03 af c6 39 |..8E...........9| +peer0.org1.example.com | 00000010 17 d9 af 28 59 3d 50 8c 0e dc 48 07 ac bf 8b 67 |...(Y=P...H....g|" +peer0.org1.example.com | "2019-09-24 01:05:39.183 UTC [msp.identity] Verify -> DEBU 45aa Verify: sig = 00000000 30 44 02 20 7d 45 7e 8c 6f a9 68 f6 5a 9b 60 65 |0D. }E~.o.h.Z.`e| +peer0.org1.example.com | 00000010 05 7d 58 48 1b 9c 5e 8a 2a 6d ba f2 6b 16 f9 dc |.}XH..^.*m..k...| +peer0.org1.example.com | 00000020 3d bc 4b 3b 02 20 41 8f 5c 9a ec ae d7 b6 e1 a7 |=.K;. A.\.......| +peer0.org1.example.com | 00000030 92 8a 34 0f 3d ba 3b 15 c4 ad cb 82 31 b7 47 33 |..4.=.;.....1.G3| +peer0.org1.example.com | 00000040 b5 ad b1 a2 ef 9f |......|" +peer0.org1.example.com | "2019-09-24 01:05:39.183 UTC [cauthdsl] func2 -> DEBU 45ab 0xc003df3c40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:39.184 UTC [cauthdsl] func1 -> DEBU 45ac 0xc003df3c40 gate 1569287139172649000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:39.184 UTC [policies] Evaluate -> DEBU 45ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.185 UTC [policies] Evaluate -> DEBU 45ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.185 UTC [policies] Evaluate -> DEBU 45af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.186 UTC [policies] Evaluate -> DEBU 45b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:39.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:39.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45bb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.191 UTC [gossip.gossip] handleMessage -> DEBU 45ba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.192 UTC [msp] DeserializeIdentity -> DEBU 45bc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.193 UTC [gossip.gossip] handleMessage -> DEBU 45bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45be Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45c0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45c2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.194 UTC [gossip.gossip] handleMessage -> DEBU 45bf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.195 UTC [gossip.gossip] handleMessage -> DEBU 45c4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.196 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.197 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.197 UTC [msp] DeserializeIdentity -> DEBU 45c9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.195 UTC [gossip.gossip] handleMessage -> DEBU 45c6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.197 UTC [gossip.comm] Send -> DEBU 45ca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.198 UTC [msp] DeserializeIdentity -> DEBU 45cc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.198 UTC [msp] DeserializeIdentity -> DEBU 45cd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.198 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.198 UTC [gossip.comm] sendToEndpoint -> DEBU 45cf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.198 UTC [gossip.comm] sendToEndpoint -> DEBU 45d0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45cb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.199 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.199 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 45d3 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:39.235 UTC [msp.identity] Sign -> DEBU 45d4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151033 " +peer0.org1.example.com | "2019-09-24 01:05:39.236 UTC [msp.identity] Sign -> DEBU 45d5 Sign: digest: B84C49A82B49ADC37F86B155BFFE4074C297B4CB5EA78A0AD0F0E891B92E074E " +peer0.org1.example.com | "2019-09-24 01:05:39.236 UTC [msp] GetDefaultSigningIdentity -> DEBU 45d6 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:39.236 UTC [msp.identity] Sign -> DEBU 45d7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:39.237 UTC [msp.identity] Sign -> DEBU 45d8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:39.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 45d9 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:39.239 UTC [msp] DeserializeIdentity -> DEBU 45da Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.240 UTC [msp] DeserializeIdentity -> DEBU 45db Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.240 UTC [gossip.comm] Send -> DEBU 45dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.241 UTC [msp] DeserializeIdentity -> DEBU 45dd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.241 UTC [gossip.comm] sendToEndpoint -> DEBU 45de Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.241 UTC [gossip.comm] sendToEndpoint -> DEBU 45df Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.241 UTC [gossip.comm] Send -> DEBU 45e0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.242 UTC [msp] DeserializeIdentity -> DEBU 45e1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:39.242 UTC [gossip.comm] sendToEndpoint -> DEBU 45e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.242 UTC [gossip.comm] sendToEndpoint -> DEBU 45e3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:39.243 UTC [gossip.comm] Send -> DEBU 45e4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:39.244 UTC [gossip.comm] sendToEndpoint -> DEBU 45e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:39.245 UTC [gossip.comm] sendToEndpoint -> DEBU 45e6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.661 UTC [msp] DeserializeIdentity -> DEBU 45e7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.662 UTC [msp] DeserializeIdentity -> DEBU 45e8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.663 UTC [gossip.comm] Send -> DEBU 45e9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:41.664 UTC [gossip.comm] sendToEndpoint -> DEBU 45ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.664 UTC [gossip.comm] sendToEndpoint -> DEBU 45eb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.666 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.667 UTC [gossip.gossip] handleMessage -> DEBU 45f0 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.668 UTC [msp.identity] Verify -> DEBU 45f1 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:41.668 UTC [msp.identity] Verify -> DEBU 45f2 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:41.671 UTC [gossip.comm] func1 -> DEBU 45f3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.671 UTC [gossip.comm] func1 -> DEBU 45f4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.672 UTC [msp.identity] Verify -> DEBU 45f5 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:41.672 UTC [msp.identity] Verify -> DEBU 45f6 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:41.673 UTC [msp] DeserializeIdentity -> DEBU 45f7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.673 UTC [msp] DeserializeIdentity -> DEBU 45f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45fa Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45fb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.680 UTC [cauthdsl] func1 -> DEBU 45ff 0xc003aa2950 gate 1569287141680073200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.680 UTC [cauthdsl] func2 -> DEBU 4600 0xc003aa2950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.680 UTC [cauthdsl] func2 -> DEBU 4601 0xc003aa2950 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.681 UTC [cauthdsl] func2 -> DEBU 4602 0xc003aa2950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.681 UTC [cauthdsl] func2 -> DEBU 4603 0xc003aa2950 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.681 UTC [cauthdsl] func1 -> DEBU 4604 0xc003aa2950 gate 1569287141680073200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4605 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4606 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4607 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.682 UTC [cauthdsl] func1 -> DEBU 4608 0xc003aa3190 gate 1569287141682801000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.682 UTC [cauthdsl] func2 -> DEBU 4609 0xc003aa3190 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460a 0xc003aa3190 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460b 0xc003aa3190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460c 0xc003aa3190 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.683 UTC [cauthdsl] func1 -> DEBU 460d 0xc003aa3190 gate 1569287141682801000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 460e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 460f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.693 UTC [cauthdsl] func1 -> DEBU 4611 0xc003aa39d0 gate 1569287141693386900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.693 UTC [cauthdsl] func2 -> DEBU 4612 0xc003aa39d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.694 UTC [cauthdsl] func2 -> DEBU 4613 0xc003aa39d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.694 UTC [cauthdsl] func2 -> DEBU 4614 0xc003aa39d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.694 UTC [msp.identity] Verify -> DEBU 4615 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:41.694 UTC [msp.identity] Verify -> DEBU 4616 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:41.695 UTC [cauthdsl] func2 -> DEBU 4617 0xc003aa39d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.695 UTC [cauthdsl] func1 -> DEBU 4618 0xc003aa39d0 gate 1569287141693386900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 4619 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 461b Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.698 UTC [policies] Evaluate -> DEBU 461c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.698 UTC [msp] DeserializeIdentity -> DEBU 461d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.699 UTC [msp] DeserializeIdentity -> DEBU 461e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 461f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4620 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4621 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4622 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4623 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.704 UTC [cauthdsl] func1 -> DEBU 4625 0xc0037151a0 gate 1569287141704048100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.704 UTC [cauthdsl] func2 -> DEBU 4626 0xc0037151a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.704 UTC [cauthdsl] func2 -> DEBU 4627 0xc0037151a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.705 UTC [cauthdsl] func2 -> DEBU 4628 0xc0037151a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.705 UTC [cauthdsl] func2 -> DEBU 4629 0xc0037151a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.705 UTC [cauthdsl] func1 -> DEBU 462a 0xc0037151a0 gate 1569287141704048100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.705 UTC [policies] Evaluate -> DEBU 462b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.706 UTC [policies] Evaluate -> DEBU 462c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.707 UTC [policies] Evaluate -> DEBU 462d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.707 UTC [cauthdsl] func1 -> DEBU 462e 0xc0037159e0 gate 1569287141707456400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 462f 0xc0037159e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 4630 0xc0037159e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 4631 0xc0037159e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.709 UTC [cauthdsl] func2 -> DEBU 4632 0xc0037159e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.710 UTC [cauthdsl] func1 -> DEBU 4633 0xc0037159e0 gate 1569287141707456400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.710 UTC [policies] Evaluate -> DEBU 4634 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.710 UTC [policies] Evaluate -> DEBU 4635 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.711 UTC [policies] Evaluate -> DEBU 4636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.711 UTC [cauthdsl] func1 -> DEBU 4637 0xc00372a220 gate 1569287141711467900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.712 UTC [cauthdsl] func2 -> DEBU 4638 0xc00372a220 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.713 UTC [cauthdsl] func2 -> DEBU 4639 0xc00372a220 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.714 UTC [cauthdsl] func2 -> DEBU 463a 0xc00372a220 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.715 UTC [msp.identity] Verify -> DEBU 463b Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:41.715 UTC [msp.identity] Verify -> DEBU 463c Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:41.716 UTC [cauthdsl] func2 -> DEBU 463d 0xc00372a220 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.716 UTC [cauthdsl] func1 -> DEBU 463e 0xc00372a220 gate 1569287141711467900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.717 UTC [policies] Evaluate -> DEBU 463f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.717 UTC [policies] Evaluate -> DEBU 4640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.718 UTC [policies] Evaluate -> DEBU 4641 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.718 UTC [policies] Evaluate -> DEBU 4642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.718 UTC [gossip.gossip] handleMessage -> DEBU 4643 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.719 UTC [gossip.gossip] handleMessage -> DEBU 4644 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.719 UTC [msp] DeserializeIdentity -> DEBU 4645 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.719 UTC [msp] DeserializeIdentity -> DEBU 4646 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.720 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.722 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.722 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.723 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.723 UTC [cauthdsl] func1 -> DEBU 464e 0xc00372bd30 gate 1569287141723289700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 464f 0xc00372bd30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 4650 0xc00372bd30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 4651 0xc00372bd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.724 UTC [cauthdsl] func2 -> DEBU 4652 0xc00372bd30 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.725 UTC [cauthdsl] func1 -> DEBU 4653 0xc00372bd30 gate 1569287141723289700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.725 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.726 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.726 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.726 UTC [cauthdsl] func1 -> DEBU 4657 0xc003744570 gate 1569287141726708300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.726 UTC [cauthdsl] func2 -> DEBU 4658 0xc003744570 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 4659 0xc003744570 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 465a 0xc003744570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 465b 0xc003744570 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.728 UTC [cauthdsl] func1 -> DEBU 465c 0xc003744570 gate 1569287141726708300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.728 UTC [policies] Evaluate -> DEBU 465f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.728 UTC [gossip.election] waitForInterrupt -> DEBU 465d d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.732 UTC [gossip.election] IsLeader -> DEBU 4660 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:41.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 4661 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:41.733 UTC [msp.identity] Sign -> DEBU 4662 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510101801 " +peer0.org1.example.com | "2019-09-24 01:05:41.733 UTC [msp.identity] Sign -> DEBU 4663 Sign: digest: 740CFEDA073FC3B70460A8930376A395A79C056501F0C94824D114E1C60A9B09 " +peer0.org1.example.com | "2019-09-24 01:05:41.734 UTC [gossip.election] waitForInterrupt -> DEBU 4664 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:41.728 UTC [msp] DeserializeIdentity -> DEBU 465e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.735 UTC [msp] DeserializeIdentity -> DEBU 4665 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.735 UTC [gossip.pull] Hello -> DEBU 4666 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:41.736 UTC [msp] DeserializeIdentity -> DEBU 4667 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.736 UTC [msp] DeserializeIdentity -> DEBU 4668 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.737 UTC [gossip.comm] Send -> DEBU 4669 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:41.737 UTC [gossip.comm] sendToEndpoint -> DEBU 466a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.738 UTC [gossip.comm] sendToEndpoint -> DEBU 466b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.738 UTC [msp] DeserializeIdentity -> DEBU 466c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.739 UTC [msp] DeserializeIdentity -> DEBU 466d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.739 UTC [msp] DeserializeIdentity -> DEBU 466e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.740 UTC [msp] DeserializeIdentity -> DEBU 466f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.740 UTC [gossip.comm] Send -> DEBU 4670 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:41.742 UTC [msp] DeserializeIdentity -> DEBU 4671 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.743 UTC [msp] DeserializeIdentity -> DEBU 4672 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.743 UTC [gossip.comm] sendToEndpoint -> DEBU 4673 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.744 UTC [gossip.comm] sendToEndpoint -> DEBU 4674 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.729 UTC [policies] Evaluate -> DEBU 4675 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.745 UTC [policies] Evaluate -> DEBU 4676 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.746 UTC [cauthdsl] func1 -> DEBU 4677 0xc003744db0 gate 1569287141745892100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.746 UTC [cauthdsl] func2 -> DEBU 4678 0xc003744db0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.747 UTC [cauthdsl] func2 -> DEBU 4679 0xc003744db0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.747 UTC [cauthdsl] func2 -> DEBU 467a 0xc003744db0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.748 UTC [msp.identity] Verify -> DEBU 467b Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:41.749 UTC [msp.identity] Verify -> DEBU 467c Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:41.749 UTC [cauthdsl] func2 -> DEBU 467d 0xc003744db0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.749 UTC [cauthdsl] func1 -> DEBU 467e 0xc003744db0 gate 1569287141745892100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 467f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 4680 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 4681 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.751 UTC [policies] Evaluate -> DEBU 4682 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.751 UTC [msp.identity] Verify -> DEBU 4683 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:41.753 UTC [msp.identity] Verify -> DEBU 4684 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:41.754 UTC [msp.identity] Verify -> DEBU 4685 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:41.754 UTC [msp.identity] Verify -> DEBU 4686 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:41.755 UTC [msp] DeserializeIdentity -> DEBU 4687 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.755 UTC [msp] DeserializeIdentity -> DEBU 4688 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4689 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 468a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 468b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.760 UTC [cauthdsl] func1 -> DEBU 468f 0xc0040c93c0 gate 1569287141760912100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4690 0xc0040c93c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4691 0xc0040c93c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4692 0xc0040c93c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.762 UTC [cauthdsl] func2 -> DEBU 4693 0xc0040c93c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.762 UTC [cauthdsl] func1 -> DEBU 4694 0xc0040c93c0 gate 1569287141760912100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.762 UTC [policies] Evaluate -> DEBU 4695 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.762 UTC [policies] Evaluate -> DEBU 4696 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.763 UTC [policies] Evaluate -> DEBU 4697 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.763 UTC [cauthdsl] func1 -> DEBU 4698 0xc0040c9c00 gate 1569287141763693700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 4699 0xc0040c9c00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 469a 0xc0040c9c00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 469b 0xc0040c9c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.765 UTC [cauthdsl] func2 -> DEBU 469c 0xc0040c9c00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.765 UTC [cauthdsl] func1 -> DEBU 469d 0xc0040c9c00 gate 1569287141763693700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.766 UTC [policies] Evaluate -> DEBU 469e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.766 UTC [policies] Evaluate -> DEBU 469f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func1 -> DEBU 46a1 0xc0040dc440 gate 1569287141768069300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a2 0xc0040dc440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a3 0xc0040dc440 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a4 0xc0040dc440 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [msp.identity] Verify -> DEBU 46a5 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [msp.identity] Verify -> DEBU 46a6 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a7 0xc0040dc440 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [cauthdsl] func1 -> DEBU 46a8 0xc0040dc440 gate 1569287141768069300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46a9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46ab Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [gossip.gossip] handleMessage -> DEBU 46ad Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [gossip.gossip] handleMessage -> DEBU 46ae Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46af Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46b0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46b3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46b4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46b8 0xc0040ddf50 gate 1569287141769000800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46b9 0xc0040ddf50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46ba 0xc0040ddf50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46bb 0xc0040ddf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46bc 0xc0040ddf50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46bd 0xc0040ddf50 gate 1569287141769000800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46c1 0xc0040f0790 gate 1569287141769300500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c2 0xc0040f0790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c3 0xc0040f0790 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c4 0xc0040f0790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c5 0xc0040f0790 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46c6 0xc0040f0790 gate 1569287141769300500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46ca 0xc0040f0fd0 gate 1569287141769591500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cb 0xc0040f0fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cc 0xc0040f0fd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cd 0xc0040f0fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [msp.identity] Verify -> DEBU 46ce Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [msp.identity] Verify -> DEBU 46cf Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46d0 0xc0040f0fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46d1 0xc0040f0fd0 gate 1569287141769591500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [policies] Evaluate -> DEBU 46d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d6 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d7 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d8 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d9 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:41.770 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.779 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46dd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.782 UTC [cauthdsl] func1 -> DEBU 46e2 0xc0041055e0 gate 1569287141782180300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.782 UTC [cauthdsl] func2 -> DEBU 46e3 0xc0041055e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e4 0xc0041055e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e5 0xc0041055e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e6 0xc0041055e0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.783 UTC [cauthdsl] func1 -> DEBU 46e7 0xc0041055e0 gate 1569287141782180300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.784 UTC [policies] Evaluate -> DEBU 46e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.784 UTC [policies] Evaluate -> DEBU 46e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.785 UTC [policies] Evaluate -> DEBU 46ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.785 UTC [cauthdsl] func1 -> DEBU 46eb 0xc004105e20 gate 1569287141785662500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ec 0xc004105e20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ed 0xc004105e20 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ee 0xc004105e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ef 0xc004105e20 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func1 -> DEBU 46f0 0xc004105e20 gate 1569287141785662500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func1 -> DEBU 46f4 0xc00411c660 gate 1569287141786387200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f5 0xc00411c660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00411c660 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00411c660 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [msp.identity] Verify -> DEBU 46f8 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [msp.identity] Verify -> DEBU 46f9 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46fa 0xc00411c660 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [cauthdsl] func1 -> DEBU 46fb 0xc00411c660 gate 1569287141786387200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4700 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4701 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [gossip.pull] HandleMessage -> DEBU 4702 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4703 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.838 UTC [gossip.gossip] handleMessage -> DEBU 4704 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.839 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.841 UTC [msp] DeserializeIdentity -> DEBU 4706 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:41.842 UTC [gossip.gossip] handleMessage -> DEBU 4707 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:41.865 UTC [gossip.gossip] handleMessage -> DEBU 4708 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.865 UTC [gossip.pull] HandleMessage -> DEBU 4709 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:41.865 UTC [gossip.pull] SendDigest -> DEBU 470a Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:41.866 UTC [gossip.gossip] handleMessage -> DEBU 470b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.042 UTC [gossip.comm] func1 -> DEBU 470c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.043 UTC [gossip.gossip] handleMessage -> DEBU 470d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.043 UTC [msp] DeserializeIdentity -> DEBU 470e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.044 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.044 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.045 UTC [gossip.gossip] handleMessage -> DEBU 4711 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.240 UTC [gossip.comm] func1 -> DEBU 4712 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.240 UTC [gossip.gossip] handleMessage -> DEBU 4713 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.241 UTC [msp] DeserializeIdentity -> DEBU 4714 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.241 UTC [msp] DeserializeIdentity -> DEBU 4715 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.242 UTC [msp] DeserializeIdentity -> DEBU 4716 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.243 UTC [gossip.gossip] handleMessage -> DEBU 4717 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.492 UTC [gossip.gossip] handleMessage -> DEBU 4718 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.493 UTC [gossip.pull] HandleMessage -> DEBU 4719 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.494 UTC [gossip.pull] SendDigest -> DEBU 471a Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:42.495 UTC [gossip.gossip] handleMessage -> DEBU 471b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.524 UTC [gossip.gossip] handleMessage -> DEBU 471c Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:Y=a\244\235" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.525 UTC [gossip.gossip] handleMessage -> DEBU 471d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 471e Got message: GossipMessage: tag:EMPTY mem_req:Y=a\244\235" > > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 471f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.527 UTC [msp.identity] Verify -> DEBU 4720 Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +peer0.org1.example.com | 00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +peer0.org1.example.com | "2019-09-24 01:05:42.529 UTC [msp.identity] Verify -> DEBU 4721 Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +peer0.org1.example.com | 00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +peer0.org1.example.com | 00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +peer0.org1.example.com | 00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +peer0.org1.example.com | 00000040 1e 77 26 bb 94 c9 |.w&...|" +peer0.org1.example.com | "2019-09-24 01:05:42.531 UTC [msp.identity] Verify -> DEBU 4722 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:42.531 UTC [msp.identity] Verify -> DEBU 4723 Verify: sig = 00000000 30 45 02 21 00 c6 9e 9e 8f 9e 1f cd 26 02 96 9f |0E.!........&...| +peer0.org1.example.com | 00000010 b7 76 41 a5 71 31 d1 d4 a9 11 20 0c 2d af c6 81 |.vA.q1.... .-...| +peer0.org1.example.com | 00000020 c4 a3 1f 14 d9 02 20 71 02 8b 6b 75 12 48 a9 00 |...... q..ku.H..| +peer0.org1.example.com | 00000030 61 f7 93 0e 6d ca cb 4e 7d fe 6d d1 2a 86 4e bc |a...m..N}.m.*.N.| +peer0.org1.example.com | 00000040 71 3e 59 3d 61 a4 9d |q>Y=a..|" +peer0.org1.example.com | "2019-09-24 01:05:42.532 UTC [gossip.discovery] handleAliveMessage -> DEBU 4724 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4725 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4726 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4727 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4728 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 4729 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 472a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.534 UTC [gossip.discovery] sendMemResponse -> DEBU 472b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:42.535 UTC [msp] DeserializeIdentity -> DEBU 472c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.535 UTC [msp] DeserializeIdentity -> DEBU 472d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.535 UTC [gossip.comm] Send -> DEBU 472e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.536 UTC [gossip.discovery] sendMemResponse -> DEBU 472f Exiting, replying with alive:Y=a\244\235" > > alive: " +peer0.org1.example.com | "2019-09-24 01:05:42.536 UTC [gossip.comm] sendToEndpoint -> DEBU 4730 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.536 UTC [gossip.comm] sendToEndpoint -> DEBU 4731 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4732 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.856 UTC [gossip.comm] func1 -> DEBU 4733 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.857 UTC [gossip.gossip] handleMessage -> DEBU 4734 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.857 UTC [gossip.pull] HandleMessage -> DEBU 4735 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4736 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4737 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4738 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.861 UTC [msp] DeserializeIdentity -> DEBU 4739 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.862 UTC [msp] DeserializeIdentity -> DEBU 473a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.862 UTC [msp] DeserializeIdentity -> DEBU 473b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.862 UTC [gossip.pull] SendDigest -> DEBU 473c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:42.863 UTC [gossip.gossip] handleMessage -> DEBU 473d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.866 UTC [gossip.comm] func1 -> DEBU 473e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.867 UTC [gossip.gossip] handleMessage -> DEBU 473f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.870 UTC [gossip.gossip] handleMessage -> DEBU 4740 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4741 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4742 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.871 UTC [msp] DeserializeIdentity -> DEBU 4743 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4744 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:42.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4745 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4746 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.874 UTC [policies] Evaluate -> DEBU 4747 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.875 UTC [policies] Evaluate -> DEBU 4748 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:42.876 UTC [policies] Evaluate -> DEBU 4749 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.877 UTC [cauthdsl] func1 -> DEBU 474a 0xc004050300 gate 1569287142877328100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.877 UTC [cauthdsl] func2 -> DEBU 474b 0xc004050300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474c 0xc004050300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474d 0xc004050300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474e 0xc004050300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.879 UTC [cauthdsl] func1 -> DEBU 474f 0xc004050300 gate 1569287142877328100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.880 UTC [policies] Evaluate -> DEBU 4750 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.880 UTC [policies] Evaluate -> DEBU 4751 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.881 UTC [policies] Evaluate -> DEBU 4752 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.881 UTC [cauthdsl] func1 -> DEBU 4753 0xc004050b40 gate 1569287142881205000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.881 UTC [cauthdsl] func2 -> DEBU 4754 0xc004050b40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.882 UTC [cauthdsl] func2 -> DEBU 4755 0xc004050b40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.883 UTC [cauthdsl] func2 -> DEBU 4756 0xc004050b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.883 UTC [cauthdsl] func2 -> DEBU 4757 0xc004050b40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.883 UTC [cauthdsl] func1 -> DEBU 4758 0xc004050b40 gate 1569287142881205000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 4759 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 475a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 475b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.902 UTC [cauthdsl] func1 -> DEBU 475c 0xc004051380 gate 1569287142902808800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475d 0xc004051380 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475e 0xc004051380 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475f 0xc004051380 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [msp.identity] Verify -> DEBU 4760 Verify: digest = 00000000 1e 58 1f fd 58 15 86 f0 88 40 39 67 29 4a 2c be |.X..X....@9g)J,.| +peer0.org1.example.com | 00000010 e7 d3 44 a7 7d 48 4a d1 47 d1 ea 87 f3 56 1e af |..D.}HJ.G....V..|" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [msp.identity] Verify -> DEBU 4761 Verify: sig = 00000000 30 44 02 20 0d e6 50 29 de 95 fd 84 00 24 0d f8 |0D. ..P).....$..| +peer0.org1.example.com | 00000010 ae 4d 85 8e e6 d7 3d 6b d7 06 e7 c8 32 e2 97 d3 |.M....=k....2...| +peer0.org1.example.com | 00000020 b7 59 dd 1d 02 20 48 84 ef c0 5e 0a 3b 46 aa c1 |.Y... H...^.;F..| +peer0.org1.example.com | 00000030 8b 35 4f b7 86 3b 1b 5a 5d 9d 98 7e fa 50 6d a9 |.5O..;.Z]..~.Pm.| +peer0.org1.example.com | 00000040 2e f5 61 fe b2 4c |..a..L|" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [cauthdsl] func2 -> DEBU 4762 0xc004051380 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [cauthdsl] func1 -> DEBU 4763 0xc004051380 gate 1569287142902808800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4764 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4766 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4768 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 4769 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476a updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476b Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 476e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 476f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] sendMemResponse -> DEBU 4770 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4771 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4772 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4773 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.comm] Send -> DEBU 4774 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.903 UTC [gossip.discovery] sendMemResponse -> DEBU 4775 Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4776 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4777 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.comm] func1 -> DEBU 4778 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.gossip] handleMessage -> DEBU 4779 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.gossip] handleMessage -> DEBU 477a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 477b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 477c Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [msp] DeserializeIdentity -> DEBU 477d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 477e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 477f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4780 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4781 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4782 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 4784 0xc004061f50 gate 1569287142904729500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4785 0xc004061f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4786 0xc004061f50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4787 0xc004061f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4788 0xc004061f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 4789 0xc004061f50 gate 1569287142904729500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 478d 0xc004086790 gate 1569287142904985400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 478e 0xc004086790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 478f 0xc004086790 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 4790 0xc004086790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 4791 0xc004086790 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [cauthdsl] func1 -> DEBU 4792 0xc004086790 gate 1569287142904985400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.867 UTC [gossip.comm] func1 -> DEBU 4793 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.911 UTC [gossip.gossip] handleMessage -> DEBU 4794 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.912 UTC [gossip.pull] HandleMessage -> DEBU 4795 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4796 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4797 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4798 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 4799 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 479a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 479b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.913 UTC [gossip.pull] SendDigest -> DEBU 479c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:42.913 UTC [gossip.gossip] handleMessage -> DEBU 479d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.916 UTC [msp] GetDefaultSigningIdentity -> DEBU 479e Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 479f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151034 " +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a0 Sign: digest: 0A592601F0C26BE053997727180E5831F0747796E496F26C2865525B60DDD97A " +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp] GetDefaultSigningIdentity -> DEBU 47a1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a4 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp] DeserializeIdentity -> DEBU 47a5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [msp] DeserializeIdentity -> DEBU 47a7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a8 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] sendToEndpoint -> DEBU 47a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] sendToEndpoint -> DEBU 47aa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.pull] Hello -> DEBU 47ab Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47ac Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.pull] Hello -> DEBU 47ad Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.pull] Hello -> DEBU 47af Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] Send -> DEBU 47b0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47ba Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.932 UTC [gossip.comm] func1 -> DEBU 47bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.933 UTC [gossip.comm] func1 -> DEBU 47bc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.933 UTC [gossip.gossip] handleMessage -> DEBU 47bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.934 UTC [gossip.comm] func1 -> DEBU 47be Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.934 UTC [gossip.comm] func1 -> DEBU 47bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.905 UTC [policies] Evaluate -> DEBU 47c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [policies] Evaluate -> DEBU 47c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [policies] Evaluate -> DEBU 47c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [cauthdsl] func1 -> DEBU 47c3 0xc004086fd0 gate 1569287142935872100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c4 0xc004086fd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c5 0xc004086fd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c6 0xc004086fd0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [msp.identity] Verify -> DEBU 47c7 Verify: digest = 00000000 fc da f1 d7 a9 4a 40 a2 b4 91 8b f6 95 af bf 1d |.....J@.........| +peer0.org1.example.com | 00000010 42 da f1 ee 1b f8 e4 20 64 94 6d 37 57 75 05 ef |B...... d.m7Wu..|" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [msp.identity] Verify -> DEBU 47c8 Verify: sig = 00000000 30 45 02 21 00 8d 0b 5b 7b f0 d9 44 2b ad 3b 39 |0E.!...[{..D+.;9| +peer0.org1.example.com | 00000010 46 ca 1a cd 1d 99 c0 ae 08 2c 62 b8 6b 65 fa 10 |F........,b.ke..| +peer0.org1.example.com | 00000020 99 be dc c2 32 02 20 2a 98 f2 2b 91 a7 9f 8d d8 |....2. *..+.....| +peer0.org1.example.com | 00000030 4a 9a 7d 2c 9d 21 9e 41 5d 6c 1f 93 4d 93 d9 65 |J.},.!.A]l..M..e| +peer0.org1.example.com | 00000040 38 ec b5 7d 0b 41 1f |8..}.A.|" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [cauthdsl] func2 -> DEBU 47c9 0xc004086fd0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [cauthdsl] func1 -> DEBU 47ca 0xc004086fd0 gate 1569287142935872100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 47cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d1 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d2 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 47d5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.937 UTC [gossip.discovery] sendMemResponse -> DEBU 47d6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.938 UTC [gossip.comm] Send -> DEBU 47da Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:42.939 UTC [gossip.discovery] sendMemResponse -> DEBU 47db Exiting, replying with alive: alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 47dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 47dd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47de Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47e1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [msp] DeserializeIdentity -> DEBU 47e2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47e4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47e5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [cauthdsl] func1 -> DEBU 47e9 0xc00419f050 gate 1569287142943745300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ea 0xc00419f050 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47eb 0xc00419f050 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ec 0xc00419f050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ed 0xc00419f050 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47ee 0xc00419f050 gate 1569287142943745300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47ef Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47f2 0xc00419f890 gate 1569287142944195400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f3 0xc00419f890 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f4 0xc00419f890 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f5 0xc00419f890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f6 0xc00419f890 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47f7 0xc00419f890 gate 1569287142944195400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47fb 0xc0041c00d0 gate 1569287142944590300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47fc 0xc0041c00d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.942 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 47fd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.945 UTC [gossip.pull] HandleMessage -> DEBU 47fe GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 47ff Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 4800 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [gossip.pull] HandleMessage -> DEBU 4801 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [gossip.gossip] handleMessage -> DEBU 4802 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [gossip.gossip] handleMessage -> DEBU 4803 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 4804 0xc0041c00d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [cauthdsl] func2 -> DEBU 4805 0xc0041c00d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [msp.identity] Verify -> DEBU 4806 Verify: digest = 00000000 fc da f1 d7 a9 4a 40 a2 b4 91 8b f6 95 af bf 1d |.....J@.........| +peer0.org1.example.com | 00000010 42 da f1 ee 1b f8 e4 20 64 94 6d 37 57 75 05 ef |B...... d.m7Wu..|" +peer0.org1.example.com | "2019-09-24 01:05:42.946 UTC [msp.identity] Verify -> DEBU 4807 Verify: sig = 00000000 30 45 02 21 00 8d 0b 5b 7b f0 d9 44 2b ad 3b 39 |0E.!...[{..D+.;9| +peer0.org1.example.com | 00000010 46 ca 1a cd 1d 99 c0 ae 08 2c 62 b8 6b 65 fa 10 |F........,b.ke..| +peer0.org1.example.com | 00000020 99 be dc c2 32 02 20 2a 98 f2 2b 91 a7 9f 8d d8 |....2. *..+.....| +peer0.org1.example.com | 00000030 4a 9a 7d 2c 9d 21 9e 41 5d 6c 1f 93 4d 93 d9 65 |J.},.!.A]l..M..e| +peer0.org1.example.com | 00000040 38 ec b5 7d 0b 41 1f |8..}.A.|" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [cauthdsl] func2 -> DEBU 4808 0xc0041c00d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [cauthdsl] func1 -> DEBU 4809 0xc0041c00d0 gate 1569287142944590300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 480e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 480f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4810 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4811 Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +peer0.org1.example.com | 00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4812 Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +peer0.org1.example.com | 00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +peer0.org1.example.com | 00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +peer0.org1.example.com | 00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +peer0.org1.example.com | 00000040 1e 77 26 bb 94 c9 |.w&...|" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 4813 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 4814 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4815 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +peer0.org1.example.com | 00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +peer0.org1.example.com | "2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +peer0.org1.example.com | 00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +peer0.org1.example.com | 00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +peer0.org1.example.com | 00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +peer0.org1.example.com | 00000040 6e b4 c8 cf 74 b2 |n...t.|" +peer0.org1.example.com | "2019-09-24 01:05:42.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4818 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.948 UTC [gossip.discovery] isSentByMe -> DEBU 4819 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 481a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 481b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 481c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 481d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.949 UTC [msp.identity] Verify -> DEBU 481e Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +peer0.org1.example.com | 00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +peer0.org1.example.com | "2019-09-24 01:05:42.949 UTC [msp.identity] Verify -> DEBU 481f Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +peer0.org1.example.com | 00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +peer0.org1.example.com | 00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +peer0.org1.example.com | 00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +peer0.org1.example.com | 00000040 6e b4 c8 cf 74 b2 |n...t.|" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4820 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [gossip.discovery] isSentByMe -> DEBU 4821 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4822 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4823 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [msp] DeserializeIdentity -> DEBU 4824 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4825 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4826 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4827 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4828 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4829 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 482a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 482b 0xc0041dcac0 gate 1569287142950581800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482c 0xc0041dcac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482d 0xc0041dcac0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482e 0xc0041dcac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482f 0xc0041dcac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 4830 0xc0041dcac0 gate 1569287142950581800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4831 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4833 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 4834 0xc0041dd300 gate 1569287142950907400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 4835 0xc0041dd300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 4836 0xc0041dd300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4837 0xc0041dd300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4838 0xc0041dd300 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 4839 0xc0041dd300 gate 1569287142950907400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 483d 0xc0041ddb40 gate 1569287142951236600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 483e 0xc0041ddb40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 483f 0xc0041ddb40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4840 0xc0041ddb40 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [msp.identity] Verify -> DEBU 4841 Verify: digest = 00000000 1e 58 1f fd 58 15 86 f0 88 40 39 67 29 4a 2c be |.X..X....@9g)J,.| +peer0.org1.example.com | 00000010 e7 d3 44 a7 7d 48 4a d1 47 d1 ea 87 f3 56 1e af |..D.}HJ.G....V..|" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [msp.identity] Verify -> DEBU 4842 Verify: sig = 00000000 30 44 02 20 0d e6 50 29 de 95 fd 84 00 24 0d f8 |0D. ..P).....$..| +peer0.org1.example.com | 00000010 ae 4d 85 8e e6 d7 3d 6b d7 06 e7 c8 32 e2 97 d3 |.M....=k....2...| +peer0.org1.example.com | 00000020 b7 59 dd 1d 02 20 48 84 ef c0 5e 0a 3b 46 aa c1 |.Y... H...^.;F..| +peer0.org1.example.com | 00000030 8b 35 4f b7 86 3b 1b 5a 5d 9d 98 7e fa 50 6d a9 |.5O..;.Z]..~.Pm.| +peer0.org1.example.com | 00000040 2e f5 61 fe b2 4c |..a..L|" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4843 0xc0041ddb40 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 4844 0xc0041ddb40 gate 1569287142951236600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4845 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4846 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4847 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4848 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4849 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 484a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.952 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 484b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.952 UTC [msp.identity] Verify -> DEBU 484c Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +peer0.org1.example.com | 00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +peer0.org1.example.com | "2019-09-24 01:05:42.952 UTC [msp.identity] Verify -> DEBU 484d Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +peer0.org1.example.com | 00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +peer0.org1.example.com | 00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +peer0.org1.example.com | 00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +peer0.org1.example.com | 00000040 1e 77 26 bb 94 c9 |.w&...|" +peer0.org1.example.com | "2019-09-24 01:05:42.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 484e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 484f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4850 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.949 UTC [gossip.gossip] handleMessage -> DEBU 4851 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4852 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.pull] HandleMessage -> DEBU 4853 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4854 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4855 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4856 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4857 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4858 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:42.957 UTC [msp.identity] Verify -> DEBU 4859 Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +peer0.org1.example.com | 00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +peer0.org1.example.com | "2019-09-24 01:05:42.957 UTC [msp.identity] Verify -> DEBU 485a Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +peer0.org1.example.com | 00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +peer0.org1.example.com | 00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +peer0.org1.example.com | 00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +peer0.org1.example.com | 00000040 6e b4 c8 cf 74 b2 |n...t.|" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [msp.identity] Verify -> DEBU 485b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [msp.identity] Verify -> DEBU 485c Verify: sig = 00000000 30 44 02 20 79 4d 9d 79 8c 05 e0 8d 69 6e ca 31 |0D. yM.y....in.1| +peer0.org1.example.com | 00000010 8e 1a 85 7f ec c6 f0 50 3a 31 82 a0 77 32 6c df |.......P:1..w2l.| +peer0.org1.example.com | 00000020 b7 ee 1a 80 02 20 3a ac 58 5b 37 4f 28 75 2e 11 |..... :.X[7O(u..| +peer0.org1.example.com | 00000030 bc d1 db 60 6f 63 be 0e 23 06 d5 0e 66 3d 92 a3 |...`oc..#...f=..| +peer0.org1.example.com | 00000040 7b 47 5e e3 8d 2a |{G^..*|" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 485d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [gossip.discovery] isSentByMe -> DEBU 485e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 485f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:42.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4860 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.gossip] handleMessage -> DEBU 4861 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.gossip] handleMessage -> DEBU 4862 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4863 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4864 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [msp.identity] Verify -> DEBU 4865 Verify: digest = 00000000 d5 bd e5 ef d9 d1 d3 c9 e6 35 d6 14 8d 50 c7 03 |.........5...P..| +peer0.org1.example.com | 00000010 1d 6b 32 28 66 cd 72 5d 6d ef 68 ab 9c bf b5 4b |.k2(f.r]m.h....K|" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [msp.identity] Verify -> DEBU 4866 Verify: sig = 00000000 30 44 02 20 6b d2 6f e0 48 84 1a 5c 43 51 1d 58 |0D. k.o.H..\CQ.X| +peer0.org1.example.com | 00000010 d9 59 2c 56 36 c9 f7 71 94 5f 61 d0 f5 21 3b b5 |.Y,V6..q._a..!;.| +peer0.org1.example.com | 00000020 50 1e 9b c5 02 20 2a e9 b4 45 98 d6 ed 01 df df |P.... *..E......| +peer0.org1.example.com | 00000030 3c dd e2 3f 02 6e 1c 97 c9 35 98 f5 0b c8 b4 5b |<..?.n...5.....[| +peer0.org1.example.com | 00000040 e5 85 a7 5b 95 1c |...[..|" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 4867 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 4869 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 486a Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:43.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 486b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:43.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 486c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 486d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 4870 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 4871 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:43.528 UTC [gossip.comm] Send -> DEBU 4872 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [msp] DeserializeIdentity -> DEBU 4873 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [gossip.comm] Send -> DEBU 4874 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4875 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4876 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4877 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4878 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.comm] func1 -> DEBU 4879 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.comm] func1 -> DEBU 487e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 4880 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4881 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.145 UTC [gossip.comm] func1 -> DEBU 4883 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.147 UTC [gossip.gossip] handleMessage -> DEBU 4884 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4885 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.149 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4886 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4887 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:44.151 UTC [msp] DeserializeIdentity -> DEBU 4888 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4889 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 488c Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:44.157 UTC [gossip.gossip] handleMessage -> DEBU 488a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.157 UTC [gossip.comm] func1 -> DEBU 488b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.160 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 488d Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:44.161 UTC [policies] Evaluate -> DEBU 488f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.161 UTC [policies] Evaluate -> DEBU 4890 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:44.160 UTC [gossip.comm] func1 -> DEBU 488e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.162 UTC [policies] Evaluate -> DEBU 4891 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.163 UTC [cauthdsl] func1 -> DEBU 4892 0xc00422cf90 gate 1569287144163215500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.163 UTC [gossip.comm] func1 -> DEBU 4893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.164 UTC [cauthdsl] func2 -> DEBU 4894 0xc00422cf90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.165 UTC [cauthdsl] func2 -> DEBU 4895 0xc00422cf90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.166 UTC [cauthdsl] func2 -> DEBU 4896 0xc00422cf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:44.166 UTC [cauthdsl] func2 -> DEBU 4897 0xc00422cf90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.167 UTC [cauthdsl] func1 -> DEBU 4898 0xc00422cf90 gate 1569287144163215500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.167 UTC [policies] Evaluate -> DEBU 4899 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 489a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 489b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 489c 0xc00422d7d0 gate 1569287144168572900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489d 0xc00422d7d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489e 0xc00422d7d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489f 0xc00422d7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a0 0xc00422d7d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 48a1 0xc00422d7d0 gate 1569287144168572900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 48a5 0xc004246010 gate 1569287144168819200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a6 0xc004246010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a7 0xc004246010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a8 0xc004246010 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [msp.identity] Verify -> DEBU 48a9 Verify: digest = 00000000 72 39 c3 3a 84 86 f5 12 15 bb 92 ac 9a 03 83 04 |r9.:............| +peer0.org1.example.com | 00000010 d4 73 89 06 9f be b6 b9 6e 1a 6e ae 8f 6c 10 8e |.s......n.n..l..|" +peer0.org1.example.com | "2019-09-24 01:05:44.168 UTC [msp.identity] Verify -> DEBU 48aa Verify: sig = 00000000 30 45 02 21 00 9a 5e 5b 25 b7 aa 21 48 4a 7d 98 |0E.!..^[%..!HJ}.| +peer0.org1.example.com | 00000010 f0 c8 05 7f 16 f8 57 7b a7 fd c6 bf 81 1b 79 6d |......W{......ym| +peer0.org1.example.com | 00000020 32 b1 a2 63 6e 02 20 1f c7 f3 ca 5a 6f 18 64 3e |2..cn. ....Zo.d>| +peer0.org1.example.com | 00000030 b9 20 97 45 cc 8d 16 1b bf 4d 8a 81 a8 e7 26 15 |. .E.....M....&.| +peer0.org1.example.com | 00000040 30 73 57 d2 f5 b6 ae |0sW....|" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [cauthdsl] func2 -> DEBU 48ab 0xc004246010 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [cauthdsl] func1 -> DEBU 48ac 0xc004246010 gate 1569287144168819200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48af Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 48b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b3 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b4 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 48b7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.170 UTC [gossip.gossip] handleMessage -> DEBU 48b9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.170 UTC [gossip.gossip] handleMessage -> DEBU 48ba Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bc Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [gossip.gossip] handleMessage -> DEBU 48bd Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [gossip.gossip] handleMessage -> DEBU 48be Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48c0 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [msp] DeserializeIdentity -> DEBU 48c1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:44.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48c3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48c4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48c8 0xc004260250 gate 1569287144173127300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48c9 0xc004260250 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48ca 0xc004260250 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48cb 0xc004260250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48cc 0xc004260250 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48cd 0xc004260250 gate 1569287144173127300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48d1 0xc004260a90 gate 1569287144173376300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d2 0xc004260a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d3 0xc004260a90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d4 0xc004260a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d5 0xc004260a90 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48d6 0xc004260a90 gate 1569287144173376300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48da 0xc0042612d0 gate 1569287144173624100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48db 0xc0042612d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48dc 0xc0042612d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48dd 0xc0042612d0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [msp.identity] Verify -> DEBU 48de Verify: digest = 00000000 46 42 6b 40 9e c0 72 f2 43 8e fd a7 d2 aa a5 02 |FBk@..r.C.......| +peer0.org1.example.com | 00000010 ce c9 14 db a7 c0 8d 57 81 5b 97 de cd 8a 6a 8e |.......W.[....j.|" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [msp.identity] Verify -> DEBU 48df Verify: sig = 00000000 30 45 02 21 00 bf 5e e2 cf ce 3d 08 a0 28 b7 0a |0E.!..^...=..(..| +peer0.org1.example.com | 00000010 04 6b ee db e5 b5 32 03 0c 5a 8f 15 f3 52 e2 22 |.k....2..Z...R."| +peer0.org1.example.com | 00000020 ce f5 ee b8 66 02 20 4b a4 ec e5 03 b9 14 e4 3c |....f. K.......<| +peer0.org1.example.com | 00000030 d2 64 c5 b2 0b c1 ea 1c f6 56 24 ba 43 4f 30 ed |.d.......V$.CO0.| +peer0.org1.example.com | 00000040 67 b8 1b 16 b9 78 c4 |g....x.|" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48e0 0xc0042612d0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48e1 0xc0042612d0 gate 1569287144173624100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [policies] Evaluate -> DEBU 48e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 48e6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e8 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e9 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48eb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ec Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48ed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.174 UTC [gossip.gossip] handleMessage -> DEBU 48ee Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.175 UTC [gossip.gossip] handleMessage -> DEBU 48ef Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.179 UTC [msp] DeserializeIdentity -> DEBU 48f1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.179 UTC [msp] DeserializeIdentity -> DEBU 48f2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.180 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.180 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.181 UTC [msp] DeserializeIdentity -> DEBU 48f5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.181 UTC [msp] DeserializeIdentity -> DEBU 48f6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.181 UTC [gossip.comm] Send -> DEBU 48f7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.182 UTC [msp] DeserializeIdentity -> DEBU 48f8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.183 UTC [msp] DeserializeIdentity -> DEBU 48fa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.183 UTC [gossip.comm] Send -> DEBU 48fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.183 UTC [msp] DeserializeIdentity -> DEBU 48fc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48fd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48fe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48ff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 4900 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.185 UTC [gossip.comm] Send -> DEBU 4901 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.185 UTC [msp] DeserializeIdentity -> DEBU 4902 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.185 UTC [msp] DeserializeIdentity -> DEBU 4903 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.185 UTC [gossip.comm] Send -> DEBU 4904 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4905 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4906 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.183 UTC [gossip.comm] sendToEndpoint -> DEBU 48f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4907 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4908 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 4909 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 490a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 490b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 490f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 4910 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 4911 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4912 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4913 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 4914 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:44.238 UTC [msp.identity] Sign -> DEBU 4915 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151035 " +peer0.org1.example.com | "2019-09-24 01:05:44.238 UTC [msp.identity] Sign -> DEBU 4916 Sign: digest: 89F566866FFDE77DD84B8762FA7E444D455C61AEFADC0007B8B1B9F2DD71AB5D " +peer0.org1.example.com | "2019-09-24 01:05:44.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 4917 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:44.239 UTC [msp.identity] Sign -> DEBU 4918 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:44.239 UTC [msp.identity] Sign -> DEBU 4919 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:44.239 UTC [gossip.discovery] periodicalSendAlive -> DEBU 491a Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:44.246 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.246 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.247 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.247 UTC [msp] DeserializeIdentity -> DEBU 491e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [gossip.comm] Send -> DEBU 4920 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [gossip.comm] Send -> DEBU 4922 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 4923 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 4924 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 4925 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 4926 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:44.250 UTC [gossip.comm] sendToEndpoint -> DEBU 4927 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.654 UTC [msp] DeserializeIdentity -> DEBU 4928 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.654 UTC [msp] DeserializeIdentity -> DEBU 4929 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.654 UTC [gossip.comm] Send -> DEBU 492a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.658 UTC [gossip.gossip] handleMessage -> DEBU 4931 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.659 UTC [msp.identity] Verify -> DEBU 4932 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:45.659 UTC [msp.identity] Verify -> DEBU 4933 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:45.660 UTC [msp.identity] Verify -> DEBU 4934 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:45.660 UTC [msp.identity] Verify -> DEBU 4935 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:45.660 UTC [msp] DeserializeIdentity -> DEBU 4936 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.660 UTC [msp] DeserializeIdentity -> DEBU 4937 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4939 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 493a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 493e 0xc0042c1280 gate 1569287145661559900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 493f 0xc0042c1280 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4940 0xc0042c1280 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4941 0xc0042c1280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4942 0xc0042c1280 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 4943 0xc0042c1280 gate 1569287145661559900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4944 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 4947 0xc0042c1ac0 gate 1569287145661928100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4948 0xc0042c1ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4949 0xc0042c1ac0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 494a 0xc0042c1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 494b 0xc0042c1ac0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func1 -> DEBU 494c 0xc0042c1ac0 gate 1569287145661928100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func1 -> DEBU 4950 0xc0042d0300 gate 1569287145662212200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4951 0xc0042d0300 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4952 0xc0042d0300 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4953 0xc0042d0300 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [msp.identity] Verify -> DEBU 4954 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [msp.identity] Verify -> DEBU 4955 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:45.663 UTC [gossip.comm] func1 -> DEBU 4956 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.663 UTC [gossip.comm] func1 -> DEBU 4957 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4958 0xc0042d0300 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.664 UTC [cauthdsl] func1 -> DEBU 4959 0xc0042d0300 gate 1569287145662212200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.664 UTC [policies] Evaluate -> DEBU 495a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.664 UTC [policies] Evaluate -> DEBU 495b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.665 UTC [policies] Evaluate -> DEBU 495c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.665 UTC [policies] Evaluate -> DEBU 495d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.665 UTC [msp] DeserializeIdentity -> DEBU 495e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.665 UTC [msp] DeserializeIdentity -> DEBU 495f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4960 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4961 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4962 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4963 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4964 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4965 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [cauthdsl] func1 -> DEBU 4966 0xc0042d1ad0 gate 1569287145668791900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4967 0xc0042d1ad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4968 0xc0042d1ad0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4969 0xc0042d1ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 496a 0xc0042d1ad0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 496b 0xc0042d1ad0 gate 1569287145668791900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 496f 0xc0042e6310 gate 1569287145669175600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4970 0xc0042e6310 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4971 0xc0042e6310 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4972 0xc0042e6310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4973 0xc0042e6310 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 4974 0xc0042e6310 gate 1569287145669175600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4975 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4976 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 4978 0xc0042e6b50 gate 1569287145669420300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4979 0xc0042e6b50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497a 0xc0042e6b50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497b 0xc0042e6b50 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [msp.identity] Verify -> DEBU 497c Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [msp.identity] Verify -> DEBU 497d Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497e 0xc0042e6b50 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 497f 0xc0042e6b50 gate 1569287145669420300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4980 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4982 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4983 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4984 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4985 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [msp] DeserializeIdentity -> DEBU 4986 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.669 UTC [msp] DeserializeIdentity -> DEBU 4987 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [msp] DeserializeIdentity -> DEBU 4988 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4989 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 498a Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 498b Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 498f 0xc0042f6660 gate 1569287145670345900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4990 0xc0042f6660 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4991 0xc0042f6660 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4992 0xc0042f6660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4993 0xc0042f6660 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 4994 0xc0042f6660 gate 1569287145670345900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4995 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4996 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4997 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 4998 0xc0042f6ea0 gate 1569287145670592600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4999 0xc0042f6ea0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499a 0xc0042f6ea0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499b 0xc0042f6ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499c 0xc0042f6ea0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 499d 0xc0042f6ea0 gate 1569287145670592600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 499e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 499f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 49a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 49a1 0xc0042f76e0 gate 1569287145670973400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a2 0xc0042f76e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a3 0xc0042f76e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a4 0xc0042f76e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [msp.identity] Verify -> DEBU 49a5 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [msp.identity] Verify -> DEBU 49a6 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a7 0xc0042f76e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [cauthdsl] func1 -> DEBU 49a8 0xc0042f76e0 gate 1569287145670973400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49a9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49ab Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.675 UTC [msp.identity] Verify -> DEBU 49ad Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:45.675 UTC [msp.identity] Verify -> DEBU 49ae Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:45.676 UTC [msp.identity] Verify -> DEBU 49af Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:45.676 UTC [msp.identity] Verify -> DEBU 49b0 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:45.679 UTC [msp] DeserializeIdentity -> DEBU 49b1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.680 UTC [msp] DeserializeIdentity -> DEBU 49b2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b4 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b5 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [cauthdsl] func1 -> DEBU 49b9 0xc004305cf0 gate 1569287145681423900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49ba 0xc004305cf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49bb 0xc004305cf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49bc 0xc004305cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49bd 0xc004305cf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49be 0xc004305cf0 gate 1569287145681423900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49bf Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49c2 0xc004322530 gate 1569287145682290700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c3 0xc004322530 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c4 0xc004322530 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c5 0xc004322530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c6 0xc004322530 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49c7 0xc004322530 gate 1569287145682290700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [policies] Evaluate -> DEBU 49c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [policies] Evaluate -> DEBU 49ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [cauthdsl] func1 -> DEBU 49cb 0xc004322d70 gate 1569287145683492500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49cc 0xc004322d70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49cd 0xc004322d70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49ce 0xc004322d70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.683 UTC [msp.identity] Verify -> DEBU 49cf Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [msp.identity] Verify -> DEBU 49d0 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [cauthdsl] func2 -> DEBU 49d1 0xc004322d70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [cauthdsl] func1 -> DEBU 49d2 0xc004322d70 gate 1569287145683492500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [policies] Evaluate -> DEBU 49d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [gossip.gossip] handleMessage -> DEBU 49d7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [gossip.gossip] handleMessage -> DEBU 49d8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49d9 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49da Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49dd Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49de Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49e2 0xc004330880 gate 1569287145687112700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e3 0xc004330880 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e4 0xc004330880 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e5 0xc004330880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e6 0xc004330880 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49e7 0xc004330880 gate 1569287145687112700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49eb 0xc0043310c0 gate 1569287145687441000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ec 0xc0043310c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ed 0xc0043310c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ee 0xc0043310c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ef 0xc0043310c0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func1 -> DEBU 49f0 0xc0043310c0 gate 1569287145687441000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.688 UTC [cauthdsl] func1 -> DEBU 49f4 0xc004331900 gate 1569287145688736900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f5 0xc004331900 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f6 0xc004331900 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f7 0xc004331900 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.689 UTC [msp.identity] Verify -> DEBU 49f8 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:45.689 UTC [msp.identity] Verify -> DEBU 49f9 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [cauthdsl] func2 -> DEBU 49fa 0xc004331900 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [cauthdsl] func1 -> DEBU 49fb 0xc004331900 gate 1569287145688736900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fe Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a00 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a01 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a02 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a03 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [msp] DeserializeIdentity -> DEBU 4a04 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [msp] DeserializeIdentity -> DEBU 4a05 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a07 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a08 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc004341f10 gate 1569287145691569600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc004341f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc004341f10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc004341f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a10 0xc004341f10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a11 0xc004341f10 gate 1569287145691569600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a15 0xc004366750 gate 1569287145691860000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a16 0xc004366750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a17 0xc004366750 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a18 0xc004366750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a19 0xc004366750 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a1a 0xc004366750 gate 1569287145691860000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a1e 0xc004366f90 gate 1569287145692223500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a1f 0xc004366f90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a20 0xc004366f90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a21 0xc004366f90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [msp.identity] Verify -> DEBU 4a22 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [msp.identity] Verify -> DEBU 4a23 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a24 0xc004366f90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a25 0xc004366f90 gate 1569287145692223500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a28 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:45.692 UTC [gossip.gossip] handleMessage -> DEBU 4a2a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.738 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.742 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.743 UTC [gossip.pull] Hello -> DEBU 4a2d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:45.745 UTC [msp] DeserializeIdentity -> DEBU 4a2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.745 UTC [msp] DeserializeIdentity -> DEBU 4a2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.746 UTC [gossip.comm] Send -> DEBU 4a30 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:45.746 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.747 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.750 UTC [gossip.gossip] handleMessage -> DEBU 4a33 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.751 UTC [gossip.pull] HandleMessage -> DEBU 4a34 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.751 UTC [gossip.gossip] handleMessage -> DEBU 4a35 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.844 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.850 UTC [msp] DeserializeIdentity -> DEBU 4a37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.850 UTC [msp] DeserializeIdentity -> DEBU 4a38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:45.853 UTC [gossip.gossip] handleMessage -> DEBU 4a39 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:45.865 UTC [gossip.gossip] handleMessage -> DEBU 4a3a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.866 UTC [gossip.pull] HandleMessage -> DEBU 4a3b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:45.866 UTC [gossip.pull] SendDigest -> DEBU 4a3c Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:45.866 UTC [gossip.gossip] handleMessage -> DEBU 4a3d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.040 UTC [gossip.comm] func1 -> DEBU 4a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.041 UTC [gossip.gossip] handleMessage -> DEBU 4a3f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.041 UTC [msp] DeserializeIdentity -> DEBU 4a40 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.042 UTC [msp] DeserializeIdentity -> DEBU 4a41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.042 UTC [msp] DeserializeIdentity -> DEBU 4a42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.042 UTC [gossip.gossip] handleMessage -> DEBU 4a43 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [gossip.comm] func1 -> DEBU 4a44 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [gossip.gossip] handleMessage -> DEBU 4a45 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a46 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a47 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a48 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.241 UTC [gossip.gossip] handleMessage -> DEBU 4a49 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.493 UTC [gossip.gossip] handleMessage -> DEBU 4a4a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.493 UTC [gossip.pull] HandleMessage -> DEBU 4a4b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.493 UTC [gossip.pull] SendDigest -> DEBU 4a4c Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:46.493 UTC [gossip.gossip] handleMessage -> DEBU 4a4d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [gossip.gossip] handleMessage -> DEBU 4a4e Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [gossip.gossip] handleMessage -> DEBU 4a4f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a50 Got message: GossipMessage: tag:EMPTY mem_req:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a51 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a52 Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +peer0.org1.example.com | 00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a53 Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +peer0.org1.example.com | 00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +peer0.org1.example.com | 00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +peer0.org1.example.com | 00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +peer0.org1.example.com | 00000040 e4 6b 15 e0 e8 e4 |.k....|" +peer0.org1.example.com | "2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a54 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:46.531 UTC [msp.identity] Verify -> DEBU 4a55 Verify: sig = 00000000 30 44 02 20 39 6d 2d 6d dd 3c 60 9d 83 5e 16 02 |0D. 9m-m.<`..^..| +peer0.org1.example.com | 00000010 0a 56 d9 c3 45 ea 9f e7 45 c1 f6 13 3e 8c c8 7e |.V..E...E...>..~| +peer0.org1.example.com | 00000020 84 09 8f cf 02 20 13 42 0f 1c a6 63 b8 06 4d 6a |..... .B...c..Mj| +peer0.org1.example.com | 00000030 7a b9 75 31 f4 f4 e8 da 4c 26 8d 87 bd 6f 4b 70 |z.u1....L&...oKp| +peer0.org1.example.com | 00000040 5e 2a 43 e7 99 ba |^*C...|" +peer0.org1.example.com | "2019-09-24 01:05:46.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:46.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a58 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a59 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a5b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a5c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a5d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] sendMemResponse -> DEBU 4a5e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [msp] DeserializeIdentity -> DEBU 4a5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [msp] DeserializeIdentity -> DEBU 4a60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.comm] Send -> DEBU 4a61 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.discovery] sendMemResponse -> DEBU 4a62 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > alive: " +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.comm] sendToEndpoint -> DEBU 4a63 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.535 UTC [gossip.comm] sendToEndpoint -> DEBU 4a64 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.736 UTC [gossip.election] waitForInterrupt -> DEBU 4a65 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.736 UTC [gossip.election] IsLeader -> DEBU 4a66 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:46.736 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a67 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:46.736 UTC [msp.identity] Sign -> DEBU 4a68 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510111801 " +peer0.org1.example.com | "2019-09-24 01:05:46.736 UTC [msp.identity] Sign -> DEBU 4a69 Sign: digest: 075313BF4445762D432EF13F5431A5C5529AE7D54745CC05E5657CCD5C8237EF " +peer0.org1.example.com | "2019-09-24 01:05:46.737 UTC [gossip.election] waitForInterrupt -> DEBU 4a6a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [gossip.comm] Send -> DEBU 4a6f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a70 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a71 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [gossip.comm] sendToEndpoint -> DEBU 4a72 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.739 UTC [gossip.comm] sendToEndpoint -> DEBU 4a73 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.857 UTC [gossip.comm] func1 -> DEBU 4a74 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.857 UTC [gossip.gossip] handleMessage -> DEBU 4a75 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.857 UTC [gossip.pull] HandleMessage -> DEBU 4a76 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.857 UTC [msp] DeserializeIdentity -> DEBU 4a77 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.858 UTC [msp] DeserializeIdentity -> DEBU 4a78 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.858 UTC [msp] DeserializeIdentity -> DEBU 4a79 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.840 UTC [msp] DeserializeIdentity -> DEBU 4a7a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.841 UTC [msp] DeserializeIdentity -> DEBU 4a7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.842 UTC [msp] DeserializeIdentity -> DEBU 4a7c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.842 UTC [gossip.pull] SendDigest -> DEBU 4a7d Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:46.844 UTC [gossip.gossip] handleMessage -> DEBU 4a7e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.845 UTC [gossip.comm] func1 -> DEBU 4a7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.852 UTC [gossip.gossip] handleMessage -> DEBU 4a80 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.861 UTC [gossip.gossip] handleMessage -> DEBU 4a81 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a83 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.871 UTC [msp] DeserializeIdentity -> DEBU 4a84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a86 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a87 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a8b 0xc0043b9840 gate 1569287146874546000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8c 0xc0043b9840 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8d 0xc0043b9840 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8e 0xc0043b9840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8f 0xc0043b9840 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a90 0xc0043b9840 gate 1569287146874546000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a91 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a94 0xc0043ea080 gate 1569287146874861100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a95 0xc0043ea080 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a96 0xc0043ea080 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a97 0xc0043ea080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a98 0xc0043ea080 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func1 -> DEBU 4a99 0xc0043ea080 gate 1569287146874861100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func1 -> DEBU 4a9d 0xc0043ea8c0 gate 1569287146875558600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc0043ea8c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc0043ea8c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc0043ea8c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [msp.identity] Verify -> DEBU 4aa1 Verify: digest = 00000000 73 28 4c 14 a7 72 65 05 46 77 5c 1a a0 cb 81 55 |s(L..re.Fw\....U| +peer0.org1.example.com | 00000010 ee 95 08 55 88 00 01 1f 5f 82 1a df 8f 6d ce 89 |...U...._....m..|" +peer0.org1.example.com | "2019-09-24 01:05:46.875 UTC [msp.identity] Verify -> DEBU 4aa2 Verify: sig = 00000000 30 44 02 20 44 fb 18 ba 8c 1d e1 c5 40 ed fe 3c |0D. D.......@..<| +peer0.org1.example.com | 00000010 70 3c f9 63 e7 19 ab 47 a3 05 74 56 f4 c0 ce 5b |p<.c...G..tV...[| +peer0.org1.example.com | 00000020 bf 35 88 8e 02 20 39 40 15 31 33 2f d1 05 38 68 |.5... 9@.13/..8h| +peer0.org1.example.com | 00000030 cd 58 0e c0 1d a6 a7 03 36 dd 88 29 1a 16 58 e9 |.X......6..)..X.| +peer0.org1.example.com | 00000040 33 c1 56 21 b8 77 |3.V!.w|" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [cauthdsl] func2 -> DEBU 4aa3 0xc0043ea8c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [cauthdsl] func1 -> DEBU 4aa4 0xc0043ea8c0 gate 1569287146875558600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa7 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 4aa9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aaa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aab updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.881 UTC [gossip.comm] func1 -> DEBU 4aac Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.882 UTC [gossip.gossip] handleMessage -> DEBU 4aad Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aae Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aaf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:46.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ab0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab1 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [msp.identity] Sign -> DEBU 4ab5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151036 " +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [msp.identity] Sign -> DEBU 4ab6 Sign: digest: 20781E8C0D3DA179EFFD34C1ACEACE8C4F7C935980AE40FA7B16512F8B5AEE83 " +peer0.org1.example.com | "2019-09-24 01:05:46.885 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab7 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:46.885 UTC [msp.identity] Sign -> DEBU 4ab8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:46.885 UTC [msp.identity] Sign -> DEBU 4ab9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [gossip.discovery] sendMemResponse -> DEBU 4ab4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:46.887 UTC [gossip.pull] Hello -> DEBU 4aba Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:46.888 UTC [gossip.gossip] handleMessage -> DEBU 4abb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.890 UTC [gossip.comm] func1 -> DEBU 4abc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [gossip.gossip] handleMessage -> DEBU 4ac0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [gossip.pull] HandleMessage -> DEBU 4ac1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac7 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.pull] SendDigest -> DEBU 4ac8 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.gossip] handleMessage -> DEBU 4ac9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.890 UTC [gossip.comm] Send -> DEBU 4abd Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4aca Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4acb Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4acc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4acd Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 4ace Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 4acf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.890 UTC [msp] DeserializeIdentity -> DEBU 4abe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ad1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4ad2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.discovery] sendMemResponse -> DEBU 4ad3 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.891 UTC [gossip.comm] Send -> DEBU 4abf Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.pull] Hello -> DEBU 4ada Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] Send -> DEBU 4adb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.pull] Hello -> DEBU 4adc Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] Send -> DEBU 4add Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ade Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4adf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ae4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ae5 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.895 UTC [msp] DeserializeIdentity -> DEBU 4ae6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.895 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ae7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae8 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae9 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4aed 0xc004426910 gate 1569287146896224800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4aee 0xc004426910 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4aef 0xc004426910 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af0 0xc004426910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af1 0xc004426910 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4af2 0xc004426910 gate 1569287146896224800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4af6 0xc004427150 gate 1569287146896537600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af7 0xc004427150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af8 0xc004427150 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af9 0xc004427150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4afa 0xc004427150 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4afb 0xc004427150 gate 1569287146896537600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4aff 0xc004427990 gate 1569287146896920400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b00 0xc004427990 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b01 0xc004427990 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b02 0xc004427990 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [msp.identity] Verify -> DEBU 4b03 Verify: digest = 00000000 27 4e ab 39 e0 3e 38 28 f5 1b cc 77 95 17 6f 0f |'N.9.>8(...w..o.| +peer0.org1.example.com | 00000010 50 2a b7 62 45 27 4a ee 25 cf fe 82 28 27 67 f8 |P*.bE'J.%...('g.|" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [msp.identity] Verify -> DEBU 4b04 Verify: sig = 00000000 30 44 02 20 0f da 81 8b 80 52 67 83 ca 12 9f 89 |0D. .....Rg.....| +peer0.org1.example.com | 00000010 ec f4 bc ba da ef 35 85 fc 7b 25 c9 f5 3c f5 60 |......5..{%..<.`| +peer0.org1.example.com | 00000020 8b 8a 14 de 02 20 15 40 da 99 3f c8 2c 2e c6 38 |..... .@..?.,..8| +peer0.org1.example.com | 00000030 15 fa b7 c4 ce 49 0b 29 2e ba a5 ff e6 d5 00 0b |.....I.)........| +peer0.org1.example.com | 00000040 47 3c a9 90 34 19 |G<..4.|" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b05 0xc004427990 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [cauthdsl] func1 -> DEBU 4b06 0xc004427990 gate 1569287146896920400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b09 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.901 UTC [policies] Evaluate -> DEBU 4b0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b0b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b0c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.comm] func1 -> DEBU 4b0d Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b0e updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.gossip] handleMessage -> DEBU 4b0f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b10 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.pull] HandleMessage -> DEBU 4b11 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.gossip] handleMessage -> DEBU 4b12 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b13 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b14 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b15 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.pull] HandleMessage -> DEBU 4b17 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b18 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b19 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b16 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b1a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.904 UTC [gossip.comm] func1 -> DEBU 4b1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.904 UTC [gossip.discovery] sendMemResponse -> DEBU 4b1d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:46.904 UTC [msp] DeserializeIdentity -> DEBU 4b1e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.905 UTC [msp] DeserializeIdentity -> DEBU 4b1f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.905 UTC [msp] DeserializeIdentity -> DEBU 4b20 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.905 UTC [gossip.comm] Send -> DEBU 4b21 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:46.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b22 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [gossip.discovery] sendMemResponse -> DEBU 4b23 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4b25 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [gossip.gossip] handleMessage -> DEBU 4b26 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [gossip.gossip] handleMessage -> DEBU 4b27 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.906 UTC [msp.identity] Verify -> DEBU 4b28 Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +peer0.org1.example.com | 00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +peer0.org1.example.com | "2019-09-24 01:05:46.913 UTC [msp.identity] Verify -> DEBU 4b29 Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +peer0.org1.example.com | 00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +peer0.org1.example.com | 00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +peer0.org1.example.com | 00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +peer0.org1.example.com | 00000040 dc 05 71 c8 4f 8e |..q.O.|" +peer0.org1.example.com | "2019-09-24 01:05:46.914 UTC [msp.identity] Verify -> DEBU 4b2a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:46.914 UTC [msp.identity] Verify -> DEBU 4b2b Verify: sig = 00000000 30 44 02 20 53 05 21 b6 28 95 1d 64 6c 7f 0b b5 |0D. S.!.(..dl...| +peer0.org1.example.com | 00000010 bc e0 44 6c 36 a7 d5 6d 20 ab 25 d6 e8 ba 31 f3 |..Dl6..m .%...1.| +peer0.org1.example.com | 00000020 55 a2 d8 9f 02 20 45 1b 6f a9 14 29 03 df d8 a9 |U.... E.o..)....| +peer0.org1.example.com | 00000030 e5 7e a8 d0 1a 00 df 33 1f 95 fa b6 7a 86 31 8f |.~.....3....z.1.| +peer0.org1.example.com | 00000040 86 8f 23 9e f8 5a |..#..Z|" +peer0.org1.example.com | "2019-09-24 01:05:46.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b2c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.916 UTC [gossip.discovery] isSentByMe -> DEBU 4b2d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b2e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b2f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b31 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.917 UTC [msp.identity] Verify -> DEBU 4b32 Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +peer0.org1.example.com | 00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +peer0.org1.example.com | "2019-09-24 01:05:46.917 UTC [msp.identity] Verify -> DEBU 4b33 Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +peer0.org1.example.com | 00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +peer0.org1.example.com | 00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +peer0.org1.example.com | 00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +peer0.org1.example.com | 00000040 dc 05 71 c8 4f 8e |..q.O.|" +peer0.org1.example.com | "2019-09-24 01:05:46.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b34 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.918 UTC [gossip.discovery] isSentByMe -> DEBU 4b35 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b36 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b37 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.919 UTC [msp] DeserializeIdentity -> DEBU 4b38 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [gossip.gossip] handleMessage -> DEBU 4b3a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b3b Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b3c Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func1 -> DEBU 4b40 0xc00445b960 gate 1569287146920360100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b41 0xc00445b960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b42 0xc00445b960 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b43 0xc00445b960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b44 0xc00445b960 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [cauthdsl] func1 -> DEBU 4b45 0xc00445b960 gate 1569287146920360100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b46 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.921 UTC [cauthdsl] func1 -> DEBU 4b49 0xc0044681a0 gate 1569287146921074200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.921 UTC [cauthdsl] func2 -> DEBU 4b4a 0xc0044681a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4b 0xc0044681a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4c 0xc0044681a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4d 0xc0044681a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.922 UTC [cauthdsl] func1 -> DEBU 4b4e 0xc0044681a0 gate 1569287146921074200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func1 -> DEBU 4b52 0xc0044689e0 gate 1569287146923123000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b53 0xc0044689e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b54 0xc0044689e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b55 0xc0044689e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [msp.identity] Verify -> DEBU 4b56 Verify: digest = 00000000 73 28 4c 14 a7 72 65 05 46 77 5c 1a a0 cb 81 55 |s(L..re.Fw\....U| +peer0.org1.example.com | 00000010 ee 95 08 55 88 00 01 1f 5f 82 1a df 8f 6d ce 89 |...U...._....m..|" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [msp.identity] Verify -> DEBU 4b57 Verify: sig = 00000000 30 44 02 20 44 fb 18 ba 8c 1d e1 c5 40 ed fe 3c |0D. D.......@..<| +peer0.org1.example.com | 00000010 70 3c f9 63 e7 19 ab 47 a3 05 74 56 f4 c0 ce 5b |p<.c...G..tV...[| +peer0.org1.example.com | 00000020 bf 35 88 8e 02 20 39 40 15 31 33 2f d1 05 38 68 |.5... 9@.13/..8h| +peer0.org1.example.com | 00000030 cd 58 0e c0 1d a6 a7 03 36 dd 88 29 1a 16 58 e9 |.X......6..)..X.| +peer0.org1.example.com | 00000040 33 c1 56 21 b8 77 |3.V!.w|" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b58 0xc0044689e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [cauthdsl] func1 -> DEBU 4b59 0xc0044689e0 gate 1569287146923123000 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5c Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b5e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b5f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b60 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.925 UTC [msp.identity] Verify -> DEBU 4b61 Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +peer0.org1.example.com | 00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +peer0.org1.example.com | "2019-09-24 01:05:46.925 UTC [msp.identity] Verify -> DEBU 4b62 Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +peer0.org1.example.com | 00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +peer0.org1.example.com | 00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +peer0.org1.example.com | 00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +peer0.org1.example.com | 00000040 e4 6b 15 e0 e8 e4 |.k....|" +peer0.org1.example.com | "2019-09-24 01:05:46.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b64 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b65 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.930 UTC [gossip.comm] func1 -> DEBU 4b66 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.930 UTC [gossip.comm] func1 -> DEBU 4b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.930 UTC [gossip.gossip] handleMessage -> DEBU 4b68 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.931 UTC [gossip.pull] HandleMessage -> DEBU 4b69 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.931 UTC [gossip.gossip] handleMessage -> DEBU 4b6a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.931 UTC [gossip.gossip] handleMessage -> DEBU 4b6b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b6d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.933 UTC [msp.identity] Verify -> DEBU 4b6e Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +peer0.org1.example.com | 00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +peer0.org1.example.com | "2019-09-24 01:05:46.933 UTC [msp.identity] Verify -> DEBU 4b6f Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +peer0.org1.example.com | 00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +peer0.org1.example.com | 00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +peer0.org1.example.com | 00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +peer0.org1.example.com | 00000040 dc 05 71 c8 4f 8e |..q.O.|" +peer0.org1.example.com | "2019-09-24 01:05:46.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.933 UTC [gossip.discovery] isSentByMe -> DEBU 4b71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.932 UTC [gossip.gossip] handleMessage -> DEBU 4b72 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b73 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b74 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [msp] DeserializeIdentity -> DEBU 4b75 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b76 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b77 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b78 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b7c 0xc00447dbf0 gate 1569287146935050800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7d 0xc00447dbf0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7e 0xc00447dbf0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7f 0xc00447dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b80 0xc00447dbf0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b81 0xc00447dbf0 gate 1569287146935050800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b82 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b85 0xc0044a0430 gate 1569287146935590900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b86 0xc0044a0430 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b87 0xc0044a0430 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b88 0xc0044a0430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b89 0xc0044a0430 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b8a 0xc0044a0430 gate 1569287146935590900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b8e 0xc0044a0c70 gate 1569287146935968700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b8f 0xc0044a0c70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b90 0xc0044a0c70 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b91 0xc0044a0c70 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.937 UTC [msp.identity] Verify -> DEBU 4b92 Verify: digest = 00000000 27 4e ab 39 e0 3e 38 28 f5 1b cc 77 95 17 6f 0f |'N.9.>8(...w..o.| +peer0.org1.example.com | 00000010 50 2a b7 62 45 27 4a ee 25 cf fe 82 28 27 67 f8 |P*.bE'J.%...('g.|" +peer0.org1.example.com | "2019-09-24 01:05:46.937 UTC [msp.identity] Verify -> DEBU 4b93 Verify: sig = 00000000 30 44 02 20 0f da 81 8b 80 52 67 83 ca 12 9f 89 |0D. .....Rg.....| +peer0.org1.example.com | 00000010 ec f4 bc ba da ef 35 85 fc 7b 25 c9 f5 3c f5 60 |......5..{%..<.`| +peer0.org1.example.com | 00000020 8b 8a 14 de 02 20 15 40 da 99 3f c8 2c 2e c6 38 |..... .@..?.,..8| +peer0.org1.example.com | 00000030 15 fa b7 c4 ce 49 0b 29 2e ba a5 ff e6 d5 00 0b |.....I.)........| +peer0.org1.example.com | 00000040 47 3c a9 90 34 19 |G<..4.|" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [cauthdsl] func2 -> DEBU 4b94 0xc0044a0c70 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [cauthdsl] func1 -> DEBU 4b95 0xc0044a0c70 gate 1569287146935968700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b98 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b9c Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:46.938 UTC [msp.identity] Verify -> DEBU 4b9d Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +peer0.org1.example.com | 00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +peer0.org1.example.com | "2019-09-24 01:05:46.939 UTC [msp.identity] Verify -> DEBU 4b9e Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +peer0.org1.example.com | 00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +peer0.org1.example.com | 00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +peer0.org1.example.com | 00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +peer0.org1.example.com | 00000040 e4 6b 15 e0 e8 e4 |.k....|" +peer0.org1.example.com | "2019-09-24 01:05:46.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:46.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:46.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.385 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ba2 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:49.389 UTC [msp.identity] Sign -> DEBU 4ba4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151037 " +peer0.org1.example.com | "2019-09-24 01:05:49.389 UTC [gossip.gossip] handleMessage -> DEBU 4ba3 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.390 UTC [gossip.gossip] handleMessage -> DEBU 4ba5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.390 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ba7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:49.390 UTC [msp.identity] Verify -> DEBU 4ba8 Verify: digest = 00000000 7b 7f 0c b5 e8 48 6a 34 29 fb 0b e6 d7 93 06 3f |{....Hj4)......?| +peer0.org1.example.com | 00000010 75 7e 93 c0 f1 2b 9e 7e 5f da aa 5b 64 b6 f6 37 |u~...+.~_..[d..7|" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [msp.identity] Verify -> DEBU 4ba9 Verify: sig = 00000000 30 44 02 20 7f 87 05 6b d9 0d 82 af 79 b2 10 ca |0D. ...k....y...| +peer0.org1.example.com | 00000010 82 4f 78 a4 2c e7 2f 3c 82 9c 1b 93 0d 01 87 87 |.Ox.,./<........| +peer0.org1.example.com | 00000020 f9 6d 4a d4 02 20 2a 02 17 d6 7c 6d 7b 97 19 8e |.mJ.. *...|m{...| +peer0.org1.example.com | 00000030 1a a0 2a 40 6e d7 32 3b d3 41 c1 31 d7 bc a9 29 |..*@n.2;.A.1...)| +peer0.org1.example.com | 00000040 fd 56 ba 3f cd 0e |.V.?..|" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] handleAliveMessage -> DEBU 4baa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bac updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bad Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4baf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bb0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bb1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.395 UTC [msp] DeserializeIdentity -> DEBU 4bb2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.397 UTC [msp] DeserializeIdentity -> DEBU 4bb3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.399 UTC [msp] DeserializeIdentity -> DEBU 4bb4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.400 UTC [gossip.comm] Send -> DEBU 4bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.401 UTC [msp] DeserializeIdentity -> DEBU 4bb6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.401 UTC [gossip.comm] Send -> DEBU 4bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.402 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.402 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.403 UTC [gossip.comm] sendToEndpoint -> DEBU 4bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.404 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbb Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.404 UTC [gossip.comm] func1 -> DEBU 4bbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.407 UTC [gossip.comm] func1 -> DEBU 4bbd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bbe Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bbf Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bc0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.409 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bc2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:49.410 UTC [msp] DeserializeIdentity -> DEBU 4bc3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.410 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bc5 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bc6 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.411 UTC [policies] Evaluate -> DEBU 4bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.412 UTC [policies] Evaluate -> DEBU 4bc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.413 UTC [policies] Evaluate -> DEBU 4bc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.413 UTC [cauthdsl] func1 -> DEBU 4bca 0xc0044c9360 gate 1569287149413444800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcb 0xc0044c9360 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcc 0xc0044c9360 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcd 0xc0044c9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bce 0xc0044c9360 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.415 UTC [cauthdsl] func1 -> DEBU 4bcf 0xc0044c9360 gate 1569287149413444800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.415 UTC [policies] Evaluate -> DEBU 4bd0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.416 UTC [policies] Evaluate -> DEBU 4bd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.416 UTC [policies] Evaluate -> DEBU 4bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.416 UTC [cauthdsl] func1 -> DEBU 4bd3 0xc0044c9ba0 gate 1569287149416678100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd4 0xc0044c9ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd5 0xc0044c9ba0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd6 0xc0044c9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd7 0xc0044c9ba0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.418 UTC [cauthdsl] func1 -> DEBU 4bd8 0xc0044c9ba0 gate 1569287149416678100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.419 UTC [cauthdsl] func1 -> DEBU 4bdc 0xc0044dc3e0 gate 1569287149419175400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bdd 0xc0044dc3e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bde 0xc0044dc3e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bdf 0xc0044dc3e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.419 UTC [msp.identity] Verify -> DEBU 4be0 Verify: digest = 00000000 72 62 52 c5 7b 7d 15 7d 50 9a 43 57 d5 11 18 e3 |rbR.{}.}P.CW....| +peer0.org1.example.com | 00000010 cb 15 dc 1c 41 3a cb a3 99 4e 6d 5b f7 39 92 ff |....A:...Nm[.9..|" +peer0.org1.example.com | "2019-09-24 01:05:49.420 UTC [msp.identity] Verify -> DEBU 4be1 Verify: sig = 00000000 30 45 02 21 00 d0 e9 64 40 f0 1d 67 34 0e b9 5e |0E.!...d@..g4..^| +peer0.org1.example.com | 00000010 0d f2 3a b9 b7 07 34 cc 8c 11 8b 3f c0 8b a9 1a |..:...4....?....| +peer0.org1.example.com | 00000020 ba 32 62 5c c1 02 20 50 9c 44 1a 56 78 17 97 92 |.2b\.. P.D.Vx...| +peer0.org1.example.com | 00000030 15 90 95 0d 81 ae ac 26 af bf f2 94 c3 10 f9 d9 |.......&........| +peer0.org1.example.com | 00000040 67 55 81 c6 e6 5c 95 |gU...\.|" +peer0.org1.example.com | "2019-09-24 01:05:49.420 UTC [cauthdsl] func2 -> DEBU 4be2 0xc0044dc3e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.420 UTC [cauthdsl] func1 -> DEBU 4be3 0xc0044dc3e0 gate 1569287149419175400 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.420 UTC [policies] Evaluate -> DEBU 4be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be6 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.421 UTC [gossip.discovery] handleAliveMessage -> DEBU 4be8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4be9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bea updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4beb Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.423 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bec Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:49.423 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bed Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.424 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bee Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.425 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.426 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.426 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.426 UTC [gossip.gossip] handleMessage -> DEBU 4bf6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.427 UTC [gossip.gossip] handleMessage -> DEBU 4bf7 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.424 UTC [msp.identity] Sign -> DEBU 4bef Sign: digest: 56A51EEECDBAB18C0AADB11091943CA09854C1D71EB0E0EB737057A594FEC98D " +peer0.org1.example.com | "2019-09-24 01:05:49.427 UTC [gossip.gossip] handleMessage -> DEBU 4bf8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.428 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bf9 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:49.429 UTC [msp.identity] Sign -> DEBU 4bfb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:49.428 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfe Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.425 UTC [msp] DeserializeIdentity -> DEBU 4bf1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.430 UTC [msp.identity] Sign -> DEBU 4bfd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:49.428 UTC [gossip.gossip] handleMessage -> DEBU 4bfa Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.431 UTC [gossip.gossip] handleMessage -> DEBU 4c00 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.425 UTC [gossip.comm] func1 -> DEBU 4bf3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.425 UTC [gossip.comm] func1 -> DEBU 4bf2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.430 UTC [msp] DeserializeIdentity -> DEBU 4bff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.431 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c01 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.432 UTC [gossip.comm] func1 -> DEBU 4c02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.433 UTC [msp] DeserializeIdentity -> DEBU 4c03 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.434 UTC [msp] DeserializeIdentity -> DEBU 4c07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.433 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c04 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:49.431 UTC [gossip.gossip] handleMessage -> DEBU 4c05 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.434 UTC [gossip.comm] func1 -> DEBU 4c06 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.435 UTC [msp] DeserializeIdentity -> DEBU 4c08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.436 UTC [msp] DeserializeIdentity -> DEBU 4c0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.435 UTC [msp] DeserializeIdentity -> DEBU 4c09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.436 UTC [msp] DeserializeIdentity -> DEBU 4c0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.437 UTC [gossip.comm] Send -> DEBU 4c0d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.437 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c0e Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c0f Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.438 UTC [policies] Evaluate -> DEBU 4c10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [policies] Evaluate -> DEBU 4c12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [policies] Evaluate -> DEBU 4c13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [cauthdsl] func1 -> DEBU 4c14 0xc0044ad7a0 gate 1569287149439421400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [cauthdsl] func2 -> DEBU 4c15 0xc0044ad7a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [cauthdsl] func2 -> DEBU 4c16 0xc0044ad7a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.439 UTC [gossip.comm] sendToEndpoint -> DEBU 4c17 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.440 UTC [gossip.comm] sendToEndpoint -> DEBU 4c18 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.440 UTC [cauthdsl] func2 -> DEBU 4c19 0xc0044ad7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.437 UTC [msp] DeserializeIdentity -> DEBU 4c11 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.441 UTC [cauthdsl] func2 -> DEBU 4c1a 0xc0044ad7a0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.441 UTC [cauthdsl] func1 -> DEBU 4c1c 0xc0044ad7a0 gate 1569287149439421400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.441 UTC [gossip.comm] Send -> DEBU 4c1b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.442 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4c20 Sleeping 5s" +peer0.org1.example.com | "2019-09-24 01:05:49.442 UTC [cauthdsl] func1 -> DEBU 4c21 0xc004514100 gate 1569287149442505000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c22 0xc004514100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c23 0xc004514100 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c24 0xc004514100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c25 0xc004514100 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.445 UTC [cauthdsl] func1 -> DEBU 4c26 0xc004514100 gate 1569287149442505000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.445 UTC [cauthdsl] func1 -> DEBU 4c2a 0xc004514950 gate 1569287149445984500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2b 0xc004514950 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2c 0xc004514950 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2d 0xc004514950 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.447 UTC [msp.identity] Verify -> DEBU 4c2e Verify: digest = 00000000 6d f8 1a b0 bc 1a 8c f0 cf 7f ba a4 c3 e0 94 42 |m..............B| +peer0.org1.example.com | 00000010 6a d9 7e 90 3a f1 63 e3 fb 23 69 6f b1 69 7e d8 |j.~.:.c..#io.i~.|" +peer0.org1.example.com | "2019-09-24 01:05:49.447 UTC [msp.identity] Verify -> DEBU 4c2f Verify: sig = 00000000 30 45 02 21 00 d3 13 3c 5b 02 5d ca 20 f7 eb eb |0E.!...<[.]. ...| +peer0.org1.example.com | 00000010 f7 b2 8e 91 92 70 4f c9 37 33 1d b8 b9 6a 7f a4 |.....pO.73...j..| +peer0.org1.example.com | 00000020 23 80 79 07 03 02 20 7f 6d d3 c9 c0 73 69 b0 18 |#.y... .m...si..| +peer0.org1.example.com | 00000030 9a ae 2a 29 5d 23 4e bc e5 61 db 7f 2a 5f 69 a6 |..*)]#N..a..*_i.| +peer0.org1.example.com | 00000040 5d e8 a0 23 23 9b 13 |]..##..|" +peer0.org1.example.com | "2019-09-24 01:05:49.448 UTC [cauthdsl] func2 -> DEBU 4c30 0xc004514950 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.448 UTC [cauthdsl] func1 -> DEBU 4c31 0xc004514950 gate 1569287149445984500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c34 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.449 UTC [policies] Evaluate -> DEBU 4c35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.449 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c36 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c37 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c38 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c39 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c3a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c3b Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.451 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c3c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.451 UTC [gossip.gossip] handleMessage -> DEBU 4c40 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c41 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c42 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c43 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c44 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c45 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c46 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c47 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c48 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c49 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c4a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.455 UTC [gossip.comm] sendToEndpoint -> DEBU 4c4d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.455 UTC [gossip.comm] sendToEndpoint -> DEBU 4c4e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.457 UTC [msp] DeserializeIdentity -> DEBU 4c4f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.458 UTC [msp] DeserializeIdentity -> DEBU 4c50 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.458 UTC [gossip.comm] Send -> DEBU 4c51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.459 UTC [msp] DeserializeIdentity -> DEBU 4c52 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.459 UTC [gossip.comm] Send -> DEBU 4c53 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.459 UTC [gossip.comm] sendToEndpoint -> DEBU 4c54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.459 UTC [gossip.comm] sendToEndpoint -> DEBU 4c55 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.460 UTC [gossip.comm] sendToEndpoint -> DEBU 4c56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.460 UTC [gossip.comm] sendToEndpoint -> DEBU 4c57 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.460 UTC [msp] DeserializeIdentity -> DEBU 4c58 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.463 UTC [gossip.comm] Send -> DEBU 4c59 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.463 UTC [msp] DeserializeIdentity -> DEBU 4c5a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4c5b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4c5c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.466 UTC [msp] DeserializeIdentity -> DEBU 4c5d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c5e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c5f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.469 UTC [gossip.comm] Send -> DEBU 4c61 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.469 UTC [msp] DeserializeIdentity -> DEBU 4c62 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.471 UTC [msp] DeserializeIdentity -> DEBU 4c64 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.469 UTC [gossip.comm] sendToEndpoint -> DEBU 4c63 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.471 UTC [gossip.comm] sendToEndpoint -> DEBU 4c66 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.471 UTC [gossip.comm] Send -> DEBU 4c65 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.472 UTC [gossip.comm] sendToEndpoint -> DEBU 4c67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.472 UTC [gossip.comm] sendToEndpoint -> DEBU 4c68 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.562 UTC [endorser] ProcessProposal -> DEBU 4c69 Entering: request from 172.18.0.5:50060" +peer0.org1.example.com | "2019-09-24 01:05:49.562 UTC [protoutils] ValidateProposalMessage -> DEBU 4c6a ValidateProposalMessage starts for signed proposal 0xc0044ab270" +peer0.org1.example.com | "2019-09-24 01:05:49.563 UTC [protoutils] validateChannelHeader -> DEBU 4c6b validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:49.563 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6c begin" +peer0.org1.example.com | "2019-09-24 01:05:49.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6d creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:49.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6e creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:49.565 UTC [msp.identity] Verify -> DEBU 4c6f Verify: digest = 00000000 43 3d c7 b3 c6 10 82 42 0e 96 71 5c dc 88 e3 07 |C=.....B..q\....| +peer0.org1.example.com | 00000010 ea ec cf db 70 1b e4 1d e1 bc 00 0e 0b 3a 25 22 |....p........:%"|" +peer0.org1.example.com | "2019-09-24 01:05:49.566 UTC [msp.identity] Verify -> DEBU 4c70 Verify: sig = 00000000 30 45 02 21 00 89 5e 73 7b 92 f4 a0 55 08 7c dc |0E.!..^s{...U.|.| +peer0.org1.example.com | 00000010 bd 5c 80 af de 48 c4 11 55 12 f6 64 ed f7 91 cb |.\...H..U..d....| +peer0.org1.example.com | 00000020 2c cf 1c 40 5e 02 20 24 88 34 a8 cb e6 5a 10 a8 |,..@^. $.4...Z..| +peer0.org1.example.com | 00000030 77 92 63 c3 40 b9 c0 2f d4 e8 fe 1a e0 46 7f 25 |w.c.@../.....F.%| +peer0.org1.example.com | 00000040 9a 51 5f 17 96 bf 1f |.Q_....|" +peer0.org1.example.com | "2019-09-24 01:05:49.566 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c71 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:49.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4c72 validateChaincodeProposalMessage starts for proposal 0xc003f1dab0, header 0xc0044ab680" +peer0.org1.example.com | "2019-09-24 01:05:49.567 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4c73 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:49.568 UTC [endorser] preProcess -> DEBU 4c74 [][94e2a88e] processing txid: 94e2a88e2cc7755cea7ece078cd474aaa6557020c777eb7f6cccde3fd2e4a8b7" +peer0.org1.example.com | "2019-09-24 01:05:49.568 UTC [endorser] SimulateProposal -> DEBU 4c75 [][94e2a88e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:49.568 UTC [endorser] callChaincode -> INFO 4c76 [][94e2a88e] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-09-24 01:05:49.568 UTC [chaincode] Execute -> DEBU 4c77 Entry" +peer0.org1.example.com | "2019-09-24 01:05:49.569 UTC [cscc] Invoke -> DEBU 4c78 Invoke function: GetChannels" +peer0.org1.example.com | "2019-09-24 01:05:49.569 UTC [msp.identity] Verify -> DEBU 4c79 Verify: digest = 00000000 43 3d c7 b3 c6 10 82 42 0e 96 71 5c dc 88 e3 07 |C=.....B..q\....| +peer0.org1.example.com | 00000010 ea ec cf db 70 1b e4 1d e1 bc 00 0e 0b 3a 25 22 |....p........:%"|" +peer0.org1.example.com | "2019-09-24 01:05:49.570 UTC [msp.identity] Verify -> DEBU 4c7a Verify: sig = 00000000 30 45 02 21 00 89 5e 73 7b 92 f4 a0 55 08 7c dc |0E.!..^s{...U.|.| +peer0.org1.example.com | 00000010 bd 5c 80 af de 48 c4 11 55 12 f6 64 ed f7 91 cb |.\...H..U..d....| +peer0.org1.example.com | 00000020 2c cf 1c 40 5e 02 20 24 88 34 a8 cb e6 5a 10 a8 |,..@^. $.4...Z..| +peer0.org1.example.com | 00000030 77 92 63 c3 40 b9 c0 2f d4 e8 fe 1a e0 46 7f 25 |w.c.@../.....F.%| +peer0.org1.example.com | 00000040 9a 51 5f 17 96 bf 1f |.Q_....|" +peer0.org1.example.com | "2019-09-24 01:05:49.570 UTC [chaincode] handleMessage -> DEBU 4c7b [94e2a88e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:49.570 UTC [chaincode] Notify -> DEBU 4c7c [94e2a88e] notifying Txid:94e2a88e2cc7755cea7ece078cd474aaa6557020c777eb7f6cccde3fd2e4a8b7, channelID:" +peer0.org1.example.com | "2019-09-24 01:05:49.571 UTC [chaincode] Execute -> DEBU 4c7d Exit" +peer0.org1.example.com | "2019-09-24 01:05:49.571 UTC [endorser] callChaincode -> INFO 4c7e [][94e2a88e] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-09-24 01:05:49.571 UTC [endorser] SimulateProposal -> DEBU 4c7f [][94e2a88e] Exit" +peer0.org1.example.com | "2019-09-24 01:05:49.571 UTC [endorser] func1 -> DEBU 4c80 Exit: request from 172.18.0.5:50060" +peer0.org1.example.com | "2019-09-24 01:05:49.572 UTC [comm.grpc.server] 1 -> INFO 4c81 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:50060 grpc.code=OK grpc.call_duration=10.6648ms +peer0.org1.example.com | "2019-09-24 01:05:49.577 UTC [grpc] warningf -> DEBU 4c82 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:50060: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:49.577 UTC [grpc] infof -> DEBU 4c83 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [msp] DeserializeIdentity -> DEBU 4c84 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [msp] DeserializeIdentity -> DEBU 4c85 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] Send -> DEBU 4c86 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c87 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c88 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c89 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.620 UTC [gossip.comm] func1 -> DEBU 4c8d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.620 UTC [gossip.gossip] handleMessage -> DEBU 4c8f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c90 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c91 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c92 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c94 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c95 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4c99 0xc00454dbb0 gate 1569287149621533300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9a 0xc00454dbb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9b 0xc00454dbb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9c 0xc00454dbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9d 0xc00454dbb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4c9e 0xc00454dbb0 gate 1569287149621533300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c9f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4ca2 0xc0045a43f0 gate 1569287149621798200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca3 0xc0045a43f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca4 0xc0045a43f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca5 0xc0045a43f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca6 0xc0045a43f0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4ca7 0xc0045a43f0 gate 1569287149621798200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func1 -> DEBU 4cab 0xc0045a4c30 gate 1569287149622067200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cac 0xc0045a4c30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cad 0xc0045a4c30 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cae 0xc0045a4c30 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4caf Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb0 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cb1 0xc0045a4c30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [cauthdsl] func1 -> DEBU 4cb2 0xc0045a4c30 gate 1569287149622067200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb5 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb7 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb8 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [msp.identity] Verify -> DEBU 4cb9 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [msp.identity] Verify -> DEBU 4cba Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [msp] DeserializeIdentity -> DEBU 4cbb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [msp] DeserializeIdentity -> DEBU 4cbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4cbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cbe Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cbf Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cc3 0xc0045b9240 gate 1569287149623522800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc4 0xc0045b9240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc5 0xc0045b9240 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc6 0xc0045b9240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc7 0xc0045b9240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cc8 0xc0045b9240 gate 1569287149623522800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4ccb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4ccc 0xc0045b9a80 gate 1569287149623772700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4ccd 0xc0045b9a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cce 0xc0045b9a80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4ccf 0xc0045b9a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cd0 0xc0045b9a80 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cd1 0xc0045b9a80 gate 1569287149623772700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func1 -> DEBU 4cd5 0xc0045ca2c0 gate 1569287149624021100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd6 0xc0045ca2c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd7 0xc0045ca2c0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd8 0xc0045ca2c0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [msp.identity] Verify -> DEBU 4cd9 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [msp.identity] Verify -> DEBU 4cda Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cdb 0xc0045ca2c0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [cauthdsl] func1 -> DEBU 4cdc 0xc0045ca2c0 gate 1569287149624021100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cdf Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4ce0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [gossip.gossip] handleMessage -> DEBU 4ce1 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.620 UTC [gossip.comm] func1 -> DEBU 4c8e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [gossip.gossip] handleMessage -> DEBU 4ce2 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce5 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ce6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ce7 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ce8 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4ce9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4ceb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func1 -> DEBU 4cec 0xc0045cbde0 gate 1569287149625212900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4ced 0xc0045cbde0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cee 0xc0045cbde0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cef 0xc0045cbde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cf0 0xc0045cbde0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [cauthdsl] func1 -> DEBU 4cf1 0xc0045cbde0 gate 1569287149625212900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cf2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cf3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [policies] Evaluate -> DEBU 4cf4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func1 -> DEBU 4cf5 0xc0045e8620 gate 1569287149626335100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf6 0xc0045e8620 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf7 0xc0045e8620 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf8 0xc0045e8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf9 0xc0045e8620 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [cauthdsl] func1 -> DEBU 4cfa 0xc0045e8620 gate 1569287149626335100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.626 UTC [policies] Evaluate -> DEBU 4cfb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [policies] Evaluate -> DEBU 4cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [policies] Evaluate -> DEBU 4cfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [cauthdsl] func1 -> DEBU 4cfe 0xc0045e8e60 gate 1569287149627301100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4cff 0xc0045e8e60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4d00 0xc0045e8e60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4d01 0xc0045e8e60 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [msp.identity] Verify -> DEBU 4d02 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:49.627 UTC [msp.identity] Verify -> DEBU 4d03 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [cauthdsl] func2 -> DEBU 4d04 0xc0045e8e60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [cauthdsl] func1 -> DEBU 4d05 0xc0045e8e60 gate 1569287149627301100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d08 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0a Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0b Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0c Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0d Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.630 UTC [msp] DeserializeIdentity -> DEBU 4d0f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d11 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d12 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d14 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d16 0xc0045ff470 gate 1569287149631176900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d17 0xc0045ff470 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d18 0xc0045ff470 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d19 0xc0045ff470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d1a 0xc0045ff470 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d1b 0xc0045ff470 gate 1569287149631176900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d1f 0xc0045ffcb0 gate 1569287149631448600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d20 0xc0045ffcb0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d21 0xc0045ffcb0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d22 0xc0045ffcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d23 0xc0045ffcb0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d24 0xc0045ffcb0 gate 1569287149631448600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d28 0xc0046104f0 gate 1569287149631708300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d29 0xc0046104f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2a 0xc0046104f0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2b 0xc0046104f0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [msp.identity] Verify -> DEBU 4d2c Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [msp.identity] Verify -> DEBU 4d2d Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2e 0xc0046104f0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [cauthdsl] func1 -> DEBU 4d2f 0xc0046104f0 gate 1569287149631708300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d30 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d32 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [gossip.gossip] handleMessage -> DEBU 4d34 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [gossip.gossip] handleMessage -> DEBU 4d35 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d36 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d37 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d38 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d39 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [msp] DeserializeIdentity -> DEBU 4d3a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [msp] DeserializeIdentity -> DEBU 4d3b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d3d Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d3e Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [cauthdsl] func1 -> DEBU 4d42 0xc004626d40 gate 1569287149633695700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [cauthdsl] func2 -> DEBU 4d43 0xc004626d40 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.633 UTC [cauthdsl] func2 -> DEBU 4d44 0xc004626d40 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.635 UTC [cauthdsl] func2 -> DEBU 4d45 0xc004626d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.635 UTC [cauthdsl] func2 -> DEBU 4d46 0xc004626d40 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.636 UTC [cauthdsl] func1 -> DEBU 4d47 0xc004626d40 gate 1569287149633695700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.636 UTC [cauthdsl] func1 -> DEBU 4d4b 0xc004627580 gate 1569287149636611900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4c 0xc004627580 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4d 0xc004627580 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4e 0xc004627580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.638 UTC [cauthdsl] func2 -> DEBU 4d4f 0xc004627580 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.638 UTC [cauthdsl] func1 -> DEBU 4d50 0xc004627580 gate 1569287149636611900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.638 UTC [policies] Evaluate -> DEBU 4d51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.638 UTC [policies] Evaluate -> DEBU 4d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.639 UTC [policies] Evaluate -> DEBU 4d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.641 UTC [cauthdsl] func1 -> DEBU 4d54 0xc004627dc0 gate 1569287149641071900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d55 0xc004627dc0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d56 0xc004627dc0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d57 0xc004627dc0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.651 UTC [msp.identity] Verify -> DEBU 4d58 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:49.651 UTC [msp.identity] Verify -> DEBU 4d59 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [cauthdsl] func2 -> DEBU 4d5a 0xc004627dc0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [cauthdsl] func1 -> DEBU 4d5b 0xc004627dc0 gate 1569287149641071900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5e Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [msp] DeserializeIdentity -> DEBU 4d60 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [msp] DeserializeIdentity -> DEBU 4d61 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d63 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d64 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d68 0xc00463b590 gate 1569287149653020100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d69 0xc00463b590 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6a 0xc00463b590 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6b 0xc00463b590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6c 0xc00463b590 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d6d 0xc00463b590 gate 1569287149653020100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d6e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d71 0xc00463bdd0 gate 1569287149653337400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d72 0xc00463bdd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d73 0xc00463bdd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d74 0xc00463bdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d75 0xc00463bdd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d76 0xc00463bdd0 gate 1569287149653337400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d77 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d7a 0xc00464a610 gate 1569287149653649500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7b 0xc00464a610 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7c 0xc00464a610 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7d 0xc00464a610 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [msp.identity] Verify -> DEBU 4d7e Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [msp.identity] Verify -> DEBU 4d7f Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d80 0xc00464a610 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [cauthdsl] func1 -> DEBU 4d81 0xc00464a610 gate 1569287149653649500 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d84 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:49.654 UTC [gossip.gossip] handleMessage -> DEBU 4d86 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.712 UTC [msp] DeserializeIdentity -> DEBU 4d87 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.713 UTC [msp] DeserializeIdentity -> DEBU 4d88 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.713 UTC [gossip.pull] Hello -> DEBU 4d89 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:49.714 UTC [msp] DeserializeIdentity -> DEBU 4d8a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.714 UTC [msp] DeserializeIdentity -> DEBU 4d8b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.715 UTC [gossip.comm] Send -> DEBU 4d8c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.717 UTC [gossip.gossip] handleMessage -> DEBU 4d8f Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.717 UTC [gossip.pull] HandleMessage -> DEBU 4d90 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.718 UTC [gossip.gossip] handleMessage -> DEBU 4d91 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.803 UTC [gossip.gossip] handleMessage -> DEBU 4d92 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.803 UTC [msp] DeserializeIdentity -> DEBU 4d93 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.804 UTC [msp] DeserializeIdentity -> DEBU 4d94 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:49.804 UTC [gossip.gossip] handleMessage -> DEBU 4d95 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:49.834 UTC [gossip.gossip] handleMessage -> DEBU 4d96 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.834 UTC [gossip.pull] HandleMessage -> DEBU 4d97 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:49.834 UTC [gossip.pull] SendDigest -> DEBU 4d98 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:49.835 UTC [gossip.gossip] handleMessage -> DEBU 4d99 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.006 UTC [gossip.comm] func1 -> DEBU 4d9a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.007 UTC [gossip.gossip] handleMessage -> DEBU 4d9b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.008 UTC [gossip.gossip] handleMessage -> DEBU 4d9f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.204 UTC [gossip.comm] func1 -> DEBU 4da0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.205 UTC [gossip.gossip] handleMessage -> DEBU 4da1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da2 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da3 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da4 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.205 UTC [gossip.gossip] handleMessage -> DEBU 4da5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.458 UTC [gossip.gossip] handleMessage -> DEBU 4da6 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.458 UTC [gossip.pull] HandleMessage -> DEBU 4da7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.458 UTC [gossip.pull] SendDigest -> DEBU 4da8 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +peer0.org1.example.com | "2019-09-24 01:05:50.458 UTC [gossip.gossip] handleMessage -> DEBU 4da9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.493 UTC [gossip.gossip] handleMessage -> DEBU 4daa Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.493 UTC [gossip.gossip] handleMessage -> DEBU 4dab Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.493 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dac Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.493 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4dad Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.493 UTC [msp.identity] Verify -> DEBU 4dae Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +peer0.org1.example.com | 00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +peer0.org1.example.com | "2019-09-24 01:05:50.494 UTC [msp.identity] Verify -> DEBU 4daf Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +peer0.org1.example.com | 00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +peer0.org1.example.com | 00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +peer0.org1.example.com | 00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +peer0.org1.example.com | 00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +peer0.org1.example.com | "2019-09-24 01:05:50.494 UTC [msp.identity] Verify -> DEBU 4db0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [msp.identity] Verify -> DEBU 4db1 Verify: sig = 00000000 30 44 02 20 64 93 f8 a3 31 7f b2 cd 57 22 b5 f6 |0D. d...1...W"..| +peer0.org1.example.com | 00000010 41 22 b6 38 73 09 5a 4a b1 46 ea 33 74 52 0a 87 |A".8s.ZJ.F.3tR..| +peer0.org1.example.com | 00000020 a4 22 d9 46 02 20 73 44 85 f4 e3 78 03 92 a7 ab |.".F. sD...x....| +peer0.org1.example.com | 00000030 89 10 7f 48 54 b8 bd 6b 17 57 70 26 ff 4a e7 aa |...HT..k.Wp&.J..| +peer0.org1.example.com | 00000040 27 cb c2 c1 4d cd |'...M.|" +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 4db2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db4 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db5 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db7 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [gossip.discovery] handleAliveMessage -> DEBU 4db8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db9 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [gossip.discovery] sendMemResponse -> DEBU 4dba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [msp] DeserializeIdentity -> DEBU 4dbb Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [msp] DeserializeIdentity -> DEBU 4dbc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.496 UTC [gossip.comm] Send -> DEBU 4dbd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.497 UTC [gossip.discovery] sendMemResponse -> DEBU 4dbe Exiting, replying with alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > alive: " +peer0.org1.example.com | "2019-09-24 01:05:50.497 UTC [gossip.comm] sendToEndpoint -> DEBU 4dbf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.497 UTC [gossip.comm] sendToEndpoint -> DEBU 4dc0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [endorser] ProcessProposal -> DEBU 4dc1 Entering: request from 172.18.0.5:50068" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] ValidateProposalMessage -> DEBU 4dc2 ValidateProposalMessage starts for signed proposal 0xc0046594f0" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] validateChannelHeader -> DEBU 4dc3 validateChannelHeader info: header type 3" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc4 begin" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc5 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc6 creator is valid" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [msp.identity] Verify -> DEBU 4dc7 Verify: digest = 00000000 58 91 2e 54 f2 99 f3 b4 50 98 75 8f 2f 05 a1 30 |X..T....P.u./..0| +peer0.org1.example.com | 00000010 13 d0 5c c7 fb bd 31 5e 24 06 ab 34 0f db f0 b2 |..\...1^$..4....|" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [msp.identity] Verify -> DEBU 4dc8 Verify: sig = 00000000 30 44 02 20 19 38 d6 cf ba 9e 0b 75 78 a8 8c bc |0D. .8.....ux...| +peer0.org1.example.com | 00000010 9f b6 57 eb b7 75 c5 b6 d0 7d 55 c0 b8 56 dd 66 |..W..u...}U..V.f| +peer0.org1.example.com | 00000020 e1 c9 de db 02 20 5f 57 bd 7a 11 46 01 0f dd 80 |..... _W.z.F....| +peer0.org1.example.com | 00000030 25 d9 4b 3a 54 17 b0 96 95 53 30 fd 30 e1 5c 68 |%.K:T....S0.0.\h| +peer0.org1.example.com | 00000040 27 21 37 20 45 9f |'!7 E.|" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc9 exits successfully" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4dca validateChaincodeProposalMessage starts for proposal 0xc0046843f0, header 0xc004659900" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4dcb validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [endorser] preProcess -> DEBU 4dcc [][6936b647] processing txid: 6936b647092248a2cc40d71d75ceeb19d69fc6873d35289c2700f6e3e1ef341b" +peer0.org1.example.com | "2019-09-24 01:05:50.519 UTC [endorser] SimulateProposal -> DEBU 4dcd [][6936b647] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [endorser] callChaincode -> INFO 4dce [][6936b647] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [chaincode] Execute -> DEBU 4dcf Entry" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [qscc] Invoke -> DEBU 4dd0 Invoke function: GetChainInfo on chain: businesschannel" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [aclmgmt] CheckACL -> DEBU 4dd1 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [aclmgmt] CheckACL -> DEBU 4dd2 acl check(/Channel/Application/Readers)" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [msp] DeserializeIdentity -> DEBU 4dd6 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.520 UTC [msp.identity] newIdentity -> DEBU 4dd7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +peer0.org1.example.com | xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +peer0.org1.example.com | o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +peer0.org1.example.com | 3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +peer0.org1.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func1 -> DEBU 4dd8 0xc0046bd860 gate 1569287150521162400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4dd9 0xc0046bd860 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4dda 0xc0046bd860 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4ddb 0xc0046bd860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4ddc 0xc0046bd860 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [cauthdsl] func1 -> DEBU 4ddd 0xc0046bd860 gate 1569287150521162400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4dde Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4ddf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4de0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.522 UTC [cauthdsl] func1 -> DEBU 4de1 0xc0046d49e0 gate 1569287150522670200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.522 UTC [cauthdsl] func2 -> DEBU 4de2 0xc0046d49e0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.522 UTC [cauthdsl] func2 -> DEBU 4de3 0xc0046d49e0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.522 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4de4 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | "2019-09-24 01:05:50.522 UTC [msp] Validate -> DEBU 4de5 MSP Org1MSP validating identity" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [msp] getCertificationChain -> DEBU 4de6 MSP Org1MSP getting certification chain" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [cauthdsl] func2 -> DEBU 4de7 0xc0046d49e0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [msp.identity] Verify -> DEBU 4de8 Verify: digest = 00000000 58 91 2e 54 f2 99 f3 b4 50 98 75 8f 2f 05 a1 30 |X..T....P.u./..0| +peer0.org1.example.com | 00000010 13 d0 5c c7 fb bd 31 5e 24 06 ab 34 0f db f0 b2 |..\...1^$..4....|" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [msp.identity] Verify -> DEBU 4de9 Verify: sig = 00000000 30 44 02 20 19 38 d6 cf ba 9e 0b 75 78 a8 8c bc |0D. .8.....ux...| +peer0.org1.example.com | 00000010 9f b6 57 eb b7 75 c5 b6 d0 7d 55 c0 b8 56 dd 66 |..W..u...}U..V.f| +peer0.org1.example.com | 00000020 e1 c9 de db 02 20 5f 57 bd 7a 11 46 01 0f dd 80 |..... _W.z.F....| +peer0.org1.example.com | 00000030 25 d9 4b 3a 54 17 b0 96 95 53 30 fd 30 e1 5c 68 |%.K:T....S0.0.\h| +peer0.org1.example.com | 00000040 27 21 37 20 45 9f |'!7 E.|" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [cauthdsl] func2 -> DEBU 4dea 0xc0046d49e0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [cauthdsl] func1 -> DEBU 4deb 0xc0046d49e0 gate 1569287150522670200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4dec Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4dee Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [chaincode] handleMessage -> DEBU 4df0 [6936b647] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +peer0.org1.example.com | "2019-09-24 01:05:50.523 UTC [chaincode] Notify -> DEBU 4df1 [6936b647] notifying Txid:6936b647092248a2cc40d71d75ceeb19d69fc6873d35289c2700f6e3e1ef341b, channelID:" +peer0.org1.example.com | "2019-09-24 01:05:50.524 UTC [chaincode] Execute -> DEBU 4df2 Exit" +peer0.org1.example.com | "2019-09-24 01:05:50.524 UTC [endorser] callChaincode -> INFO 4df3 [][6936b647] Exit chaincode: name:"qscc" (4ms)" +peer0.org1.example.com | "2019-09-24 01:05:50.524 UTC [endorser] SimulateProposal -> DEBU 4df4 [][6936b647] Exit" +peer0.org1.example.com | "2019-09-24 01:05:50.524 UTC [endorser] func1 -> DEBU 4df5 Exit: request from 172.18.0.5:50068" +peer0.org1.example.com | "2019-09-24 01:05:50.524 UTC [comm.grpc.server] 1 -> INFO 4df6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:50068 grpc.code=OK grpc.call_duration=5.5529ms +peer0.org1.example.com | "2019-09-24 01:05:50.533 UTC [grpc] warningf -> DEBU 4df7 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:50068: read: connection reset by peer" +peer0.org1.example.com | "2019-09-24 01:05:50.533 UTC [grpc] infof -> DEBU 4df8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [gossip.comm] func1 -> DEBU 4df9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [gossip.gossip] handleMessage -> DEBU 4dfa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [gossip.pull] HandleMessage -> DEBU 4dfb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfc Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfd Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfe Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dff Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4e00 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.826 UTC [msp] DeserializeIdentity -> DEBU 4e01 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.826 UTC [gossip.pull] SendDigest -> DEBU 4e02 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +peer0.org1.example.com | "2019-09-24 01:05:50.826 UTC [gossip.gossip] handleMessage -> DEBU 4e03 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.830 UTC [gossip.comm] func1 -> DEBU 4e04 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.831 UTC [gossip.gossip] handleMessage -> DEBU 4e05 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.831 UTC [gossip.pull] HandleMessage -> DEBU 4e06 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e07 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e08 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e09 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.832 UTC [gossip.pull] SendDigest -> DEBU 4e0d Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +peer0.org1.example.com | "2019-09-24 01:05:50.832 UTC [gossip.gossip] handleMessage -> DEBU 4e0e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.838 UTC [gossip.comm] func1 -> DEBU 4e0f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [gossip.gossip] handleMessage -> DEBU 4e10 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [gossip.gossip] handleMessage -> DEBU 4e11 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e12 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e13 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [msp] DeserializeIdentity -> DEBU 4e14 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.839 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e16 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e17 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func1 -> DEBU 4e1b 0xc0046f9710 gate 1569287150840344700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1c 0xc0046f9710 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1d 0xc0046f9710 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1e 0xc0046f9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1f 0xc0046f9710 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [cauthdsl] func1 -> DEBU 4e20 0xc0046f9710 gate 1569287150840344700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func1 -> DEBU 4e24 0xc0046f9f50 gate 1569287150841078000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e25 0xc0046f9f50 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e26 0xc0046f9f50 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e27 0xc0046f9f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e28 0xc0046f9f50 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [cauthdsl] func1 -> DEBU 4e29 0xc0046f9f50 gate 1569287150841078000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [cauthdsl] func1 -> DEBU 4e2d 0xc00471e790 gate 1569287150841941900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e2e 0xc00471e790 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e2f 0xc00471e790 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e30 0xc00471e790 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [msp.identity] Verify -> DEBU 4e31 Verify: digest = 00000000 d5 d5 79 3b 0d 49 85 81 e5 50 bf 6b 99 84 b0 ff |..y;.I...P.k....| +peer0.org1.example.com | 00000010 c7 19 66 35 d3 45 68 5c b0 8b 46 de c2 0b ac ed |..f5.Eh\..F.....|" +peer0.org1.example.com | "2019-09-24 01:05:50.842 UTC [msp.identity] Verify -> DEBU 4e32 Verify: sig = 00000000 30 44 02 20 5f fe 52 b0 8c 5f 5a d0 23 01 c9 dd |0D. _.R.._Z.#...| +peer0.org1.example.com | 00000010 6a 43 17 ca e7 f7 5a 54 77 6a ab 21 55 5c 7f b8 |jC....ZTwj.!U\..| +peer0.org1.example.com | 00000020 db da 46 ab 02 20 4d c7 4c 0b 8a a4 2e d8 b9 18 |..F.. M.L.......| +peer0.org1.example.com | 00000030 76 2c 17 88 23 39 f9 f7 5e b3 48 d7 51 f7 1b aa |v,..#9..^.H.Q...| +peer0.org1.example.com | 00000040 7d 9a eb 27 dc 37 |}..'.7|" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [cauthdsl] func2 -> DEBU 4e33 0xc00471e790 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [cauthdsl] func1 -> DEBU 4e34 0xc00471e790 gate 1569287150841941900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e37 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e39 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3b updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3c Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:50.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e3f Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e40 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.845 UTC [gossip.discovery] sendMemResponse -> DEBU 4e41 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +peer0.org1.example.com | "2019-09-24 01:05:50.845 UTC [msp] DeserializeIdentity -> DEBU 4e42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.846 UTC [msp] DeserializeIdentity -> DEBU 4e43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.846 UTC [msp] DeserializeIdentity -> DEBU 4e44 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.846 UTC [gossip.comm] Send -> DEBU 4e45 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.846 UTC [gossip.discovery] sendMemResponse -> DEBU 4e46 Exiting, replying with alive: alive: alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" > alive: " +peer0.org1.example.com | "2019-09-24 01:05:50.846 UTC [gossip.comm] sendToEndpoint -> DEBU 4e47 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.847 UTC [gossip.comm] sendToEndpoint -> DEBU 4e48 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.868 UTC [gossip.comm] func1 -> DEBU 4e49 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.869 UTC [gossip.gossip] handleMessage -> DEBU 4e4a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e4c Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.870 UTC [msp] DeserializeIdentity -> DEBU 4e4d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e4e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e4f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e50 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.871 UTC [policies] Evaluate -> DEBU 4e51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.872 UTC [policies] Evaluate -> DEBU 4e52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:50.872 UTC [policies] Evaluate -> DEBU 4e53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.872 UTC [cauthdsl] func1 -> DEBU 4e54 0xc004733010 gate 1569287150872797400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e55 0xc004733010 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e56 0xc004733010 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e57 0xc004733010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e58 0xc004733010 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [cauthdsl] func1 -> DEBU 4e59 0xc004733010 gate 1569287150872797400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [policies] Evaluate -> DEBU 4e5a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.873 UTC [policies] Evaluate -> DEBU 4e5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.874 UTC [policies] Evaluate -> DEBU 4e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.874 UTC [cauthdsl] func1 -> DEBU 4e5d 0xc004733850 gate 1569287150874088200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.874 UTC [cauthdsl] func2 -> DEBU 4e5e 0xc004733850 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.874 UTC [cauthdsl] func2 -> DEBU 4e5f 0xc004733850 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.875 UTC [cauthdsl] func2 -> DEBU 4e60 0xc004733850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.875 UTC [cauthdsl] func2 -> DEBU 4e61 0xc004733850 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.875 UTC [cauthdsl] func1 -> DEBU 4e62 0xc004733850 gate 1569287150874088200 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.875 UTC [policies] Evaluate -> DEBU 4e63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.876 UTC [policies] Evaluate -> DEBU 4e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.876 UTC [policies] Evaluate -> DEBU 4e65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.876 UTC [cauthdsl] func1 -> DEBU 4e66 0xc004744090 gate 1569287150876927800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.877 UTC [cauthdsl] func2 -> DEBU 4e67 0xc004744090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.877 UTC [cauthdsl] func2 -> DEBU 4e68 0xc004744090 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [cauthdsl] func2 -> DEBU 4e69 0xc004744090 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [msp.identity] Verify -> DEBU 4e6a Verify: digest = 00000000 13 d9 36 90 f6 2e 5f 73 92 b0 36 ff 20 19 aa c2 |..6..._s..6. ...| +peer0.org1.example.com | 00000010 7c 05 b8 9a 6c 9d 23 32 26 81 1c 74 c0 b9 4a 75 ||...l.#2&..t..Ju|" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [msp.identity] Verify -> DEBU 4e6b Verify: sig = 00000000 30 44 02 20 7c 75 03 d5 c8 67 8c 4e 3a c3 7b 01 |0D. |u...g.N:.{.| +peer0.org1.example.com | 00000010 1f 70 70 25 4c 6a 09 76 c9 5d 97 fa db 6f 26 4e |.pp%Lj.v.]...o&N| +peer0.org1.example.com | 00000020 74 10 fb cb 02 20 74 a1 81 cf b2 2b fe a8 50 08 |t.... t....+..P.| +peer0.org1.example.com | 00000030 86 fb ee 6f 38 38 f4 f0 00 7f ec 83 92 54 6a 6e |...o88.......Tjn| +peer0.org1.example.com | 00000040 7b cd 5e 59 28 15 |{.^Y(.|" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [cauthdsl] func2 -> DEBU 4e6c 0xc004744090 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [cauthdsl] func1 -> DEBU 4e6d 0xc004744090 gate 1569287150876927800 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e70 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e72 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e73 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +peer0.org1.example.com | "2019-09-24 01:05:50.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e74 updating membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e75 Updating aliveness data: membership: timestamp: " +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e76 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e77 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e78 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e79 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4e7a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7b Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.comm] Send -> DEBU 4e7e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4e7f Exiting, replying with alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" > alive: alive: alive: " +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e81 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.880 UTC [gossip.gossip] handleMessage -> DEBU 4e82 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 4e83 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:50.893 UTC [msp.identity] Sign -> DEBU 4e84 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151038 " +peer0.org1.example.com | "2019-09-24 01:05:50.893 UTC [msp.identity] Sign -> DEBU 4e85 Sign: digest: 4D1477FA332319B60426DD0A9531872FC1904FDE5CEFF1996786685EE7B02B78 " +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e86 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e88 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e89 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e8a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e8b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e8c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 4e87 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e90 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e92 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.896 UTC [msp.identity] Sign -> DEBU 4e93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +peer0.org1.example.com | "2019-09-24 01:05:50.899 UTC [msp.identity] Sign -> DEBU 4e96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +peer0.org1.example.com | "2019-09-24 01:05:50.900 UTC [gossip.comm] Send -> DEBU 4e97 Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.898 UTC [gossip.comm] func1 -> DEBU 4e94 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.898 UTC [gossip.gossip] handleMessage -> DEBU 4e95 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.900 UTC [msp] DeserializeIdentity -> DEBU 4e98 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.901 UTC [gossip.comm] sendToEndpoint -> DEBU 4e99 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.902 UTC [gossip.pull] HandleMessage -> DEBU 4e9a GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.903 UTC [gossip.comm] func1 -> DEBU 4e9b Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.903 UTC [gossip.comm] Send -> DEBU 4e9c Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.904 UTC [msp] DeserializeIdentity -> DEBU 4e9f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.comm] Send -> DEBU 4ea0 Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9d Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.904 UTC [gossip.gossip] handleMessage -> DEBU 4e9e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.pull] HandleMessage -> DEBU 4ea4 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea5 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.906 UTC [gossip.pull] HandleMessage -> DEBU 4ea7 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.906 UTC [gossip.gossip] handleMessage -> DEBU 4ea8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4eaa Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.909 UTC [gossip.comm] func1 -> DEBU 4eab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.909 UTC [gossip.gossip] handleMessage -> DEBU 4ead Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.910 UTC [gossip.gossip] handleMessage -> DEBU 4eae Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.909 UTC [gossip.comm] func1 -> DEBU 4eac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eaf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eb0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.910 UTC [gossip.gossip] handleMessage -> DEBU 4eb1 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.911 UTC [msp.identity] Verify -> DEBU 4eb2 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +peer0.org1.example.com | 00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +peer0.org1.example.com | "2019-09-24 01:05:50.911 UTC [msp.identity] Verify -> DEBU 4eb3 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +peer0.org1.example.com | 00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +peer0.org1.example.com | 00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +peer0.org1.example.com | 00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +peer0.org1.example.com | 00000040 9c 95 af 2a ec 88 c5 |...*...|" +peer0.org1.example.com | "2019-09-24 01:05:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eb4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.911 UTC [gossip.discovery] isSentByMe -> DEBU 4eb5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eb6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eb7 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [msp] DeserializeIdentity -> DEBU 4eb8 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eba Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ebb Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.912 UTC [cauthdsl] func1 -> DEBU 4ebf 0xc0047a0420 gate 1569287150912925000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec0 0xc0047a0420 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec1 0xc0047a0420 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec2 0xc0047a0420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec3 0xc0047a0420 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ec4 0xc0047a0420 gate 1569287150912925000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ec8 0xc0047a0c60 gate 1569287150913599000 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec9 0xc0047a0c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4eca 0xc0047a0c60 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ecb 0xc0047a0c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ecc 0xc0047a0c60 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ecd 0xc0047a0c60 gate 1569287150913599000 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ece Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [cauthdsl] func1 -> DEBU 4ed1 0xc0047a14a0 gate 1569287150914164100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed2 0xc0047a14a0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed3 0xc0047a14a0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed4 0xc0047a14a0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [msp.identity] Verify -> DEBU 4ed5 Verify: digest = 00000000 d5 d5 79 3b 0d 49 85 81 e5 50 bf 6b 99 84 b0 ff |..y;.I...P.k....| +peer0.org1.example.com | 00000010 c7 19 66 35 d3 45 68 5c b0 8b 46 de c2 0b ac ed |..f5.Eh\..F.....|" +peer0.org1.example.com | "2019-09-24 01:05:50.914 UTC [msp.identity] Verify -> DEBU 4ed6 Verify: sig = 00000000 30 44 02 20 5f fe 52 b0 8c 5f 5a d0 23 01 c9 dd |0D. _.R.._Z.#...| +peer0.org1.example.com | 00000010 6a 43 17 ca e7 f7 5a 54 77 6a ab 21 55 5c 7f b8 |jC....ZTwj.!U\..| +peer0.org1.example.com | 00000020 db da 46 ab 02 20 4d c7 4c 0b 8a a4 2e d8 b9 18 |..F.. M.L.......| +peer0.org1.example.com | 00000030 76 2c 17 88 23 39 f9 f7 5e b3 48 d7 51 f7 1b aa |v,..#9..^.H.Q...| +peer0.org1.example.com | 00000040 7d 9a eb 27 dc 37 |}..'.7|" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [cauthdsl] func2 -> DEBU 4ed7 0xc0047a14a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [cauthdsl] func1 -> DEBU 4ed8 0xc0047a14a0 gate 1569287150914164100 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4ed9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4edb Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4edc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4edd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ede Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4edf Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [msp.identity] Verify -> DEBU 4ee0 Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +peer0.org1.example.com | 00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [msp.identity] Verify -> DEBU 4ee1 Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +peer0.org1.example.com | 00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +peer0.org1.example.com | 00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +peer0.org1.example.com | 00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +peer0.org1.example.com | 00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ee2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ee3 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee4 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ee6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.920 UTC [msp.identity] Verify -> DEBU 4ee7 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +peer0.org1.example.com | 00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +peer0.org1.example.com | "2019-09-24 01:05:50.920 UTC [msp.identity] Verify -> DEBU 4ee9 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +peer0.org1.example.com | 00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +peer0.org1.example.com | 00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +peer0.org1.example.com | 00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +peer0.org1.example.com | 00000040 9c 95 af 2a ec 88 c5 |...*...|" +peer0.org1.example.com | "2019-09-24 01:05:50.920 UTC [gossip.gossip] handleMessage -> DEBU 4ee8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.921 UTC [gossip.gossip] handleMessage -> DEBU 4eea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.921 UTC [msp.identity] Verify -> DEBU 4eeb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +peer0.org1.example.com | "2019-09-24 01:05:50.921 UTC [msp.identity] Verify -> DEBU 4eec Verify: sig = 00000000 30 44 02 20 4f ac cd 46 08 f0 47 e1 ca c0 e5 76 |0D. O..F..G....v| +peer0.org1.example.com | 00000010 b0 2f 94 28 8f aa c9 09 16 f3 43 c4 e3 61 51 18 |./.(......C..aQ.| +peer0.org1.example.com | 00000020 c9 ae af 8b 02 20 36 f3 9d 75 18 08 32 cb 42 10 |..... 6..u..2.B.| +peer0.org1.example.com | 00000030 99 e7 c8 aa 6c a4 9e 9f a8 e6 df b9 06 52 9e a4 |....l........R..| +peer0.org1.example.com | 00000040 96 1b 33 53 7b eb |..3S{.|" +peer0.org1.example.com | "2019-09-24 01:05:50.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.922 UTC [gossip.discovery] isSentByMe -> DEBU 4eee Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eef Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ef0 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ef1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.924 UTC [gossip.gossip] handleMessage -> DEBU 4ef2 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ef3 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.924 UTC [msp.identity] Verify -> DEBU 4ef4 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +peer0.org1.example.com | 00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +peer0.org1.example.com | "2019-09-24 01:05:50.925 UTC [msp.identity] Verify -> DEBU 4ef5 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +peer0.org1.example.com | 00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +peer0.org1.example.com | 00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +peer0.org1.example.com | 00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +peer0.org1.example.com | 00000040 9c 95 af 2a ec 88 c5 |...*...|" +peer0.org1.example.com | "2019-09-24 01:05:50.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ef6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.925 UTC [gossip.discovery] isSentByMe -> DEBU 4ef7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ef8 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ef9 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.926 UTC [msp] DeserializeIdentity -> DEBU 4efa Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4efc Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4efd Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:50.928 UTC [policies] Evaluate -> DEBU 4efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.928 UTC [policies] Evaluate -> DEBU 4eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:50.929 UTC [policies] Evaluate -> DEBU 4f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.929 UTC [cauthdsl] func1 -> DEBU 4f01 0xc0047cd090 gate 1569287150929336700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.929 UTC [cauthdsl] func2 -> DEBU 4f02 0xc0047cd090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.929 UTC [cauthdsl] func2 -> DEBU 4f03 0xc0047cd090 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.930 UTC [cauthdsl] func2 -> DEBU 4f04 0xc0047cd090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.930 UTC [cauthdsl] func2 -> DEBU 4f05 0xc0047cd090 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.930 UTC [cauthdsl] func1 -> DEBU 4f06 0xc0047cd090 gate 1569287150929336700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f07 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.931 UTC [cauthdsl] func1 -> DEBU 4f0a 0xc0047cd8d0 gate 1569287150931870900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0b 0xc0047cd8d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0c 0xc0047cd8d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0d 0xc0047cd8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:50.933 UTC [cauthdsl] func2 -> DEBU 4f0e 0xc0047cd8d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.933 UTC [cauthdsl] func1 -> DEBU 4f0f 0xc0047cd8d0 gate 1569287150931870900 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f10 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:50.934 UTC [cauthdsl] func1 -> DEBU 4f13 0xc0047e4110 gate 1569287150934155200 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:50.934 UTC [cauthdsl] func2 -> DEBU 4f14 0xc0047e4110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:50.934 UTC [cauthdsl] func2 -> DEBU 4f15 0xc0047e4110 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:50.935 UTC [cauthdsl] func2 -> DEBU 4f16 0xc0047e4110 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.935 UTC [msp.identity] Verify -> DEBU 4f17 Verify: digest = 00000000 13 d9 36 90 f6 2e 5f 73 92 b0 36 ff 20 19 aa c2 |..6..._s..6. ...| +peer0.org1.example.com | 00000010 7c 05 b8 9a 6c 9d 23 32 26 81 1c 74 c0 b9 4a 75 ||...l.#2&..t..Ju|" +peer0.org1.example.com | "2019-09-24 01:05:50.935 UTC [msp.identity] Verify -> DEBU 4f18 Verify: sig = 00000000 30 44 02 20 7c 75 03 d5 c8 67 8c 4e 3a c3 7b 01 |0D. |u...g.N:.{.| +peer0.org1.example.com | 00000010 1f 70 70 25 4c 6a 09 76 c9 5d 97 fa db 6f 26 4e |.pp%Lj.v.]...o&N| +peer0.org1.example.com | 00000020 74 10 fb cb 02 20 74 a1 81 cf b2 2b fe a8 50 08 |t.... t....+..P.| +peer0.org1.example.com | 00000030 86 fb ee 6f 38 38 f4 f0 00 7f ec 83 92 54 6a 6e |...o88.......Tjn| +peer0.org1.example.com | 00000040 7b cd 5e 59 28 15 |{.^Y(.|" +peer0.org1.example.com | "2019-09-24 01:05:50.936 UTC [cauthdsl] func2 -> DEBU 4f19 0xc0047e4110 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:50.936 UTC [cauthdsl] func1 -> DEBU 4f1a 0xc0047e4110 gate 1569287150934155200 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:50.936 UTC [policies] Evaluate -> DEBU 4f1b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.936 UTC [policies] Evaluate -> DEBU 4f1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.937 UTC [policies] Evaluate -> DEBU 4f1d Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.937 UTC [policies] Evaluate -> DEBU 4f1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:50.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f1f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f20 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f21 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +peer0.org1.example.com | "2019-09-24 01:05:50.939 UTC [msp.identity] Verify -> DEBU 4f22 Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +peer0.org1.example.com | 00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +peer0.org1.example.com | "2019-09-24 01:05:50.939 UTC [msp.identity] Verify -> DEBU 4f23 Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +peer0.org1.example.com | 00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +peer0.org1.example.com | 00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +peer0.org1.example.com | 00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +peer0.org1.example.com | 00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +peer0.org1.example.com | "2019-09-24 01:05:50.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f24 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:50.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f25 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:50.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f26 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:51.702 UTC [gossip.election] waitForInterrupt -> DEBU 4f27 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +peer0.org1.example.com | "2019-09-24 01:05:51.702 UTC [gossip.election] IsLeader -> DEBU 4f28 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +peer0.org1.example.com | "2019-09-24 01:05:51.702 UTC [msp] GetDefaultSigningIdentity -> DEBU 4f29 Obtaining default signing identity" +peer0.org1.example.com | "2019-09-24 01:05:51.702 UTC [msp.identity] Sign -> DEBU 4f2a Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510121801 " +peer0.org1.example.com | "2019-09-24 01:05:51.702 UTC [msp.identity] Sign -> DEBU 4f2b Sign: digest: B09F0DFAC2F407E9E4B4E9E08679DE00F41B55FF152DFB3504B9A73D92408C16 " +peer0.org1.example.com | "2019-09-24 01:05:51.703 UTC [gossip.election] waitForInterrupt -> DEBU 4f2c d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +peer0.org1.example.com | "2019-09-24 01:05:51.706 UTC [msp] DeserializeIdentity -> DEBU 4f2d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [msp] DeserializeIdentity -> DEBU 4f2e Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [msp] DeserializeIdentity -> DEBU 4f2f Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [msp] DeserializeIdentity -> DEBU 4f30 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [gossip.comm] Send -> DEBU 4f31 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [msp] DeserializeIdentity -> DEBU 4f32 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [msp] DeserializeIdentity -> DEBU 4f33 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4f34 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +peer0.org1.example.com | "2019-09-24 01:05:51.707 UTC [gossip.comm] sendToEndpoint -> DEBU 4f35 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.630 UTC [msp] DeserializeIdentity -> DEBU 4f36 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.630 UTC [msp] DeserializeIdentity -> DEBU 4f37 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.630 UTC [gossip.comm] Send -> DEBU 4f38 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +peer0.org1.example.com | "2019-09-24 01:05:53.630 UTC [gossip.comm] sendToEndpoint -> DEBU 4f39 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.631 UTC [gossip.comm] sendToEndpoint -> DEBU 4f3a Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.631 UTC [gossip.comm] sendToEndpoint -> DEBU 4f3b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.631 UTC [gossip.comm] sendToEndpoint -> DEBU 4f3c Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.631 UTC [gossip.comm] sendToEndpoint -> DEBU 4f3d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.631 UTC [gossip.comm] sendToEndpoint -> DEBU 4f3e Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.632 UTC [gossip.comm] func1 -> DEBU 4f3f Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.632 UTC [gossip.gossip] handleMessage -> DEBU 4f40 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [msp] DeserializeIdentity -> DEBU 4f41 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [msp] DeserializeIdentity -> DEBU 4f42 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [msp] DeserializeIdentity -> DEBU 4f43 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f44 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f45 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f46 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f47 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f48 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f49 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func1 -> DEBU 4f4a 0xc004809680 gate 1569287153633453600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f4b 0xc004809680 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f4c 0xc004809680 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f4d 0xc004809680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f4e 0xc004809680 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func1 -> DEBU 4f4f 0xc004809680 gate 1569287153633453600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f50 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func1 -> DEBU 4f53 0xc004809ec0 gate 1569287153633697600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f54 0xc004809ec0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f55 0xc004809ec0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f56 0xc004809ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f57 0xc004809ec0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func1 -> DEBU 4f58 0xc004809ec0 gate 1569287153633697600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f59 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [policies] Evaluate -> DEBU 4f5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func1 -> DEBU 4f5c 0xc004828700 gate 1569287153633935900 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f5d 0xc004828700 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.633 UTC [cauthdsl] func2 -> DEBU 4f5e 0xc004828700 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [cauthdsl] func2 -> DEBU 4f5f 0xc004828700 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f60 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f61 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [cauthdsl] func2 -> DEBU 4f62 0xc004828700 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [cauthdsl] func1 -> DEBU 4f63 0xc004828700 gate 1569287153633935900 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [policies] Evaluate -> DEBU 4f64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [policies] Evaluate -> DEBU 4f65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [policies] Evaluate -> DEBU 4f66 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [policies] Evaluate -> DEBU 4f67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f68 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f69 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f6a Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp.identity] Verify -> DEBU 4f6b Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp] DeserializeIdentity -> DEBU 4f6c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [msp] DeserializeIdentity -> DEBU 4f6d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.634 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f6e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6f Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f70 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f71 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f72 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f73 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f74 0xc00483ad10 gate 1569287153635122100 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f75 0xc00483ad10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f76 0xc00483ad10 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f77 0xc00483ad10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f78 0xc00483ad10 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f79 0xc00483ad10 gate 1569287153635122100 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f7a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f7b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f7c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f7d 0xc00483b550 gate 1569287153635360800 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f7e 0xc00483b550 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f7f 0xc00483b550 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f80 0xc00483b550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f81 0xc00483b550 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f82 0xc00483b550 gate 1569287153635360800 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f83 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f86 0xc00483bd90 gate 1569287153635591700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f87 0xc00483bd90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f88 0xc00483bd90 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f89 0xc00483bd90 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [msp.identity] Verify -> DEBU 4f8a Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [msp.identity] Verify -> DEBU 4f8b Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func2 -> DEBU 4f8c 0xc00483bd90 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [cauthdsl] func1 -> DEBU 4f8d 0xc00483bd90 gate 1569287153635591700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f8e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f8f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f90 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [policies] Evaluate -> DEBU 4f91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.635 UTC [gossip.gossip] handleMessage -> DEBU 4f92 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [gossip.comm] func1 -> DEBU 4f93 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [gossip.gossip] handleMessage -> DEBU 4f94 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [msp] DeserializeIdentity -> DEBU 4f95 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [msp] DeserializeIdentity -> DEBU 4f96 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [msp] DeserializeIdentity -> DEBU 4f97 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4f98 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f99 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f9a Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4f9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4f9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4f9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func1 -> DEBU 4f9e 0xc00484fa00 gate 1569287153636522300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func2 -> DEBU 4f9f 0xc00484fa00 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func2 -> DEBU 4fa0 0xc00484fa00 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func2 -> DEBU 4fa1 0xc00484fa00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func2 -> DEBU 4fa2 0xc00484fa00 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func1 -> DEBU 4fa3 0xc00484fa00 gate 1569287153636522300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4fa4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4fa5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [policies] Evaluate -> DEBU 4fa6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func1 -> DEBU 4fa7 0xc004864240 gate 1569287153636868600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.636 UTC [cauthdsl] func2 -> DEBU 4fa8 0xc004864240 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fa9 0xc004864240 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4faa 0xc004864240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fab 0xc004864240 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func1 -> DEBU 4fac 0xc004864240 gate 1569287153636868600 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4faf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func1 -> DEBU 4fb0 0xc004864a80 gate 1569287153637384300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fb1 0xc004864a80 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fb2 0xc004864a80 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fb3 0xc004864a80 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [msp.identity] Verify -> DEBU 4fb4 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [msp.identity] Verify -> DEBU 4fb5 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func2 -> DEBU 4fb6 0xc004864a80 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [cauthdsl] func1 -> DEBU 4fb7 0xc004864a80 gate 1569287153637384300 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fb8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fb9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fba Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [policies] Evaluate -> DEBU 4fbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [msp.identity] Verify -> DEBU 4fbc Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:53.637 UTC [msp.identity] Verify -> DEBU 4fbd Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [msp.identity] Verify -> DEBU 4fbe Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [msp.identity] Verify -> DEBU 4fbf Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [msp] DeserializeIdentity -> DEBU 4fc0 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [msp] DeserializeIdentity -> DEBU 4fc1 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4fc2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fc3 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fc4 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fc5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fc6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fc7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func1 -> DEBU 4fc8 0xc004881090 gate 1569287153638615500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fc9 0xc004881090 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fca 0xc004881090 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fcb 0xc004881090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fcc 0xc004881090 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func1 -> DEBU 4fcd 0xc004881090 gate 1569287153638615500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [policies] Evaluate -> DEBU 4fd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func1 -> DEBU 4fd1 0xc0048818d0 gate 1569287153638905400 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fd2 0xc0048818d0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.638 UTC [cauthdsl] func2 -> DEBU 4fd3 0xc0048818d0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fd4 0xc0048818d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fd5 0xc0048818d0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func1 -> DEBU 4fd6 0xc0048818d0 gate 1569287153638905400 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fd7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fd8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func1 -> DEBU 4fda 0xc004890110 gate 1569287153639167700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fdb 0xc004890110 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fdc 0xc004890110 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fdd 0xc004890110 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [msp.identity] Verify -> DEBU 4fde Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [msp.identity] Verify -> DEBU 4fdf Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func2 -> DEBU 4fe0 0xc004890110 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [cauthdsl] func1 -> DEBU 4fe1 0xc004890110 gate 1569287153639167700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fe2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fe3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fe4 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [policies] Evaluate -> DEBU 4fe5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.639 UTC [gossip.gossip] handleMessage -> DEBU 4fe6 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.643 UTC [gossip.gossip] handleMessage -> DEBU 4fe7 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.644 UTC [msp.identity] Verify -> DEBU 4fe8 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +peer0.org1.example.com | 00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +peer0.org1.example.com | "2019-09-24 01:05:53.644 UTC [msp.identity] Verify -> DEBU 4fe9 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +peer0.org1.example.com | 00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +peer0.org1.example.com | 00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +peer0.org1.example.com | 00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +peer0.org1.example.com | 00000040 c9 51 67 e6 8e 78 |.Qg..x|" +peer0.org1.example.com | "2019-09-24 01:05:53.645 UTC [msp.identity] Verify -> DEBU 4fea Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +peer0.org1.example.com | 00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +peer0.org1.example.com | "2019-09-24 01:05:53.645 UTC [msp.identity] Verify -> DEBU 4feb Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +peer0.org1.example.com | 00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +peer0.org1.example.com | 00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +peer0.org1.example.com | 00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +peer0.org1.example.com | 00000040 6d 24 7d bd 89 f8 |m$}...|" +peer0.org1.example.com | "2019-09-24 01:05:53.646 UTC [msp] DeserializeIdentity -> DEBU 4fec Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.646 UTC [msp] DeserializeIdentity -> DEBU 4fed Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.646 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4fee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4fef Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.647 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ff0 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.647 UTC [policies] Evaluate -> DEBU 4ff1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.647 UTC [policies] Evaluate -> DEBU 4ff2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.648 UTC [policies] Evaluate -> DEBU 4ff3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.648 UTC [cauthdsl] func1 -> DEBU 4ff4 0xc0048ae490 gate 1569287153648319300 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.648 UTC [cauthdsl] func2 -> DEBU 4ff5 0xc0048ae490 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.648 UTC [cauthdsl] func2 -> DEBU 4ff6 0xc0048ae490 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.648 UTC [cauthdsl] func2 -> DEBU 4ff7 0xc0048ae490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.649 UTC [cauthdsl] func2 -> DEBU 4ff8 0xc0048ae490 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.649 UTC [cauthdsl] func1 -> DEBU 4ff9 0xc0048ae490 gate 1569287153648319300 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.649 UTC [policies] Evaluate -> DEBU 4ffa Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.649 UTC [policies] Evaluate -> DEBU 4ffb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.649 UTC [policies] Evaluate -> DEBU 4ffc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.650 UTC [cauthdsl] func1 -> DEBU 4ffd 0xc0048aecd0 gate 1569287153650594500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.650 UTC [cauthdsl] func2 -> DEBU 4ffe 0xc0048aecd0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.651 UTC [cauthdsl] func2 -> DEBU 4fff 0xc0048aecd0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.651 UTC [cauthdsl] func2 -> DEBU 5000 0xc0048aecd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.651 UTC [cauthdsl] func2 -> DEBU 5001 0xc0048aecd0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.651 UTC [cauthdsl] func1 -> DEBU 5002 0xc0048aecd0 gate 1569287153650594500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.653 UTC [policies] Evaluate -> DEBU 5003 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.653 UTC [policies] Evaluate -> DEBU 5004 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.654 UTC [policies] Evaluate -> DEBU 5005 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.654 UTC [cauthdsl] func1 -> DEBU 5006 0xc0048af510 gate 1569287153654700700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.657 UTC [cauthdsl] func2 -> DEBU 5007 0xc0048af510 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.659 UTC [cauthdsl] func2 -> DEBU 5008 0xc0048af510 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.659 UTC [cauthdsl] func2 -> DEBU 5009 0xc0048af510 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.660 UTC [msp.identity] Verify -> DEBU 500a Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +peer0.org1.example.com | 00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +peer0.org1.example.com | "2019-09-24 01:05:53.660 UTC [msp.identity] Verify -> DEBU 500b Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +peer0.org1.example.com | 00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +peer0.org1.example.com | 00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +peer0.org1.example.com | 00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +peer0.org1.example.com | 00000040 56 2b e3 0e fd cb |V+....|" +peer0.org1.example.com | "2019-09-24 01:05:53.665 UTC [cauthdsl] func2 -> DEBU 500c 0xc0048af510 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.666 UTC [cauthdsl] func1 -> DEBU 500d 0xc0048af510 gate 1569287153654700700 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.666 UTC [policies] Evaluate -> DEBU 500e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.666 UTC [policies] Evaluate -> DEBU 500f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.667 UTC [policies] Evaluate -> DEBU 5010 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.667 UTC [policies] Evaluate -> DEBU 5011 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.668 UTC [msp] DeserializeIdentity -> DEBU 5012 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.672 UTC [msp] DeserializeIdentity -> DEBU 5013 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5014 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +peer0.org1.example.com | "2019-09-24 01:05:53.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5015 Got policy manager for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5016 Got reader policy for channel [businesschannel] with flag [true]" +peer0.org1.example.com | "2019-09-24 01:05:53.675 UTC [policies] Evaluate -> DEBU 5017 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.676 UTC [policies] Evaluate -> DEBU 5018 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | "2019-09-24 01:05:53.676 UTC [policies] Evaluate -> DEBU 5019 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.677 UTC [cauthdsl] func1 -> DEBU 501a 0xc0048bace0 gate 1569287153677245700 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.683 UTC [cauthdsl] func2 -> DEBU 501b 0xc0048bace0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.683 UTC [cauthdsl] func2 -> DEBU 501c 0xc0048bace0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.683 UTC [cauthdsl] func2 -> DEBU 501d 0xc0048bace0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 501e 0xc0048bace0 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func1 -> DEBU 501f 0xc0048bace0 gate 1569287153677245700 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 5020 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 5021 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 5022 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func1 -> DEBU 5023 0xc004891460 gate 1569287153684208500 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 5024 0xc004891460 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 5025 0xc004891460 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 5026 0xc004891460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 5027 0xc004891460 principal evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func1 -> DEBU 5028 0xc004891460 gate 1569287153684208500 evaluation fails" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 5029 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 502a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [policies] Evaluate -> DEBU 502b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func1 -> DEBU 502c 0xc004891ca0 gate 1569287153684458600 evaluation starts" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 502d 0xc004891ca0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 502e 0xc004891ca0 processing identity 0 with bytes of 1150090" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 502f 0xc004891ca0 principal matched by identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [msp.identity] Verify -> DEBU 5030 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +peer0.org1.example.com | 00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [msp.identity] Verify -> DEBU 5031 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +peer0.org1.example.com | 00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +peer0.org1.example.com | 00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +peer0.org1.example.com | 00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +peer0.org1.example.com | 00000040 82 7d 0d 15 0e 1f |.}....|" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func2 -> DEBU 5032 0xc004891ca0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | "2019-09-24 01:05:53.684 UTC [cauthdsl] func1 -> DEBU 5033 0xc004891ca0 gate 1569287153684458600 evaluation succeeds" +peer0.org1.example.com | "2019-09-24 01:05:53.689 UTC [policies] Evaluate -> DEBU 5034 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.689 UTC [policies] Evaluate -> DEBU 5035 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.689 UTC [policies] Evaluate -> DEBU 5036 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.689 UTC [policies] Evaluate -> DEBU 5037 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | "2019-09-24 01:05:53.689 UTC [gossip.gossip] handleMessage -> DEBU 5038 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.715 UTC [msp] DeserializeIdentity -> DEBU 5039 Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.716 UTC [msp] DeserializeIdentity -> DEBU 503a Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.716 UTC [gossip.pull] Hello -> DEBU 503b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +peer0.org1.example.com | "2019-09-24 01:05:53.716 UTC [msp] DeserializeIdentity -> DEBU 503c Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.716 UTC [msp] DeserializeIdentity -> DEBU 503d Obtaining identity" +peer0.org1.example.com | "2019-09-24 01:05:53.717 UTC [gossip.comm] Send -> DEBU 503e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +peer0.org1.example.com | "2019-09-24 01:05:53.717 UTC [gossip.comm] sendToEndpoint -> DEBU 503f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +peer0.org1.example.com | "2019-09-24 01:05:53.717 UTC [gossip.comm] sendToEndpoint -> DEBU 5040 Exiting" +peer0.org1.example.com | "2019-09-24 01:05:53.720 UTC [gossip.gossip] handleMessage -> DEBU 5041 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" diff --git a/hyperledger_fabric/v1.4.3/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.3/raft/logs/dev_orderer.log new file mode 100644 index 00000000..3938db8e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/logs/dev_orderer.log @@ -0,0 +1,9497 @@ +2019-09-24 01:04:15.903 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for operations +2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for operations.TLS +2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for operations.TLS.Enabled setting to bool false +2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.904 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for operations.TLS.Certificate setting to +2019-09-24 01:04:15.904 UTC [viperutil] unmarshalJSON -> DEBU 009 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00a Found real value for operations.TLS.PrivateKey setting to +2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00b Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00c Found real value for operations.TLS.ClientAuthRequired setting to bool false +2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: [] +2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for operations.TLS.RootCAs setting to +2019-09-24 01:04:15.905 UTC [viperutil] getKeysRecursively -> DEBU 011 Found map[interface{}]interface{} value for metrics +2019-09-24 01:04:15.905 UTC [viperutil] unmarshalJSON -> DEBU 012 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 013 Found real value for metrics.Provider setting to string prometheus +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 014 Found map[string]interface{} value for metrics.Statsd +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for metrics.Statsd.WriteInterval setting to string 30s +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for metrics.Statsd.Prefix setting to +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for metrics.Statsd.Network setting to string udp +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[interface{}]interface{} value for consensus +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2019-09-24 01:04:15.906 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2019-09-24 01:04:15.906 UTC [viperutil] getKeysRecursively -> DEBU 022 Found map[interface{}]interface{} value for general +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 023 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 024 Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 025 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 026 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 027 Found map[string]interface{} value for general.Profile +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for general.Profile.Enabled setting to bool false +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.LedgerType setting to string file +2019-09-24 01:04:15.907 UTC [viperutil] getKeysRecursively -> DEBU 02e Found map[string]interface{} value for general.Cluster +2019-09-24 01:04:15.907 UTC [viperutil] unmarshalJSON -> DEBU 02f Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 030 Found real value for general.Cluster.ServerCertificate setting to +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 031 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 032 Found real value for general.Cluster.ReplicationPullTimeout setting to +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 033 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 034 Found real value for general.Cluster.ReplicationRetryTimeout setting to +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 035 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 036 Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 037 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 038 Found real value for general.Cluster.ListenAddress setting to +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 039 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.908 UTC [viperutil] getKeysRecursively -> DEBU 03a Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-09-24 01:04:15.908 UTC [viperutil] unmarshalJSON -> DEBU 03b Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 03c Found real value for general.Cluster.DialTimeout setting to +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 03d Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 03e Found real value for general.Cluster.ReplicationBufferSize setting to +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 03f Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 040 Found real value for general.Cluster.TLSHandshakeTimeShift setting to +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value is not a string: 10 +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Cluster.SendBufferSize setting to int 10 +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 045 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 046 Found real value for general.Cluster.ListenPort setting to +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 047 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.909 UTC [viperutil] getKeysRecursively -> DEBU 048 Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2019-09-24 01:04:15.909 UTC [viperutil] unmarshalJSON -> DEBU 049 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04a Found real value for general.Cluster.ReplicationMaxRetries setting to +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04b Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04c Found real value for general.Cluster.ServerPrivateKey setting to +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04d Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 04e Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.Cluster.RPCTimeout setting to +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 051 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 052 Found real value for general.ListenPort setting to string 7050 +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 053 Found map[string]interface{} value for general.Keepalive +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 054 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 055 Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 056 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 057 Found real value for general.Keepalive.ServerInterval setting to string 7200s +2019-09-24 01:04:15.910 UTC [viperutil] unmarshalJSON -> DEBU 058 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.910 UTC [viperutil] getKeysRecursively -> DEBU 059 Found real value for general.Keepalive.ServerTimeout setting to string 20s +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.GenesisMethod setting to string file +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.ListenAddress setting to string 0.0.0.0 +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 05e Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 05f Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 060 Found map[string]interface{} value for general.Authentication +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 061 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 062 Found real value for general.Authentication.TimeWindow setting to string 15m +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 063 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 064 Found real value for general.Authentication.NoExpirationChecks setting to +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 065 Found map[string]interface{} value for general.TLS +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 066 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 067 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 068 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 069 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.911 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2019-09-24 01:04:15.911 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.TLS.ClientAuthRequired setting to bool false +2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.TLS.ClientRootCAs setting to +2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 070 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 071 Found real value for general.TLS.Enabled setting to string true +2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 072 Found map[string]interface{} value for general.BCCSP +2019-09-24 01:04:15.912 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 01:04:15.912 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for general.BCCSP.Default setting to string SW +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[string]interface{} value for general.BCCSP.SW +2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: 256 +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for general.BCCSP.SW.Security setting to int 256 +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07a Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07b Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07c Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07d Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 07e Found real value for general.LocalMSPID setting to string OrdererMSP +2019-09-24 01:04:15.913 UTC [viperutil] unmarshalJSON -> DEBU 07f Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.913 UTC [viperutil] getKeysRecursively -> DEBU 080 Found real value for general.ConnectionTimeout setting to +2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 081 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 082 Found real value for general.SystemChannel setting to +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 083 Found map[interface{}]interface{} value for fileledger +2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 084 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 085 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 086 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 087 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 088 Found map[interface{}]interface{} value for ramledger +2019-09-24 01:04:15.914 UTC [viperutil] unmarshalJSON -> DEBU 089 Unmarshal JSON: value is not a string: 1000 +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 08a Found real value for ramledger.HistorySize setting to int 1000 +2019-09-24 01:04:15.914 UTC [viperutil] getKeysRecursively -> DEBU 08b Found map[interface{}]interface{} value for kafka +2019-09-24 01:04:15.915 UTC [viperutil] getKeysRecursively -> DEBU 08c Found map[string]interface{} value for kafka.TLS +2019-09-24 01:04:15.915 UTC [viperutil] unmarshalJSON -> DEBU 08d Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.916 UTC [viperutil] getKeysRecursively -> DEBU 08e Found real value for kafka.TLS.RootCAs setting to +2019-09-24 01:04:15.916 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.916 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.TLS.Enabled setting to bool false +2019-09-24 01:04:15.923 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.923 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for kafka.TLS.ClientAuthRequired setting to +2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 093 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 094 Found real value for kafka.TLS.ClientRootCAs setting to +2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 095 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 096 Found real value for kafka.TLS.PrivateKey setting to +2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.TLS.Certificate setting to +2019-09-24 01:04:15.924 UTC [viperutil] getKeysRecursively -> DEBU 099 Found map[string]interface{} value for kafka.SASLPlain +2019-09-24 01:04:15.924 UTC [viperutil] unmarshalJSON -> DEBU 09a Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09b Found real value for kafka.SASLPlain.Enabled setting to bool false +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.SASLPlain.User setting to +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.SASLPlain.Password setting to +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.Version setting to +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a2 Found map[string]interface{} value for kafka.Retry +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a3 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a4 Found real value for kafka.Retry.LongInterval setting to string 5m +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a5 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a6 Found real value for kafka.Retry.LongTotal setting to string 12h +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0a8 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0a9 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0aa Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ab Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2019-09-24 01:04:15.925 UTC [viperutil] unmarshalJSON -> DEBU 0ac Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ad Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2019-09-24 01:04:15.925 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found map[string]interface{} value for kafka.Retry.Metadata +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b1 Unmarshal JSON: value is not a string: 3 +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b2 Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found map[string]interface{} value for kafka.Retry.Producer +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b6 Unmarshal JSON: value is not a string: 3 +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0b8 Found map[string]interface{} value for kafka.Retry.Consumer +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0b9 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0ba Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0bb Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0bc Found real value for kafka.Retry.ShortInterval setting to string 5s +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0bd Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0be Found real value for kafka.Retry.ShortTotal setting to string 10m +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found map[string]interface{} value for kafka.Topic +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value is not a string: 3 +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2019-09-24 01:04:15.926 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for kafka.Verbose setting to bool false +2019-09-24 01:04:15.926 UTC [viperutil] getKeysRecursively -> DEBU 0c4 Found map[interface{}]interface{} value for debug +2019-09-24 01:04:15.927 UTC [viperutil] unmarshalJSON -> DEBU 0c5 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.927 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found real value for debug.BroadcastTraceDir setting to +2019-09-24 01:04:15.934 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value is not a string: +2019-09-24 01:04:15.934 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for debug.DeliverTraceDir setting to +2019-09-24 01:04:15.935 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0c9 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress: ListenPort: RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate: ServerPrivateKey: TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2019-09-24 01:04:15.937 UTC [localconfig] completeInitialization -> INFO 0ca Kafka.Version unset, setting to 0.10.2.0 +"2019-09-24 01:04:15.949 UTC [bccsp_sw] openKeyStore -> DEBU 0cb KeyStore opened at [/var/hyperledger/orderer/msp/keystore]...done" +"2019-09-24 01:04:15.949 UTC [bccsp] initBCCSP -> DEBU 0cc Initialize BCCSP [SW]" +"2019-09-24 01:04:15.949 UTC [msp] getPemMaterialFromDir -> DEBU 0cd Reading directory /var/hyperledger/orderer/msp/signcerts" +"2019-09-24 01:04:15.959 UTC [msp] getPemMaterialFromDir -> DEBU 0ce Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2019-09-24 01:04:15.965 UTC [msp] getPemMaterialFromDir -> DEBU 0cf Reading directory /var/hyperledger/orderer/msp/cacerts" +"2019-09-24 01:04:15.975 UTC [msp] getPemMaterialFromDir -> DEBU 0d0 Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2019-09-24 01:04:15.989 UTC [msp] getPemMaterialFromDir -> DEBU 0d1 Reading directory /var/hyperledger/orderer/msp/admincerts" +"2019-09-24 01:04:16.005 UTC [msp] getPemMaterialFromDir -> DEBU 0d2 Inspecting file /var/hyperledger/orderer/msp/admincerts/Admin@example.com-cert.pem" +"2019-09-24 01:04:16.055 UTC [msp] getPemMaterialFromDir -> DEBU 0d3 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2019-09-24 01:04:16.057 UTC [msp] getMspConfig -> DEBU 0d4 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2019-09-24 01:04:16.057 UTC [msp] getPemMaterialFromDir -> DEBU 0d5 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2019-09-24 01:04:16.065 UTC [msp] getPemMaterialFromDir -> DEBU 0d6 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2019-09-24 01:04:16.069 UTC [msp] getPemMaterialFromDir -> DEBU 0d7 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2019-09-24 01:04:16.069 UTC [msp] getMspConfig -> DEBU 0d8 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2019-09-24 01:04:16.069 UTC [msp] getPemMaterialFromDir -> DEBU 0d9 Reading directory /var/hyperledger/orderer/msp/crls" +"2019-09-24 01:04:16.070 UTC [msp] getMspConfig -> DEBU 0da crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2019-09-24 01:04:16.071 UTC [msp] getMspConfig -> DEBU 0db MSP configuration file not found at [/var/hyperledger/orderer/msp/config.yaml]: [stat /var/hyperledger/orderer/msp/config.yaml: no such file or directory]" +"2019-09-24 01:04:16.071 UTC [msp] newBccspMsp -> DEBU 0dc Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.072 UTC [msp] New -> DEBU 0dd Creating Cache-MSP instance" +"2019-09-24 01:04:16.072 UTC [msp] loadLocaMSP -> DEBU 0de Created new local MSP" +"2019-09-24 01:04:16.072 UTC [msp] Setup -> DEBU 0df Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:16.072 UTC [msp.identity] newIdentity -> DEBU 0e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.072 UTC [msp.identity] newIdentity -> DEBU 0e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.097 UTC [bccsp_sw] loadPrivateKey -> DEBU 0e2 Loading private key [0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f] at [/var/hyperledger/orderer/msp/keystore/0f81addff7fdd17a84732ec32ca810bd6011a47f4af82b6357ba3bd5773d146f_sk]..." +"2019-09-24 01:04:16.102 UTC [msp.identity] newIdentity -> DEBU 0e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.102 UTC [msp] setupSigningIdentity -> DEBU 0e4 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +"2019-09-24 01:04:16.103 UTC [msp.identity] newIdentity -> DEBU 0e5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.103 UTC [msp] Validate -> DEBU 0e6 MSP OrdererMSP validating identity" +"2019-09-24 01:04:16.103 UTC [orderer.common.server] prettyPrintStruct -> INFO 0e7 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Cluster.TLSHandshakeTimeShift = 0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + General.Authentication.NoExpirationChecks = false + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-09-24 01:04:16.108 UTC [common.channelconfig] NewStandardValues -> DEBU 0e8 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0e9 Processing field: HashingAlgorithm" +"2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ea Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:16.108 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0eb Processing field: OrdererAddresses" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ec Processing field: Consortium" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ed Processing field: Capabilities" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] NewStandardValues -> DEBU 0ee Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0ef Processing field: ConsensusType" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f0 Processing field: BatchSize" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f1 Processing field: BatchTimeout" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f2 Processing field: KafkaBrokers" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f3 Processing field: ChannelRestrictions" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: Capabilities" +"2019-09-24 01:04:16.109 UTC [common.channelconfig] NewStandardValues -> DEBU 0f5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: Endpoints" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] NewStandardValues -> DEBU 0f7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: MSP" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] validateMSP -> DEBU 0f9 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:16.110 UTC [msp] newBccspMsp -> DEBU 0fa Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.110 UTC [msp] New -> DEBU 0fb Creating Cache-MSP instance" +"2019-09-24 01:04:16.110 UTC [msp] Setup -> DEBU 0fc Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:16.110 UTC [msp.identity] newIdentity -> DEBU 0fd Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.110 UTC [msp.identity] newIdentity -> DEBU 0fe Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.110 UTC [msp] Validate -> DEBU 0ff MSP OrdererMSP validating identity" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] NewStandardValues -> DEBU 100 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 01:04:16.110 UTC [common.channelconfig] initializeProtosStruct -> DEBU 101 Processing field: ChannelCreationPolicy" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:16.111 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.111 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +"2019-09-24 01:04:16.111 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:16.111 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: MSP" +"2019-09-24 01:04:16.111 UTC [common.channelconfig] validateMSP -> DEBU 10b Setting up MSP for org Org2MSP" +"2019-09-24 01:04:16.111 UTC [msp] newBccspMsp -> DEBU 10c Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.111 UTC [msp] New -> DEBU 10d Creating Cache-MSP instance" +"2019-09-24 01:04:16.111 UTC [msp] Setup -> DEBU 10e Setting up MSP instance Org2MSP" +"2019-09-24 01:04:16.111 UTC [msp.identity] newIdentity -> DEBU 10f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.112 UTC [msp] Setup -> DEBU 110 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:16.112 UTC [msp] Setup -> DEBU 111 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:16.112 UTC [policies] NewManagerImpl -> DEBU 112 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 113 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 114 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 115 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 116 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 117 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 118 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 119 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel" +"2019-09-24 01:04:16.113 UTC [policies] GetPolicy -> DEBU 123 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel" +"2019-09-24 01:04:16.113 UTC [policies] GetPolicy -> DEBU 125 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 01:04:16.113 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Writers for Channel" +"2019-09-24 01:04:16.113 UTC [common.configtx] addToMap -> DEBU 127 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 128 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 129 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12a Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 12f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:16.114 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:16.115 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:16.116 UTC [orderer.common.server] createLedgerFactory -> DEBU 14e Ledger dir: /var/hyperledger/production/orderer" +"2019-09-24 01:04:16.117 UTC [kvledger.util] CreateDirIfMissing -> DEBU 14f CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2019-09-24 01:04:16.117 UTC [kvledger.util] logDirStatus -> DEBU 150 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2019-09-24 01:04:16.117 UTC [kvledger.util] logDirStatus -> DEBU 151 After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2019-09-24 01:04:16.127 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 152 Bootstrapping because no existing channels" +"2019-09-24 01:04:16.127 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 153 Selected bootstrap block, because system channel last config block is nil" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] NewStandardValues -> DEBU 154 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 155 Processing field: HashingAlgorithm" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 156 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157 Processing field: OrdererAddresses" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158 Processing field: Consortium" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159 Processing field: Capabilities" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] NewStandardValues -> DEBU 15a Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b Processing field: ConsensusType" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c Processing field: BatchSize" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15d Processing field: BatchTimeout" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15e Processing field: KafkaBrokers" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: ChannelRestrictions" +"2019-09-24 01:04:16.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: Capabilities" +"2019-09-24 01:04:16.129 UTC [common.channelconfig] NewStandardValues -> DEBU 161 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:16.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Endpoints" +"2019-09-24 01:04:16.129 UTC [common.channelconfig] NewStandardValues -> DEBU 163 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164 Processing field: MSP" +"2019-09-24 01:04:16.129 UTC [common.channelconfig] validateMSP -> DEBU 165 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:16.129 UTC [msp] newBccspMsp -> DEBU 166 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.129 UTC [msp] New -> DEBU 167 Creating Cache-MSP instance" +"2019-09-24 01:04:16.129 UTC [msp] Setup -> DEBU 168 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:16.129 UTC [msp.identity] newIdentity -> DEBU 169 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.131 UTC [msp.identity] newIdentity -> DEBU 16a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.131 UTC [msp] Validate -> DEBU 16b MSP OrdererMSP validating identity" +"2019-09-24 01:04:16.131 UTC [common.channelconfig] NewStandardValues -> DEBU 16c Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 01:04:16.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16d Processing field: ChannelCreationPolicy" +"2019-09-24 01:04:16.131 UTC [common.channelconfig] NewStandardValues -> DEBU 16e Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16f Processing field: MSP" +"2019-09-24 01:04:16.131 UTC [common.channelconfig] validateMSP -> DEBU 170 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:16.131 UTC [msp] newBccspMsp -> DEBU 171 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.131 UTC [msp] New -> DEBU 172 Creating Cache-MSP instance" +"2019-09-24 01:04:16.131 UTC [msp] Setup -> DEBU 173 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:16.132 UTC [msp.identity] newIdentity -> DEBU 174 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.134 UTC [common.channelconfig] NewStandardValues -> DEBU 175 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: MSP" +"2019-09-24 01:04:16.135 UTC [common.channelconfig] validateMSP -> DEBU 177 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:16.136 UTC [msp] newBccspMsp -> DEBU 178 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.136 UTC [msp] New -> DEBU 179 Creating Cache-MSP instance" +"2019-09-24 01:04:16.136 UTC [msp] Setup -> DEBU 17a Setting up MSP instance Org2MSP" +"2019-09-24 01:04:16.136 UTC [msp.identity] newIdentity -> DEBU 17b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.137 UTC [msp] Setup -> DEBU 17c Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:16.137 UTC [msp] Setup -> DEBU 17d MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 17e Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 17f Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 180 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 181 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 182 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 183 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 184 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 185 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 01:04:16.137 UTC [policies] GetPolicy -> DEBU 18e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Readers for Channel" +"2019-09-24 01:04:16.137 UTC [policies] GetPolicy -> DEBU 190 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 01:04:16.137 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Writers for Channel" +"2019-09-24 01:04:16.138 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Admins for Channel" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 193 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 194 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 195 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 196 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 197 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 198 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 199 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19a Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 01:04:16.138 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:16.139 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:16.172 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 1ba Booted with a genesis block, replication isn't an option" +"2019-09-24 01:04:16.189 UTC [orderer.common.server] initializeServerConfig -> INFO 1bb Starting orderer with TLS enabled" +"2019-09-24 01:04:16.190 UTC [orderer.common.server] configureClusterListener -> INFO 1bc Cluster listener is not configured, defaulting to use the general listener on port 7050" +"2019-09-24 01:04:16.193 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1bd newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2019-09-24 01:04:16.193 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1be CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2019-09-24 01:04:16.193 UTC [kvledger.util] logDirStatus -> DEBU 1bf Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2019-09-24 01:04:16.193 UTC [kvledger.util] logDirStatus -> DEBU 1c0 After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2019-09-24 01:04:16.193 UTC [fsblkstorage] newBlockfileMgr -> INFO 1c1 Getting block information from block storage" +"2019-09-24 01:04:16.193 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c2 Retrieving checkpoint info from block files" +"2019-09-24 01:04:16.194 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c3 retrieveLastFileSuffix()" +"2019-09-24 01:04:16.194 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1c4 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 01:04:16.194 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c5 Last file number found = -1" +"2019-09-24 01:04:16.194 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1c6 No block file found" +"2019-09-24 01:04:16.197 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1c7 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0001bd1a0)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 01:04:16.199 UTC [fsblkstorage] newBlockIndex -> DEBU 1c8 newBlockIndex() - indexItems:[[BlockNum]]" +"2019-09-24 01:04:16.202 UTC [fsblkstorage] indexBlock -> DEBU 1c9 Indexing block [blockNum=0, blockHash=[]byte{0x25, 0x7e, 0xab, 0xd8, 0x68, 0xeb, 0xd9, 0xbd, 0xb4, 0x4, 0xcd, 0x1e, 0x16, 0xe1, 0x4, 0xc6, 0x94, 0x35, 0x21, 0xbd, 0x47, 0x20, 0x58, 0xe2, 0xd8, 0x22, 0x71, 0x56, 0x47, 0x67, 0xc6, 0xc1} txOffsets= +txId=bf76a1c8af33afe52bfeaae841fe7584952202796aafdef7bd136582f92a94b0 locPointer=offset=39, bytesLength=20242 +]" +"2019-09-24 01:04:16.204 UTC [fsblkstorage] updateCheckpoint -> DEBU 1ca Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[20287], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 01:04:16.205 UTC [common.channelconfig] NewStandardValues -> DEBU 1cb Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cc Processing field: HashingAlgorithm" +"2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cd Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ce Processing field: OrdererAddresses" +"2019-09-24 01:04:16.205 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cf Processing field: Consortium" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d0 Processing field: Capabilities" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: ConsensusType" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d3 Processing field: BatchSize" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d4 Processing field: BatchTimeout" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d5 Processing field: KafkaBrokers" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d6 Processing field: ChannelRestrictions" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d7 Processing field: Capabilities" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: Endpoints" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] NewStandardValues -> DEBU 1da Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: MSP" +"2019-09-24 01:04:16.211 UTC [common.channelconfig] validateMSP -> DEBU 1dc Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:16.211 UTC [msp] newBccspMsp -> DEBU 1dd Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.211 UTC [msp] New -> DEBU 1de Creating Cache-MSP instance" +"2019-09-24 01:04:16.212 UTC [msp] Setup -> DEBU 1df Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:16.212 UTC [msp.identity] newIdentity -> DEBU 1e0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.212 UTC [msp.identity] newIdentity -> DEBU 1e1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.212 UTC [msp] Validate -> DEBU 1e2 MSP OrdererMSP validating identity" +"2019-09-24 01:04:16.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1e3 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 01:04:16.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e4 Processing field: ChannelCreationPolicy" +"2019-09-24 01:04:16.213 UTC [common.channelconfig] NewStandardValues -> DEBU 1e5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.213 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e6 Processing field: MSP" +"2019-09-24 01:04:16.213 UTC [common.channelconfig] validateMSP -> DEBU 1e7 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:16.213 UTC [msp] newBccspMsp -> DEBU 1e8 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.213 UTC [msp] New -> DEBU 1e9 Creating Cache-MSP instance" +"2019-09-24 01:04:16.213 UTC [msp] Setup -> DEBU 1ea Setting up MSP instance Org2MSP" +"2019-09-24 01:04:16.213 UTC [msp.identity] newIdentity -> DEBU 1eb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.214 UTC [common.channelconfig] NewStandardValues -> DEBU 1ec Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.214 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1ed Processing field: MSP" +"2019-09-24 01:04:16.214 UTC [common.channelconfig] validateMSP -> DEBU 1ee Setting up MSP for org Org1MSP" +"2019-09-24 01:04:16.214 UTC [msp] newBccspMsp -> DEBU 1ef Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.214 UTC [msp] New -> DEBU 1f0 Creating Cache-MSP instance" +"2019-09-24 01:04:16.214 UTC [msp] Setup -> DEBU 1f1 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:16.214 UTC [msp.identity] newIdentity -> DEBU 1f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.215 UTC [msp] Setup -> DEBU 1f3 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:16.215 UTC [msp] Setup -> DEBU 1f4 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fa Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fd Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 1ff Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 200 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 201 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 202 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 203 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 204 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 01:04:16.215 UTC [policies] GetPolicy -> DEBU 205 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 206 Proposed new policy Writers for Channel" +"2019-09-24 01:04:16.215 UTC [policies] NewManagerImpl -> DEBU 207 Proposed new policy Admins for Channel" +"2019-09-24 01:04:16.216 UTC [policies] GetPolicy -> DEBU 208 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 01:04:16.216 UTC [policies] NewManagerImpl -> DEBU 209 Proposed new policy Readers for Channel" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Group] /Channel" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 01:04:16.216 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 226 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 227 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 228 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 229 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22c Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22d Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22e Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 22f Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:16.217 UTC [common.configtx] addToMap -> DEBU 230 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:16.229 UTC [fsblkstorage] Next -> DEBU 231 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:16.229 UTC [fsblkstorage] newBlockfileStream -> DEBU 232 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:16.229 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 233 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 234 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 235 blockbytes [20284] read from file [0]" +"2019-09-24 01:04:16.230 UTC [fsblkstorage] Next -> DEBU 236 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:16.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 237 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:16.230 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 238 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-09-24 01:04:16.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 239 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:16.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 23a blockbytes [20284] read from file [0]" +"2019-09-24 01:04:16.232 UTC [common.channelconfig] NewStandardValues -> DEBU 23b Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:16.232 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: HashingAlgorithm" +"2019-09-24 01:04:16.232 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23d Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: OrdererAddresses" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23f Processing field: Consortium" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: Capabilities" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] NewStandardValues -> DEBU 241 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 242 Processing field: ConsensusType" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 243 Processing field: BatchSize" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 244 Processing field: BatchTimeout" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 245 Processing field: KafkaBrokers" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 246 Processing field: ChannelRestrictions" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: Capabilities" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] NewStandardValues -> DEBU 248 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:16.233 UTC [common.channelconfig] initializeProtosStruct -> DEBU 249 Processing field: Endpoints" +"2019-09-24 01:04:16.234 UTC [common.channelconfig] NewStandardValues -> DEBU 24a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24b Processing field: MSP" +"2019-09-24 01:04:16.234 UTC [common.channelconfig] validateMSP -> DEBU 24c Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:16.234 UTC [msp] newBccspMsp -> DEBU 24d Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.234 UTC [msp] New -> DEBU 24e Creating Cache-MSP instance" +"2019-09-24 01:04:16.235 UTC [msp] Setup -> DEBU 24f Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:16.235 UTC [msp.identity] newIdentity -> DEBU 250 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.238 UTC [msp.identity] newIdentity -> DEBU 251 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.238 UTC [msp] Validate -> DEBU 252 MSP OrdererMSP validating identity" +"2019-09-24 01:04:16.239 UTC [common.channelconfig] NewStandardValues -> DEBU 253 Initializing protos for *channelconfig.ConsortiumProtos" +"2019-09-24 01:04:16.239 UTC [common.channelconfig] initializeProtosStruct -> DEBU 254 Processing field: ChannelCreationPolicy" +"2019-09-24 01:04:16.240 UTC [common.channelconfig] NewStandardValues -> DEBU 255 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.240 UTC [common.channelconfig] initializeProtosStruct -> DEBU 256 Processing field: MSP" +"2019-09-24 01:04:16.240 UTC [common.channelconfig] validateMSP -> DEBU 257 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:16.240 UTC [msp] newBccspMsp -> DEBU 258 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.240 UTC [msp] New -> DEBU 259 Creating Cache-MSP instance" +"2019-09-24 01:04:16.241 UTC [msp] Setup -> DEBU 25a Setting up MSP instance Org1MSP" +"2019-09-24 01:04:16.241 UTC [msp.identity] newIdentity -> DEBU 25b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.247 UTC [common.channelconfig] NewStandardValues -> DEBU 25c Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:16.247 UTC [common.channelconfig] initializeProtosStruct -> DEBU 25d Processing field: MSP" +"2019-09-24 01:04:16.247 UTC [common.channelconfig] validateMSP -> DEBU 25e Setting up MSP for org Org2MSP" +"2019-09-24 01:04:16.247 UTC [msp] newBccspMsp -> DEBU 25f Creating BCCSP-based MSP instance" +"2019-09-24 01:04:16.247 UTC [msp] New -> DEBU 260 Creating Cache-MSP instance" +"2019-09-24 01:04:16.247 UTC [msp] Setup -> DEBU 261 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:16.247 UTC [msp.identity] newIdentity -> DEBU 262 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:16.248 UTC [msp] Setup -> DEBU 263 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:16.248 UTC [msp] Setup -> DEBU 264 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:16.249 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.250 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.250 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 26f Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 271 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 274 Proposed new policy Admins for Channel/Consortiums" +"2019-09-24 01:04:16.251 UTC [policies] GetPolicy -> DEBU 275 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 276 Proposed new policy Readers for Channel" +"2019-09-24 01:04:16.251 UTC [policies] GetPolicy -> DEBU 277 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 278 Proposed new policy Writers for Channel" +"2019-09-24 01:04:16.251 UTC [policies] NewManagerImpl -> DEBU 279 Proposed new policy Admins for Channel" +"2019-09-24 01:04:16.251 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Group] /Channel" +"2019-09-24 01:04:16.251 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:16.252 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:16.253 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:16.254 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Group] /Channel/Consortiums" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2019-09-24 01:04:16.255 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2019-09-24 01:04:16.257 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29b Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29c Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29d Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29e Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 29f Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:16.260 UTC [common.configtx] addToMap -> DEBU 2a0 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:16.260 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a1 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:16.260 UTC [common.channelconfig] LogSanityChecks -> DEBU 2a2 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a3 Manager Channel looking up path [Application]" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a4 Manager Channel has managers Orderer" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a5 Manager Channel has managers Consortiums" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a6 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a7 Manager Channel has managers Orderer" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a8 Manager Channel has managers Consortiums" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2a9 Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:16.261 UTC [policies] Manager -> DEBU 2aa Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ab As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ac As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ad As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:16.261 UTC [common.channelconfig] LogSanityChecks -> DEBU 2ae As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:16.261 UTC [common.capabilities] Supported -> DEBU 2af Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:16.261 UTC [common.capabilities] Supported -> DEBU 2b0 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:16.261 UTC [orderer.common.server] func1 -> DEBU 2b1 Executing callback to update root CAs" +"2019-09-24 01:04:16.261 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b2 updating root CAs for channel [testchainid]" +"2019-09-24 01:04:16.261 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b3 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:16.262 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b4 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:16.262 UTC [orderer.common.server] updateTrustedRoots -> DEBU 2b5 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:16.262 UTC [fsblkstorage] Next -> DEBU 2b6 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:16.262 UTC [fsblkstorage] newBlockfileStream -> DEBU 2b7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b8 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2b9 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:16.262 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2ba blockbytes [20284] read from file [0]" +"2019-09-24 01:04:16.262 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 2bb [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2019-09-24 01:04:16.262 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 2bc EvictionSuspicion not set, defaulting to 10m0s" +"2019-09-24 01:04:16.263 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2bd No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2019-09-24 01:04:16.263 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 2be No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2019-09-24 01:04:16.300 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 2bf Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2019-09-24 01:04:16.302 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c0 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2019-09-24 01:04:16.302 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 2c1 Appending 0 entries to memory storage" channel=testchainid node=1 +"2019-09-24 01:04:16.302 UTC [fsblkstorage] Next -> DEBU 2c2 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] newBlockfileStream -> DEBU 2c3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c4 Remaining bytes=[20287], Going to peek [8] bytes" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c5 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2c6 blockbytes [20284] read from file [0]" +"2019-09-24 01:04:16.302 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 2c7 [channel: testchainid] Done creating channel support resources" +"2019-09-24 01:04:16.302 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 2c8 Creating system channel msg processor for channel testchainid" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] Next -> DEBU 2c9 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] newBlockfileStream -> DEBU 2ca newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cb Remaining bytes=[20287], Going to peek [8] bytes" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cc Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:16.302 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2cd blockbytes [20284] read from file [0]" +"2019-09-24 01:04:16.302 UTC [orderer.commmon.multichannel] Initialize -> INFO 2ce Starting system channel 'testchainid' with genesis block hash 257eabd868ebd9bdb404cd1e16e104c6943521bd472058e2d82271564767c6c1 and orderer type etcdraft" +"2019-09-24 01:04:16.303 UTC [orderer.consensus.etcdraft] Start -> INFO 2cf Starting Raft node" channel=testchainid node=1 +"2019-09-24 01:04:16.303 UTC [orderer.common.cluster] Configure -> INFO 2d0 Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +]" +"2019-09-24 01:04:16.303 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d1 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2019-09-24 01:04:16.303 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d2 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-09-24 01:04:16.304 UTC [orderer.common.cluster] func1 -> DEBU 2d3 Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + for channel testchainid" +"2019-09-24 01:04:16.304 UTC [grpc] DialContext -> DEBU 2d4 parsed scheme: """ +"2019-09-24 01:04:16.304 UTC [grpc] DialContext -> DEBU 2d5 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:16.304 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d6 Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2019-09-24 01:04:16.304 UTC [orderer.common.cluster] updateStubInMapping -> INFO 2d7 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-09-24 01:04:16.305 UTC [orderer.common.cluster] func1 -> DEBU 2d8 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- + for channel testchainid" +"2019-09-24 01:04:16.305 UTC [grpc] DialContext -> DEBU 2d9 parsed scheme: """ +"2019-09-24 01:04:16.305 UTC [grpc] DialContext -> DEBU 2da scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:16.305 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2db 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-09-24 01:04:16.305 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 2dc 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2019-09-24 01:04:16.305 UTC [orderer.common.cluster] Configure -> INFO 2dd Exiting" +"2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] start -> DEBU 2de Starting raft node: #peers: 3" channel=testchainid node=1 +"2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] start -> INFO 2df Starting raft node as part of a new channel" channel=testchainid node=1 +"2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e0 1 became follower at term 0" channel=testchainid node=1 +"2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] newRaft -> INFO 2e1 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2019-09-24 01:04:16.305 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2e2 1 became follower at term 1" channel=testchainid node=1 +"2019-09-24 01:04:16.305 UTC [orderer.common.server] Start -> INFO 2e3 Starting orderer: + Version: 1.4.3 + Commit SHA: development build + Go version: go1.12.9 + OS/Arch: linux/amd64" +"2019-09-24 01:04:16.305 UTC [orderer.common.server] Start -> INFO 2e4 Beginning to serve requests" +"2019-09-24 01:04:16.315 UTC [grpc] watcher -> DEBU 2e5 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2019-09-24 01:04:16.315 UTC [grpc] switchBalancer -> DEBU 2e6 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:16.316 UTC [grpc] HandleSubConnStateChange -> DEBU 2e7 pickfirstBalancer: HandleSubConnStateChange: 0xc00036a250, CONNECTING" +"2019-09-24 01:04:16.317 UTC [grpc] watcher -> DEBU 2e8 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2019-09-24 01:04:16.317 UTC [grpc] switchBalancer -> DEBU 2e9 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:16.317 UTC [grpc] HandleSubConnStateChange -> DEBU 2ea pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, CONNECTING" +"2019-09-24 01:04:16.323 UTC [orderer.consensus.etcdraft] apply -> INFO 2eb Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 01:04:16.324 UTC [orderer.consensus.etcdraft] apply -> INFO 2ec Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 01:04:16.324 UTC [orderer.consensus.etcdraft] apply -> INFO 2ed Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2019-09-24 01:04:16.344 UTC [grpc] createTransport -> DEBU 2ee grpc: addrConn.createTransport failed to connect to {orderer2.example.com:7050 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 172.18.0.3:7050: connect: connection refused". Reconnecting..." +"2019-09-24 01:04:16.344 UTC [grpc] HandleSubConnStateChange -> DEBU 2ef pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, TRANSIENT_FAILURE" +"2019-09-24 01:04:16.371 UTC [grpc] HandleSubConnStateChange -> DEBU 2f0 pickfirstBalancer: HandleSubConnStateChange: 0xc00036a250, READY" +"2019-09-24 01:04:17.284 UTC [grpc] HandleSubConnStateChange -> DEBU 2f1 pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, CONNECTING" +"2019-09-24 01:04:17.288 UTC [grpc] HandleSubConnStateChange -> DEBU 2f2 pickfirstBalancer: HandleSubConnStateChange: 0xc00036acd0, READY" +"2019-09-24 01:04:17.723 UTC [orderer.common.cluster] Step -> DEBU 2f3 Connection from orderer2.example.com(172.18.0.3:44808)" +"2019-09-24 01:04:17.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:17.723 UTC [orderer.consensus.etcdraft] Step -> INFO 2f5 1 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=1 +"2019-09-24 01:04:17.724 UTC [orderer.common.cluster] NewStream -> DEBU 2f6 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 01:04:17.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2f7 Sending msg of 28 bytes to 3 on channel testchainid took 72.9µs" +"2019-09-24 01:04:17.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2f8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.5µs " +"2019-09-24 01:04:17.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2f9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] Step -> INFO 2fa 1 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 2fb 1 became follower at term 2" channel=testchainid node=1 +"2019-09-24 01:04:17.727 UTC [orderer.consensus.etcdraft] Step -> INFO 2fc 1 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=1 +"2019-09-24 01:04:17.728 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 2fd Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2019-09-24 01:04:17.728 UTC [orderer.common.cluster.step] sendMessage -> DEBU 2fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +"2019-09-24 01:04:17.730 UTC [orderer.common.cluster.step] handleMessage -> DEBU 2ff Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 36" +"2019-09-24 01:04:17.731 UTC [orderer.consensus.etcdraft] run -> INFO 300 raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2019-09-24 01:04:17.732 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 301 Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2019-09-24 01:04:17.732 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 302 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 01:04:17.732 UTC [orderer.common.cluster.step] sendMessage -> DEBU 303 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.6µs " +"2019-09-24 01:04:17.733 UTC [orderer.common.cluster.step] handleMessage -> DEBU 304 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:17.733 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 305 Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2019-09-24 01:04:17.734 UTC [orderer.common.cluster.step] sendMessage -> DEBU 306 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.9µs " +"2019-09-24 01:04:18.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 307 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:18.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 308 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 01:04:18.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 309 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.3µs " +"2019-09-24 01:04:18.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:18.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30b Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 01:04:18.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +"2019-09-24 01:04:19.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 30d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:19.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 30e Sending msg of 28 bytes to 3 on channel testchainid took 107.7µs" +"2019-09-24 01:04:19.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 30f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 454.8µs " +"2019-09-24 01:04:19.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 310 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:19.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 311 Sending msg of 28 bytes to 3 on channel testchainid took 25.1µs" +"2019-09-24 01:04:19.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 312 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +"2019-09-24 01:04:20.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 313 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:20.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 314 Sending msg of 28 bytes to 3 on channel testchainid took 26.1µs" +"2019-09-24 01:04:20.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 315 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.7µs " +"2019-09-24 01:04:20.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU 316 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:20.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 317 Sending msg of 28 bytes to 3 on channel testchainid took 25.8µs" +"2019-09-24 01:04:20.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU 318 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.9µs " +"2019-09-24 01:04:21.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 319 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:21.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31a Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-09-24 01:04:21.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97µs " +"2019-09-24 01:04:21.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:21.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 31d Sending msg of 28 bytes to 3 on channel testchainid took 43µs" +"2019-09-24 01:04:21.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 31e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.1µs " +"2019-09-24 01:04:22.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 31f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:22.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU 320 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.9µs " +"2019-09-24 01:04:22.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 321 Sending msg of 28 bytes to 3 on channel testchainid took 46.5µs" +"2019-09-24 01:04:22.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 322 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:22.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 323 Sending msg of 28 bytes to 3 on channel testchainid took 57.2µs" +"2019-09-24 01:04:22.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 324 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.2µs " +"2019-09-24 01:04:23.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 325 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:23.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 326 Sending msg of 28 bytes to 3 on channel testchainid took 21.6µs" +"2019-09-24 01:04:23.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 327 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.8µs " +"2019-09-24 01:04:23.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU 328 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:23.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 329 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 01:04:23.722 UTC [orderer.common.cluster.step] sendMessage -> DEBU 32a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.4µs " +"2019-09-24 01:04:23.972 UTC [orderer.common.server] Deliver -> DEBU 32b Starting new Deliver handler" +"2019-09-24 01:04:23.972 UTC [common.deliver] Handle -> DEBU 32c Starting new deliver loop for 172.18.0.5:53642" +"2019-09-24 01:04:23.974 UTC [common.deliver] Handle -> DEBU 32d Attempting to read seek info message from 172.18.0.5:53642" +"2019-09-24 01:04:24.012 UTC [orderer.common.server] Broadcast -> DEBU 32e Starting new Broadcast handler" +"2019-09-24 01:04:24.015 UTC [orderer.common.broadcast] Handle -> DEBU 32f Starting new broadcast loop for 172.18.0.5:53644" +"2019-09-24 01:04:24.016 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 330 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53644" +"2019-09-24 01:04:24.018 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 331 Processing config update tx with system channel message processor for channel ID businesschannel" +"2019-09-24 01:04:24.019 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 332 Processing channel create tx for channel businesschannel on system channel testchainid" +"2019-09-24 01:04:24.020 UTC [common.channelconfig] NewStandardValues -> DEBU 333 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:24.021 UTC [common.channelconfig] initializeProtosStruct -> DEBU 334 Processing field: HashingAlgorithm" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 335 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 336 Processing field: OrdererAddresses" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 337 Processing field: Consortium" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 338 Processing field: Capabilities" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 339 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33a Processing field: ConsensusType" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33b Processing field: BatchSize" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33c Processing field: BatchTimeout" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33d Processing field: KafkaBrokers" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33e Processing field: ChannelRestrictions" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 33f Processing field: Capabilities" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 340 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 341 Processing field: Endpoints" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] NewStandardValues -> DEBU 342 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] initializeProtosStruct -> DEBU 343 Processing field: MSP" +"2019-09-24 01:04:24.022 UTC [common.channelconfig] validateMSP -> DEBU 344 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:24.022 UTC [msp] newBccspMsp -> DEBU 345 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.022 UTC [msp] New -> DEBU 346 Creating Cache-MSP instance" +"2019-09-24 01:04:24.022 UTC [msp] Setup -> DEBU 347 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:24.023 UTC [msp.identity] newIdentity -> DEBU 348 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.023 UTC [msp.identity] newIdentity -> DEBU 349 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.023 UTC [msp] Validate -> DEBU 34a MSP OrdererMSP validating identity" +"2019-09-24 01:04:24.023 UTC [common.channelconfig] NewStandardValues -> DEBU 34b Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:24.023 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34c Processing field: ACLs" +"2019-09-24 01:04:24.026 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34d Processing field: Capabilities" +"2019-09-24 01:04:24.026 UTC [common.channelconfig] NewStandardValues -> DEBU 34e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 34f Processing field: AnchorPeers" +"2019-09-24 01:04:24.027 UTC [common.channelconfig] NewStandardValues -> DEBU 350 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 351 Processing field: MSP" +"2019-09-24 01:04:24.027 UTC [common.channelconfig] Validate -> DEBU 352 Anchor peers for org Org1MSP are " +"2019-09-24 01:04:24.027 UTC [common.channelconfig] validateMSP -> DEBU 353 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:24.028 UTC [msp] newBccspMsp -> DEBU 354 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.028 UTC [msp] New -> DEBU 355 Creating Cache-MSP instance" +"2019-09-24 01:04:24.028 UTC [msp] Setup -> DEBU 356 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:24.029 UTC [msp.identity] newIdentity -> DEBU 357 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.031 UTC [common.channelconfig] NewStandardValues -> DEBU 358 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.031 UTC [common.channelconfig] initializeProtosStruct -> DEBU 359 Processing field: AnchorPeers" +"2019-09-24 01:04:24.031 UTC [common.channelconfig] NewStandardValues -> DEBU 35a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.031 UTC [common.channelconfig] initializeProtosStruct -> DEBU 35b Processing field: MSP" +"2019-09-24 01:04:24.031 UTC [common.channelconfig] Validate -> DEBU 35c Anchor peers for org Org2MSP are " +"2019-09-24 01:04:24.031 UTC [common.channelconfig] validateMSP -> DEBU 35d Setting up MSP for org Org2MSP" +"2019-09-24 01:04:24.031 UTC [msp] newBccspMsp -> DEBU 35e Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.031 UTC [msp] New -> DEBU 35f Creating Cache-MSP instance" +"2019-09-24 01:04:24.031 UTC [msp] Setup -> DEBU 360 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:24.032 UTC [msp.identity] newIdentity -> DEBU 361 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.032 UTC [msp] Setup -> DEBU 362 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:24.032 UTC [msp] Setup -> DEBU 363 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 364 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 365 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 366 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 367 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 368 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 369 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 36a Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:24.032 UTC [policies] NewManagerImpl -> DEBU 36b Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36c Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36e Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 36f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 370 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 371 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 372 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 373 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 374 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 375 Proposed new policy Admins for Channel" +"2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 376 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 377 Proposed new policy Readers for Channel" +"2019-09-24 01:04:24.033 UTC [policies] GetPolicy -> DEBU 378 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-09-24 01:04:24.033 UTC [policies] NewManagerImpl -> DEBU 379 Proposed new policy Writers for Channel" +"2019-09-24 01:04:24.033 UTC [common.configtx] addToMap -> DEBU 37a Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.033 UTC [common.configtx] addToMap -> DEBU 37b Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:24.034 UTC [common.configtx] addToMap -> DEBU 37c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.035 UTC [common.configtx] addToMap -> DEBU 37d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 37e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 37f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 380 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 381 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 382 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 383 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 384 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 385 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:24.040 UTC [common.configtx] addToMap -> DEBU 386 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 387 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 388 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 389 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38a Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38c Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38d Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38e Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 38f Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 390 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 391 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 392 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 393 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 394 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 395 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 396 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 397 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 398 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 399 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39b Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39c Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39d Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39e Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 39f Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:24.041 UTC [common.configtx] addToMap -> DEBU 3a0 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a1 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a2 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a3 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a4 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a5 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a6 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a8 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3a9 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3aa Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ab Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ac Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ad Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3ae Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3af Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.042 UTC [common.configtx] addToMap -> DEBU 3b0 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b1 Processing change to key: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b2 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.042 UTC [common.configtx] verifyDeltaSet -> DEBU 3b3 Processing change to key: [Group] /Channel/Application" +"2019-09-24 01:04:24.042 UTC [common.configtx] policyForItem -> DEBU 3b4 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b5 Manager Channel looking up path []" +"2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b6 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b7 Manager Channel has managers Application" +"2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b8 Manager Channel looking up path [Application]" +"2019-09-24 01:04:24.042 UTC [policies] Manager -> DEBU 3b9 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3ba Manager Channel has managers Application" +"2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bb Manager Channel/Application looking up path []" +"2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bc Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:24.043 UTC [policies] Manager -> DEBU 3bd Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:24.043 UTC [policies] Evaluate -> DEBU 3c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:04:24.043 UTC [msp] DeserializeIdentity -> DEBU 3c1 Obtaining identity" +"2019-09-24 01:04:24.043 UTC [msp.identity] newIdentity -> DEBU 3c2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.043 UTC [cauthdsl] func1 -> DEBU 3c3 0xc0002b6e90 gate 1569287064043721200 evaluation starts" +"2019-09-24 01:04:24.043 UTC [cauthdsl] func2 -> DEBU 3c4 0xc0002b6e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:24.044 UTC [cauthdsl] func2 -> DEBU 3c5 0xc0002b6e90 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:24.044 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3c6 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:24.044 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3c7 Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:24.044 UTC [msp] Validate -> DEBU 3c8 MSP Org1MSP validating identity" +"2019-09-24 01:04:24.044 UTC [msp] getCertificationChain -> DEBU 3c9 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:24.045 UTC [msp] hasOURole -> DEBU 3ca MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:24.045 UTC [msp] getCertificationChain -> DEBU 3cb MSP Org1MSP getting certification chain" +"2019-09-24 01:04:24.045 UTC [cauthdsl] func2 -> DEBU 3cc 0xc0002b6e90 principal matched by identity 0" +"2019-09-24 01:04:24.046 UTC [msp.identity] Verify -> DEBU 3cd Verify: digest = 00000000 88 88 59 3f 5b f7 0b f9 95 ad aa 76 17 fe 8f 43 |..Y?[......v...C| +00000010 85 c2 8b 2d 7a e3 6d 0c 62 3b 92 69 26 70 18 41 |...-z.m.b;.i&p.A|" +"2019-09-24 01:04:24.047 UTC [msp.identity] Verify -> DEBU 3ce Verify: sig = 00000000 30 44 02 20 39 d0 3f ea bb 39 bd e4 1f 1c a9 88 |0D. 9.?..9......| +00000010 69 8b b1 77 90 f7 c1 bc 40 8d 8b b4 8c fc 09 f6 |i..w....@.......| +00000020 4f 3c b0 50 02 20 01 18 1f 83 44 e2 60 04 40 a4 |O<.P. ....D.`.@.| +00000030 ed 10 b8 da 29 7d cb 56 45 c7 bc d3 8a 66 ee d1 |....)}.VE....f..| +00000040 f6 62 6d 94 8a 78 |.bm..x|" +"2019-09-24 01:04:24.047 UTC [cauthdsl] func2 -> DEBU 3cf 0xc0002b6e90 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:24.047 UTC [cauthdsl] func1 -> DEBU 3d0 0xc0002b6e90 gate 1569287064043721200 evaluation succeeds" +"2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d1 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d3 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.047 UTC [policies] Evaluate -> DEBU 3d4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d5 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d6 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d7 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d8 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.048 UTC [common.configtx] verifyDeltaSet -> DEBU 3d9 Processing change to key: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3da Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3db Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3dc Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3dd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3de Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3df Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.048 UTC [common.configtx] recurseConfigMap -> DEBU 3e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e2 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3ea Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.049 UTC [common.configtx] recurseConfigMap -> DEBU 3eb Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ec Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ed Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ee Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3ef Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [common.configtx] recurseConfigMap -> DEBU 3f0 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.050 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f1 Obtaining default signing identity" +"2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f2 Obtaining default signing identity" +"2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f3 Sign: plaintext: 0AD2060A1B08011A060898D7A5EC0522...F039342E636F7D29017AFF951FB086A5 " +"2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f4 Sign: digest: 21F7193067F79881F5EB3A7E5EFFE226D4D037B76440AE0026CA35BD072DD550 " +"2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f5 Obtaining default signing identity" +"2019-09-24 01:04:24.051 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f6 Obtaining default signing identity" +"2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f7 Sign: plaintext: 0ACE060A1708041A060898D7A5EC0522...EAA34C85FCE8248A0EF6C3233EE88DB1 " +"2019-09-24 01:04:24.051 UTC [msp.identity] Sign -> DEBU 3f8 Sign: digest: 04693A2E09EA3A4FB231521A014B95692D3CDC756A25BDBC7A726322FC1B50D3 " +"2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:24.051 UTC [policies] Evaluate -> DEBU 3fd == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:24.051 UTC [msp] DeserializeIdentity -> DEBU 3fe Obtaining identity" +"2019-09-24 01:04:24.052 UTC [msp.identity] newIdentity -> DEBU 3ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.052 UTC [cauthdsl] func1 -> DEBU 400 0xc0003b3d50 gate 1569287064052482900 evaluation starts" +"2019-09-24 01:04:24.052 UTC [cauthdsl] func2 -> DEBU 401 0xc0003b3d50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:24.052 UTC [cauthdsl] func2 -> DEBU 402 0xc0003b3d50 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:24.052 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 403 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:04:24.052 UTC [msp] Validate -> DEBU 404 MSP OrdererMSP validating identity" +"2019-09-24 01:04:24.053 UTC [cauthdsl] func2 -> DEBU 405 0xc0003b3d50 principal matched by identity 0" +"2019-09-24 01:04:24.053 UTC [msp.identity] Verify -> DEBU 406 Verify: digest = 00000000 04 69 3a 2e 09 ea 3a 4f b2 31 52 1a 01 4b 95 69 |.i:...:O.1R..K.i| +00000010 2d 3c dc 75 6a 25 bd bc 7a 72 63 22 fc 1b 50 d3 |-<.uj%..zrc"..P.|" +"2019-09-24 01:04:24.053 UTC [msp.identity] Verify -> DEBU 407 Verify: sig = 00000000 30 44 02 20 25 0a 6a 8a a6 61 64 4e 9f b6 7f b2 |0D. %.j..adN....| +00000010 67 95 1a 46 df 30 03 67 da af 7d 15 eb d8 90 b9 |g..F.0.g..}.....| +00000020 7f a3 06 0d 02 20 3c f4 6c d9 08 af e2 c1 82 0d |..... <.l.......| +00000030 00 16 57 7e c7 08 c4 c4 e7 a5 f5 45 aa 3e a0 c7 |..W~.......E.>..| +00000040 07 bf ad b2 fa 9c |......|" +"2019-09-24 01:04:24.054 UTC [cauthdsl] func2 -> DEBU 408 0xc0003b3d50 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:24.054 UTC [cauthdsl] func1 -> DEBU 409 0xc0003b3d50 gate 1569287064052482900 evaluation succeeds" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40c Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40e Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:04:24.054 UTC [policies] Evaluate -> DEBU 40f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 410 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 411 Processing field: HashingAlgorithm" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 412 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 413 Processing field: OrdererAddresses" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 414 Processing field: Consortium" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 415 Processing field: Capabilities" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 416 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 417 Processing field: ConsensusType" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 418 Processing field: BatchSize" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 419 Processing field: BatchTimeout" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41a Processing field: KafkaBrokers" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41b Processing field: ChannelRestrictions" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41c Processing field: Capabilities" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] NewStandardValues -> DEBU 41d Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:24.055 UTC [common.channelconfig] initializeProtosStruct -> DEBU 41e Processing field: Endpoints" +"2019-09-24 01:04:24.056 UTC [common.channelconfig] NewStandardValues -> DEBU 41f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.056 UTC [common.channelconfig] initializeProtosStruct -> DEBU 420 Processing field: MSP" +"2019-09-24 01:04:24.056 UTC [common.channelconfig] validateMSP -> DEBU 421 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:24.056 UTC [msp] newBccspMsp -> DEBU 422 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.056 UTC [msp] New -> DEBU 423 Creating Cache-MSP instance" +"2019-09-24 01:04:24.056 UTC [msp] Setup -> DEBU 424 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:24.056 UTC [msp.identity] newIdentity -> DEBU 425 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.057 UTC [msp.identity] newIdentity -> DEBU 426 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.057 UTC [msp] Validate -> DEBU 427 MSP OrdererMSP validating identity" +"2019-09-24 01:04:24.057 UTC [common.channelconfig] NewStandardValues -> DEBU 428 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:24.057 UTC [common.channelconfig] initializeProtosStruct -> DEBU 429 Processing field: ACLs" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42a Processing field: Capabilities" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] NewStandardValues -> DEBU 42b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42c Processing field: AnchorPeers" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] NewStandardValues -> DEBU 42d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] initializeProtosStruct -> DEBU 42e Processing field: MSP" +"2019-09-24 01:04:24.058 UTC [common.channelconfig] Validate -> DEBU 42f Anchor peers for org Org1MSP are " +"2019-09-24 01:04:24.058 UTC [common.channelconfig] validateMSP -> DEBU 430 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:24.058 UTC [msp] newBccspMsp -> DEBU 431 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.058 UTC [msp] New -> DEBU 432 Creating Cache-MSP instance" +"2019-09-24 01:04:24.058 UTC [msp] Setup -> DEBU 433 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:24.058 UTC [msp.identity] newIdentity -> DEBU 434 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.059 UTC [common.channelconfig] NewStandardValues -> DEBU 435 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 436 Processing field: AnchorPeers" +"2019-09-24 01:04:24.059 UTC [common.channelconfig] NewStandardValues -> DEBU 437 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.059 UTC [common.channelconfig] initializeProtosStruct -> DEBU 438 Processing field: MSP" +"2019-09-24 01:04:24.059 UTC [common.channelconfig] Validate -> DEBU 439 Anchor peers for org Org2MSP are " +"2019-09-24 01:04:24.059 UTC [common.channelconfig] validateMSP -> DEBU 43a Setting up MSP for org Org2MSP" +"2019-09-24 01:04:24.059 UTC [msp] newBccspMsp -> DEBU 43b Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.059 UTC [msp] New -> DEBU 43c Creating Cache-MSP instance" +"2019-09-24 01:04:24.059 UTC [msp] Setup -> DEBU 43d Setting up MSP instance Org2MSP" +"2019-09-24 01:04:24.059 UTC [msp.identity] newIdentity -> DEBU 43e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.060 UTC [msp] Setup -> DEBU 43f Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:24.060 UTC [msp] Setup -> DEBU 440 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 441 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 442 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 443 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 444 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 445 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 446 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 447 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 448 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 449 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.060 UTC [policies] NewManagerImpl -> DEBU 44d Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 44e Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 44f Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 450 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 451 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 452 Proposed new policy Readers for Channel" +"2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 453 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 454 Proposed new policy Writers for Channel" +"2019-09-24 01:04:24.061 UTC [policies] GetPolicy -> DEBU 455 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2019-09-24 01:04:24.061 UTC [policies] NewManagerImpl -> DEBU 456 Proposed new policy Admins for Channel" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 457 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 458 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 459 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45b Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45d Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 45f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 460 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 461 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 462 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 463 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 464 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 465 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.061 UTC [common.configtx] addToMap -> DEBU 466 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 467 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 468 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 469 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46c Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 46f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 470 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 471 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 472 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 473 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 474 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 475 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 476 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 477 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 478 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:24.062 UTC [common.configtx] addToMap -> DEBU 479 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47a Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47b Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47c Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47d Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47e Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 47f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 480 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 481 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 482 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 483 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 484 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 485 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 486 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 487 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 488 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 489 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.063 UTC [common.configtx] addToMap -> DEBU 48d Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 48e Processing change to key: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 48f Processing change to key: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.063 UTC [common.configtx] verifyDeltaSet -> DEBU 490 Processing change to key: [Group] /Channel/Application" +"2019-09-24 01:04:24.064 UTC [common.configtx] policyForItem -> DEBU 491 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 492 Manager Channel looking up path []" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 493 Manager Channel has managers Application" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 494 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 495 Manager Channel looking up path [Application]" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 496 Manager Channel has managers Application" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 497 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 498 Manager Channel/Application looking up path []" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 499 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:24.064 UTC [policies] Manager -> DEBU 49a Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:24.064 UTC [policies] Evaluate -> DEBU 49d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:04:24.064 UTC [msp] DeserializeIdentity -> DEBU 49e Obtaining identity" +"2019-09-24 01:04:24.065 UTC [msp.identity] newIdentity -> DEBU 49f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.065 UTC [cauthdsl] func1 -> DEBU 4a0 0xc000405f60 gate 1569287064065343300 evaluation starts" +"2019-09-24 01:04:24.065 UTC [cauthdsl] func2 -> DEBU 4a1 0xc000405f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:24.065 UTC [cauthdsl] func2 -> DEBU 4a2 0xc000405f60 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:24.065 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a3 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:24.065 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 4a4 Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:24.065 UTC [msp] Validate -> DEBU 4a5 MSP Org1MSP validating identity" +"2019-09-24 01:04:24.065 UTC [msp] getCertificationChain -> DEBU 4a6 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:24.065 UTC [msp] hasOURole -> DEBU 4a7 MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:24.065 UTC [msp] getCertificationChain -> DEBU 4a8 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:24.066 UTC [cauthdsl] func2 -> DEBU 4a9 0xc000405f60 principal matched by identity 0" +"2019-09-24 01:04:24.066 UTC [msp.identity] Verify -> DEBU 4aa Verify: digest = 00000000 88 88 59 3f 5b f7 0b f9 95 ad aa 76 17 fe 8f 43 |..Y?[......v...C| +00000010 85 c2 8b 2d 7a e3 6d 0c 62 3b 92 69 26 70 18 41 |...-z.m.b;.i&p.A|" +"2019-09-24 01:04:24.066 UTC [msp.identity] Verify -> DEBU 4ab Verify: sig = 00000000 30 44 02 20 39 d0 3f ea bb 39 bd e4 1f 1c a9 88 |0D. 9.?..9......| +00000010 69 8b b1 77 90 f7 c1 bc 40 8d 8b b4 8c fc 09 f6 |i..w....@.......| +00000020 4f 3c b0 50 02 20 01 18 1f 83 44 e2 60 04 40 a4 |O<.P. ....D.`.@.| +00000030 ed 10 b8 da 29 7d cb 56 45 c7 bc d3 8a 66 ee d1 |....)}.VE....f..| +00000040 f6 62 6d 94 8a 78 |.bm..x|" +"2019-09-24 01:04:24.066 UTC [cauthdsl] func2 -> DEBU 4ac 0xc000405f60 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:24.066 UTC [cauthdsl] func1 -> DEBU 4ad 0xc000405f60 gate 1569287064065343300 evaluation succeeds" +"2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4ae Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4b0 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.066 UTC [policies] Evaluate -> DEBU 4b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b2 Processing change to key: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b3 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b4 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.066 UTC [common.configtx] verifyDeltaSet -> DEBU 4b5 Processing change to key: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.067 UTC [common.configtx] verifyDeltaSet -> DEBU 4b6 Processing change to key: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4b9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4ba Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bb Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4be Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4bf Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.067 UTC [common.configtx] recurseConfigMap -> DEBU 4c0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c2 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c3 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c4 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.068 UTC [common.configtx] recurseConfigMap -> DEBU 4c5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c6 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4c9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4ca Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.069 UTC [common.configtx] recurseConfigMap -> DEBU 4cd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:24.070 UTC [common.channelconfig] NewStandardValues -> DEBU 4ce Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4cf Processing field: HashingAlgorithm" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d0 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d1 Processing field: OrdererAddresses" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d2 Processing field: Consortium" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d3 Processing field: Capabilities" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] NewStandardValues -> DEBU 4d4 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:24.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d5 Processing field: ConsensusType" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d6 Processing field: BatchSize" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d7 Processing field: BatchTimeout" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d8 Processing field: KafkaBrokers" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4d9 Processing field: ChannelRestrictions" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4da Processing field: Capabilities" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] NewStandardValues -> DEBU 4db Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4dc Processing field: Endpoints" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] NewStandardValues -> DEBU 4dd Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4de Processing field: MSP" +"2019-09-24 01:04:24.072 UTC [common.channelconfig] validateMSP -> DEBU 4df Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:24.072 UTC [msp] newBccspMsp -> DEBU 4e0 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.072 UTC [msp] New -> DEBU 4e1 Creating Cache-MSP instance" +"2019-09-24 01:04:24.073 UTC [msp] Setup -> DEBU 4e2 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:24.074 UTC [msp.identity] newIdentity -> DEBU 4e3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.075 UTC [msp.identity] newIdentity -> DEBU 4e4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.075 UTC [msp] Validate -> DEBU 4e5 MSP OrdererMSP validating identity" +"2019-09-24 01:04:24.075 UTC [common.channelconfig] NewStandardValues -> DEBU 4e6 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:24.075 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e7 Processing field: ACLs" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4e8 Processing field: Capabilities" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] NewStandardValues -> DEBU 4e9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ea Processing field: AnchorPeers" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] NewStandardValues -> DEBU 4eb Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ec Processing field: MSP" +"2019-09-24 01:04:24.076 UTC [common.channelconfig] Validate -> DEBU 4ed Anchor peers for org Org2MSP are " +"2019-09-24 01:04:24.076 UTC [common.channelconfig] validateMSP -> DEBU 4ee Setting up MSP for org Org2MSP" +"2019-09-24 01:04:24.076 UTC [msp] newBccspMsp -> DEBU 4ef Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.076 UTC [msp] New -> DEBU 4f0 Creating Cache-MSP instance" +"2019-09-24 01:04:24.076 UTC [msp] Setup -> DEBU 4f1 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:24.076 UTC [msp.identity] newIdentity -> DEBU 4f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.077 UTC [common.channelconfig] NewStandardValues -> DEBU 4f3 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f4 Processing field: AnchorPeers" +"2019-09-24 01:04:24.077 UTC [common.channelconfig] NewStandardValues -> DEBU 4f5 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.077 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4f6 Processing field: MSP" +"2019-09-24 01:04:24.077 UTC [common.channelconfig] Validate -> DEBU 4f7 Anchor peers for org Org1MSP are " +"2019-09-24 01:04:24.077 UTC [common.channelconfig] validateMSP -> DEBU 4f8 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:24.077 UTC [msp] newBccspMsp -> DEBU 4f9 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.077 UTC [msp] New -> DEBU 4fa Creating Cache-MSP instance" +"2019-09-24 01:04:24.077 UTC [msp] Setup -> DEBU 4fb Setting up MSP instance Org1MSP" +"2019-09-24 01:04:24.078 UTC [msp.identity] newIdentity -> DEBU 4fc Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.078 UTC [msp] Setup -> DEBU 4fd Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:24.079 UTC [msp] Setup -> DEBU 4fe MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 4ff Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 500 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 501 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 502 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 503 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:24.079 UTC [policies] NewManagerImpl -> DEBU 504 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 505 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 506 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 507 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 508 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 509 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50b Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50c Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50e Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 50f Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 510 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 511 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 512 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 513 Proposed new policy Readers for Channel" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 514 Proposed new policy Writers for Channel" +"2019-09-24 01:04:24.080 UTC [policies] NewManagerImpl -> DEBU 515 Proposed new policy Admins for Channel" +"2019-09-24 01:04:24.080 UTC [common.configtx] addToMap -> DEBU 516 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 517 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 518 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 519 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51c Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:24.081 UTC [common.configtx] addToMap -> DEBU 51d Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 51e Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 51f Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 520 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 521 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 522 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 523 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 524 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 525 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 526 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 527 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 528 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 529 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52b Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52c Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52d Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52e Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 52f Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 530 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 531 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 532 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 533 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 534 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 535 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 536 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 537 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 538 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.082 UTC [common.configtx] addToMap -> DEBU 539 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53a Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53b Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 53f Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 540 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:24.083 UTC [common.configtx] addToMap -> DEBU 541 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:24.083 UTC [common.capabilities] Supported -> DEBU 542 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:24.083 UTC [common.capabilities] Supported -> DEBU 543 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:24.083 UTC [orderer.common.cluster] NewStream -> DEBU 544 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2019-09-24 01:04:24.083 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 545 Sending msg of 26612 bytes to 3 on channel testchainid took 172.4µs" +"2019-09-24 01:04:24.083 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 546 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53644" +"2019-09-24 01:04:24.084 UTC [orderer.common.broadcast] Handle -> DEBU 547 Received EOF from 172.18.0.5:53644, hangup" +"2019-09-24 01:04:24.084 UTC [orderer.common.server] func1 -> DEBU 548 Closing Broadcast stream" +"2019-09-24 01:04:24.084 UTC [comm.grpc.server] 1 -> INFO 549 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53644 grpc.code=OK grpc.call_duration=73.1977ms +"2019-09-24 01:04:24.085 UTC [common.deliver] deliverBlocks -> DEBU 54a Rejecting deliver for 172.18.0.5:53642 because channel businesschannel not found" +"2019-09-24 01:04:24.085 UTC [orderer.common.cluster.step] sendMessage -> DEBU 54b Send of SubmitRequest for channel testchainid with payload of size 26612 to orderer2.example.com(orderer2.example.com:7050) took 1.7356ms " +"2019-09-24 01:04:24.085 UTC [orderer.common.server] func1 -> DEBU 54c Closing Deliver stream" +"2019-09-24 01:04:24.085 UTC [comm.grpc.server] 1 -> INFO 54d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53642 grpc.code=OK grpc.call_duration=113.9102ms +"2019-09-24 01:04:24.090 UTC [orderer.common.cluster.step] handleMessage -> DEBU 54e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 26822" +"2019-09-24 01:04:24.094 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 54f Sending msg of 28 bytes to 3 on channel testchainid took 90.7µs" +"2019-09-24 01:04:24.095 UTC [orderer.common.cluster.step] sendMessage -> DEBU 550 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +"2019-09-24 01:04:24.125 UTC [orderer.common.cluster.step] handleMessage -> DEBU 551 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:24.126 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 552 Sending msg of 28 bytes to 3 on channel testchainid took 12.5µs" +"2019-09-24 01:04:24.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 553 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +"2019-09-24 01:04:24.127 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 554 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2019-09-24 01:04:24.128 UTC [common.channelconfig] NewStandardValues -> DEBU 555 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:24.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: HashingAlgorithm" +"2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: OrdererAddresses" +"2019-09-24 01:04:24.129 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: Consortium" +"2019-09-24 01:04:24.130 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55a Processing field: Capabilities" +"2019-09-24 01:04:24.130 UTC [common.channelconfig] NewStandardValues -> DEBU 55b Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:24.130 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: ACLs" +"2019-09-24 01:04:24.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: Capabilities" +"2019-09-24 01:04:24.131 UTC [common.channelconfig] NewStandardValues -> DEBU 55e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: AnchorPeers" +"2019-09-24 01:04:24.132 UTC [common.channelconfig] NewStandardValues -> DEBU 560 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU 561 Processing field: MSP" +"2019-09-24 01:04:24.133 UTC [common.channelconfig] Validate -> DEBU 562 Anchor peers for org Org1MSP are " +"2019-09-24 01:04:24.133 UTC [common.channelconfig] validateMSP -> DEBU 563 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:24.133 UTC [msp] newBccspMsp -> DEBU 564 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.133 UTC [msp] New -> DEBU 565 Creating Cache-MSP instance" +"2019-09-24 01:04:24.133 UTC [msp] Setup -> DEBU 566 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:24.134 UTC [msp.identity] newIdentity -> DEBU 567 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.136 UTC [common.channelconfig] NewStandardValues -> DEBU 568 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:24.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU 569 Processing field: AnchorPeers" +"2019-09-24 01:04:24.137 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.139 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: MSP" +"2019-09-24 01:04:24.142 UTC [common.channelconfig] Validate -> DEBU 56d Anchor peers for org Org2MSP are " +"2019-09-24 01:04:24.143 UTC [common.channelconfig] validateMSP -> DEBU 56e Setting up MSP for org Org2MSP" +"2019-09-24 01:04:24.143 UTC [msp] newBccspMsp -> DEBU 56f Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.143 UTC [msp] New -> DEBU 570 Creating Cache-MSP instance" +"2019-09-24 01:04:24.144 UTC [msp] Setup -> DEBU 571 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:24.149 UTC [msp.identity] newIdentity -> DEBU 572 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.141 UTC [orderer.common.server] Deliver -> DEBU 56c Starting new Deliver handler" +"2019-09-24 01:04:24.151 UTC [common.deliver] Handle -> DEBU 573 Starting new deliver loop for 172.18.0.5:53646" +"2019-09-24 01:04:24.152 UTC [common.deliver] Handle -> DEBU 575 Attempting to read seek info message from 172.18.0.5:53646" +"2019-09-24 01:04:24.151 UTC [common.channelconfig] NewStandardValues -> DEBU 574 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:24.152 UTC [common.channelconfig] initializeProtosStruct -> DEBU 576 Processing field: ConsensusType" +"2019-09-24 01:04:24.153 UTC [common.channelconfig] initializeProtosStruct -> DEBU 577 Processing field: BatchSize" +"2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: BatchTimeout" +"2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 579 Processing field: KafkaBrokers" +"2019-09-24 01:04:24.154 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: ChannelRestrictions" +"2019-09-24 01:04:24.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57b Processing field: Capabilities" +"2019-09-24 01:04:24.155 UTC [common.channelconfig] NewStandardValues -> DEBU 57c Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:24.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57d Processing field: Endpoints" +"2019-09-24 01:04:24.156 UTC [common.channelconfig] NewStandardValues -> DEBU 57e Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:24.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57f Processing field: MSP" +"2019-09-24 01:04:24.158 UTC [common.channelconfig] validateMSP -> DEBU 580 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:24.159 UTC [msp] newBccspMsp -> DEBU 581 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:24.159 UTC [msp] New -> DEBU 582 Creating Cache-MSP instance" +"2019-09-24 01:04:24.160 UTC [msp] Setup -> DEBU 583 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:24.163 UTC [msp.identity] newIdentity -> DEBU 584 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.164 UTC [msp.identity] newIdentity -> DEBU 585 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:24.168 UTC [msp] Validate -> DEBU 586 MSP OrdererMSP validating identity" +"2019-09-24 01:04:24.172 UTC [msp] Setup -> DEBU 587 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:24.176 UTC [msp] Setup -> DEBU 588 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:24.176 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.182 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.183 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.184 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:24.184 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.185 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.186 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.186 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:24.187 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:24.188 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:24.189 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:24.190 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.194 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.195 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.195 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:24.196 UTC [policies] NewManagerImpl -> DEBU 59a Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59b Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59c Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59d Proposed new policy Writers for Channel" +"2019-09-24 01:04:24.197 UTC [policies] NewManagerImpl -> DEBU 59e Proposed new policy Admins for Channel" +"2019-09-24 01:04:24.198 UTC [policies] NewManagerImpl -> DEBU 59f Proposed new policy Readers for Channel" +"2019-09-24 01:04:24.198 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:24.199 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:24.199 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:24.200 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:24.201 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:24.202 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:24.203 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:24.204 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:24.205 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:24.206 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:24.207 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:24.208 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c6 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c7 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:24.209 UTC [common.configtx] addToMap -> DEBU 5c8 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5c9 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5ca Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:24.210 UTC [common.configtx] addToMap -> DEBU 5cb Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:24.211 UTC [common.channelconfig] LogSanityChecks -> DEBU 5cc As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:24.211 UTC [common.channelconfig] LogSanityChecks -> DEBU 5cd As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:24.211 UTC [policies] Manager -> DEBU 5ce Manager Channel looking up path [Application]" +"2019-09-24 01:04:24.211 UTC [policies] Manager -> DEBU 5cf Manager Channel has managers Application" +"2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d0 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d1 Manager Channel/Application looking up path []" +"2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d2 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:24.212 UTC [policies] Manager -> DEBU 5d3 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:24.212 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d4 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:24.213 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d5 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:24.213 UTC [common.channelconfig] LogSanityChecks -> DEBU 5d6 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d7 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d8 Manager Channel has managers Application" +"2019-09-24 01:04:24.213 UTC [policies] Manager -> DEBU 5d9 Manager Channel has managers Orderer" +"2019-09-24 01:04:24.214 UTC [policies] Manager -> DEBU 5da Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:24.214 UTC [policies] Manager -> DEBU 5db Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dc As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5dd As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:24.215 UTC [common.channelconfig] LogSanityChecks -> DEBU 5de As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:24.216 UTC [common.channelconfig] LogSanityChecks -> DEBU 5df As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:24.216 UTC [common.capabilities] Supported -> DEBU 5e0 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:24.216 UTC [common.capabilities] Supported -> DEBU 5e1 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:24.216 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5e2 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-09-24 01:04:24.217 UTC [kvledger.util] CreateDirIfMissing -> DEBU 5e3 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2019-09-24 01:04:24.217 UTC [kvledger.util] logDirStatus -> DEBU 5e4 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2019-09-24 01:04:24.217 UTC [kvledger.util] logDirStatus -> DEBU 5e5 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2019-09-24 01:04:24.218 UTC [fsblkstorage] newBlockfileMgr -> INFO 5e6 Getting block information from block storage" +"2019-09-24 01:04:24.218 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5e7 Retrieving checkpoint info from block files" +"2019-09-24 01:04:24.218 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e8 retrieveLastFileSuffix()" +"2019-09-24 01:04:24.219 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 5e9 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 01:04:24.219 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5ea Last file number found = -1" +"2019-09-24 01:04:24.219 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 5eb No block file found" +"2019-09-24 01:04:24.220 UTC [fsblkstorage] newBlockfileMgr -> DEBU 5ec Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000cdb540)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 01:04:24.222 UTC [fsblkstorage] newBlockIndex -> DEBU 5ed newBlockIndex() - indexItems:[[BlockNum]]" +"2019-09-24 01:04:24.222 UTC [orderer.common.server] func1 -> DEBU 5ee Executing callback to update root CAs" +"2019-09-24 01:04:24.223 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5ef updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:24.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5f0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:24.223 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f1 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:24.224 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f2 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:24.224 UTC [orderer.common.server] updateTrustedRoots -> DEBU 5f3 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:24.227 UTC [fsblkstorage] indexBlock -> DEBU 5f4 Indexing block [blockNum=0, blockHash=[]byte{0x2f, 0xbc, 0x19, 0xc6, 0x1e, 0x52, 0xc5, 0x88, 0xe6, 0x4e, 0xa4, 0x19, 0xae, 0x2b, 0x7c, 0x3f, 0x7, 0x35, 0xa0, 0xe4, 0x28, 0x1e, 0xc1, 0x63, 0xa9, 0x5f, 0x8c, 0xba, 0xac, 0xe2, 0x90, 0xc5} txOffsets= +txId=ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551 locPointer=offset=39, bytesLength=25762 +]" +"2019-09-24 01:04:24.229 UTC [fsblkstorage] updateCheckpoint -> DEBU 5f5 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25807], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 01:04:24.229 UTC [fsblkstorage] Next -> DEBU 5f6 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:24.230 UTC [fsblkstorage] newBlockfileStream -> DEBU 5f7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:24.231 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f8 Remaining bytes=[25807], Going to peek [8] bytes" +"2019-09-24 01:04:24.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5f9 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:24.232 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 5fa blockbytes [25804] read from file [0]" +"2019-09-24 01:04:24.233 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 5fb [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2019-09-24 01:04:24.233 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 5fc EvictionSuspicion not set, defaulting to 10m0s" +"2019-09-24 01:04:24.234 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 5fd No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2019-09-24 01:04:24.235 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 5fe No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2019-09-24 01:04:24.239 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 5ff Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2019-09-24 01:04:24.240 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 600 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2019-09-24 01:04:24.240 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 601 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2019-09-24 01:04:24.240 UTC [fsblkstorage] Next -> DEBU 602 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:24.240 UTC [fsblkstorage] newBlockfileStream -> DEBU 603 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 604 Remaining bytes=[25807], Going to peek [8] bytes" +"2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 605 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:24.240 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 606 blockbytes [25804] read from file [0]" +"2019-09-24 01:04:24.240 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 607 [channel: businesschannel] Done creating channel support resources" +"2019-09-24 01:04:24.240 UTC [orderer.commmon.multichannel] newChain -> INFO 608 Created and starting new chain businesschannel" +"2019-09-24 01:04:24.241 UTC [orderer.consensus.etcdraft] Start -> INFO 609 Starting Raft node" channel=businesschannel node=1 +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] Configure -> INFO 60a Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +]" +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60b Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60c Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] func1 -> DEBU 60d Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQAcANB1B/DFoweeVR4FdC0jAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAE0DiaZBWU1NNhumc5anDUP3n2qxVT5gg21+WJCX4UZV+n +jrJTJbi4/eE7YqZowhXFZfR6XqQG1ZjiT+80fEFDUaOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgXC9Zm8OCGYT7UvBm/ycCL979w7ra4LJR0Uq2I0/0yyYw +KQYDVR0RBCIwIIIUb3JkZXJlcjEuZXhhbXBsZS5jb22CCG9yZGVyZXIxMAoGCCqG +SM49BAMCA0gAMEUCIQCFa5XLHXmtsdMgcV24Mw3i7fKV5Z2L4JMc79XRVNvxegIg +UtUIBLFxJ9tQKSNcz3Pb/UCgiD2ELkFc8MEC4wVYyOc= +-----END CERTIFICATE----- + for channel businesschannel" +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2019-09-24 01:04:24.241 UTC [orderer.common.cluster] updateStubInMapping -> INFO 60f Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2019-09-24 01:04:24.242 UTC [orderer.common.cluster] func1 -> DEBU 610 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAKkT+oJUmBGpWzTtYim8W+IwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMi5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABB3IrJKcYK2uJDdnTofTcamGEfvYQv3TuQuDLSgmCmgJ +3NOwp9ADBqhpQk8ZbiwL4juPfU8Oliff87k74ndv2amjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIFwvWZvDghmE+1LwZv8nAi/e/cO62uCyUdFKtiNP9Msm +MCkGA1UdEQQiMCCCFG9yZGVyZXIyLmV4YW1wbGUuY29tgghvcmRlcmVyMjAKBggq +hkjOPQQDAgNIADBFAiEA2m2FR1khoJIELt/LvbuTz1Uy+re4F7xcw1g0pK9CUFAC +ICk+CzWymxfAnj7TKoz8ZWLNP8DXctkAw6KsAip0pZXl +-----END CERTIFICATE----- + for channel businesschannel" +"2019-09-24 01:04:24.243 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 611 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-09-24 01:04:24.243 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 612 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2019-09-24 01:04:24.243 UTC [orderer.common.cluster] Configure -> INFO 613 Exiting" +"2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] start -> DEBU 614 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] start -> INFO 615 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 616 1 became follower at term 0" channel=businesschannel node=1 +"2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] newRaft -> INFO 617 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2019-09-24 01:04:24.243 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 618 1 became follower at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:24.243 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 619 [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2019-09-24 01:04:24.243 UTC [msp] GetDefaultSigningIdentity -> DEBU 61a Obtaining default signing identity" +"2019-09-24 01:04:24.243 UTC [msp] GetDefaultSigningIdentity -> DEBU 61b Obtaining default signing identity" +"2019-09-24 01:04:24.243 UTC [msp.identity] Sign -> DEBU 61c Sign: plaintext: 0A00120B0A090A03010203100418050A...B379AC4E99C5BB79D174EC242C21D00F " +"2019-09-24 01:04:24.243 UTC [msp.identity] Sign -> DEBU 61d Sign: digest: 9106FFD99E535522C060659E7DA0B88E67D04C56BE350834CF35B2F29BD45257 " +"2019-09-24 01:04:24.245 UTC [orderer.consensus.etcdraft] run -> INFO 61e This node is picked to start campaign" channel=businesschannel node=1 +"2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 61f Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 620 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 01:04:24.246 UTC [orderer.consensus.etcdraft] apply -> INFO 621 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2019-09-24 01:04:24.247 UTC [fsblkstorage] indexBlock -> DEBU 622 Indexing block [blockNum=1, blockHash=[]byte{0xc9, 0x45, 0xdf, 0x37, 0x81, 0x48, 0xe9, 0xcf, 0x2f, 0x67, 0x79, 0xf2, 0x8, 0xa2, 0x45, 0x82, 0x78, 0x1, 0x40, 0x7d, 0x53, 0x8c, 0x1b, 0x24, 0x72, 0x1b, 0x17, 0xb8, 0xe0, 0x6f, 0x62, 0x94} txOffsets= +txId=6c31ef6b312999199af53620b2990731085e5abd5ebbe05e585103b587b39c7d locPointer=offset=71, bytesLength=26691 +]" +"2019-09-24 01:04:24.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 623 Sending msg of 28 bytes to 3 on channel testchainid took 366.6µs" +"2019-09-24 01:04:24.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 624 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.5µs " +"2019-09-24 01:04:24.249 UTC [fsblkstorage] updateCheckpoint -> DEBU 625 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[47980], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 01:04:24.250 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 626 [channel: testchainid] Wrote block [1]" +"2019-09-24 01:04:24.349 UTC [common.deliver] deliverBlocks -> WARN 627 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53646 because of consenter error" +"2019-09-24 01:04:24.350 UTC [orderer.common.server] func1 -> DEBU 628 Closing Deliver stream" +"2019-09-24 01:04:24.350 UTC [comm.grpc.server] 1 -> INFO 629 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53646 grpc.code=OK grpc.call_duration=209.3085ms +"2019-09-24 01:04:24.376 UTC [orderer.common.server] Deliver -> DEBU 62a Starting new Deliver handler" +"2019-09-24 01:04:24.376 UTC [common.deliver] Handle -> DEBU 62b Starting new deliver loop for 172.18.0.5:53648" +"2019-09-24 01:04:24.376 UTC [common.deliver] Handle -> DEBU 62c Attempting to read seek info message from 172.18.0.5:53648" +"2019-09-24 01:04:24.580 UTC [common.deliver] deliverBlocks -> WARN 62d [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53648 because of consenter error" +"2019-09-24 01:04:24.581 UTC [orderer.common.server] func1 -> DEBU 62e Closing Deliver stream" +"2019-09-24 01:04:24.582 UTC [comm.grpc.server] 1 -> INFO 62f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53648 grpc.code=OK grpc.call_duration=207.4685ms +"2019-09-24 01:04:24.605 UTC [orderer.common.server] Deliver -> DEBU 630 Starting new Deliver handler" +"2019-09-24 01:04:24.605 UTC [common.deliver] Handle -> DEBU 631 Starting new deliver loop for 172.18.0.5:53650" +"2019-09-24 01:04:24.605 UTC [common.deliver] Handle -> DEBU 632 Attempting to read seek info message from 172.18.0.5:53650" +"2019-09-24 01:04:24.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU 633 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:24.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU 634 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.3µs " +"2019-09-24 01:04:24.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 635 Sending msg of 28 bytes to 3 on channel testchainid took 158.7µs" +"2019-09-24 01:04:24.809 UTC [common.deliver] deliverBlocks -> WARN 636 [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53650 because of consenter error" +"2019-09-24 01:04:24.810 UTC [orderer.common.server] func1 -> DEBU 637 Closing Deliver stream" +"2019-09-24 01:04:24.811 UTC [comm.grpc.server] 1 -> INFO 638 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53650 grpc.code=OK grpc.call_duration=205.8058ms +"2019-09-24 01:04:24.845 UTC [orderer.common.server] Deliver -> DEBU 639 Starting new Deliver handler" +"2019-09-24 01:04:24.845 UTC [common.deliver] Handle -> DEBU 63a Starting new deliver loop for 172.18.0.5:53652" +"2019-09-24 01:04:24.846 UTC [common.deliver] Handle -> DEBU 63b Attempting to read seek info message from 172.18.0.5:53652" +"2019-09-24 01:04:25.047 UTC [common.deliver] deliverBlocks -> WARN 63c [channel: businesschannel] Rejecting deliver request for 172.18.0.5:53652 because of consenter error" +"2019-09-24 01:04:25.047 UTC [orderer.common.server] func1 -> DEBU 63d Closing Deliver stream" +"2019-09-24 01:04:25.048 UTC [comm.grpc.server] 1 -> INFO 63e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53652 grpc.code=OK grpc.call_duration=202.9277ms +"2019-09-24 01:04:25.066 UTC [orderer.common.server] Deliver -> DEBU 63f Starting new Deliver handler" +"2019-09-24 01:04:25.066 UTC [common.deliver] Handle -> DEBU 640 Starting new deliver loop for 172.18.0.5:53654" +"2019-09-24 01:04:25.067 UTC [common.deliver] Handle -> DEBU 641 Attempting to read seek info message from 172.18.0.5:53654" +"2019-09-24 01:04:25.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU 642 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:25.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU 643 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +"2019-09-24 01:04:25.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 644 Sending msg of 28 bytes to 3 on channel testchainid took 1.0063ms" +"2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] Step -> INFO 645 1 is starting a new election at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 646 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] poll -> INFO 647 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] campaign -> INFO 648 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.247 UTC [orderer.consensus.etcdraft] campaign -> INFO 649 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.247 UTC [orderer.common.cluster] NewStream -> DEBU 64a Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 01:04:25.248 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 64b Sending msg of 28 bytes to 2 on channel businesschannel took 190.7µs" +"2019-09-24 01:04:25.248 UTC [orderer.common.cluster] NewStream -> DEBU 64c Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2019-09-24 01:04:25.248 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 64d Sending msg of 28 bytes to 3 on channel businesschannel took 150.4µs" +"2019-09-24 01:04:25.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 192.7µs " +"2019-09-24 01:04:25.249 UTC [orderer.common.cluster.step] sendMessage -> DEBU 64f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125.7µs " +"2019-09-24 01:04:25.252 UTC [orderer.common.cluster] Step -> DEBU 650 Connection from orderer2.example.com(172.18.0.3:44808)" +"2019-09-24 01:04:25.253 UTC [orderer.common.cluster.step] handleMessage -> DEBU 651 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] poll -> INFO 652 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 653 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-09-24 01:04:25.254 UTC [orderer.common.cluster] Step -> DEBU 654 Connection from orderer1.example.com(172.18.0.4:54914)" +"2019-09-24 01:04:25.255 UTC [orderer.common.cluster.step] handleMessage -> DEBU 656 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.254 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 655 1 became candidate at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.255 UTC [orderer.consensus.etcdraft] poll -> INFO 657 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.256 UTC [orderer.consensus.etcdraft] campaign -> INFO 658 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.256 UTC [orderer.consensus.etcdraft] campaign -> INFO 659 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.257 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65a Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2019-09-24 01:04:25.257 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 65b Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2019-09-24 01:04:25.258 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 94.1µs " +"2019-09-24 01:04:25.258 UTC [orderer.common.cluster.step] sendMessage -> DEBU 65d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.6µs " +"2019-09-24 01:04:25.261 UTC [orderer.common.cluster.step] handleMessage -> DEBU 65e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] poll -> INFO 65f 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 660 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2019-09-24 01:04:25.262 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 661 1 became leader at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.263 UTC [orderer.consensus.etcdraft] run -> INFO 662 raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2019-09-24 01:04:25.263 UTC [orderer.common.cluster.step] handleMessage -> DEBU 663 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.264 UTC [orderer.consensus.etcdraft] run -> INFO 664 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2019-09-24 01:04:25.265 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 665 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2019-09-24 01:04:25.265 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 666 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2019-09-24 01:04:25.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU 667 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 227.3µs " +"2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 668 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 669 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:25.270 UTC [policies] Evaluate -> DEBU 66c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:04:25.270 UTC [msp] DeserializeIdentity -> DEBU 66d Obtaining identity" +"2019-09-24 01:04:25.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66e Sending msg of 36 bytes to 2 on channel businesschannel took 3.1207ms" +"2019-09-24 01:04:25.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 66f Sending msg of 36 bytes to 3 on channel businesschannel took 23.8µs" +"2019-09-24 01:04:25.272 UTC [msp.identity] newIdentity -> DEBU 670 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.273 UTC [orderer.common.cluster.step] sendMessage -> DEBU 671 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 941.5µs " +"2019-09-24 01:04:25.276 UTC [orderer.common.cluster.step] handleMessage -> DEBU 672 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.276 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 673 Sending msg of 28 bytes to 2 on channel businesschannel took 11.4µs" +"2019-09-24 01:04:25.276 UTC [orderer.common.cluster.step] sendMessage -> DEBU 674 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +"2019-09-24 01:04:25.276 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 675 Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2019-09-24 01:04:25.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 676 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.278 UTC [orderer.common.cluster.step] handleMessage -> DEBU 677 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.278 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 678 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2019-09-24 01:04:25.278 UTC [cauthdsl] func1 -> DEBU 679 0xc0003b33c0 gate 1569287065278418600 evaluation starts" +"2019-09-24 01:04:25.278 UTC [cauthdsl] func2 -> DEBU 67a 0xc0003b33c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:25.278 UTC [cauthdsl] func2 -> DEBU 67b 0xc0003b33c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:25.278 UTC [orderer.common.cluster.step] sendMessage -> DEBU 67c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.6µs " +"2019-09-24 01:04:25.279 UTC [cauthdsl] func2 -> DEBU 67d 0xc0003b33c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-09-24 01:04:25.279 UTC [orderer.common.cluster.step] handleMessage -> DEBU 67e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.279 UTC [cauthdsl] func2 -> DEBU 67f 0xc0003b33c0 principal evaluation fails" +"2019-09-24 01:04:25.280 UTC [cauthdsl] func1 -> DEBU 680 0xc0003b33c0 gate 1569287065278418600 evaluation fails" +"2019-09-24 01:04:25.280 UTC [policies] Evaluate -> DEBU 681 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:25.280 UTC [policies] Evaluate -> DEBU 682 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:25.280 UTC [policies] func1 -> DEBU 683 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-09-24 01:04:25.280 UTC [policies] Evaluate -> DEBU 684 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-09-24 01:04:25.281 UTC [policies] Evaluate -> DEBU 685 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:04:25.281 UTC [policies] Evaluate -> DEBU 686 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:25.282 UTC [policies] Evaluate -> DEBU 687 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:25.282 UTC [policies] Evaluate -> DEBU 688 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:25.282 UTC [cauthdsl] func1 -> DEBU 689 0xc00036b1c0 gate 1569287065282907700 evaluation starts" +"2019-09-24 01:04:25.282 UTC [cauthdsl] func2 -> DEBU 68a 0xc00036b1c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:25.283 UTC [cauthdsl] func2 -> DEBU 68b 0xc00036b1c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:25.283 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 68c Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:25.283 UTC [msp] Validate -> DEBU 68d MSP Org1MSP validating identity" +"2019-09-24 01:04:25.284 UTC [msp] getCertificationChain -> DEBU 68e MSP Org1MSP getting certification chain" +"2019-09-24 01:04:25.285 UTC [cauthdsl] func2 -> DEBU 68f 0xc00036b1c0 principal matched by identity 0" +"2019-09-24 01:04:25.285 UTC [msp.identity] Verify -> DEBU 690 Verify: digest = 00000000 84 55 d9 f1 a6 c0 16 be 8a 08 1c 27 73 bf f0 25 |.U.........'s..%| +00000010 9a 31 5b d2 0e e1 04 5f d0 5b 3f 54 e2 68 4f 9f |.1[...._.[?T.hO.|" +"2019-09-24 01:04:25.285 UTC [msp.identity] Verify -> DEBU 691 Verify: sig = 00000000 30 44 02 20 31 29 77 ac d0 41 07 5e 87 90 bb 3d |0D. 1)w..A.^...=| +00000010 f3 8e 3d fc a6 3a e5 5f 6c af 8e 1a e5 5f 3c 45 |..=..:._l...._..u.|" +"2019-09-24 01:04:25.286 UTC [cauthdsl] func2 -> DEBU 692 0xc00036b1c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:25.287 UTC [cauthdsl] func1 -> DEBU 693 0xc00036b1c0 gate 1569287065282907700 evaluation succeeds" +"2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 694 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 695 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:25.287 UTC [policies] Evaluate -> DEBU 696 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 697 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 698 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:04:25.288 UTC [policies] Evaluate -> DEBU 699 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:04:25.288 UTC [common.deliver] deliverBlocks -> DEBU 69a [channel: businesschannel] Received seekInfo (0xc0002b0780) start: > stop: > from 172.18.0.5:53654" +"2019-09-24 01:04:25.288 UTC [fsblkstorage] Next -> DEBU 69b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2019-09-24 01:04:25.288 UTC [fsblkstorage] newBlockfileStream -> DEBU 69c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69d Remaining bytes=[25807], Going to peek [8] bytes" +"2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69e Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:04:25.289 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 69f blockbytes [25804] read from file [0]" +"2019-09-24 01:04:25.289 UTC [common.deliver] deliverBlocks -> DEBU 6a0 [channel: businesschannel] Delivering block for (0xc0002b0780) for 172.18.0.5:53654" +"2019-09-24 01:04:25.289 UTC [common.deliver] deliverBlocks -> DEBU 6a1 [channel: businesschannel] Done delivering to 172.18.0.5:53654 for (0xc0002b0780)" +"2019-09-24 01:04:25.294 UTC [common.deliver] Handle -> DEBU 6a2 Waiting for new SeekInfo from 172.18.0.5:53654" +"2019-09-24 01:04:25.294 UTC [common.deliver] Handle -> DEBU 6a3 Attempting to read seek info message from 172.18.0.5:53654" +"2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.301 UTC [common.deliver] Handle -> DEBU 6a5 Received EOF from 172.18.0.5:53654, hangup" +"2019-09-24 01:04:25.301 UTC [orderer.common.server] func1 -> DEBU 6a6 Closing Deliver stream" +"2019-09-24 01:04:25.301 UTC [comm.grpc.server] 1 -> INFO 6a7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53654 grpc.code=OK grpc.call_duration=235.5333ms +"2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.301 UTC [grpc] infof -> DEBU 6a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6aa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ab transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.302 UTC [grpc] infof -> DEBU 6ad transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:25.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:25.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6af Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-09-24 01:04:25.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +"2019-09-24 01:04:25.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b1 Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2019-09-24 01:04:25.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b2 Sending msg of 28 bytes to 3 on channel businesschannel took 365.4µs" +"2019-09-24 01:04:25.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.8µs " +"2019-09-24 01:04:25.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6b4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.3µs " +"2019-09-24 01:04:25.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:25.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:26.192 UTC [orderer.common.server] replicateDisabledChains -> DEBU 6b7 No inactive chains to try to replicate" +"2019-09-24 01:04:26.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6b8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:26.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6b9 Sending msg of 28 bytes to 3 on channel testchainid took 21.9µs" +"2019-09-24 01:04:26.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.6µs " +"2019-09-24 01:04:26.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bb Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-09-24 01:04:26.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-09-24 01:04:26.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 207.8µs " +"2019-09-24 01:04:26.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 363.7µs " +"2019-09-24 01:04:26.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:26.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:26.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:26.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c2 Sending msg of 28 bytes to 3 on channel testchainid took 101µs" +"2019-09-24 01:04:26.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.2µs " +"2019-09-24 01:04:26.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c4 Sending msg of 28 bytes to 3 on channel businesschannel took 29.6µs" +"2019-09-24 01:04:26.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6c5 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +"2019-09-24 01:04:26.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.6µs " +"2019-09-24 01:04:26.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 443.4µs " +"2019-09-24 01:04:26.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:26.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6c9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:27.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:27.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cb Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2019-09-24 01:04:27.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.8µs " +"2019-09-24 01:04:27.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cd Sending msg of 28 bytes to 2 on channel businesschannel took 35.7µs" +"2019-09-24 01:04:27.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.5µs " +"2019-09-24 01:04:27.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2019-09-24 01:04:27.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +"2019-09-24 01:04:27.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:27.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:28.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d3 Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2019-09-24 01:04:28.064 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d5 Sending msg of 28 bytes to 3 on channel businesschannel took 155.2µs" +"2019-09-24 01:04:28.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.6µs " +"2019-09-24 01:04:28.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 66.1µs " +"2019-09-24 01:04:28.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:28.065 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d8 Sending msg of 28 bytes to 3 on channel testchainid took 85µs" +"2019-09-24 01:04:28.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.8µs " +"2019-09-24 01:04:28.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6da Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:28.067 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6db Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:28.231 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6dc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:28.231 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6dd Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 01:04:28.233 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2011ms " +"2019-09-24 01:04:28.266 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6df Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-09-24 01:04:28.268 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.2µs" +"2019-09-24 01:04:28.269 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 580.9µs " +"2019-09-24 01:04:28.270 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.2µs " +"2019-09-24 01:04:28.290 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:28.290 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 28 bytes to 2 on channel businesschannel took 43.5µs" +"2019-09-24 01:04:29.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e6 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2019-09-24 01:04:29.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.4µs " +"2019-09-24 01:04:29.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 137.1µs " +"2019-09-24 01:04:29.208 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ea Sending msg of 28 bytes to 2 on channel businesschannel took 23.5µs" +"2019-09-24 01:04:29.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6eb Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-09-24 01:04:29.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +"2019-09-24 01:04:29.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ed Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +"2019-09-24 01:04:29.549 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:29.550 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 3 on channel testchainid took 21.5µs" +"2019-09-24 01:04:29.551 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f1 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-09-24 01:04:29.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +"2019-09-24 01:04:29.551 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.7µs " +"2019-09-24 01:04:29.551 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.552 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.556 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.729 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:29.729 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f8 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 01:04:29.729 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.8µs " +"2019-09-24 01:04:29.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fa Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +"2019-09-24 01:04:29.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6fc Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 01:04:29.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6fd Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:29.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.3µs " +"2019-09-24 01:04:29.751 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.3µs " +"2019-09-24 01:04:29.752 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ff Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 700 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:30.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 701 Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2019-09-24 01:04:30.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 702 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.9µs " +"2019-09-24 01:04:30.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 703 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2019-09-24 01:04:30.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 704 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-09-24 01:04:30.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU 705 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.6µs " +"2019-09-24 01:04:30.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU 706 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.6µs " +"2019-09-24 01:04:30.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 707 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU 708 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU 709 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:30.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70a Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-09-24 01:04:30.731 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 208.6µs " +"2019-09-24 01:04:30.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70c Sending msg of 28 bytes to 2 on channel businesschannel took 24.1µs" +"2019-09-24 01:04:30.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 70d Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-09-24 01:04:30.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.4µs " +"2019-09-24 01:04:30.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 70f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.1µs " +"2019-09-24 01:04:30.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU 710 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU 711 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.857 UTC [orderer.common.server] Deliver -> DEBU 712 Starting new Deliver handler" +"2019-09-24 01:04:30.857 UTC [common.deliver] Handle -> DEBU 713 Starting new deliver loop for 172.18.0.5:53680" +"2019-09-24 01:04:30.857 UTC [common.deliver] Handle -> DEBU 714 Attempting to read seek info message from 172.18.0.5:53680" +"2019-09-24 01:04:30.872 UTC [orderer.common.server] Broadcast -> DEBU 715 Starting new Broadcast handler" +"2019-09-24 01:04:30.873 UTC [orderer.common.broadcast] Handle -> DEBU 716 Starting new broadcast loop for 172.18.0.5:53682" +"2019-09-24 01:04:30.873 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 717 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53682" +"2019-09-24 01:04:30.874 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 718 Processing config update message for channel businesschannel" +"2019-09-24 01:04:30.874 UTC [policies] Evaluate -> DEBU 719 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:04:30.874 UTC [policies] Evaluate -> DEBU 71a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:30.875 UTC [policies] Evaluate -> DEBU 71d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:30.875 UTC [cauthdsl] func1 -> DEBU 71e 0xc000947f40 gate 1569287070875875100 evaluation starts" +"2019-09-24 01:04:30.876 UTC [cauthdsl] func2 -> DEBU 71f 0xc000947f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:30.876 UTC [cauthdsl] func2 -> DEBU 720 0xc000947f40 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:30.877 UTC [cauthdsl] func2 -> DEBU 721 0xc000947f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-09-24 01:04:30.879 UTC [cauthdsl] func2 -> DEBU 722 0xc000947f40 principal evaluation fails" +"2019-09-24 01:04:30.880 UTC [cauthdsl] func1 -> DEBU 723 0xc000947f40 gate 1569287070875875100 evaluation fails" +"2019-09-24 01:04:30.880 UTC [policies] Evaluate -> DEBU 724 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.880 UTC [policies] Evaluate -> DEBU 725 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.881 UTC [policies] func1 -> DEBU 726 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-09-24 01:04:30.883 UTC [policies] Evaluate -> DEBU 727 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-09-24 01:04:30.886 UTC [policies] Evaluate -> DEBU 728 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:04:30.886 UTC [policies] Evaluate -> DEBU 729 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:04:30.887 UTC [policies] Evaluate -> DEBU 72a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:30.888 UTC [policies] Evaluate -> DEBU 72b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:04:30.890 UTC [cauthdsl] func1 -> DEBU 72c 0xc00097eeb0 gate 1569287070890037600 evaluation starts" +"2019-09-24 01:04:30.890 UTC [cauthdsl] func2 -> DEBU 72d 0xc00097eeb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:30.891 UTC [cauthdsl] func2 -> DEBU 72e 0xc00097eeb0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:30.891 UTC [cauthdsl] func2 -> DEBU 72f 0xc00097eeb0 principal matched by identity 0" +"2019-09-24 01:04:30.892 UTC [msp.identity] Verify -> DEBU 730 Verify: digest = 00000000 4f 60 c4 f6 4b 92 bb 51 fd 5b 23 4d c8 97 9c 8b |O`..K..Q.[#M....| +00000010 f0 7f c8 12 f4 f8 08 b1 fa 75 65 76 3b f3 02 5a |.........uev;..Z|" +"2019-09-24 01:04:30.892 UTC [msp.identity] Verify -> DEBU 731 Verify: sig = 00000000 30 45 02 21 00 86 34 33 60 61 5a f4 ca 1b 01 57 |0E.!..43`aZ....W| +00000010 1a 0c 2d 6b ad 2a 06 5a e5 ef 24 61 be 5d 8d 04 |..-k.*.Z..$a.]..| +00000020 30 a9 2b 1a cd 02 20 1d 79 3c b5 c9 92 31 b4 e1 |0.+... .y<...1..| +00000030 d4 3c cb 25 00 7b bf ef 22 8b 79 e5 33 c3 3b c3 |.<.%.{..".y.3.;.| +00000040 5a 4d cd fc 57 5a f0 |ZM..WZ.|" +"2019-09-24 01:04:30.895 UTC [cauthdsl] func2 -> DEBU 732 0xc00097eeb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:30.895 UTC [cauthdsl] func1 -> DEBU 733 0xc00097eeb0 gate 1569287070890037600 evaluation succeeds" +"2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 734 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 735 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.895 UTC [policies] Evaluate -> DEBU 736 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 737 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 738 Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:04:30.896 UTC [policies] Evaluate -> DEBU 739 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73a Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73b Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.896 UTC [common.configtx] addToMap -> DEBU 73c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 73f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 740 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 741 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 742 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 743 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.897 UTC [common.configtx] addToMap -> DEBU 744 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 745 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 746 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 747 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.898 UTC [common.configtx] addToMap -> DEBU 748 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.899 UTC [common.configtx] verifyDeltaSet -> DEBU 749 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.899 UTC [common.configtx] policyForItem -> DEBU 74a Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74b Manager Channel looking up path [Application]" +"2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74c Manager Channel has managers Orderer" +"2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74d Manager Channel has managers Application" +"2019-09-24 01:04:30.900 UTC [policies] Manager -> DEBU 74e Manager Channel/Application looking up path []" +"2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 74f Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 750 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 751 Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 01:04:30.901 UTC [policies] Manager -> DEBU 752 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.902 UTC [policies] Manager -> DEBU 753 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.902 UTC [policies] Manager -> DEBU 754 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 01:04:30.902 UTC [policies] Evaluate -> DEBU 755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:04:30.902 UTC [cauthdsl] func1 -> DEBU 756 0xc000c29b70 gate 1569287070902577200 evaluation starts" +"2019-09-24 01:04:30.902 UTC [cauthdsl] func2 -> DEBU 757 0xc000c29b70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:30.902 UTC [cauthdsl] func2 -> DEBU 758 0xc000c29b70 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:30.903 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 759 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:30.903 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 75a Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:30.903 UTC [msp] Validate -> DEBU 75b MSP Org1MSP validating identity" +"2019-09-24 01:04:30.903 UTC [msp] getCertificationChain -> DEBU 75c MSP Org1MSP getting certification chain" +"2019-09-24 01:04:30.903 UTC [msp] hasOURole -> DEBU 75d MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:30.904 UTC [msp] getCertificationChain -> DEBU 75e MSP Org1MSP getting certification chain" +"2019-09-24 01:04:30.904 UTC [cauthdsl] func2 -> DEBU 75f 0xc000c29b70 principal matched by identity 0" +"2019-09-24 01:04:30.904 UTC [msp.identity] Verify -> DEBU 760 Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +"2019-09-24 01:04:30.904 UTC [msp.identity] Verify -> DEBU 761 Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +00000040 0a 8e 87 e4 30 41 |....0A|" +"2019-09-24 01:04:30.905 UTC [cauthdsl] func2 -> DEBU 762 0xc000c29b70 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:30.905 UTC [cauthdsl] func1 -> DEBU 763 0xc000c29b70 gate 1569287070902577200 evaluation succeeds" +"2019-09-24 01:04:30.905 UTC [policies] Evaluate -> DEBU 764 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.905 UTC [policies] Evaluate -> DEBU 765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.906 UTC [common.configtx] verifyDeltaSet -> DEBU 766 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.906 UTC [common.configtx] recurseConfigMap -> DEBU 767 Setting policy for key Readers to " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 768 Setting policy for key Writers to " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 769 Setting policy for key Admins to " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76c Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.907 UTC [common.configtx] recurseConfigMap -> DEBU 76f Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 770 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 771 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 772 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 773 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 774 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 775 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 776 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.908 UTC [common.configtx] recurseConfigMap -> DEBU 777 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 778 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 779 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.configtx] recurseConfigMap -> DEBU 77c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.909 UTC [common.channelconfig] NewStandardValues -> DEBU 77d Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 77e Processing field: HashingAlgorithm" +"2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 77f Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 780 Processing field: OrdererAddresses" +"2019-09-24 01:04:30.909 UTC [common.channelconfig] initializeProtosStruct -> DEBU 781 Processing field: Consortium" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 782 Processing field: Capabilities" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 783 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 784 Processing field: ACLs" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 785 Processing field: Capabilities" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 786 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 787 Processing field: AnchorPeers" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] NewStandardValues -> DEBU 788 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.910 UTC [common.channelconfig] initializeProtosStruct -> DEBU 789 Processing field: MSP" +"2019-09-24 01:04:30.911 UTC [common.channelconfig] Validate -> DEBU 78a Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:30.911 UTC [common.channelconfig] validateMSP -> DEBU 78b Setting up MSP for org Org1MSP" +"2019-09-24 01:04:30.911 UTC [msp] newBccspMsp -> DEBU 78c Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.912 UTC [msp] New -> DEBU 78d Creating Cache-MSP instance" +"2019-09-24 01:04:30.912 UTC [msp] Setup -> DEBU 78e Setting up MSP instance Org1MSP" +"2019-09-24 01:04:30.912 UTC [msp.identity] newIdentity -> DEBU 78f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.912 UTC [common.channelconfig] NewStandardValues -> DEBU 790 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.912 UTC [common.channelconfig] initializeProtosStruct -> DEBU 791 Processing field: AnchorPeers" +"2019-09-24 01:04:30.912 UTC [common.channelconfig] NewStandardValues -> DEBU 792 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.912 UTC [common.channelconfig] initializeProtosStruct -> DEBU 793 Processing field: MSP" +"2019-09-24 01:04:30.913 UTC [common.channelconfig] Validate -> DEBU 794 Anchor peers for org Org2MSP are " +"2019-09-24 01:04:30.914 UTC [common.channelconfig] validateMSP -> DEBU 795 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:30.914 UTC [msp] newBccspMsp -> DEBU 796 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.914 UTC [msp] New -> DEBU 797 Creating Cache-MSP instance" +"2019-09-24 01:04:30.914 UTC [msp] Setup -> DEBU 798 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:30.914 UTC [msp.identity] newIdentity -> DEBU 799 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.915 UTC [common.channelconfig] NewStandardValues -> DEBU 79a Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79b Processing field: ConsensusType" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79c Processing field: BatchSize" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79d Processing field: BatchTimeout" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79e Processing field: KafkaBrokers" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 79f Processing field: ChannelRestrictions" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a0 Processing field: Capabilities" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] NewStandardValues -> DEBU 7a1 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a2 Processing field: Endpoints" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] NewStandardValues -> DEBU 7a3 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7a4 Processing field: MSP" +"2019-09-24 01:04:30.916 UTC [common.channelconfig] validateMSP -> DEBU 7a5 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:30.916 UTC [msp] newBccspMsp -> DEBU 7a6 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.916 UTC [msp] New -> DEBU 7a7 Creating Cache-MSP instance" +"2019-09-24 01:04:30.916 UTC [msp] Setup -> DEBU 7a8 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:30.916 UTC [msp.identity] newIdentity -> DEBU 7a9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.917 UTC [msp.identity] newIdentity -> DEBU 7aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.917 UTC [msp] Validate -> DEBU 7ab MSP OrdererMSP validating identity" +"2019-09-24 01:04:30.917 UTC [msp] Setup -> DEBU 7ac Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:30.917 UTC [msp] Setup -> DEBU 7ad MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7ae Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7af Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b1 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b2 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b3 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b4 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b5 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b6 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b7 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b8 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7b9 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7ba Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7bb Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7bc Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:30.917 UTC [policies] GetPolicy -> DEBU 7bd Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7be Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:30.917 UTC [policies] GetPolicy -> DEBU 7bf Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7c0 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:30.917 UTC [policies] NewManagerImpl -> DEBU 7c1 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c2 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c3 Proposed new policy Writers for Channel" +"2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c4 Proposed new policy Admins for Channel" +"2019-09-24 01:04:30.918 UTC [policies] NewManagerImpl -> DEBU 7c5 Proposed new policy Readers for Channel" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c6 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c7 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7c9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7ca Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cd Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7ce Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7cf Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d3 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d4 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d5 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d6 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7d9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7da Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7db Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7dc Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7dd Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7de Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7df Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:30.918 UTC [common.configtx] addToMap -> DEBU 7e2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e4 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e5 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e6 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e7 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7e9 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ea Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7eb Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ec Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ed Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ee Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:30.919 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7f2 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7f3 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f4 Manager Channel looking up path [Application]" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f5 Manager Channel has managers Orderer" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f6 Manager Channel has managers Application" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f7 Manager Channel/Application looking up path []" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f8 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7f9 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fa As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fb As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 7fc As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7fd Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7fe Manager Channel has managers Orderer" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 7ff Manager Channel has managers Application" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 800 Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:30.919 UTC [policies] Manager -> DEBU 801 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 802 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 803 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 804 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:30.919 UTC [common.channelconfig] LogSanityChecks -> DEBU 805 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:30.919 UTC [common.capabilities] Supported -> DEBU 806 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:30.919 UTC [common.capabilities] Supported -> DEBU 807 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:30.919 UTC [msp] GetDefaultSigningIdentity -> DEBU 808 Obtaining default signing identity" +"2019-09-24 01:04:30.920 UTC [msp] GetDefaultSigningIdentity -> DEBU 809 Obtaining default signing identity" +"2019-09-24 01:04:30.920 UTC [msp.identity] Sign -> DEBU 80a Sign: plaintext: 0AD2060A1B08011A06089ED7A5EC0522...EF228B79E533C33BC35A4DCDFC575AF0 " +"2019-09-24 01:04:30.920 UTC [msp.identity] Sign -> DEBU 80b Sign: digest: 3A3BA8FA1947C64F70723B87EBA8A93ACC79A8F3D8CD6E6D4BA90A088660295F " +"2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 80f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:30.920 UTC [policies] Evaluate -> DEBU 810 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:30.920 UTC [msp] DeserializeIdentity -> DEBU 811 Obtaining identity" +"2019-09-24 01:04:30.920 UTC [msp.identity] newIdentity -> DEBU 812 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.920 UTC [cauthdsl] func1 -> DEBU 813 0xc0001f3e30 gate 1569287070920693200 evaluation starts" +"2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 814 0xc0001f3e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 815 0xc0001f3e30 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:30.920 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 816 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:04:30.920 UTC [msp] Validate -> DEBU 817 MSP OrdererMSP validating identity" +"2019-09-24 01:04:30.920 UTC [cauthdsl] func2 -> DEBU 818 0xc0001f3e30 principal matched by identity 0" +"2019-09-24 01:04:30.921 UTC [msp.identity] Verify -> DEBU 819 Verify: digest = 00000000 3a 3b a8 fa 19 47 c6 4f 70 72 3b 87 eb a8 a9 3a |:;...G.Opr;....:| +00000010 cc 79 a8 f3 d8 cd 6e 6d 4b a9 0a 08 86 60 29 5f |.y....nmK....`)_|" +"2019-09-24 01:04:30.921 UTC [msp.identity] Verify -> DEBU 81a Verify: sig = 00000000 30 44 02 20 3a b0 a4 59 8c 0d d1 93 63 37 ae 85 |0D. :..Y....c7..| +00000010 3c d5 31 b6 01 9c 7d 0e 86 9f fd b5 ba 94 55 e6 |<.1...}.......U.| +00000020 2d 17 bd 56 02 20 63 81 1a 3b 99 93 cf 7e 2f fe |-..V. c..;...~/.| +00000030 d4 28 43 f3 2d 43 fb 57 79 ee b6 15 b0 f5 fc aa |.(C.-C.Wy.......| +00000040 1a b2 84 1a bc 27 |.....'|" +"2019-09-24 01:04:30.921 UTC [cauthdsl] func2 -> DEBU 81b 0xc0001f3e30 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:30.921 UTC [cauthdsl] func1 -> DEBU 81c 0xc0001f3e30 gate 1569287070920693200 evaluation succeeds" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 81f Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 820 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 821 Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:04:30.921 UTC [policies] Evaluate -> DEBU 822 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:04:30.921 UTC [orderer.common.msgprocessor] Apply -> DEBU 823 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 824 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 825 Processing field: HashingAlgorithm" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 826 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 827 Processing field: OrdererAddresses" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 828 Processing field: Consortium" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 829 Processing field: Capabilities" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82a Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82b Processing field: ACLs" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82c Processing field: Capabilities" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 82e Processing field: AnchorPeers" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] NewStandardValues -> DEBU 82f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] initializeProtosStruct -> DEBU 830 Processing field: MSP" +"2019-09-24 01:04:30.921 UTC [common.channelconfig] Validate -> DEBU 831 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:30.921 UTC [common.channelconfig] validateMSP -> DEBU 832 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:30.921 UTC [msp] newBccspMsp -> DEBU 833 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.921 UTC [msp] New -> DEBU 834 Creating Cache-MSP instance" +"2019-09-24 01:04:30.921 UTC [msp] Setup -> DEBU 835 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:30.922 UTC [msp.identity] newIdentity -> DEBU 836 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.922 UTC [common.channelconfig] NewStandardValues -> DEBU 837 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.922 UTC [common.channelconfig] initializeProtosStruct -> DEBU 838 Processing field: AnchorPeers" +"2019-09-24 01:04:30.922 UTC [common.channelconfig] NewStandardValues -> DEBU 839 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.922 UTC [common.channelconfig] initializeProtosStruct -> DEBU 83a Processing field: MSP" +"2019-09-24 01:04:30.922 UTC [common.channelconfig] Validate -> DEBU 83b Anchor peers for org Org2MSP are " +"2019-09-24 01:04:30.922 UTC [common.channelconfig] validateMSP -> DEBU 83c Setting up MSP for org Org2MSP" +"2019-09-24 01:04:30.922 UTC [msp] newBccspMsp -> DEBU 83d Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.922 UTC [msp] New -> DEBU 83e Creating Cache-MSP instance" +"2019-09-24 01:04:30.922 UTC [msp] Setup -> DEBU 83f Setting up MSP instance Org2MSP" +"2019-09-24 01:04:30.922 UTC [msp.identity] newIdentity -> DEBU 840 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] NewStandardValues -> DEBU 841 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 842 Processing field: ConsensusType" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 843 Processing field: BatchSize" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 844 Processing field: BatchTimeout" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 845 Processing field: KafkaBrokers" +"2019-09-24 01:04:30.930 UTC [common.channelconfig] initializeProtosStruct -> DEBU 846 Processing field: ChannelRestrictions" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 847 Processing field: Capabilities" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] NewStandardValues -> DEBU 848 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 849 Processing field: Endpoints" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] NewStandardValues -> DEBU 84a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] initializeProtosStruct -> DEBU 84b Processing field: MSP" +"2019-09-24 01:04:30.931 UTC [common.channelconfig] validateMSP -> DEBU 84c Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:30.931 UTC [msp] newBccspMsp -> DEBU 84d Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.932 UTC [msp] New -> DEBU 84e Creating Cache-MSP instance" +"2019-09-24 01:04:30.932 UTC [msp] Setup -> DEBU 84f Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:30.932 UTC [msp.identity] newIdentity -> DEBU 850 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.933 UTC [msp.identity] newIdentity -> DEBU 851 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.934 UTC [msp] Validate -> DEBU 852 MSP OrdererMSP validating identity" +"2019-09-24 01:04:30.934 UTC [msp] Setup -> DEBU 853 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:30.935 UTC [msp] Setup -> DEBU 854 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 855 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 856 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 857 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 858 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 859 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:30.935 UTC [policies] NewManagerImpl -> DEBU 85a Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85b Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85c Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85d Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85e Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 85f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 860 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 861 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.936 UTC [policies] NewManagerImpl -> DEBU 862 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.936 UTC [policies] GetPolicy -> DEBU 863 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 864 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 865 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 866 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 867 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:30.937 UTC [policies] GetPolicy -> DEBU 868 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 869 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86a Proposed new policy Writers for Channel" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86b Proposed new policy Admins for Channel" +"2019-09-24 01:04:30.937 UTC [policies] NewManagerImpl -> DEBU 86c Proposed new policy Readers for Channel" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86d Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86e Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 86f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 870 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 871 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 872 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 873 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 874 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 875 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 876 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 877 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 878 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 879 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87a Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87b Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87c Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 87f Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 880 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:30.937 UTC [common.configtx] addToMap -> DEBU 881 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 882 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 883 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 884 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 885 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 886 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 887 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 888 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 889 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88a Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88b Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88d Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 88f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 890 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 891 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 892 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 893 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 894 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:30.938 UTC [common.configtx] addToMap -> DEBU 895 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 896 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 897 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:30.941 UTC [common.configtx] addToMap -> DEBU 898 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:30.942 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 899 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53682" +"2019-09-24 01:04:30.944 UTC [orderer.consensus.etcdraft] propose -> INFO 89a Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:04:30.944 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 89b Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 01:04:30.945 UTC [orderer.consensus.etcdraft] 2 -> DEBU 89c Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:04:30.947 UTC [common.deliver] Handle -> WARN 89d Error reading from 172.18.0.5:53680: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:30.947 UTC [orderer.common.server] func1 -> DEBU 89e Closing Deliver stream" +"2019-09-24 01:04:30.947 UTC [comm.grpc.server] 1 -> INFO 89f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53680 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=90.5018ms +"2019-09-24 01:04:30.949 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8a1 Send of ConsensusRequest for channel businesschannel with payload of size 24600 to orderer2.example.com(orderer2.example.com:7050) took 1.2986ms " +"2019-09-24 01:04:30.950 UTC [grpc] infof -> DEBU 8a2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:30.947 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8a0 Sending msg of 24600 bytes to 3 on channel businesschannel took 17.5µs" +"2019-09-24 01:04:30.954 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8a3 Sending msg of 24600 bytes to 2 on channel businesschannel took 1.3423ms" +"2019-09-24 01:04:30.956 UTC [orderer.common.broadcast] Handle -> WARN 8a4 Error reading from 172.18.0.5:53682: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:30.956 UTC [orderer.common.server] func1 -> DEBU 8a5 Closing Broadcast stream" +"2019-09-24 01:04:30.957 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8a6 Send of ConsensusRequest for channel businesschannel with payload of size 24600 to orderer1.example.com(orderer1.example.com:7050) took 1.0759ms " +"2019-09-24 01:04:30.957 UTC [comm.grpc.server] 1 -> INFO 8a7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53682 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=85.8136ms +"2019-09-24 01:04:30.958 UTC [grpc] infof -> DEBU 8a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:30.958 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8a9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8aa Sending msg of 28 bytes to 2 on channel businesschannel took 12.6µs" +"2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8ab Sending msg of 28 bytes to 3 on channel businesschannel took 10.5µs" +"2019-09-24 01:04:30.959 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +"2019-09-24 01:04:30.959 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 8ad Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8ae Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8af Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b5 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b6 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b7 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b8 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8b9 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.959 UTC [common.configtx] addToMap -> DEBU 8ba Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.960 UTC [common.configtx] addToMap -> DEBU 8bb Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.960 UTC [common.configtx] addToMap -> DEBU 8bc Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.960 UTC [common.configtx] verifyDeltaSet -> DEBU 8bd Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.960 UTC [common.configtx] policyForItem -> DEBU 8be Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8bf Manager Channel looking up path [Application]" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c0 Manager Channel has managers Application" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c1 Manager Channel has managers Orderer" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c2 Manager Channel/Application looking up path []" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c3 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c4 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c5 Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c6 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c7 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.960 UTC [policies] Manager -> DEBU 8c8 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func1 -> DEBU 8ca 0xc0010ead80 gate 1569287070960426400 evaluation starts" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cb 0xc0010ead80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cc 0xc0010ead80 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8cd 0xc0010ead80 principal matched by identity 0" +"2019-09-24 01:04:30.960 UTC [msp.identity] Verify -> DEBU 8ce Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +"2019-09-24 01:04:30.960 UTC [msp.identity] Verify -> DEBU 8cf Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +00000040 0a 8e 87 e4 30 41 |....0A|" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func2 -> DEBU 8d0 0xc0010ead80 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:30.960 UTC [cauthdsl] func1 -> DEBU 8d1 0xc0010ead80 gate 1569287070960426400 evaluation succeeds" +"2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8d2 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.960 UTC [policies] Evaluate -> DEBU 8d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.960 UTC [common.configtx] verifyDeltaSet -> DEBU 8d4 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.960 UTC [common.configtx] recurseConfigMap -> DEBU 8d5 Setting policy for key Readers to " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d6 Setting policy for key Writers to " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d7 Setting policy for key Admins to " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8d9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8da Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8db Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8dc Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8dd Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8de Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8df Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8e9 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.961 UTC [common.configtx] recurseConfigMap -> DEBU 8ea Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:30.962 UTC [common.channelconfig] NewStandardValues -> DEBU 8eb Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ec Processing field: HashingAlgorithm" +"2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ed Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ee Processing field: OrdererAddresses" +"2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8ef Processing field: Consortium" +"2019-09-24 01:04:30.964 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 70.3µs " +"2019-09-24 01:04:30.962 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f1 Processing field: Capabilities" +"2019-09-24 01:04:30.965 UTC [common.channelconfig] NewStandardValues -> DEBU 8f2 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:30.965 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f3 Processing field: ACLs" +"2019-09-24 01:04:30.965 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f4 Processing field: Capabilities" +"2019-09-24 01:04:30.966 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8f5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.967 UTC [common.channelconfig] NewStandardValues -> DEBU 8f6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f7 Processing field: AnchorPeers" +"2019-09-24 01:04:30.968 UTC [common.channelconfig] NewStandardValues -> DEBU 8f8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.968 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8f9 Processing field: MSP" +"2019-09-24 01:04:30.969 UTC [common.channelconfig] Validate -> DEBU 8fa Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:30.970 UTC [common.channelconfig] validateMSP -> DEBU 8fb Setting up MSP for org Org1MSP" +"2019-09-24 01:04:30.970 UTC [msp] newBccspMsp -> DEBU 8fc Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.970 UTC [msp] New -> DEBU 8fd Creating Cache-MSP instance" +"2019-09-24 01:04:30.971 UTC [msp] Setup -> DEBU 8fe Setting up MSP instance Org1MSP" +"2019-09-24 01:04:30.973 UTC [msp.identity] newIdentity -> DEBU 8ff Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.975 UTC [common.channelconfig] NewStandardValues -> DEBU 900 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:30.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 901 Processing field: AnchorPeers" +"2019-09-24 01:04:30.975 UTC [common.channelconfig] NewStandardValues -> DEBU 902 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 903 Processing field: MSP" +"2019-09-24 01:04:30.977 UTC [common.channelconfig] Validate -> DEBU 904 Anchor peers for org Org2MSP are " +"2019-09-24 01:04:30.977 UTC [common.channelconfig] validateMSP -> DEBU 905 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:30.977 UTC [msp] newBccspMsp -> DEBU 906 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.979 UTC [msp] New -> DEBU 907 Creating Cache-MSP instance" +"2019-09-24 01:04:30.980 UTC [msp] Setup -> DEBU 908 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:30.982 UTC [msp.identity] newIdentity -> DEBU 909 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.984 UTC [common.channelconfig] NewStandardValues -> DEBU 90a Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:30.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90b Processing field: ConsensusType" +"2019-09-24 01:04:30.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90c Processing field: BatchSize" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90d Processing field: BatchTimeout" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90e Processing field: KafkaBrokers" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 90f Processing field: ChannelRestrictions" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 910 Processing field: Capabilities" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] NewStandardValues -> DEBU 911 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 912 Processing field: Endpoints" +"2019-09-24 01:04:30.985 UTC [common.channelconfig] NewStandardValues -> DEBU 913 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:30.986 UTC [common.channelconfig] initializeProtosStruct -> DEBU 914 Processing field: MSP" +"2019-09-24 01:04:30.986 UTC [common.channelconfig] validateMSP -> DEBU 915 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:30.986 UTC [msp] newBccspMsp -> DEBU 916 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:30.986 UTC [msp] New -> DEBU 917 Creating Cache-MSP instance" +"2019-09-24 01:04:30.986 UTC [msp] Setup -> DEBU 918 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:30.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 919 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 91a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:30.986 UTC [msp.identity] newIdentity -> DEBU 91b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.987 UTC [msp.identity] newIdentity -> DEBU 91c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:30.987 UTC [msp] Validate -> DEBU 91d MSP OrdererMSP validating identity" +"2019-09-24 01:04:30.987 UTC [msp] Setup -> DEBU 91e Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:30.987 UTC [msp] Setup -> DEBU 91f MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 920 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 921 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 922 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 923 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 924 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 925 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 926 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 927 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 928 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 929 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:30.987 UTC [policies] NewManagerImpl -> DEBU 92a Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92b Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92c Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92d Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 92e Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:30.988 UTC [policies] GetPolicy -> DEBU 92f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 930 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:30.988 UTC [policies] GetPolicy -> DEBU 931 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 932 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 933 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 934 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 935 Proposed new policy Readers for Channel" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 936 Proposed new policy Writers for Channel" +"2019-09-24 01:04:30.988 UTC [policies] NewManagerImpl -> DEBU 937 Proposed new policy Admins for Channel" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 938 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 939 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93b Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93c Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:30.988 UTC [common.configtx] addToMap -> DEBU 93d Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 93e Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 93f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 940 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 941 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 942 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 943 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 944 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:30.990 UTC [common.configtx] addToMap -> DEBU 945 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 946 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 947 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 948 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 949 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:30.991 UTC [common.configtx] addToMap -> DEBU 94d Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 94e Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 94f Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 950 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 951 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 952 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 953 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 954 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 955 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 956 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 957 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 958 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 959 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95e Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 95f Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 960 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:30.992 UTC [common.configtx] addToMap -> DEBU 961 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:30.993 UTC [common.configtx] addToMap -> DEBU 962 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:30.993 UTC [common.configtx] addToMap -> DEBU 963 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 964 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 965 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 966 Manager Channel looking up path [Application]" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 967 Manager Channel has managers Application" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 968 Manager Channel has managers Orderer" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 969 Manager Channel/Application looking up path []" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 96a Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:30.993 UTC [policies] Manager -> DEBU 96b Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96c As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96d As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:30.993 UTC [common.channelconfig] LogSanityChecks -> DEBU 96e As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 96f Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 970 Manager Channel has managers Orderer" +"2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 971 Manager Channel has managers Application" +"2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 972 Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:30.994 UTC [policies] Manager -> DEBU 973 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 974 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 975 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 976 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:30.995 UTC [common.channelconfig] LogSanityChecks -> DEBU 977 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:30.995 UTC [common.capabilities] Supported -> DEBU 978 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:30.995 UTC [common.capabilities] Supported -> DEBU 979 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:30.995 UTC [orderer.common.server] func1 -> DEBU 97a Executing callback to update root CAs" +"2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97b updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97c adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97d adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:30.996 UTC [orderer.common.server] updateTrustedRoots -> DEBU 97e adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:30.996 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 97f [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2019-09-24 01:04:30.996 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 980 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2019-09-24 01:04:30.996 UTC [msp] GetDefaultSigningIdentity -> DEBU 981 Obtaining default signing identity" +"2019-09-24 01:04:30.997 UTC [msp] GetDefaultSigningIdentity -> DEBU 982 Obtaining default signing identity" +"2019-09-24 01:04:30.997 UTC [msp.identity] Sign -> DEBU 983 Sign: plaintext: 0A020801120B0A090A03010203100418...45D385843EC3656689A0D7DB640DA02D " +"2019-09-24 01:04:30.997 UTC [msp.identity] Sign -> DEBU 984 Sign: digest: 77DDB6D772808AD1F85ADE4C70A668F5AD49050564CABDB4AC1D585169E0B226 " +"2019-09-24 01:04:30.999 UTC [fsblkstorage] indexBlock -> DEBU 985 Indexing block [blockNum=1, blockHash=[]byte{0x2d, 0x35, 0x2, 0xb4, 0xa1, 0xf4, 0x55, 0x5, 0x99, 0x27, 0xd1, 0x6d, 0xe6, 0x7c, 0x19, 0xc, 0x5f, 0x50, 0x26, 0x8f, 0x7a, 0x87, 0x5a, 0xb8, 0xa2, 0xc9, 0x82, 0xeb, 0xf2, 0x57, 0xa0, 0x33} txOffsets= +txId=33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636 locPointer=offset=71, bytesLength=24469 +]" +"2019-09-24 01:04:31.000 UTC [fsblkstorage] updateCheckpoint -> DEBU 986 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51285], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 01:04:31.000 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 987 [channel: businesschannel] Wrote block [1]" +"2019-09-24 01:04:31.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 988 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:31.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 989 Sending msg of 28 bytes to 3 on channel testchainid took 55.5µs" +"2019-09-24 01:04:31.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.9µs " +"2019-09-24 01:04:31.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98b Sending msg of 28 bytes to 2 on channel businesschannel took 31.2µs" +"2019-09-24 01:04:31.247 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 98c Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2019-09-24 01:04:31.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 940.7µs " +"2019-09-24 01:04:31.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU 98e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88.5µs " +"2019-09-24 01:04:31.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 98f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:31.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU 990 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:31.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU 991 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:31.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 992 Sending msg of 28 bytes to 3 on channel testchainid took 53.6µs" +"2019-09-24 01:04:31.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU 993 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 833.1µs " +"2019-09-24 01:04:31.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 994 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +"2019-09-24 01:04:31.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 995 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2019-09-24 01:04:31.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 996 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 129.5µs " +"2019-09-24 01:04:31.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU 997 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.2µs " +"2019-09-24 01:04:31.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU 998 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:31.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU 999 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:31.778 UTC [orderer.common.server] Deliver -> DEBU 99a Starting new Deliver handler" +"2019-09-24 01:04:31.778 UTC [common.deliver] Handle -> DEBU 99b Starting new deliver loop for 172.18.0.7:48428" +"2019-09-24 01:04:31.778 UTC [common.deliver] Handle -> DEBU 99c Attempting to read seek info message from 172.18.0.7:48428" +"2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 99f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 9a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:31.779 UTC [policies] Evaluate -> DEBU 9a1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:04:31.779 UTC [msp] DeserializeIdentity -> DEBU 9a2 Obtaining identity" +"2019-09-24 01:04:31.780 UTC [msp.identity] newIdentity -> DEBU 9a3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.781 UTC [cauthdsl] func1 -> DEBU 9a4 0xc001203cc0 gate 1569287071781757700 evaluation starts" +"2019-09-24 01:04:31.781 UTC [cauthdsl] func2 -> DEBU 9a5 0xc001203cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:31.782 UTC [cauthdsl] func2 -> DEBU 9a6 0xc001203cc0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:31.782 UTC [cauthdsl] func2 -> DEBU 9a7 0xc001203cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2019-09-24 01:04:31.783 UTC [cauthdsl] func2 -> DEBU 9a8 0xc001203cc0 principal evaluation fails" +"2019-09-24 01:04:31.783 UTC [cauthdsl] func1 -> DEBU 9a9 0xc001203cc0 gate 1569287071781757700 evaluation fails" +"2019-09-24 01:04:31.783 UTC [policies] Evaluate -> DEBU 9aa Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:31.783 UTC [policies] Evaluate -> DEBU 9ab == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:31.783 UTC [policies] func1 -> DEBU 9ac Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9ad Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:04:31.784 UTC [policies] Evaluate -> DEBU 9af == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:31.785 UTC [policies] Evaluate -> DEBU 9b0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:31.785 UTC [policies] Evaluate -> DEBU 9b1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:31.786 UTC [cauthdsl] func1 -> DEBU 9b2 0xc00123f2f0 gate 1569287071786449300 evaluation starts" +"2019-09-24 01:04:31.787 UTC [cauthdsl] func2 -> DEBU 9b3 0xc00123f2f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:31.787 UTC [cauthdsl] func2 -> DEBU 9b4 0xc00123f2f0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:31.789 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9b5 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:31.789 UTC [msp] Validate -> DEBU 9b6 MSP Org1MSP validating identity" +"2019-09-24 01:04:31.790 UTC [msp] getCertificationChain -> DEBU 9b7 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:31.791 UTC [cauthdsl] func2 -> DEBU 9b8 0xc00123f2f0 principal matched by identity 0" +"2019-09-24 01:04:31.791 UTC [msp.identity] Verify -> DEBU 9b9 Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +"2019-09-24 01:04:31.791 UTC [msp.identity] Verify -> DEBU 9ba Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +00000040 8d 91 b7 ea 04 6f |.....o|" +"2019-09-24 01:04:31.792 UTC [cauthdsl] func2 -> DEBU 9bb 0xc00123f2f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:31.792 UTC [cauthdsl] func1 -> DEBU 9bc 0xc00123f2f0 gate 1569287071786449300 evaluation succeeds" +"2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9bd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.793 UTC [policies] Evaluate -> DEBU 9bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c1 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:04:31.794 UTC [policies] Evaluate -> DEBU 9c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:04:31.794 UTC [common.deliver] deliverBlocks -> DEBU 9c3 [channel: businesschannel] Received seekInfo (0xc00115ddc0) start: > stop: > from 172.18.0.7:48428" +"2019-09-24 01:04:31.795 UTC [fsblkstorage] Next -> DEBU 9c4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:04:31.795 UTC [fsblkstorage] newBlockfileStream -> DEBU 9c5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +"2019-09-24 01:04:31.795 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c6 Remaining bytes=[25478], Going to peek [8] bytes" +"2019-09-24 01:04:31.796 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c7 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +"2019-09-24 01:04:31.796 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 9c8 blockbytes [25475] read from file [0]" +"2019-09-24 01:04:31.797 UTC [common.deliver] deliverBlocks -> DEBU 9c9 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:04:31.798 UTC [fsblkstorage] waitForBlock -> DEBU 9ca Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +"2019-09-24 01:04:32.146 UTC [orderer.common.server] Deliver -> DEBU 9cb Starting new Deliver handler" +"2019-09-24 01:04:32.146 UTC [common.deliver] Handle -> DEBU 9cc Starting new deliver loop for 172.18.0.9:60592" +"2019-09-24 01:04:32.147 UTC [common.deliver] Handle -> DEBU 9cd Attempting to read seek info message from 172.18.0.9:60592" +"2019-09-24 01:04:32.147 UTC [policies] Evaluate -> DEBU 9ce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9cf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9d0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:04:32.148 UTC [policies] Evaluate -> DEBU 9d1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.149 UTC [policies] Evaluate -> DEBU 9d2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:04:32.149 UTC [msp] DeserializeIdentity -> DEBU 9d3 Obtaining identity" +"2019-09-24 01:04:32.149 UTC [msp.identity] newIdentity -> DEBU 9d4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:04:32.150 UTC [cauthdsl] func1 -> DEBU 9d5 0xc001298f60 gate 1569287072150641800 evaluation starts" +"2019-09-24 01:04:32.150 UTC [cauthdsl] func2 -> DEBU 9d6 0xc001298f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d7 0xc001298f60 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d8 0xc001298f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-09-24 01:04:32.151 UTC [cauthdsl] func2 -> DEBU 9d9 0xc001298f60 principal evaluation fails" +"2019-09-24 01:04:32.151 UTC [cauthdsl] func1 -> DEBU 9da 0xc001298f60 gate 1569287072150641800 evaluation fails" +"2019-09-24 01:04:32.151 UTC [policies] Evaluate -> DEBU 9db Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:32.151 UTC [policies] Evaluate -> DEBU 9dc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:32.151 UTC [policies] func1 -> DEBU 9dd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9de Signature set did not satisfy policy /Channel/Orderer/Readers" +"2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.152 UTC [policies] Evaluate -> DEBU 9e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.152 UTC [cauthdsl] func1 -> DEBU 9e3 0xc0012d8590 gate 1569287072152510300 evaluation starts" +"2019-09-24 01:04:32.152 UTC [cauthdsl] func2 -> DEBU 9e4 0xc0012d8590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.152 UTC [cauthdsl] func2 -> DEBU 9e5 0xc0012d8590 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:32.153 UTC [cauthdsl] func2 -> DEBU 9e6 0xc0012d8590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.153 UTC [cauthdsl] func2 -> DEBU 9e7 0xc0012d8590 principal evaluation fails" +"2019-09-24 01:04:32.153 UTC [cauthdsl] func1 -> DEBU 9e8 0xc0012d8590 gate 1569287072152510300 evaluation fails" +"2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9e9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9ea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.153 UTC [policies] Evaluate -> DEBU 9eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.153 UTC [cauthdsl] func1 -> DEBU 9ec 0xc0012d8df0 gate 1569287072153970500 evaluation starts" +"2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9ed 0xc0012d8df0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9ee 0xc0012d8df0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:32.154 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9ef Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:32.154 UTC [msp] Validate -> DEBU 9f0 MSP Org2MSP validating identity" +"2019-09-24 01:04:32.154 UTC [msp] getCertificationChain -> DEBU 9f1 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:32.154 UTC [cauthdsl] func2 -> DEBU 9f2 0xc0012d8df0 principal matched by identity 0" +"2019-09-24 01:04:32.155 UTC [msp.identity] Verify -> DEBU 9f3 Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +"2019-09-24 01:04:32.155 UTC [msp.identity] Verify -> DEBU 9f4 Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +00000040 7d c0 9c 51 b2 3e |}..Q.>|" +"2019-09-24 01:04:32.155 UTC [cauthdsl] func2 -> DEBU 9f5 0xc0012d8df0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.155 UTC [cauthdsl] func1 -> DEBU 9f6 0xc0012d8df0 gate 1569287072153970500 evaluation succeeds" +"2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9f9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.155 UTC [policies] Evaluate -> DEBU 9fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.156 UTC [policies] Evaluate -> DEBU 9fb Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:04:32.156 UTC [policies] Evaluate -> DEBU 9fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:04:32.157 UTC [common.deliver] deliverBlocks -> DEBU 9fd [channel: businesschannel] Received seekInfo (0xc00104e9c0) start: > stop: > from 172.18.0.9:60592" +"2019-09-24 01:04:32.157 UTC [fsblkstorage] Next -> DEBU 9fe Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:04:32.157 UTC [fsblkstorage] newBlockfileStream -> DEBU 9ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +"2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a00 Remaining bytes=[25478], Going to peek [8] bytes" +"2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a01 Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +"2019-09-24 01:04:32.157 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU a02 blockbytes [25475] read from file [0]" +"2019-09-24 01:04:32.158 UTC [common.deliver] deliverBlocks -> DEBU a03 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:04:32.158 UTC [fsblkstorage] waitForBlock -> DEBU a04 Going to wait for newer blocks. maxAvailaBlockNumber=[1], waitForBlockNum=[2]" +"2019-09-24 01:04:32.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU a05 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:32.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a06 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2019-09-24 01:04:32.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU a07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.6µs " +"2019-09-24 01:04:32.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a08 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2019-09-24 01:04:32.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a09 Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2019-09-24 01:04:32.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.7µs " +"2019-09-24 01:04:32.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU a0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68.5µs " +"2019-09-24 01:04:32.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:32.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:32.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU a0e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:32.725 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a0f Sending msg of 28 bytes to 3 on channel testchainid took 55.4µs" +"2019-09-24 01:04:32.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU a10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 169.2µs " +"2019-09-24 01:04:32.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a11 Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2019-09-24 01:04:32.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a12 Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +"2019-09-24 01:04:32.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU a13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +"2019-09-24 01:04:32.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU a14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 632.1µs " +"2019-09-24 01:04:32.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU a15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:32.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU a16 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.154 UTC [orderer.common.server] Deliver -> DEBU a17 Starting new Deliver handler" +"2019-09-24 01:04:33.154 UTC [common.deliver] Handle -> DEBU a18 Starting new deliver loop for 172.18.0.5:53700" +"2019-09-24 01:04:33.154 UTC [common.deliver] Handle -> DEBU a19 Attempting to read seek info message from 172.18.0.5:53700" +"2019-09-24 01:04:33.180 UTC [orderer.common.server] Broadcast -> DEBU a1a Starting new Broadcast handler" +"2019-09-24 01:04:33.180 UTC [orderer.common.broadcast] Handle -> DEBU a1b Starting new broadcast loop for 172.18.0.5:53702" +"2019-09-24 01:04:33.180 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a1c [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53702" +"2019-09-24 01:04:33.180 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a1d Processing config update message for channel businesschannel" +"2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a1e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a1f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a20 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a21 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.181 UTC [policies] Evaluate -> DEBU a22 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:33.181 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +"2019-09-24 01:04:33.181 UTC [msp.identity] newIdentity -> DEBU a24 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func1 -> DEBU a25 0xc00136e790 gate 1569287073181922900 evaluation starts" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a26 0xc00136e790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a27 0xc00136e790 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a28 0xc00136e790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func2 -> DEBU a29 0xc00136e790 principal evaluation fails" +"2019-09-24 01:04:33.182 UTC [cauthdsl] func1 -> DEBU a2a 0xc00136e790 gate 1569287073181922900 evaluation fails" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2b Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.183 UTC [policies] func1 -> DEBU a2d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2e Signature set did not satisfy policy /Channel/Orderer/Writers" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a2f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a30 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a31 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a33 0xc00136fdc0 gate 1569287073183364100 evaluation starts" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a34 0xc00136fdc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a35 0xc00136fdc0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a36 0xc00136fdc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func2 -> DEBU a37 0xc00136fdc0 principal evaluation fails" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a38 0xc00136fdc0 gate 1569287073183364100 evaluation fails" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a39 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a3a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.183 UTC [policies] Evaluate -> DEBU a3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:04:33.183 UTC [cauthdsl] func1 -> DEBU a3c 0xc001386620 gate 1569287073183724000 evaluation starts" +"2019-09-24 01:04:33.195 UTC [cauthdsl] func2 -> DEBU a3d 0xc001386620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.196 UTC [cauthdsl] func2 -> DEBU a3e 0xc001386620 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.196 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a3f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:33.197 UTC [msp] Validate -> DEBU a40 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.197 UTC [msp] getCertificationChain -> DEBU a41 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.200 UTC [cauthdsl] func2 -> DEBU a42 0xc001386620 principal matched by identity 0" +"2019-09-24 01:04:33.200 UTC [msp.identity] Verify -> DEBU a43 Verify: digest = 00000000 40 ee cd 54 53 bb 54 84 fc af d5 33 ca 67 5a e7 |@..TS.T....3.gZ.| +00000010 1f b2 cf 0c c3 48 82 a6 4a 47 8f d3 27 11 e1 11 |.....H..JG..'...|" +"2019-09-24 01:04:33.200 UTC [msp.identity] Verify -> DEBU a44 Verify: sig = 00000000 30 45 02 21 00 eb d2 c7 c8 cd ac 46 29 fa 25 56 |0E.!.......F).%V| +00000010 59 b7 37 39 1f 77 ea a6 e4 0d ad ee 5d de 21 11 |Y.79.w......].!.| +00000020 ba 55 b9 75 68 02 20 51 e8 9a 2a f0 55 65 cc 94 |.U.uh. Q..*.Ue..| +00000030 4b fd 7b ad c9 a9 8b 25 d3 75 2e 21 5a 00 38 b0 |K.{....%.u.!Z.8.| +00000040 4c 20 ea c7 b0 87 4b |L ....K|" +"2019-09-24 01:04:33.202 UTC [cauthdsl] func2 -> DEBU a45 0xc001386620 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.202 UTC [cauthdsl] func1 -> DEBU a46 0xc001386620 gate 1569287073183724000 evaluation succeeds" +"2019-09-24 01:04:33.202 UTC [policies] Evaluate -> DEBU a47 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.203 UTC [policies] Evaluate -> DEBU a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a49 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4b Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:04:33.204 UTC [policies] Evaluate -> DEBU a4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4d Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4e Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.205 UTC [common.configtx] addToMap -> DEBU a4f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a50 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a51 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a52 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a53 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.206 UTC [common.configtx] addToMap -> DEBU a54 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a55 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a56 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a57 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.207 UTC [common.configtx] addToMap -> DEBU a58 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a59 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a5a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.208 UTC [common.configtx] addToMap -> DEBU a5b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.208 UTC [common.configtx] verifyDeltaSet -> DEBU a5c Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.209 UTC [common.configtx] policyForItem -> DEBU a5d Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a5e Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a5f Manager Channel has managers Orderer" +"2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a60 Manager Channel has managers Application" +"2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a61 Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.209 UTC [policies] Manager -> DEBU a62 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a63 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a64 Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a65 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a66 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.210 UTC [policies] Manager -> DEBU a67 Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 01:04:33.210 UTC [policies] Evaluate -> DEBU a68 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:04:33.210 UTC [cauthdsl] func1 -> DEBU a69 0xc000c57060 gate 1569287073210925200 evaluation starts" +"2019-09-24 01:04:33.211 UTC [cauthdsl] func2 -> DEBU a6a 0xc000c57060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.211 UTC [cauthdsl] func2 -> DEBU a6b 0xc000c57060 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.211 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6c Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-09-24 01:04:33.211 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a6d Checking if identity carries the admin ou for Org2MSP" +"2019-09-24 01:04:33.211 UTC [msp] Validate -> DEBU a6e MSP Org2MSP validating identity" +"2019-09-24 01:04:33.212 UTC [msp] getCertificationChain -> DEBU a6f MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.212 UTC [msp] hasOURole -> DEBU a70 MSP Org2MSP checking if the identity is a client" +"2019-09-24 01:04:33.212 UTC [msp] getCertificationChain -> DEBU a71 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.213 UTC [cauthdsl] func2 -> DEBU a72 0xc000c57060 principal matched by identity 0" +"2019-09-24 01:04:33.213 UTC [msp.identity] Verify -> DEBU a73 Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +"2019-09-24 01:04:33.213 UTC [msp.identity] Verify -> DEBU a74 Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +"2019-09-24 01:04:33.214 UTC [cauthdsl] func2 -> DEBU a75 0xc000c57060 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.214 UTC [cauthdsl] func1 -> DEBU a76 0xc000c57060 gate 1569287073210925200 evaluation succeeds" +"2019-09-24 01:04:33.214 UTC [policies] Evaluate -> DEBU a77 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.214 UTC [policies] Evaluate -> DEBU a78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.214 UTC [common.configtx] verifyDeltaSet -> DEBU a79 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.214 UTC [common.configtx] recurseConfigMap -> DEBU a7a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.214 UTC [common.configtx] recurseConfigMap -> DEBU a7b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7d Setting policy for key Readers to " +"2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7e Setting policy for key Writers to " +"2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a7f Setting policy for key Admins to " +"2019-09-24 01:04:33.215 UTC [common.configtx] recurseConfigMap -> DEBU a80 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.216 UTC [common.configtx] recurseConfigMap -> DEBU a81 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.216 UTC [common.configtx] recurseConfigMap -> DEBU a82 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a83 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a84 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.217 UTC [common.configtx] recurseConfigMap -> DEBU a85 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a86 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a87 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.218 UTC [common.configtx] recurseConfigMap -> DEBU a88 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a89 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.219 UTC [common.configtx] recurseConfigMap -> DEBU a8c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.220 UTC [common.configtx] recurseConfigMap -> DEBU a8d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.220 UTC [common.configtx] recurseConfigMap -> DEBU a8e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.220 UTC [common.channelconfig] NewStandardValues -> DEBU a8f Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:33.220 UTC [common.channelconfig] initializeProtosStruct -> DEBU a90 Processing field: HashingAlgorithm" +"2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a92 Processing field: OrdererAddresses" +"2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a93 Processing field: Consortium" +"2019-09-24 01:04:33.221 UTC [common.channelconfig] initializeProtosStruct -> DEBU a94 Processing field: Capabilities" +"2019-09-24 01:04:33.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU a95 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:33.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a96 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2019-09-24 01:04:33.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU a97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.3µs " +"2019-09-24 01:04:33.225 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:33.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: ACLs" +"2019-09-24 01:04:33.225 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9a Processing field: Capabilities" +"2019-09-24 01:04:33.225 UTC [common.channelconfig] NewStandardValues -> DEBU a9b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9c Processing field: AnchorPeers" +"2019-09-24 01:04:33.226 UTC [common.channelconfig] NewStandardValues -> DEBU a9d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.226 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9e Processing field: MSP" +"2019-09-24 01:04:33.227 UTC [common.channelconfig] Validate -> DEBU a9f Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:33.227 UTC [common.channelconfig] validateMSP -> DEBU aa0 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:33.227 UTC [msp] newBccspMsp -> DEBU aa1 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.228 UTC [msp] New -> DEBU aa2 Creating Cache-MSP instance" +"2019-09-24 01:04:33.228 UTC [msp] Setup -> DEBU aa3 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:33.229 UTC [msp.identity] newIdentity -> DEBU aa4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.230 UTC [common.channelconfig] NewStandardValues -> DEBU aa5 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.230 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa6 Processing field: AnchorPeers" +"2019-09-24 01:04:33.230 UTC [common.channelconfig] NewStandardValues -> DEBU aa7 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.231 UTC [common.channelconfig] initializeProtosStruct -> DEBU aa8 Processing field: MSP" +"2019-09-24 01:04:33.231 UTC [common.channelconfig] Validate -> DEBU aa9 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:04:33.232 UTC [common.channelconfig] validateMSP -> DEBU aaa Setting up MSP for org Org2MSP" +"2019-09-24 01:04:33.232 UTC [msp] newBccspMsp -> DEBU aab Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.232 UTC [msp] New -> DEBU aac Creating Cache-MSP instance" +"2019-09-24 01:04:33.232 UTC [msp] Setup -> DEBU aad Setting up MSP instance Org2MSP" +"2019-09-24 01:04:33.233 UTC [msp.identity] newIdentity -> DEBU aae Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.234 UTC [common.channelconfig] NewStandardValues -> DEBU aaf Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:33.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab0 Processing field: ConsensusType" +"2019-09-24 01:04:33.234 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab1 Processing field: BatchSize" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab2 Processing field: BatchTimeout" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab3 Processing field: KafkaBrokers" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab4 Processing field: ChannelRestrictions" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab5 Processing field: Capabilities" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] NewStandardValues -> DEBU ab6 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:33.235 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab7 Processing field: Endpoints" +"2019-09-24 01:04:33.237 UTC [common.channelconfig] NewStandardValues -> DEBU ab8 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.237 UTC [common.channelconfig] initializeProtosStruct -> DEBU ab9 Processing field: MSP" +"2019-09-24 01:04:33.238 UTC [common.channelconfig] validateMSP -> DEBU aba Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:33.238 UTC [msp] newBccspMsp -> DEBU abb Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.238 UTC [msp] New -> DEBU abc Creating Cache-MSP instance" +"2019-09-24 01:04:33.239 UTC [msp] Setup -> DEBU abd Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:33.240 UTC [msp.identity] newIdentity -> DEBU abe Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.241 UTC [msp.identity] newIdentity -> DEBU abf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.242 UTC [msp] Validate -> DEBU ac0 MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.242 UTC [msp] Setup -> DEBU ac1 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:33.243 UTC [msp] Setup -> DEBU ac2 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:33.243 UTC [policies] NewManagerImpl -> DEBU ac3 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.243 UTC [policies] NewManagerImpl -> DEBU ac4 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac5 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac6 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac7 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac8 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.244 UTC [policies] NewManagerImpl -> DEBU ac9 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:33.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU aca Sending msg of 28 bytes to 2 on channel businesschannel took 15.1µs" +"2019-09-24 01:04:33.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU acb Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2019-09-24 01:04:33.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU acc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.9µs " +"2019-09-24 01:04:33.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU acd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.5µs " +"2019-09-24 01:04:33.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU ace Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU acf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.245 UTC [policies] NewManagerImpl -> DEBU ad0 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:33.250 UTC [policies] GetPolicy -> DEBU ad1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad3 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.251 UTC [policies] GetPolicy -> DEBU ad5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad6 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:33.251 UTC [policies] NewManagerImpl -> DEBU ad7 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ad8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ad9 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ada Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU adb Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU adc Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU add Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:33.252 UTC [policies] NewManagerImpl -> DEBU ade Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU adf Proposed new policy Readers for Channel" +"2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU ae0 Proposed new policy Writers for Channel" +"2019-09-24 01:04:33.253 UTC [policies] NewManagerImpl -> DEBU ae1 Proposed new policy Admins for Channel" +"2019-09-24 01:04:33.253 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:33.254 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU ae9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aea Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aeb Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aec Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.255 UTC [common.configtx] addToMap -> DEBU aed Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU aee Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU aef Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.256 UTC [common.configtx] addToMap -> DEBU af0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af2 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af3 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:33.257 UTC [common.configtx] addToMap -> DEBU af4 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:33.258 UTC [common.configtx] addToMap -> DEBU af5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:33.258 UTC [common.configtx] addToMap -> DEBU af6 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af7 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU af9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:33.259 UTC [common.configtx] addToMap -> DEBU afa Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afd Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:33.260 UTC [common.configtx] addToMap -> DEBU afe Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU aff Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b00 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b01 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b02 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b03 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b04 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b05 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b06 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b07 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b08 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b09 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0a Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0b Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:33.261 UTC [common.configtx] addToMap -> DEBU b0c Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:33.262 UTC [common.configtx] addToMap -> DEBU b0d Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b0e As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b0f As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b10 Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b11 Manager Channel has managers Application" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b12 Manager Channel has managers Orderer" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b13 Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b14 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b15 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b16 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b17 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b18 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b19 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1a Manager Channel has managers Application" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1b Manager Channel has managers Orderer" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1c Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:33.262 UTC [policies] Manager -> DEBU b1d Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b1e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b1f As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b20 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:33.262 UTC [common.channelconfig] LogSanityChecks -> DEBU b21 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:33.262 UTC [common.capabilities] Supported -> DEBU b22 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:33.262 UTC [common.capabilities] Supported -> DEBU b23 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:33.262 UTC [msp] GetDefaultSigningIdentity -> DEBU b24 Obtaining default signing identity" +"2019-09-24 01:04:33.262 UTC [msp] GetDefaultSigningIdentity -> DEBU b25 Obtaining default signing identity" +"2019-09-24 01:04:33.263 UTC [msp.identity] Sign -> DEBU b26 Sign: plaintext: 0AD2060A1B08011A0608A1D7A5EC0522...25D3752E215A0038B04C20EAC7B0874B " +"2019-09-24 01:04:33.263 UTC [msp.identity] Sign -> DEBU b27 Sign: digest: 2896CA3D3CA0FC64A939D714F3D4026A9B34F05E8E28884FE0E77282C6DE2F91 " +"2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b28 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b29 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.263 UTC [policies] Evaluate -> DEBU b2c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:33.263 UTC [msp] DeserializeIdentity -> DEBU b2d Obtaining identity" +"2019-09-24 01:04:33.263 UTC [msp.identity] newIdentity -> DEBU b2e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.263 UTC [cauthdsl] func1 -> DEBU b2f 0xc0003b2d70 gate 1569287073263751600 evaluation starts" +"2019-09-24 01:04:33.263 UTC [cauthdsl] func2 -> DEBU b30 0xc0003b2d70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.263 UTC [cauthdsl] func2 -> DEBU b31 0xc0003b2d70 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.263 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b32 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:04:33.263 UTC [msp] Validate -> DEBU b33 MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.264 UTC [cauthdsl] func2 -> DEBU b34 0xc0003b2d70 principal matched by identity 0" +"2019-09-24 01:04:33.264 UTC [msp.identity] Verify -> DEBU b35 Verify: digest = 00000000 28 96 ca 3d 3c a0 fc 64 a9 39 d7 14 f3 d4 02 6a |(..=<..d.9.....j| +00000010 9b 34 f0 5e 8e 28 88 4f e0 e7 72 82 c6 de 2f 91 |.4.^.(.O..r.../.|" +"2019-09-24 01:04:33.264 UTC [msp.identity] Verify -> DEBU b36 Verify: sig = 00000000 30 44 02 20 06 57 d2 e6 fa fb 14 eb ac bb 01 32 |0D. .W.........2| +00000010 48 8c ba 3a 9d 7f cf ef 14 a1 79 36 35 a5 6d 68 |H..:......y65.mh| +00000020 e1 c0 da 62 02 20 17 4a cf 02 a0 12 2a 69 1d 56 |...b. .J....*i.V| +00000030 75 3a 9f de b0 ec 1d 08 95 54 c8 6d 3b 37 99 49 |u:.......T.m;7.I| +00000040 20 87 e3 8c 71 39 | ...q9|" +"2019-09-24 01:04:33.264 UTC [cauthdsl] func2 -> DEBU b37 0xc0003b2d70 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.264 UTC [cauthdsl] func1 -> DEBU b38 0xc0003b2d70 gate 1569287073263751600 evaluation succeeds" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b39 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3b Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3d Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:04:33.264 UTC [policies] Evaluate -> DEBU b3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:04:33.264 UTC [orderer.common.msgprocessor] Apply -> DEBU b3f Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 01:04:33.264 UTC [common.channelconfig] NewStandardValues -> DEBU b40 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b41 Processing field: HashingAlgorithm" +"2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b42 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b43 Processing field: OrdererAddresses" +"2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b44 Processing field: Consortium" +"2019-09-24 01:04:33.264 UTC [common.channelconfig] initializeProtosStruct -> DEBU b45 Processing field: Capabilities" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b46 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b47 Processing field: ACLs" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b48 Processing field: Capabilities" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b49 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4a Processing field: AnchorPeers" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b4b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b4c Processing field: MSP" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] Validate -> DEBU b4d Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:33.265 UTC [common.channelconfig] validateMSP -> DEBU b4e Setting up MSP for org Org1MSP" +"2019-09-24 01:04:33.265 UTC [msp] newBccspMsp -> DEBU b4f Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.265 UTC [msp] New -> DEBU b50 Creating Cache-MSP instance" +"2019-09-24 01:04:33.265 UTC [msp] Setup -> DEBU b51 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:33.265 UTC [msp.identity] newIdentity -> DEBU b52 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b53 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b54 Processing field: AnchorPeers" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] NewStandardValues -> DEBU b55 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] initializeProtosStruct -> DEBU b56 Processing field: MSP" +"2019-09-24 01:04:33.265 UTC [common.channelconfig] Validate -> DEBU b57 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:04:33.265 UTC [common.channelconfig] validateMSP -> DEBU b58 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:33.265 UTC [msp] newBccspMsp -> DEBU b59 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.266 UTC [msp] New -> DEBU b5a Creating Cache-MSP instance" +"2019-09-24 01:04:33.266 UTC [msp] Setup -> DEBU b5b Setting up MSP instance Org2MSP" +"2019-09-24 01:04:33.266 UTC [msp.identity] newIdentity -> DEBU b5c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b5d Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5e Processing field: ConsensusType" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b5f Processing field: BatchSize" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b60 Processing field: BatchTimeout" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b61 Processing field: KafkaBrokers" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b62 Processing field: ChannelRestrictions" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b63 Processing field: Capabilities" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b64 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b65 Processing field: Endpoints" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] NewStandardValues -> DEBU b66 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU b67 Processing field: MSP" +"2019-09-24 01:04:33.266 UTC [common.channelconfig] validateMSP -> DEBU b68 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:33.266 UTC [msp] newBccspMsp -> DEBU b69 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.266 UTC [msp] New -> DEBU b6a Creating Cache-MSP instance" +"2019-09-24 01:04:33.266 UTC [msp] Setup -> DEBU b6b Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:33.269 UTC [msp.identity] newIdentity -> DEBU b6c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.269 UTC [msp.identity] newIdentity -> DEBU b6d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.269 UTC [msp] Validate -> DEBU b6e MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.269 UTC [msp] Setup -> DEBU b6f Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:33.269 UTC [msp] Setup -> DEBU b70 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:33.269 UTC [policies] NewManagerImpl -> DEBU b71 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b72 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b73 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b74 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b75 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b76 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.270 UTC [policies] NewManagerImpl -> DEBU b77 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b78 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b79 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7a Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b7b Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.271 UTC [policies] GetPolicy -> DEBU b7c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7d Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7e Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b7f Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b80 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b81 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b82 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b83 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:33.271 UTC [policies] NewManagerImpl -> DEBU b84 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b85 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b86 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b87 Proposed new policy Readers for Channel" +"2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b88 Proposed new policy Writers for Channel" +"2019-09-24 01:04:33.272 UTC [policies] NewManagerImpl -> DEBU b89 Proposed new policy Admins for Channel" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b90 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:33.272 UTC [common.configtx] addToMap -> DEBU b91 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b92 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b93 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b94 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b95 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b96 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b97 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b98 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b99 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9a Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:33.273 UTC [common.configtx] addToMap -> DEBU b9d Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU b9e Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU b9f Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba0 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba1 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU baa Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:33.274 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:33.275 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:33.276 UTC [orderer.common.broadcast] ProcessMessage -> DEBU bb6 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53702" +"2019-09-24 01:04:33.276 UTC [orderer.consensus.etcdraft] propose -> INFO bb7 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:04:33.276 UTC [orderer.consensus.etcdraft] serveRequest -> INFO bb8 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 01:04:33.277 UTC [orderer.consensus.etcdraft] 2 -> DEBU bb9 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:04:33.278 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bba Sending msg of 24605 bytes to 2 on channel businesschannel took 26.8µs" +"2019-09-24 01:04:33.278 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bbb Sending msg of 24605 bytes to 3 on channel businesschannel took 15.8µs" +"2019-09-24 01:04:33.279 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbc Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer2.example.com(orderer2.example.com:7050) took 111.2µs " +"2019-09-24 01:04:33.280 UTC [orderer.common.cluster.step] sendMessage -> DEBU bbd Send of ConsensusRequest for channel businesschannel with payload of size 24605 to orderer1.example.com(orderer1.example.com:7050) took 191.8µs " +"2019-09-24 01:04:33.285 UTC [common.deliver] Handle -> WARN bbe Error reading from 172.18.0.5:53700: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:33.285 UTC [orderer.common.server] func1 -> DEBU bbf Closing Deliver stream" +"2019-09-24 01:04:33.285 UTC [comm.grpc.server] 1 -> INFO bc0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53700 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=131.4702ms +"2019-09-24 01:04:33.286 UTC [orderer.common.broadcast] Handle -> WARN bc1 Error reading from 172.18.0.5:53702: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:33.287 UTC [orderer.common.server] func1 -> DEBU bc2 Closing Broadcast stream" +"2019-09-24 01:04:33.287 UTC [comm.grpc.server] 1 -> INFO bc3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53702 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=106.8329ms +"2019-09-24 01:04:33.287 UTC [grpc] infof -> DEBU bc4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.287 UTC [grpc] infof -> DEBU bc5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.287 UTC [orderer.common.cluster.step] handleMessage -> DEBU bc6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc7 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU bc8 Sending msg of 28 bytes to 3 on channel businesschannel took 140.1µs" +"2019-09-24 01:04:33.288 UTC [orderer.common.cluster.step] sendMessage -> DEBU bc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.5µs " +"2019-09-24 01:04:33.288 UTC [orderer.consensus.etcdraft] writeBlock -> INFO bca Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcb Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcc Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcd Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bce Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bcf Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.289 UTC [common.configtx] addToMap -> DEBU bd0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd2 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd3 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd6 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.290 UTC [common.configtx] addToMap -> DEBU bd9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.290 UTC [common.configtx] verifyDeltaSet -> DEBU bda Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.290 UTC [common.configtx] policyForItem -> DEBU bdb Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 01:04:33.290 UTC [policies] Manager -> DEBU bdc Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.290 UTC [policies] Manager -> DEBU bdd Manager Channel has managers Orderer" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU bde Manager Channel has managers Application" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU bdf Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be0 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be1 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be2 Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be3 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be4 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.291 UTC [policies] Manager -> DEBU be5 Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 01:04:33.291 UTC [policies] Evaluate -> DEBU be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:04:33.292 UTC [cauthdsl] func1 -> DEBU be7 0xc00119a370 gate 1569287073292898000 evaluation starts" +"2019-09-24 01:04:33.292 UTC [cauthdsl] func2 -> DEBU be8 0xc00119a370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.293 UTC [cauthdsl] func2 -> DEBU be9 0xc00119a370 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.293 UTC [cauthdsl] func2 -> DEBU bea 0xc00119a370 principal matched by identity 0" +"2019-09-24 01:04:33.293 UTC [msp.identity] Verify -> DEBU beb Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +"2019-09-24 01:04:33.293 UTC [msp.identity] Verify -> DEBU bec Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +"2019-09-24 01:04:33.294 UTC [cauthdsl] func2 -> DEBU bed 0xc00119a370 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.294 UTC [cauthdsl] func1 -> DEBU bee 0xc00119a370 gate 1569287073292898000 evaluation succeeds" +"2019-09-24 01:04:33.294 UTC [policies] Evaluate -> DEBU bef Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.294 UTC [policies] Evaluate -> DEBU bf0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.294 UTC [common.configtx] verifyDeltaSet -> DEBU bf1 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.294 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.294 UTC [orderer.common.cluster.step] sendMessage -> DEBU bf3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 78.8µs " +"2019-09-24 01:04:33.294 UTC [common.configtx] recurseConfigMap -> DEBU bf4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.294 UTC [common.configtx] recurseConfigMap -> DEBU bf5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.298 UTC [common.configtx] recurseConfigMap -> DEBU bf6 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.301 UTC [orderer.common.cluster.step] handleMessage -> DEBU bf7 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.298 UTC [common.configtx] recurseConfigMap -> DEBU bf8 Setting policy for key Readers to " +"2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bf9 Setting policy for key Writers to " +"2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bfa Setting policy for key Admins to " +"2019-09-24 01:04:33.317 UTC [common.configtx] recurseConfigMap -> DEBU bfb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.318 UTC [common.configtx] recurseConfigMap -> DEBU bfe Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU bff Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU c00 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.319 UTC [common.configtx] recurseConfigMap -> DEBU c01 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c02 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c03 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.320 UTC [common.configtx] recurseConfigMap -> DEBU c04 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c05 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c06 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.321 UTC [common.configtx] recurseConfigMap -> DEBU c07 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.322 UTC [common.configtx] recurseConfigMap -> DEBU c08 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.322 UTC [common.configtx] recurseConfigMap -> DEBU c09 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.323 UTC [common.channelconfig] NewStandardValues -> DEBU c0a Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:33.323 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0b Processing field: HashingAlgorithm" +"2019-09-24 01:04:33.324 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:33.325 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0d Processing field: OrdererAddresses" +"2019-09-24 01:04:33.326 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0e Processing field: Consortium" +"2019-09-24 01:04:33.327 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0f Processing field: Capabilities" +"2019-09-24 01:04:33.331 UTC [orderer.common.cluster.step] handleMessage -> DEBU c10 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.327 UTC [common.channelconfig] NewStandardValues -> DEBU c11 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:33.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU c12 Processing field: ConsensusType" +"2019-09-24 01:04:33.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU c13 Processing field: BatchSize" +"2019-09-24 01:04:33.332 UTC [common.channelconfig] initializeProtosStruct -> DEBU c14 Processing field: BatchTimeout" +"2019-09-24 01:04:33.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU c15 Processing field: KafkaBrokers" +"2019-09-24 01:04:33.333 UTC [common.channelconfig] initializeProtosStruct -> DEBU c16 Processing field: ChannelRestrictions" +"2019-09-24 01:04:33.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU c17 Processing field: Capabilities" +"2019-09-24 01:04:33.334 UTC [common.channelconfig] NewStandardValues -> DEBU c18 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:33.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU c19 Processing field: Endpoints" +"2019-09-24 01:04:33.335 UTC [common.channelconfig] NewStandardValues -> DEBU c1a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.335 UTC [common.channelconfig] initializeProtosStruct -> DEBU c1b Processing field: MSP" +"2019-09-24 01:04:33.335 UTC [common.channelconfig] validateMSP -> DEBU c1c Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:33.336 UTC [msp] newBccspMsp -> DEBU c1d Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.337 UTC [msp] New -> DEBU c1e Creating Cache-MSP instance" +"2019-09-24 01:04:33.337 UTC [msp] Setup -> DEBU c1f Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:33.338 UTC [msp.identity] newIdentity -> DEBU c20 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.340 UTC [msp.identity] newIdentity -> DEBU c21 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.341 UTC [msp] Validate -> DEBU c22 MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.343 UTC [common.channelconfig] NewStandardValues -> DEBU c23 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:33.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU c24 Processing field: ACLs" +"2019-09-24 01:04:33.345 UTC [common.channelconfig] initializeProtosStruct -> DEBU c25 Processing field: Capabilities" +"2019-09-24 01:04:33.346 UTC [common.channelconfig] NewStandardValues -> DEBU c26 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.346 UTC [common.channelconfig] initializeProtosStruct -> DEBU c27 Processing field: AnchorPeers" +"2019-09-24 01:04:33.347 UTC [common.channelconfig] NewStandardValues -> DEBU c28 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.349 UTC [common.channelconfig] initializeProtosStruct -> DEBU c29 Processing field: MSP" +"2019-09-24 01:04:33.350 UTC [common.channelconfig] Validate -> DEBU c2a Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:33.350 UTC [common.channelconfig] validateMSP -> DEBU c2b Setting up MSP for org Org1MSP" +"2019-09-24 01:04:33.350 UTC [msp] newBccspMsp -> DEBU c2c Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.351 UTC [msp] New -> DEBU c2d Creating Cache-MSP instance" +"2019-09-24 01:04:33.351 UTC [msp] Setup -> DEBU c2e Setting up MSP instance Org1MSP" +"2019-09-24 01:04:33.351 UTC [msp.identity] newIdentity -> DEBU c2f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.352 UTC [common.channelconfig] NewStandardValues -> DEBU c30 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.352 UTC [common.channelconfig] initializeProtosStruct -> DEBU c31 Processing field: AnchorPeers" +"2019-09-24 01:04:33.353 UTC [common.channelconfig] NewStandardValues -> DEBU c32 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.353 UTC [common.channelconfig] initializeProtosStruct -> DEBU c33 Processing field: MSP" +"2019-09-24 01:04:33.353 UTC [common.channelconfig] Validate -> DEBU c34 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:04:33.354 UTC [common.channelconfig] validateMSP -> DEBU c35 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:33.354 UTC [msp] newBccspMsp -> DEBU c36 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.355 UTC [msp] New -> DEBU c37 Creating Cache-MSP instance" +"2019-09-24 01:04:33.355 UTC [msp] Setup -> DEBU c38 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:33.355 UTC [msp.identity] newIdentity -> DEBU c39 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.359 UTC [msp] Setup -> DEBU c3a Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:33.359 UTC [msp] Setup -> DEBU c3b MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:33.359 UTC [policies] NewManagerImpl -> DEBU c3c Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.359 UTC [policies] NewManagerImpl -> DEBU c3d Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c3e Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c3f Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.360 UTC [policies] NewManagerImpl -> DEBU c40 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.361 UTC [policies] NewManagerImpl -> DEBU c41 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.361 UTC [policies] NewManagerImpl -> DEBU c42 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:33.361 UTC [policies] GetPolicy -> DEBU c43 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c44 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.362 UTC [policies] NewManagerImpl -> DEBU c45 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c46 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.362 UTC [policies] GetPolicy -> DEBU c47 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c48 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c49 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:33.363 UTC [policies] NewManagerImpl -> DEBU c4a Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.364 UTC [policies] NewManagerImpl -> DEBU c4d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c4e Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c4f Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c50 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:33.365 UTC [policies] NewManagerImpl -> DEBU c51 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c52 Proposed new policy Admins for Channel" +"2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c53 Proposed new policy Readers for Channel" +"2019-09-24 01:04:33.366 UTC [policies] NewManagerImpl -> DEBU c54 Proposed new policy Writers for Channel" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5c Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c5f Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c60 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c61 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c62 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c63 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c64 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c65 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c66 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:33.366 UTC [common.configtx] addToMap -> DEBU c67 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c68 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c69 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6a Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6b Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6c Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6d Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c6f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c70 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c71 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c72 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c73 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c74 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c75 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c76 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c77 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c78 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c79 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7a Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7b Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7c Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7d Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7e Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c7f Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:33.367 UTC [common.configtx] addToMap -> DEBU c80 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c81 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c82 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c83 Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c84 Manager Channel has managers Orderer" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c85 Manager Channel has managers Application" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c86 Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c87 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c88 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c89 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c8a As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:33.367 UTC [common.channelconfig] LogSanityChecks -> DEBU c8b As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:33.367 UTC [policies] Manager -> DEBU c8c Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8d Manager Channel has managers Application" +"2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8e Manager Channel has managers Orderer" +"2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c8f Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:33.368 UTC [policies] Manager -> DEBU c90 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c91 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c92 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c93 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:33.368 UTC [common.channelconfig] LogSanityChecks -> DEBU c94 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:33.368 UTC [common.capabilities] Supported -> DEBU c95 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:33.368 UTC [common.capabilities] Supported -> DEBU c96 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:33.368 UTC [orderer.common.server] func1 -> DEBU c97 Executing callback to update root CAs" +"2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c98 updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c99 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c9a adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:33.368 UTC [orderer.common.server] updateTrustedRoots -> DEBU c9b adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:33.368 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9c [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2019-09-24 01:04:33.368 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c9d [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 01:04:33.368 UTC [msp] GetDefaultSigningIdentity -> DEBU c9e Obtaining default signing identity" +"2019-09-24 01:04:33.368 UTC [msp] GetDefaultSigningIdentity -> DEBU c9f Obtaining default signing identity" +"2019-09-24 01:04:33.368 UTC [msp.identity] Sign -> DEBU ca0 Sign: plaintext: 0A020802120B0A090A03010203100418...0137CCF2DEC1AFF60C42EBD8414D674A " +"2019-09-24 01:04:33.368 UTC [msp.identity] Sign -> DEBU ca1 Sign: digest: 37D45CC290FEC396915587141648724A86B62CDA34A4852F589F0990A6236DE8 " +"2019-09-24 01:04:33.372 UTC [fsblkstorage] indexBlock -> DEBU ca2 Indexing block [blockNum=2, blockHash=[]byte{0xba, 0xc0, 0xcb, 0xf4, 0x59, 0xfa, 0xb5, 0xea, 0x84, 0x86, 0x4a, 0x57, 0xcd, 0xad, 0xb5, 0xc7, 0xd0, 0x5a, 0x7c, 0x6a, 0x8b, 0x61, 0x16, 0xcf, 0x6f, 0x9c, 0x46, 0xa0, 0xe3, 0x2b, 0x77, 0xe0} txOffsets= +txId=b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e locPointer=offset=71, bytesLength=24474 +]" +"2019-09-24 01:04:33.375 UTC [fsblkstorage] updateCheckpoint -> DEBU ca3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76768], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-09-24 01:04:33.375 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ca4 [channel: businesschannel] Wrote block [2]" +"2019-09-24 01:04:33.375 UTC [fsblkstorage] waitForBlock -> DEBU ca5 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-09-24 01:04:33.376 UTC [fsblkstorage] waitForBlock -> DEBU ca6 Came out of wait. maxAvailaBlockNumber=[2]" +"2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca7 Remaining bytes=[25483], Going to peek [8] bytes" +"2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca8 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +"2019-09-24 01:04:33.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ca9 blockbytes [25480] read from file [0]" +"2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU caa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.377 UTC [policies] Evaluate -> DEBU cae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.377 UTC [msp] DeserializeIdentity -> DEBU caf Obtaining identity" +"2019-09-24 01:04:33.377 UTC [msp.identity] newIdentity -> DEBU cb0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.380 UTC [cauthdsl] func1 -> DEBU cb1 0xc00116ee00 gate 1569287073378308200 evaluation starts" +"2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb2 0xc00116ee00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb3 0xc00116ee00 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.381 UTC [cauthdsl] func2 -> DEBU cb4 0xc00116ee00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cb5 0xc00116ee00 principal evaluation fails" +"2019-09-24 01:04:33.382 UTC [cauthdsl] func1 -> DEBU cb6 0xc00116ee00 gate 1569287073378308200 evaluation fails" +"2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.382 UTC [policies] Evaluate -> DEBU cb9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.382 UTC [cauthdsl] func1 -> DEBU cba 0xc0011a20f0 gate 1569287073382627400 evaluation starts" +"2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cbb 0xc0011a20f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.382 UTC [cauthdsl] func2 -> DEBU cbc 0xc0011a20f0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.382 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cbd Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:33.383 UTC [msp] Validate -> DEBU cbe MSP Org2MSP validating identity" +"2019-09-24 01:04:33.383 UTC [msp] getCertificationChain -> DEBU cbf MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc0 Remaining bytes=[25483], Going to peek [8] bytes" +"2019-09-24 01:04:33.383 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc1 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +"2019-09-24 01:04:33.383 UTC [cauthdsl] func2 -> DEBU cc2 0xc0011a20f0 principal matched by identity 0" +"2019-09-24 01:04:33.383 UTC [msp.identity] Verify -> DEBU cc3 Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +"2019-09-24 01:04:33.383 UTC [msp.identity] Verify -> DEBU cc5 Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +00000040 7d c0 9c 51 b2 3e |}..Q.>|" +"2019-09-24 01:04:33.384 UTC [cauthdsl] func2 -> DEBU cc6 0xc0011a20f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.384 UTC [cauthdsl] func1 -> DEBU cc7 0xc0011a20f0 gate 1569287073382627400 evaluation succeeds" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cc8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cca Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.383 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc4 blockbytes [25480] read from file [0]" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cce == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU ccf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cd0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.384 UTC [msp] DeserializeIdentity -> DEBU cd1 Obtaining identity" +"2019-09-24 01:04:33.385 UTC [msp.identity] newIdentity -> DEBU cd2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.385 UTC [cauthdsl] func1 -> DEBU cd3 0xc0011cc1c0 gate 1569287073385547300 evaluation starts" +"2019-09-24 01:04:33.385 UTC [cauthdsl] func2 -> DEBU cd4 0xc0011cc1c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.385 UTC [cauthdsl] func2 -> DEBU cd5 0xc0011cc1c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:04:33.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cd6 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:33.385 UTC [msp] Validate -> DEBU cd7 MSP Org1MSP validating identity" +"2019-09-24 01:04:33.385 UTC [msp] getCertificationChain -> DEBU cd8 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:33.384 UTC [policies] Evaluate -> DEBU cd9 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:04:33.386 UTC [policies] Evaluate -> DEBU cda == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:04:33.386 UTC [common.deliver] deliverBlocks -> DEBU cdb [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:04:33.387 UTC [fsblkstorage] waitForBlock -> DEBU cdc Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-09-24 01:04:33.387 UTC [cauthdsl] func2 -> DEBU cdd 0xc0011cc1c0 principal matched by identity 0" +"2019-09-24 01:04:33.387 UTC [msp.identity] Verify -> DEBU cde Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +"2019-09-24 01:04:33.387 UTC [msp.identity] Verify -> DEBU cdf Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +00000040 8d 91 b7 ea 04 6f |.....o|" +"2019-09-24 01:04:33.387 UTC [cauthdsl] func2 -> DEBU ce0 0xc0011cc1c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.387 UTC [cauthdsl] func1 -> DEBU ce1 0xc0011cc1c0 gate 1569287073385547300 evaluation succeeds" +"2019-09-24 01:04:33.387 UTC [policies] Evaluate -> DEBU ce2 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.387 UTC [policies] Evaluate -> DEBU ce3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce6 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:04:33.388 UTC [policies] Evaluate -> DEBU ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:04:33.388 UTC [common.deliver] deliverBlocks -> DEBU ce8 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:04:33.388 UTC [fsblkstorage] waitForBlock -> DEBU ce9 Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2019-09-24 01:04:33.726 UTC [orderer.common.cluster.step] handleMessage -> DEBU cea Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:33.727 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +"2019-09-24 01:04:33.727 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cec Sending msg of 28 bytes to 3 on channel testchainid took 125.1µs" +"2019-09-24 01:04:33.752 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ced Sending msg of 28 bytes to 2 on channel businesschannel took 42.8µs" +"2019-09-24 01:04:33.753 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cef Sending msg of 28 bytes to 3 on channel businesschannel took 9.2µs" +"2019-09-24 01:04:33.753 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf0 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:33.753 UTC [orderer.common.cluster.step] sendMessage -> DEBU cee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.4µs " +"2019-09-24 01:04:33.755 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2028ms " +"2019-09-24 01:04:33.765 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:34.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:34.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf4 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2019-09-24 01:04:34.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.8µs " +"2019-09-24 01:04:34.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-09-24 01:04:34.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf7 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +"2019-09-24 01:04:34.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 132.9µs " +"2019-09-24 01:04:34.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 183.2µs " +"2019-09-24 01:04:34.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfa Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:34.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:34.725 UTC [orderer.common.cluster.step] handleMessage -> DEBU cfc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:34.726 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfd Sending msg of 28 bytes to 3 on channel testchainid took 348µs" +"2019-09-24 01:04:34.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82.9µs " +"2019-09-24 01:04:34.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cff Sending msg of 28 bytes to 3 on channel businesschannel took 32.9µs" +"2019-09-24 01:04:34.747 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d01 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +"2019-09-24 01:04:34.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +"2019-09-24 01:04:34.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d02 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:34.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU d03 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:34.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.85ms " +"2019-09-24 01:04:35.225 UTC [orderer.common.cluster.step] handleMessage -> DEBU d05 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:35.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d06 Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 01:04:35.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +"2019-09-24 01:04:35.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d08 Sending msg of 28 bytes to 2 on channel businesschannel took 31.6µs" +"2019-09-24 01:04:35.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d09 Sending msg of 28 bytes to 3 on channel businesschannel took 39.3µs" +"2019-09-24 01:04:35.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 613.7µs " +"2019-09-24 01:04:35.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.6µs " +"2019-09-24 01:04:35.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:35.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:35.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:35.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0f Sending msg of 28 bytes to 3 on channel testchainid took 31.1µs" +"2019-09-24 01:04:35.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.9µs " +"2019-09-24 01:04:35.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d11 Sending msg of 28 bytes to 2 on channel businesschannel took 30.8µs" +"2019-09-24 01:04:35.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d12 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2019-09-24 01:04:35.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d13 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 701.7µs " +"2019-09-24 01:04:35.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6534ms " +"2019-09-24 01:04:35.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d15 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:35.750 UTC [orderer.common.cluster.step] handleMessage -> DEBU d16 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:36.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d17 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:36.225 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d18 Sending msg of 28 bytes to 3 on channel testchainid took 25µs" +"2019-09-24 01:04:36.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 257µs " +"2019-09-24 01:04:36.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-09-24 01:04:36.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1b Sending msg of 28 bytes to 3 on channel businesschannel took 17.1µs" +"2019-09-24 01:04:36.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 708µs " +"2019-09-24 01:04:36.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0121ms " +"2019-09-24 01:04:36.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:36.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:36.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d20 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:36.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d21 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2019-09-24 01:04:36.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.6µs " +"2019-09-24 01:04:36.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d23 Sending msg of 28 bytes to 2 on channel businesschannel took 38.8µs" +"2019-09-24 01:04:36.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 494.9µs " +"2019-09-24 01:04:36.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d25 Sending msg of 28 bytes to 3 on channel businesschannel took 24.9µs" +"2019-09-24 01:04:36.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.5µs " +"2019-09-24 01:04:36.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d27 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:36.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d28 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:37.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d29 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:37.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2a Sending msg of 28 bytes to 3 on channel testchainid took 1.2457ms" +"2019-09-24 01:04:37.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 766.7µs " +"2019-09-24 01:04:37.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2c Sending msg of 28 bytes to 2 on channel businesschannel took 45.9µs" +"2019-09-24 01:04:37.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2d Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +"2019-09-24 01:04:37.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.4µs " +"2019-09-24 01:04:37.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:37.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:37.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d31 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 281.9µs " +"2019-09-24 01:04:37.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU d32 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:37.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d33 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-09-24 01:04:37.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU d34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 580.4µs " +"2019-09-24 01:04:37.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d35 Sending msg of 28 bytes to 2 on channel businesschannel took 98.9µs" +"2019-09-24 01:04:37.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d36 Sending msg of 28 bytes to 3 on channel businesschannel took 10.2µs" +"2019-09-24 01:04:37.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.3µs " +"2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d38 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d39 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:37.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 982.2µs " +"2019-09-24 01:04:38.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d3b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:38.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 3 on channel testchainid took 24.8µs" +"2019-09-24 01:04:38.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.2µs " +"2019-09-24 01:04:38.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3e Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2019-09-24 01:04:38.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3f Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-09-24 01:04:38.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.7µs " +"2019-09-24 01:04:38.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU d40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +"2019-09-24 01:04:38.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:38.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d43 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:38.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d44 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:38.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2019-09-24 01:04:38.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.6µs " +"2019-09-24 01:04:38.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d47 Sending msg of 28 bytes to 2 on channel businesschannel took 125.4µs" +"2019-09-24 01:04:38.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 414.6µs " +"2019-09-24 01:04:38.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d49 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +"2019-09-24 01:04:38.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:38.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:38.749 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5696ms " +"2019-09-24 01:04:39.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:39.226 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 3 on channel testchainid took 40µs" +"2019-09-24 01:04:39.226 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 310.6µs " +"2019-09-24 01:04:39.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d50 Sending msg of 28 bytes to 2 on channel businesschannel took 33.9µs" +"2019-09-24 01:04:39.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d52 Sending msg of 28 bytes to 3 on channel businesschannel took 24.8µs" +"2019-09-24 01:04:39.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.6µs " +"2019-09-24 01:04:39.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.9µs " +"2019-09-24 01:04:39.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:39.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d55 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:39.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU d56 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:39.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 3 on channel testchainid took 11.2µs" +"2019-09-24 01:04:39.724 UTC [orderer.common.cluster.step] sendMessage -> DEBU d58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.7µs " +"2019-09-24 01:04:39.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d59 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +"2019-09-24 01:04:39.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5a Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2019-09-24 01:04:39.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 250.5µs " +"2019-09-24 01:04:39.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +"2019-09-24 01:04:39.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:39.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:40.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:40.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d60 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 01:04:40.222 UTC [orderer.common.cluster.step] sendMessage -> DEBU d61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +"2019-09-24 01:04:40.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d62 Sending msg of 28 bytes to 3 on channel businesschannel took 42.4µs" +"2019-09-24 01:04:40.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d63 Sending msg of 28 bytes to 2 on channel businesschannel took 15µs" +"2019-09-24 01:04:40.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +"2019-09-24 01:04:40.248 UTC [orderer.common.cluster.step] sendMessage -> DEBU d65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.7µs " +"2019-09-24 01:04:40.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d66 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:40.250 UTC [orderer.common.cluster.step] handleMessage -> DEBU d67 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:40.369 UTC [orderer.common.server] Broadcast -> DEBU d68 Starting new Broadcast handler" +"2019-09-24 01:04:40.369 UTC [orderer.common.broadcast] Handle -> DEBU d69 Starting new broadcast loop for 172.18.0.5:53754" +"2019-09-24 01:04:40.723 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:40.723 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6b Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2019-09-24 01:04:40.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +"2019-09-24 01:04:40.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6d Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +"2019-09-24 01:04:40.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6e Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +"2019-09-24 01:04:40.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.7µs " +"2019-09-24 01:04:40.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.3µs " +"2019-09-24 01:04:40.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d71 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:40.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d72 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:41.240 UTC [orderer.common.cluster.step] handleMessage -> DEBU d73 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:41.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-09-24 01:04:41.240 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +"2019-09-24 01:04:41.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d76 Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +"2019-09-24 01:04:41.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d77 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-09-24 01:04:41.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d78 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +"2019-09-24 01:04:41.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.5µs " +"2019-09-24 01:04:41.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:41.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:41.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:41.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2019-09-24 01:04:41.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 287.8µs " +"2019-09-24 01:04:41.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7f Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2019-09-24 01:04:41.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d80 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2019-09-24 01:04:41.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +"2019-09-24 01:04:41.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU d82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118µs " +"2019-09-24 01:04:41.746 UTC [orderer.common.cluster.step] handleMessage -> DEBU d83 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:41.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU d84 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:42.224 UTC [orderer.common.cluster.step] handleMessage -> DEBU d85 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:42.224 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel testchainid took 247.4µs" +"2019-09-24 01:04:42.225 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96µs " +"2019-09-24 01:04:42.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d88 Sending msg of 28 bytes to 2 on channel businesschannel took 494µs" +"2019-09-24 01:04:42.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d89 Sending msg of 28 bytes to 3 on channel businesschannel took 143.4µs" +"2019-09-24 01:04:42.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.1µs " +"2019-09-24 01:04:42.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 159.6µs " +"2019-09-24 01:04:42.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:42.249 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:42.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:42.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 01:04:42.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.5µs " +"2019-09-24 01:04:42.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d91 Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2019-09-24 01:04:42.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d92 Sending msg of 28 bytes to 3 on channel businesschannel took 21.8µs" +"2019-09-24 01:04:42.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU d93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5279ms " +"2019-09-24 01:04:42.748 UTC [orderer.common.cluster.step] sendMessage -> DEBU d94 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 544.8µs " +"2019-09-24 01:04:42.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d95 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:42.749 UTC [orderer.common.cluster.step] handleMessage -> DEBU d96 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:43.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU d97 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:43.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel testchainid took 606.5µs" +"2019-09-24 01:04:43.224 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 512.2µs " +"2019-09-24 01:04:43.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9a Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2019-09-24 01:04:43.246 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9b Sending msg of 28 bytes to 3 on channel businesschannel took 36.2µs" +"2019-09-24 01:04:43.247 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.5µs " +"2019-09-24 01:04:43.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 149.1µs " +"2019-09-24 01:04:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:43.251 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:43.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU da0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:43.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +"2019-09-24 01:04:43.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.2µs " +"2019-09-24 01:04:43.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da3 Sending msg of 28 bytes to 3 on channel businesschannel took 29.8µs" +"2019-09-24 01:04:43.746 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da4 Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2019-09-24 01:04:43.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU da5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.7µs " +"2019-09-24 01:04:43.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU da6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 668.8µs " +"2019-09-24 01:04:43.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU da7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:43.751 UTC [orderer.common.cluster.step] handleMessage -> DEBU da8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:44.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU da9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:44.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel testchainid took 9.8µs" +"2019-09-24 01:04:44.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +"2019-09-24 01:04:44.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dac Sending msg of 28 bytes to 2 on channel businesschannel took 28.2µs" +"2019-09-24 01:04:44.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dad Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-09-24 01:04:44.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +"2019-09-24 01:04:44.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU daf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 214.3µs " +"2019-09-24 01:04:44.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU db0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:44.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU db1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:44.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU db2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:44.722 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2019-09-24 01:04:44.723 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.6µs " +"2019-09-24 01:04:44.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2019-09-24 01:04:44.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db6 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2019-09-24 01:04:44.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU db7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.9µs " +"2019-09-24 01:04:44.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU db8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138µs " +"2019-09-24 01:04:44.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU db9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:44.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dba Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:45.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:45.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2019-09-24 01:04:45.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.9µs " +"2019-09-24 01:04:45.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbe Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +"2019-09-24 01:04:45.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbf Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 01:04:45.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.4µs " +"2019-09-24 01:04:45.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.1µs " +"2019-09-24 01:04:45.246 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:45.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc3 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:45.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:45.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2019-09-24 01:04:45.726 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7675ms " +"2019-09-24 01:04:45.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc7 Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2019-09-24 01:04:45.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc8 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +"2019-09-24 01:04:45.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169µs " +"2019-09-24 01:04:45.746 UTC [orderer.common.cluster.step] sendMessage -> DEBU dca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 577.3µs " +"2019-09-24 01:04:45.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:45.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU dcc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:46.192 UTC [orderer.common.server] replicateDisabledChains -> DEBU dcd No inactive chains to try to replicate" +"2019-09-24 01:04:46.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU dce Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:46.223 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcf Sending msg of 28 bytes to 3 on channel testchainid took 195.6µs" +"2019-09-24 01:04:46.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.7µs " +"2019-09-24 01:04:46.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd1 Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2019-09-24 01:04:46.245 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 01:04:46.245 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.1µs " +"2019-09-24 01:04:46.247 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:46.248 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:46.246 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2019-09-24 01:04:46.724 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:46.724 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd8 Sending msg of 28 bytes to 3 on channel testchainid took 492µs" +"2019-09-24 01:04:46.725 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.2µs " +"2019-09-24 01:04:46.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dda Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2019-09-24 01:04:46.745 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 278.9µs " +"2019-09-24 01:04:46.745 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddc Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2019-09-24 01:04:46.747 UTC [orderer.common.cluster.step] sendMessage -> DEBU ddd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +"2019-09-24 01:04:46.747 UTC [orderer.common.cluster.step] handleMessage -> DEBU dde Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:46.748 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:47.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU de0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:47.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de1 Sending msg of 28 bytes to 3 on channel testchainid took 12.4µs" +"2019-09-24 01:04:47.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +"2019-09-24 01:04:47.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de3 Sending msg of 28 bytes to 2 on channel businesschannel took 17.3µs" +"2019-09-24 01:04:47.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de4 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2019-09-24 01:04:47.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU de5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100µs " +"2019-09-24 01:04:47.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU de6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.4µs " +"2019-09-24 01:04:47.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU de7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:47.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU de8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:47.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU de9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:47.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dea Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2019-09-24 01:04:47.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2019-09-24 01:04:47.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dec Sending msg of 28 bytes to 2 on channel businesschannel took 26.1µs" +"2019-09-24 01:04:47.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ded Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-09-24 01:04:47.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU dee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.7µs " +"2019-09-24 01:04:47.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU def Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 270.5µs " +"2019-09-24 01:04:47.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU df1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:47.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU df0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:48.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU df2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:48.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df3 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-09-24 01:04:48.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.3µs " +"2019-09-24 01:04:48.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df5 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2019-09-24 01:04:48.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df6 Sending msg of 28 bytes to 3 on channel businesschannel took 16.8µs" +"2019-09-24 01:04:48.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU df7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.2µs " +"2019-09-24 01:04:48.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU df8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 138.7µs " +"2019-09-24 01:04:48.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU df9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:48.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfa Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:48.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:48.697 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfc Sending msg of 28 bytes to 3 on channel testchainid took 7.9021ms" +"2019-09-24 01:04:48.697 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 364.5µs " +"2019-09-24 01:04:48.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfe Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 01:04:48.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dff Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2019-09-24 01:04:48.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 303.8µs " +"2019-09-24 01:04:48.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.3µs " +"2019-09-24 01:04:48.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e02 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:48.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e03 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:49.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e04 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:49.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e05 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-09-24 01:04:49.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.1µs " +"2019-09-24 01:04:49.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e07 Sending msg of 28 bytes to 2 on channel businesschannel took 384.1µs" +"2019-09-24 01:04:49.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e08 Sending msg of 28 bytes to 3 on channel businesschannel took 390.9µs" +"2019-09-24 01:04:49.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU e09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.1µs " +"2019-09-24 01:04:49.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.5µs " +"2019-09-24 01:04:49.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:49.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:49.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e0d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:49.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0e Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 01:04:49.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +"2019-09-24 01:04:49.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.3µs " +"2019-09-24 01:04:49.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e11 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 01:04:49.713 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e12 Sending msg of 28 bytes to 3 on channel businesschannel took 49µs" +"2019-09-24 01:04:49.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e13 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:49.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.6µs " +"2019-09-24 01:04:49.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:50.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e16 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:50.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e17 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 01:04:50.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.3µs " +"2019-09-24 01:04:50.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e19 Sending msg of 28 bytes to 3 on channel businesschannel took 24µs" +"2019-09-24 01:04:50.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1a Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2019-09-24 01:04:50.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 162.6µs " +"2019-09-24 01:04:50.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 95.6µs " +"2019-09-24 01:04:50.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:50.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:50.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:50.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e20 Sending msg of 28 bytes to 3 on channel testchainid took 91.2µs" +"2019-09-24 01:04:50.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.5µs " +"2019-09-24 01:04:50.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e22 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2019-09-24 01:04:50.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e23 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +"2019-09-24 01:04:50.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e24 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 89.8µs " +"2019-09-24 01:04:50.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.3µs " +"2019-09-24 01:04:50.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e26 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:50.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e27 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:51.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e28 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:51.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e29 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 01:04:51.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 262.8µs " +"2019-09-24 01:04:51.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2b Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-09-24 01:04:51.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2c Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +"2019-09-24 01:04:51.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.7µs " +"2019-09-24 01:04:51.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 477.8µs " +"2019-09-24 01:04:51.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:51.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e30 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:51.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU e31 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:51.694 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e32 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +"2019-09-24 01:04:51.694 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.7µs " +"2019-09-24 01:04:51.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e34 Sending msg of 28 bytes to 2 on channel businesschannel took 42.3µs" +"2019-09-24 01:04:51.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e35 Sending msg of 28 bytes to 3 on channel businesschannel took 22µs" +"2019-09-24 01:04:51.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e36 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 386.5µs " +"2019-09-24 01:04:51.714 UTC [orderer.common.cluster.step] sendMessage -> DEBU e37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.9669ms " +"2019-09-24 01:04:51.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU e38 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:51.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU e39 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:52.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:52.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3b Sending msg of 28 bytes to 3 on channel testchainid took 273.7µs" +"2019-09-24 01:04:52.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +"2019-09-24 01:04:52.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3d Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2019-09-24 01:04:52.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3e Sending msg of 28 bytes to 2 on channel businesschannel took 8.5µs" +"2019-09-24 01:04:52.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 403.1µs " +"2019-09-24 01:04:52.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 55.7µs " +"2019-09-24 01:04:52.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e41 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:52.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e42 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:52.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU e43 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:52.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e44 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-09-24 01:04:52.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.7µs " +"2019-09-24 01:04:52.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e46 Sending msg of 28 bytes to 2 on channel businesschannel took 13.7µs" +"2019-09-24 01:04:52.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 348.3µs " +"2019-09-24 01:04:52.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.7µs " +"2019-09-24 01:04:52.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU e49 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:52.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4a Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2019-09-24 01:04:52.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:53.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:53.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4d Sending msg of 28 bytes to 3 on channel testchainid took 420.6µs" +"2019-09-24 01:04:53.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2019-09-24 01:04:53.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4f Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2019-09-24 01:04:53.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e50 Sending msg of 28 bytes to 3 on channel businesschannel took 10.8µs" +"2019-09-24 01:04:53.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.3µs " +"2019-09-24 01:04:53.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +"2019-09-24 01:04:53.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e53 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:53.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e54 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:53.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e55 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:53.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e56 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 01:04:53.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e57 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.3µs " +"2019-09-24 01:04:53.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e58 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2019-09-24 01:04:53.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e59 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2019-09-24 01:04:53.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 260µs " +"2019-09-24 01:04:53.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:53.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.6µs " +"2019-09-24 01:04:53.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:54.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:54.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5f Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-09-24 01:04:54.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59µs " +"2019-09-24 01:04:54.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e61 Sending msg of 28 bytes to 2 on channel businesschannel took 10.8µs" +"2019-09-24 01:04:54.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.2µs " +"2019-09-24 01:04:54.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e63 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-09-24 01:04:54.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167.3µs " +"2019-09-24 01:04:54.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e65 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:54.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e66 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:54.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e67 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:54.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e68 Sending msg of 28 bytes to 3 on channel testchainid took 204.1µs" +"2019-09-24 01:04:54.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.5µs " +"2019-09-24 01:04:54.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6a Sending msg of 28 bytes to 2 on channel businesschannel took 21.9µs" +"2019-09-24 01:04:54.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6b Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2019-09-24 01:04:54.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.8µs " +"2019-09-24 01:04:54.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.2µs " +"2019-09-24 01:04:54.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:54.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:55.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e70 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:55.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e71 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-09-24 01:04:55.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 919.4µs " +"2019-09-24 01:04:55.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e73 Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +"2019-09-24 01:04:55.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e74 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 01:04:55.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU e75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 153µs " +"2019-09-24 01:04:55.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 648.5µs " +"2019-09-24 01:04:55.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU e77 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:55.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e78 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:55.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e79 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:55.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 01:04:55.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.8µs " +"2019-09-24 01:04:55.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7c Sending msg of 28 bytes to 3 on channel businesschannel took 21.7µs" +"2019-09-24 01:04:55.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.4µs " +"2019-09-24 01:04:55.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7e Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2019-09-24 01:04:55.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 148.4µs " +"2019-09-24 01:04:55.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e80 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:55.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU e81 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:56.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU e82 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:56.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e83 Sending msg of 28 bytes to 3 on channel testchainid took 10.8µs" +"2019-09-24 01:04:56.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.7µs " +"2019-09-24 01:04:56.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e85 Sending msg of 28 bytes to 2 on channel businesschannel took 12.9µs" +"2019-09-24 01:04:56.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e86 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2019-09-24 01:04:56.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +"2019-09-24 01:04:56.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 307.8µs " +"2019-09-24 01:04:56.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e89 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:56.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:56.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:56.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8c Sending msg of 28 bytes to 3 on channel testchainid took 607.1µs" +"2019-09-24 01:04:56.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.8µs " +"2019-09-24 01:04:56.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8e Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-09-24 01:04:56.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8f Sending msg of 28 bytes to 2 on channel businesschannel took 11.3µs" +"2019-09-24 01:04:56.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.4µs " +"2019-09-24 01:04:56.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU e91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.1µs " +"2019-09-24 01:04:56.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e92 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:56.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU e93 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:57.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU e94 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:57.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 01:04:57.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.3µs " +"2019-09-24 01:04:57.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e97 Sending msg of 28 bytes to 2 on channel businesschannel took 17.4µs" +"2019-09-24 01:04:57.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e98 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 01:04:57.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 357µs " +"2019-09-24 01:04:57.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 762.2µs " +"2019-09-24 01:04:57.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:57.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:57.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU e9d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:57.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9e Sending msg of 28 bytes to 3 on channel testchainid took 24.4µs" +"2019-09-24 01:04:57.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.7004ms " +"2019-09-24 01:04:57.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea0 Sending msg of 28 bytes to 2 on channel businesschannel took 32.3µs" +"2019-09-24 01:04:57.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea1 Sending msg of 28 bytes to 3 on channel businesschannel took 30.9µs" +"2019-09-24 01:04:57.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.8µs " +"2019-09-24 01:04:57.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2019-09-24 01:04:57.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:57.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:58.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:58.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea7 Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 01:04:58.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0539ms " +"2019-09-24 01:04:58.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea9 Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +"2019-09-24 01:04:58.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaa Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +"2019-09-24 01:04:58.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU eab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258.2µs " +"2019-09-24 01:04:58.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU eac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.2µs " +"2019-09-24 01:04:58.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ead Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:58.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU eae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:58.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:58.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb0 Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2019-09-24 01:04:58.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 593.6µs " +"2019-09-24 01:04:58.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb2 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2019-09-24 01:04:58.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb3 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2019-09-24 01:04:58.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 144.5µs " +"2019-09-24 01:04:58.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 904.8µs " +"2019-09-24 01:04:58.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:58.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb7 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:59.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:59.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb9 Sending msg of 28 bytes to 3 on channel testchainid took 456.4µs" +"2019-09-24 01:04:59.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +"2019-09-24 01:04:59.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebb Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2019-09-24 01:04:59.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebc Sending msg of 28 bytes to 3 on channel businesschannel took 253.9µs" +"2019-09-24 01:04:59.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.8µs " +"2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.2913ms " +"2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec0 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:59.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebf Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:59.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:04:59.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel testchainid took 832.7µs" +"2019-09-24 01:04:59.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 282.3µs " +"2019-09-24 01:04:59.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec4 Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2019-09-24 01:04:59.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec5 Sending msg of 28 bytes to 3 on channel businesschannel took 9.7µs" +"2019-09-24 01:04:59.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200.6µs " +"2019-09-24 01:04:59.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 368.5µs " +"2019-09-24 01:04:59.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:04:59.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:00.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU eca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:00.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecb Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2019-09-24 01:05:00.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.2µs " +"2019-09-24 01:05:00.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ecd Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +"2019-09-24 01:05:00.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ece Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67.1µs " +"2019-09-24 01:05:00.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.2µs " +"2019-09-24 01:05:00.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel businesschannel took 722.8µs" +"2019-09-24 01:05:00.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:00.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:00.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:00.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2019-09-24 01:05:00.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.5µs " +"2019-09-24 01:05:00.714 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed6 Sending msg of 28 bytes to 2 on channel businesschannel took 15.6µs" +"2019-09-24 01:05:00.715 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2019-09-24 01:05:00.715 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49µs " +"2019-09-24 01:05:00.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:00.714 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +"2019-09-24 01:05:00.717 UTC [orderer.common.cluster.step] handleMessage -> DEBU edb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:01.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU edc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:01.188 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edd Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +"2019-09-24 01:05:01.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 250.5µs " +"2019-09-24 01:05:01.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edf Sending msg of 28 bytes to 2 on channel businesschannel took 16.8µs" +"2019-09-24 01:05:01.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-09-24 01:05:01.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 114.6µs " +"2019-09-24 01:05:01.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:01.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.7µs " +"2019-09-24 01:05:01.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:01.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:01.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee6 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 01:05:01.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 403.3µs " +"2019-09-24 01:05:01.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee8 Sending msg of 28 bytes to 2 on channel businesschannel took 23.1µs" +"2019-09-24 01:05:01.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee9 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-09-24 01:05:01.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.2µs " +"2019-09-24 01:05:01.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU eeb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63µs " +"2019-09-24 01:05:01.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eec Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:01.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eed Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:02.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU eee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:02.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel testchainid took 7.6µs" +"2019-09-24 01:05:02.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 107.7µs " +"2019-09-24 01:05:02.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef1 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2019-09-24 01:05:02.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.6µs " +"2019-09-24 01:05:02.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.1µs " +"2019-09-24 01:05:02.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2019-09-24 01:05:02.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:02.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:02.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:02.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef8 Sending msg of 28 bytes to 3 on channel testchainid took 11µs" +"2019-09-24 01:05:02.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +"2019-09-24 01:05:02.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efa Sending msg of 28 bytes to 2 on channel businesschannel took 16.3µs" +"2019-09-24 01:05:02.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efb Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 01:05:02.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU efc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.5µs " +"2019-09-24 01:05:02.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU efd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58.8µs " +"2019-09-24 01:05:02.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU efe Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:02.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU eff Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:03.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f00 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:03.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f01 Sending msg of 28 bytes to 3 on channel testchainid took 22.7µs" +"2019-09-24 01:05:03.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +"2019-09-24 01:05:03.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f03 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2019-09-24 01:05:03.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f04 Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +"2019-09-24 01:05:03.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.2µs " +"2019-09-24 01:05:03.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 166.4µs " +"2019-09-24 01:05:03.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f07 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:03.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:03.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:03.688 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2019-09-24 01:05:03.688 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124µs " +"2019-09-24 01:05:03.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0c Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2019-09-24 01:05:03.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0d Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2019-09-24 01:05:03.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.8µs " +"2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 736.2µs " +"2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f10 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:03.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f11 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:04.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f12 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:04.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 01:05:04.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2019-09-24 01:05:04.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f15 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2019-09-24 01:05:04.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f16 Sending msg of 28 bytes to 2 on channel businesschannel took 8.7µs" +"2019-09-24 01:05:04.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.3µs " +"2019-09-24 01:05:04.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.7µs " +"2019-09-24 01:05:04.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f19 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:04.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:04.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:04.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1c Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2019-09-24 01:05:04.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.5µs " +"2019-09-24 01:05:04.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1e Sending msg of 28 bytes to 2 on channel businesschannel took 14.2µs" +"2019-09-24 01:05:04.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1f Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-09-24 01:05:04.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 182.3µs " +"2019-09-24 01:05:04.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 596µs " +"2019-09-24 01:05:04.712 UTC [orderer.common.cluster.step] handleMessage -> DEBU f22 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:04.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f23 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:05.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU f24 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:05.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f25 Sending msg of 28 bytes to 3 on channel testchainid took 18µs" +"2019-09-24 01:05:05.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 155µs " +"2019-09-24 01:05:05.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f27 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 01:05:05.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f28 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2019-09-24 01:05:05.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.5µs " +"2019-09-24 01:05:05.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.5µs " +"2019-09-24 01:05:05.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:05.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:05.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f2d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:05.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2e Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2019-09-24 01:05:05.691 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 88µs " +"2019-09-24 01:05:05.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f30 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2019-09-24 01:05:05.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f31 Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +"2019-09-24 01:05:05.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.3µs " +"2019-09-24 01:05:05.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU f33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 234.5µs " +"2019-09-24 01:05:05.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f34 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:05.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU f35 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:06.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU f36 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:06.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f37 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-09-24 01:05:06.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 308.9µs " +"2019-09-24 01:05:06.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f39 Sending msg of 28 bytes to 2 on channel businesschannel took 17µs" +"2019-09-24 01:05:06.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3a Sending msg of 28 bytes to 3 on channel businesschannel took 10.7µs" +"2019-09-24 01:05:06.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 67.1µs " +"2019-09-24 01:05:06.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 621.7µs " +"2019-09-24 01:05:06.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:06.214 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:06.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:06.696 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f40 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2019-09-24 01:05:06.698 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2949ms " +"2019-09-24 01:05:06.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f42 Sending msg of 28 bytes to 2 on channel businesschannel took 42µs" +"2019-09-24 01:05:06.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f43 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-09-24 01:05:06.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.9µs " +"2019-09-24 01:05:06.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.3µs " +"2019-09-24 01:05:06.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f46 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:06.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f47 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:07.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU f48 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:07.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f49 Sending msg of 28 bytes to 3 on channel testchainid took 21.4µs" +"2019-09-24 01:05:07.190 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.6µs " +"2019-09-24 01:05:07.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4b Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +"2019-09-24 01:05:07.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4c Sending msg of 28 bytes to 3 on channel businesschannel took 28.5µs" +"2019-09-24 01:05:07.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.9µs " +"2019-09-24 01:05:07.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.4µs " +"2019-09-24 01:05:07.218 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:07.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f50 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:07.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f51 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:07.690 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f52 Sending msg of 28 bytes to 3 on channel testchainid took 19.1µs" +"2019-09-24 01:05:07.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.5µs " +"2019-09-24 01:05:07.720 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f54 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2019-09-24 01:05:07.720 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f55 Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2019-09-24 01:05:07.721 UTC [orderer.common.cluster.step] sendMessage -> DEBU f56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +"2019-09-24 01:05:07.721 UTC [orderer.common.cluster.step] sendMessage -> DEBU f57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 65.2µs " +"2019-09-24 01:05:07.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU f58 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:07.722 UTC [orderer.common.cluster.step] handleMessage -> DEBU f59 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:08.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:08.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2019-09-24 01:05:08.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 975µs " +"2019-09-24 01:05:08.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5d Sending msg of 28 bytes to 2 on channel businesschannel took 21.6µs" +"2019-09-24 01:05:08.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5e Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2019-09-24 01:05:08.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.2µs " +"2019-09-24 01:05:08.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU f60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 58µs " +"2019-09-24 01:05:08.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f61 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:08.212 UTC [orderer.common.cluster.step] handleMessage -> DEBU f62 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:08.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f63 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:08.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f64 Sending msg of 28 bytes to 3 on channel testchainid took 11.7µs" +"2019-09-24 01:05:08.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54.1µs " +"2019-09-24 01:05:08.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f66 Sending msg of 28 bytes to 3 on channel businesschannel took 102.6µs" +"2019-09-24 01:05:08.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f67 Sending msg of 28 bytes to 2 on channel businesschannel took 11µs" +"2019-09-24 01:05:08.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.1µs " +"2019-09-24 01:05:08.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.5µs " +"2019-09-24 01:05:08.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:08.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:09.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:09.190 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6d Sending msg of 28 bytes to 3 on channel testchainid took 59.8µs" +"2019-09-24 01:05:09.191 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 661.5µs " +"2019-09-24 01:05:09.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6f Sending msg of 28 bytes to 2 on channel businesschannel took 17.5µs" +"2019-09-24 01:05:09.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f70 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 99.7µs " +"2019-09-24 01:05:09.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f71 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2019-09-24 01:05:09.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.9µs " +"2019-09-24 01:05:09.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f73 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:09.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU f74 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:09.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU f75 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:09.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f76 Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2019-09-24 01:05:09.689 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.8µs " +"2019-09-24 01:05:09.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f78 Sending msg of 28 bytes to 2 on channel businesschannel took 16.4µs" +"2019-09-24 01:05:09.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f79 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +"2019-09-24 01:05:09.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +"2019-09-24 01:05:09.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +"2019-09-24 01:05:09.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:09.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:10.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:10.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7f Sending msg of 28 bytes to 3 on channel testchainid took 49.3µs" +"2019-09-24 01:05:10.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +"2019-09-24 01:05:10.219 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f81 Sending msg of 28 bytes to 2 on channel businesschannel took 84.3µs" +"2019-09-24 01:05:10.219 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f82 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2019-09-24 01:05:10.219 UTC [orderer.common.cluster.step] sendMessage -> DEBU f83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 203.2µs " +"2019-09-24 01:05:10.220 UTC [orderer.common.cluster.step] sendMessage -> DEBU f84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 238.4µs " +"2019-09-24 01:05:10.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f85 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:10.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU f86 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:10.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f87 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:10.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f88 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2019-09-24 01:05:10.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.5µs " +"2019-09-24 01:05:10.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8a Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2019-09-24 01:05:10.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8b Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2019-09-24 01:05:10.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.3µs " +"2019-09-24 01:05:10.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 222.1µs " +"2019-09-24 01:05:10.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:10.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:11.190 UTC [orderer.common.cluster.step] handleMessage -> DEBU f90 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:11.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f91 Sending msg of 28 bytes to 3 on channel testchainid took 81.1µs" +"2019-09-24 01:05:11.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.6µs " +"2019-09-24 01:05:11.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU f93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.5µs " +"2019-09-24 01:05:11.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f94 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2019-09-24 01:05:11.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU f95 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.6µs " +"2019-09-24 01:05:11.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU f96 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:11.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU f97 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:11.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 3 on channel businesschannel took 4.3494ms" +"2019-09-24 01:05:11.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU f99 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:11.695 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9a Sending msg of 28 bytes to 3 on channel testchainid took 130.5µs" +"2019-09-24 01:05:11.695 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +"2019-09-24 01:05:11.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9c Sending msg of 28 bytes to 2 on channel businesschannel took 50.5µs" +"2019-09-24 01:05:11.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9d Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2019-09-24 01:05:11.711 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.9µs " +"2019-09-24 01:05:11.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.9µs " +"2019-09-24 01:05:11.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:11.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:11.965 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fa2 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53754 with txid '920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640' of type ENDORSER_TRANSACTION" +"2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:11.971 UTC [policies] Evaluate -> DEBU fa5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:11.972 UTC [policies] Evaluate -> DEBU fa6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:11.972 UTC [policies] Evaluate -> DEBU fa7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:11.972 UTC [msp] DeserializeIdentity -> DEBU fa8 Obtaining identity" +"2019-09-24 01:05:11.973 UTC [msp.identity] newIdentity -> DEBU fa9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:05:11.974 UTC [cauthdsl] func1 -> DEBU faa 0xc000b02450 gate 1569287111974162000 evaluation starts" +"2019-09-24 01:05:11.974 UTC [cauthdsl] func2 -> DEBU fab 0xc000b02450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:11.974 UTC [cauthdsl] func2 -> DEBU fac 0xc000b02450 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:11.974 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU fad Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:11.974 UTC [msp] Validate -> DEBU fae MSP Org1MSP validating identity" +"2019-09-24 01:05:11.974 UTC [msp] getCertificationChain -> DEBU faf MSP Org1MSP getting certification chain" +"2019-09-24 01:05:11.975 UTC [cauthdsl] func2 -> DEBU fb0 0xc000b02450 principal matched by identity 0" +"2019-09-24 01:05:11.975 UTC [msp.identity] Verify -> DEBU fb1 Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +"2019-09-24 01:05:11.975 UTC [msp.identity] Verify -> DEBU fb2 Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +00000040 cf d1 1e e6 b1 d6 |......|" +"2019-09-24 01:05:11.975 UTC [cauthdsl] func2 -> DEBU fb3 0xc000b02450 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:11.975 UTC [cauthdsl] func1 -> DEBU fb4 0xc000b02450 gate 1569287111974162000 evaluation succeeds" +"2019-09-24 01:05:11.975 UTC [policies] Evaluate -> DEBU fb5 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:11.975 UTC [policies] Evaluate -> DEBU fb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb7 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fb9 Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:05:11.976 UTC [policies] Evaluate -> DEBU fba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:05:11.976 UTC [orderer.common.blockcutter] Ordered -> DEBU fbb Enqueuing message into batch" +"2019-09-24 01:05:11.976 UTC [orderer.common.broadcast] ProcessMessage -> DEBU fbc [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53754" +"2019-09-24 01:05:11.979 UTC [grpc] infof -> DEBU fbd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:11.979 UTC [orderer.common.broadcast] Handle -> WARN fbe Error reading from 172.18.0.5:53754: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:11.979 UTC [orderer.common.server] func1 -> DEBU fbf Closing Broadcast stream" +"2019-09-24 01:05:11.979 UTC [comm.grpc.server] 1 -> INFO fc0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53754 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=31.6445302s +"2019-09-24 01:05:12.188 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:12.189 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc2 Sending msg of 28 bytes to 3 on channel testchainid took 17.1µs" +"2019-09-24 01:05:12.189 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 85.1µs " +"2019-09-24 01:05:12.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc4 Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +"2019-09-24 01:05:12.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 3 on channel businesschannel took 17.4µs" +"2019-09-24 01:05:12.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 570.5µs " +"2019-09-24 01:05:12.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.8µs " +"2019-09-24 01:05:12.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:12.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:12.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:12.692 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcb Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +"2019-09-24 01:05:12.693 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 690.8µs " +"2019-09-24 01:05:12.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127µs " +"2019-09-24 01:05:12.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 2 on channel businesschannel took 61.9µs" +"2019-09-24 01:05:12.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcf Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +"2019-09-24 01:05:12.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.1µs " +"2019-09-24 01:05:12.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:12.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.189 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:13.191 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd4 Sending msg of 28 bytes to 3 on channel testchainid took 1.705ms" +"2019-09-24 01:05:13.192 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 935.8µs " +"2019-09-24 01:05:13.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd6 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2019-09-24 01:05:13.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 3 on channel businesschannel took 41.1µs" +"2019-09-24 01:05:13.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 130.9µs " +"2019-09-24 01:05:13.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498.3µs " +"2019-09-24 01:05:13.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU fda Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.689 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:13.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdd Sending msg of 28 bytes to 3 on channel testchainid took 28.5µs" +"2019-09-24 01:05:13.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU fde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.3µs " +"2019-09-24 01:05:13.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fdf Sending msg of 28 bytes to 2 on channel businesschannel took 51.8µs" +"2019-09-24 01:05:13.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 3 on channel businesschannel took 29.1µs" +"2019-09-24 01:05:13.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 125µs " +"2019-09-24 01:05:13.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.4867ms " +"2019-09-24 01:05:13.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe3 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.979 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU fe5 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 01:05:13.979 UTC [orderer.consensus.etcdraft] propose -> INFO fe6 Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe7 Sending msg of 3644 bytes to 2 on channel businesschannel took 18.9µs" +"2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe8 Sending msg of 3644 bytes to 3 on channel businesschannel took 21.9µs" +"2019-09-24 01:05:13.981 UTC [orderer.consensus.etcdraft] 2 -> DEBU fe9 Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:05:13.981 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer2.example.com(orderer2.example.com:7050) took 105.9µs " +"2019-09-24 01:05:13.984 UTC [orderer.common.cluster.step] sendMessage -> DEBU feb Send of ConsensusRequest for channel businesschannel with payload of size 3644 to orderer1.example.com(orderer1.example.com:7050) took 2.704ms " +"2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU fec Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fee Sending msg of 28 bytes to 2 on channel businesschannel took 16.1µs" +"2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO fef Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2019-09-24 01:05:13.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.5µs " +"2019-09-24 01:05:13.986 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.2µs " +"2019-09-24 01:05:13.988 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.990 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU ff4 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 01:05:13.990 UTC [msp] GetDefaultSigningIdentity -> DEBU ff5 Obtaining default signing identity" +"2019-09-24 01:05:13.991 UTC [msp] GetDefaultSigningIdentity -> DEBU ff6 Obtaining default signing identity" +"2019-09-24 01:05:13.991 UTC [msp.identity] Sign -> DEBU ff7 Sign: plaintext: 0A020802120B0A090A03010203100418...45973607989927ED32227DE5C26DEBF9 " +"2019-09-24 01:05:13.991 UTC [msp.identity] Sign -> DEBU ff8 Sign: digest: 6EDF11BF536DCE34A864BEB5771B1B28301B6A119EF4A94A7FC1EE32A4336550 " +"2019-09-24 01:05:13.992 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:13.995 UTC [fsblkstorage] indexBlock -> DEBU ffa Indexing block [blockNum=3, blockHash=[]byte{0x7b, 0xa8, 0x45, 0xce, 0x5d, 0x8d, 0x8, 0x76, 0x56, 0x78, 0x91, 0xdb, 0x7d, 0x1c, 0x31, 0x7b, 0xf2, 0x8, 0x34, 0xf4, 0xa9, 0x92, 0xfe, 0x49, 0x2f, 0x65, 0x4, 0x9f, 0x10, 0x2b, 0x3a, 0x80} txOffsets= +txId=920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 locPointer=offset=70, bytesLength=3516 +]" +"2019-09-24 01:05:13.999 UTC [fsblkstorage] updateCheckpoint -> DEBU ffb Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81292], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-09-24 01:05:13.999 UTC [orderer.commmon.multichannel] commitBlock -> DEBU ffc [channel: businesschannel] Wrote block [3]" +"2019-09-24 01:05:13.999 UTC [fsblkstorage] waitForBlock -> DEBU ffd Came out of wait. maxAvailaBlockNumber=[3]" +"2019-09-24 01:05:14.000 UTC [fsblkstorage] waitForBlock -> DEBU ffe Came out of wait. maxAvailaBlockNumber=[3]" +"2019-09-24 01:05:13.999 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU fff Remaining bytes=[4524], Going to peek [8] bytes" +"2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1000 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +"2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1001 blockbytes [4522] read from file [0]" +"2019-09-24 01:05:14.001 UTC [common.deliver] deliverBlocks -> DEBU 1002 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:05:14.001 UTC [fsblkstorage] waitForBlock -> DEBU 1003 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-09-24 01:05:14.000 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1004 Remaining bytes=[4524], Going to peek [8] bytes" +"2019-09-24 01:05:14.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1005 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +"2019-09-24 01:05:14.006 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1006 blockbytes [4522] read from file [0]" +"2019-09-24 01:05:14.008 UTC [common.deliver] deliverBlocks -> DEBU 1007 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:05:14.017 UTC [fsblkstorage] waitForBlock -> DEBU 1008 Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2019-09-24 01:05:14.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:14.193 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100a Sending msg of 28 bytes to 3 on channel testchainid took 64.1µs" +"2019-09-24 01:05:14.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1712ms " +"2019-09-24 01:05:14.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100c Sending msg of 28 bytes to 2 on channel businesschannel took 29.8µs" +"2019-09-24 01:05:14.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 3 on channel businesschannel took 649.5µs" +"2019-09-24 01:05:14.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.8122ms " +"2019-09-24 01:05:14.217 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 540.9µs " +"2019-09-24 01:05:14.222 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1010 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:14.223 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:14.688 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:14.689 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1013 Sending msg of 28 bytes to 3 on channel testchainid took 58.8µs" +"2019-09-24 01:05:14.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1014 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 601.5µs " +"2019-09-24 01:05:14.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1015 Sending msg of 28 bytes to 2 on channel businesschannel took 90.9µs" +"2019-09-24 01:05:14.713 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 12.6µs" +"2019-09-24 01:05:14.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 425.2µs " +"2019-09-24 01:05:14.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1018 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +"2019-09-24 01:05:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:14.714 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:14.857 UTC [orderer.common.server] Broadcast -> DEBU 101b Starting new Broadcast handler" +"2019-09-24 01:05:14.857 UTC [orderer.common.broadcast] Handle -> DEBU 101c Starting new broadcast loop for 172.18.0.5:53770" +"2019-09-24 01:05:14.898 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 101d [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53770 with txid '716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b' of type ENDORSER_TRANSACTION" +"2019-09-24 01:05:14.899 UTC [policies] Evaluate -> DEBU 101e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:05:14.899 UTC [policies] Evaluate -> DEBU 101f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1021 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.900 UTC [policies] Evaluate -> DEBU 1022 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:14.900 UTC [cauthdsl] func1 -> DEBU 1023 0xc00136f400 gate 1569287114900788200 evaluation starts" +"2019-09-24 01:05:14.901 UTC [cauthdsl] func2 -> DEBU 1024 0xc00136f400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.901 UTC [cauthdsl] func2 -> DEBU 1025 0xc00136f400 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:14.902 UTC [cauthdsl] func2 -> DEBU 1026 0xc00136f400 principal matched by identity 0" +"2019-09-24 01:05:14.903 UTC [msp.identity] Verify -> DEBU 1027 Verify: digest = 00000000 e0 f8 35 ad 30 51 bb 43 c2 4a 4f 91 93 18 65 36 |..5.0Q.C.JO...e6| +00000010 82 ac 95 13 d5 cc b4 10 07 64 48 79 81 43 d0 07 |.........dHy.C..|" +"2019-09-24 01:05:14.903 UTC [msp.identity] Verify -> DEBU 1028 Verify: sig = 00000000 30 45 02 21 00 f0 75 11 1d c1 3c 4c 4e df 7f cd |0E.!..u... DEBU 1029 0xc00136f400 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.910 UTC [cauthdsl] func1 -> DEBU 102a 0xc00136f400 gate 1569287114900788200 evaluation succeeds" +"2019-09-24 01:05:14.910 UTC [policies] Evaluate -> DEBU 102b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.910 UTC [policies] Evaluate -> DEBU 102c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.912 UTC [policies] Evaluate -> DEBU 102d Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 102e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 102f Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 1030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:05:14.914 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1031 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53770" +"2019-09-24 01:05:14.914 UTC [orderer.common.blockcutter] Ordered -> DEBU 1032 Enqueuing message into batch" +"2019-09-24 01:05:14.921 UTC [grpc] warningf -> DEBU 1033 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53770: read: connection reset by peer" +"2019-09-24 01:05:14.921 UTC [orderer.common.broadcast] Handle -> WARN 1034 Error reading from 172.18.0.5:53770: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:14.921 UTC [orderer.common.server] func1 -> DEBU 1035 Closing Broadcast stream" +"2019-09-24 01:05:14.922 UTC [comm.grpc.server] 1 -> INFO 1036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53770 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=65.1745ms +"2019-09-24 01:05:14.923 UTC [grpc] infof -> DEBU 1037 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:15.192 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1038 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:15.194 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1039 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.2µs " +"2019-09-24 01:05:15.194 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 3 on channel testchainid took 37.5µs" +"2019-09-24 01:05:15.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103b Sending msg of 28 bytes to 2 on channel businesschannel took 87.1µs" +"2019-09-24 01:05:15.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103c Sending msg of 28 bytes to 3 on channel businesschannel took 27.4µs" +"2019-09-24 01:05:15.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.3µs " +"2019-09-24 01:05:15.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.549ms " +"2019-09-24 01:05:15.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:15.217 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1040 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:15.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1041 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:15.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1042 Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +"2019-09-24 01:05:15.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1043 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 264.7µs " +"2019-09-24 01:05:15.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2019-09-24 01:05:15.711 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1045 Sending msg of 28 bytes to 3 on channel businesschannel took 23.5µs" +"2019-09-24 01:05:15.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1046 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 205.7µs " +"2019-09-24 01:05:15.712 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 889.1µs " +"2019-09-24 01:05:15.713 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:15.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.191 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:16.192 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 3 on channel testchainid took 710.9µs" +"2019-09-24 01:05:16.193 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102.6µs " +"2019-09-24 01:05:16.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 2 on channel businesschannel took 29µs" +"2019-09-24 01:05:16.212 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel businesschannel took 18.6µs" +"2019-09-24 01:05:16.212 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.8µs " +"2019-09-24 01:05:16.213 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.6µs " +"2019-09-24 01:05:16.215 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.216 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1052 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.690 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:16.691 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 3 on channel testchainid took 37.8µs" +"2019-09-24 01:05:16.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 968.2µs " +"2019-09-24 01:05:16.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1056 Sending msg of 28 bytes to 3 on channel businesschannel took 45.1µs" +"2019-09-24 01:05:16.712 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 2 on channel businesschannel took 36.9µs" +"2019-09-24 01:05:16.713 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 235.2µs " +"2019-09-24 01:05:16.715 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1059 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.716 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.717 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.3418ms " +"2019-09-24 01:05:16.881 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 105c Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 01:05:16.881 UTC [orderer.consensus.etcdraft] propose -> INFO 105d Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:05:16.883 UTC [orderer.consensus.etcdraft] 2 -> DEBU 105e Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:05:16.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 3105 bytes to 2 on channel businesschannel took 23.4µs" +"2019-09-24 01:05:16.886 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 3105 bytes to 3 on channel businesschannel took 16.2µs" +"2019-09-24 01:05:16.887 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1061 Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer1.example.com(orderer1.example.com:7050) took 148.2µs " +"2019-09-24 01:05:16.892 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1062 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1063 Sending msg of 28 bytes to 2 on channel businesschannel took 13.8µs" +"2019-09-24 01:05:16.892 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1064 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2019-09-24 01:05:16.893 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1065 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 274.6µs " +"2019-09-24 01:05:16.893 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1066 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2019-09-24 01:05:16.893 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1067 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 01:05:16.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 1068 Obtaining default signing identity" +"2019-09-24 01:05:16.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 1069 Obtaining default signing identity" +"2019-09-24 01:05:16.894 UTC [msp.identity] Sign -> DEBU 106a Sign: plaintext: 0A020802120B0A090A03010203100418...ED82461E37C493DE73E3F63D45A32047 " +"2019-09-24 01:05:16.894 UTC [msp.identity] Sign -> DEBU 106b Sign: digest: 60C72952D5A6FA993A3F208C1D4ECD665ED3DD4606CB162F9DDD263D52FCA565 " +"2019-09-24 01:05:16.896 UTC [fsblkstorage] indexBlock -> DEBU 106c Indexing block [blockNum=4, blockHash=[]byte{0xd5, 0x57, 0x9e, 0x19, 0x63, 0x67, 0xd5, 0xdc, 0x86, 0xc, 0xd2, 0x55, 0xe5, 0x72, 0x46, 0xfe, 0x75, 0x52, 0x23, 0xda, 0x1f, 0xf6, 0x6, 0xd2, 0x79, 0xa1, 0xba, 0xeb, 0x15, 0x73, 0xde, 0xe2} txOffsets= +txId=716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b locPointer=offset=70, bytesLength=2977 +]" +"2019-09-24 01:05:16.898 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106e Send of ConsensusRequest for channel businesschannel with payload of size 3105 to orderer2.example.com(orderer2.example.com:7050) took 2.2519ms " +"2019-09-24 01:05:16.899 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.4µs " +"2019-09-24 01:05:16.899 UTC [fsblkstorage] updateCheckpoint -> DEBU 1070 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85276], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-09-24 01:05:16.899 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1071 [channel: businesschannel] Wrote block [4]" +"2019-09-24 01:05:16.900 UTC [fsblkstorage] waitForBlock -> DEBU 1072 Came out of wait. maxAvailaBlockNumber=[4]" +"2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1073 Remaining bytes=[3984], Going to peek [8] bytes" +"2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1074 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +"2019-09-24 01:05:16.900 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1075 blockbytes [3982] read from file [0]" +"2019-09-24 01:05:16.900 UTC [common.deliver] deliverBlocks -> DEBU 1076 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:05:16.901 UTC [fsblkstorage] waitForBlock -> DEBU 1077 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-09-24 01:05:16.901 UTC [fsblkstorage] waitForBlock -> DEBU 1078 Came out of wait. maxAvailaBlockNumber=[4]" +"2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1079 Remaining bytes=[3984], Going to peek [8] bytes" +"2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 107a Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +"2019-09-24 01:05:16.901 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 107b blockbytes [3982] read from file [0]" +"2019-09-24 01:05:16.902 UTC [common.deliver] deliverBlocks -> DEBU 107c [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:05:16.902 UTC [fsblkstorage] waitForBlock -> DEBU 107d Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2019-09-24 01:05:16.901 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:16.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:17.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1080 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:17.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 3 on channel testchainid took 55µs" +"2019-09-24 01:05:17.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117µs " +"2019-09-24 01:05:17.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2019-09-24 01:05:17.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-09-24 01:05:17.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 310.1µs " +"2019-09-24 01:05:17.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1113ms " +"2019-09-24 01:05:17.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:17.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:17.442 UTC [orderer.common.server] Broadcast -> DEBU 1089 Starting new Broadcast handler" +"2019-09-24 01:05:17.442 UTC [orderer.common.broadcast] Handle -> DEBU 108a Starting new broadcast loop for 172.18.0.5:53784" +"2019-09-24 01:05:17.468 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 108b [channel: businesschannel] Broadcast is processing normal message from 172.18.0.5:53784 with txid '074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5' of type ENDORSER_TRANSACTION" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 108f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 1090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:17.469 UTC [msp] DeserializeIdentity -> DEBU 1091 Obtaining identity" +"2019-09-24 01:05:17.469 UTC [msp.identity] newIdentity -> DEBU 1092 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func1 -> DEBU 1093 0xc0011bc790 gate 1569287117469740900 evaluation starts" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1094 0xc0011bc790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1095 0xc0011bc790 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1096 0xc0011bc790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func2 -> DEBU 1097 0xc0011bc790 principal evaluation fails" +"2019-09-24 01:05:17.469 UTC [cauthdsl] func1 -> DEBU 1098 0xc0011bc790 gate 1569287117469740900 evaluation fails" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 1099 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.469 UTC [policies] Evaluate -> DEBU 109a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 109b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func1 -> DEBU 109c 0xc0011bd920 gate 1569287117470048000 evaluation starts" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 109d 0xc0011bd920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 109e 0xc0011bd920 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:17.470 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 109f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:05:17.470 UTC [msp] Validate -> DEBU 10a0 MSP Org2MSP validating identity" +"2019-09-24 01:05:17.470 UTC [msp] getCertificationChain -> DEBU 10a1 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 10a2 0xc0011bd920 principal matched by identity 0" +"2019-09-24 01:05:17.470 UTC [msp.identity] Verify -> DEBU 10a3 Verify: digest = 00000000 3b bb 85 c9 b1 26 4d ef 06 5d 74 71 84 51 0c ba |;....&M..]tq.Q..| +00000010 f4 ff 97 a0 9a 74 75 1a ed 57 e9 f4 fa ce 55 e2 |.....tu..W....U.|" +"2019-09-24 01:05:17.470 UTC [msp.identity] Verify -> DEBU 10a4 Verify: sig = 00000000 30 45 02 21 00 fd a1 0a 41 10 34 78 b2 35 ea a0 |0E.!....A.4x.5..| +00000010 60 94 c5 01 ae e7 b2 c3 4c 4b 69 d7 03 98 bc 0b |`.......LKi.....| +00000020 7e c4 d0 f1 d9 02 20 7f 1b dd 4e f3 da c9 03 62 |~..... ...N....b| +00000030 53 08 49 fd d9 f2 bf 57 e1 37 ab 5a 24 b4 00 f2 |S.I....W.7.Z$...| +00000040 c0 bb be fd e2 be ad |.......|" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func2 -> DEBU 10a5 0xc0011bd920 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.470 UTC [cauthdsl] func1 -> DEBU 10a6 0xc0011bd920 gate 1569287117470048000 evaluation succeeds" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a7 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10a9 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10aa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10ab Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:05:17.470 UTC [policies] Evaluate -> DEBU 10ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:05:17.471 UTC [orderer.common.blockcutter] Ordered -> DEBU 10ad Enqueuing message into batch" +"2019-09-24 01:05:17.471 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10ae [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.5:53784" +"2019-09-24 01:05:17.474 UTC [grpc] infof -> DEBU 10af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.474 UTC [orderer.common.broadcast] Handle -> WARN 10b0 Error reading from 172.18.0.5:53784: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:17.475 UTC [orderer.common.server] func1 -> DEBU 10b1 Closing Broadcast stream" +"2019-09-24 01:05:17.475 UTC [comm.grpc.server] 1 -> INFO 10b2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53784 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.4874ms +"2019-09-24 01:05:17.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10b3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:17.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b4 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-09-24 01:05:17.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.2µs " +"2019-09-24 01:05:17.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b6 Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-09-24 01:05:17.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b7 Sending msg of 28 bytes to 3 on channel businesschannel took 12.7µs" +"2019-09-24 01:05:17.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +"2019-09-24 01:05:17.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 54.2µs " +"2019-09-24 01:05:17.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ba Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:17.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:18.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:18.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bd Sending msg of 28 bytes to 3 on channel testchainid took 33.4µs" +"2019-09-24 01:05:18.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10be Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5969ms " +"2019-09-24 01:05:18.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10bf Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2019-09-24 01:05:18.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c0 Sending msg of 28 bytes to 3 on channel businesschannel took 20.4µs" +"2019-09-24 01:05:18.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.3µs " +"2019-09-24 01:05:18.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:18.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.1718ms " +"2019-09-24 01:05:18.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:18.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:18.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c6 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2019-09-24 01:05:18.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.3µs " +"2019-09-24 01:05:18.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c8 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2019-09-24 01:05:18.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 167µs " +"2019-09-24 01:05:18.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ca Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:18.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 3 on channel businesschannel took 135.9µs" +"2019-09-24 01:05:18.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 634.5µs " +"2019-09-24 01:05:18.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ce Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:19.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cf Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 01:05:19.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.7µs " +"2019-09-24 01:05:19.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d1 Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2019-09-24 01:05:19.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d2 Sending msg of 28 bytes to 2 on channel businesschannel took 13.3µs" +"2019-09-24 01:05:19.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 463.2µs " +"2019-09-24 01:05:19.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 332.3µs " +"2019-09-24 01:05:19.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.472 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10d7 Batch timer expired, creating block" channel=businesschannel node=1 +"2019-09-24 01:05:19.472 UTC [orderer.consensus.etcdraft] propose -> INFO 10d8 Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:05:19.475 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10d9 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:05:19.478 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10da Sending msg of 3106 bytes to 2 on channel businesschannel took 23.6µs" +"2019-09-24 01:05:19.478 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 3106 bytes to 3 on channel businesschannel took 9µs" +"2019-09-24 01:05:19.478 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dc Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer1.example.com(orderer1.example.com:7050) took 132.8µs " +"2019-09-24 01:05:19.482 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10dd Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10de Sending msg of 28 bytes to 2 on channel businesschannel took 850.2µs" +"2019-09-24 01:05:19.484 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10df Sending msg of 28 bytes to 3 on channel businesschannel took 38.8µs" +"2019-09-24 01:05:19.484 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 264.4µs " +"2019-09-24 01:05:19.485 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10e1 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2019-09-24 01:05:19.485 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10e2 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2019-09-24 01:05:19.485 UTC [msp] GetDefaultSigningIdentity -> DEBU 10e3 Obtaining default signing identity" +"2019-09-24 01:05:19.486 UTC [msp] GetDefaultSigningIdentity -> DEBU 10e4 Obtaining default signing identity" +"2019-09-24 01:05:19.486 UTC [msp.identity] Sign -> DEBU 10e5 Sign: plaintext: 0A020802120B0A090A03010203100418...1111CD6184348A3E6FBF7B9C04EFCEEF " +"2019-09-24 01:05:19.486 UTC [msp.identity] Sign -> DEBU 10e6 Sign: digest: D37104C73DC3260B7090176E4A7ED54C01F96EF5B4D527EA70974D21496BA318 " +"2019-09-24 01:05:19.487 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.487 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e8 Send of ConsensusRequest for channel businesschannel with payload of size 3106 to orderer2.example.com(orderer2.example.com:7050) took 9.1596ms " +"2019-09-24 01:05:19.492 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 183.4µs " +"2019-09-24 01:05:19.488 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.495 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10eb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.498 UTC [fsblkstorage] indexBlock -> DEBU 10ec Indexing block [blockNum=5, blockHash=[]byte{0x2, 0x38, 0x9e, 0x59, 0xf8, 0xbb, 0xfc, 0xc, 0x7e, 0x52, 0x39, 0x78, 0x2b, 0xad, 0x5f, 0x4b, 0x3f, 0x3f, 0x8b, 0x94, 0xc6, 0x52, 0x18, 0x85, 0x20, 0x20, 0xfd, 0x31, 0xe0, 0x3f, 0x7c, 0xb2} txOffsets= +txId=074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 locPointer=offset=70, bytesLength=2978 +]" +"2019-09-24 01:05:19.500 UTC [fsblkstorage] updateCheckpoint -> DEBU 10ed Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89262], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-09-24 01:05:19.501 UTC [fsblkstorage] waitForBlock -> DEBU 10ee Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:19.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10ef Remaining bytes=[3986], Going to peek [8] bytes" +"2019-09-24 01:05:19.501 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10f0 [channel: businesschannel] Wrote block [5]" +"2019-09-24 01:05:19.502 UTC [fsblkstorage] waitForBlock -> DEBU 10f1 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f3 Remaining bytes=[3986], Going to peek [8] bytes" +"2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f4 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:19.502 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f5 blockbytes [3984] read from file [0]" +"2019-09-24 01:05:19.502 UTC [common.deliver] deliverBlocks -> DEBU 10f6 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:05:19.502 UTC [fsblkstorage] waitForBlock -> DEBU 10f7 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:19.501 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f2 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:19.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f8 blockbytes [3984] read from file [0]" +"2019-09-24 01:05:19.510 UTC [common.deliver] deliverBlocks -> DEBU 10f9 [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:05:19.512 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:19.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10fb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:19.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fc Sending msg of 28 bytes to 3 on channel testchainid took 23.2µs" +"2019-09-24 01:05:19.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 80.2µs " +"2019-09-24 01:05:19.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fe Sending msg of 28 bytes to 3 on channel businesschannel took 37µs" +"2019-09-24 01:05:19.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ff Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-09-24 01:05:19.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1100 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 925.1µs " +"2019-09-24 01:05:19.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1101 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569µs " +"2019-09-24 01:05:19.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1102 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:19.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1103 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:20.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1104 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:20.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1105 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2019-09-24 01:05:20.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1106 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1299ms " +"2019-09-24 01:05:20.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1107 Sending msg of 28 bytes to 2 on channel businesschannel took 27.1µs" +"2019-09-24 01:05:20.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1108 Sending msg of 28 bytes to 3 on channel businesschannel took 14.3µs" +"2019-09-24 01:05:20.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1109 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +"2019-09-24 01:05:20.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:20.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.8104ms " +"2019-09-24 01:05:20.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:20.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:20.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110e Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2019-09-24 01:05:20.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.7µs " +"2019-09-24 01:05:20.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1110 Sending msg of 28 bytes to 2 on channel businesschannel took 24µs" +"2019-09-24 01:05:20.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1111 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2019-09-24 01:05:20.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1112 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 656µs " +"2019-09-24 01:05:20.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1113 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 355.1µs " +"2019-09-24 01:05:20.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1114 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:20.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1115 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:21.155 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1116 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:21.156 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1117 Sending msg of 28 bytes to 3 on channel testchainid took 26.9µs" +"2019-09-24 01:05:21.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1118 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.9µs " +"2019-09-24 01:05:21.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1119 Sending msg of 28 bytes to 2 on channel businesschannel took 28.5µs" +"2019-09-24 01:05:21.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 111a Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2019-09-24 01:05:21.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.9µs " +"2019-09-24 01:05:21.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 111c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.8µs " +"2019-09-24 01:05:21.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:21.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:21.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 111f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:21.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1120 Sending msg of 28 bytes to 3 on channel testchainid took 31.2µs" +"2019-09-24 01:05:21.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1121 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 497.1µs " +"2019-09-24 01:05:21.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1122 Sending msg of 28 bytes to 2 on channel businesschannel took 25.8µs" +"2019-09-24 01:05:21.680 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1124 Sending msg of 28 bytes to 3 on channel businesschannel took 24.2µs" +"2019-09-24 01:05:21.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1125 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 390.3µs " +"2019-09-24 01:05:21.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1123 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 213.5µs " +"2019-09-24 01:05:21.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1126 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:21.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1127 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:22.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1128 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:22.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1129 Sending msg of 28 bytes to 3 on channel testchainid took 50µs" +"2019-09-24 01:05:22.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 223.6µs " +"2019-09-24 01:05:22.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112b Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +"2019-09-24 01:05:22.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 112c Sending msg of 28 bytes to 3 on channel businesschannel took 9.6µs" +"2019-09-24 01:05:22.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.4µs " +"2019-09-24 01:05:22.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 112e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 599µs " +"2019-09-24 01:05:22.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 112f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:22.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1130 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:22.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1131 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:22.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1132 Sending msg of 28 bytes to 3 on channel testchainid took 22.9µs" +"2019-09-24 01:05:22.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1133 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 712.3µs " +"2019-09-24 01:05:22.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1134 Sending msg of 28 bytes to 2 on channel businesschannel took 137.6µs" +"2019-09-24 01:05:22.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1135 Sending msg of 28 bytes to 3 on channel businesschannel took 21µs" +"2019-09-24 01:05:22.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1136 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.7µs " +"2019-09-24 01:05:22.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1137 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 82.7µs " +"2019-09-24 01:05:22.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1138 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:22.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1139 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:22.728 UTC [orderer.common.server] Deliver -> DEBU 113a Starting new Deliver handler" +"2019-09-24 01:05:22.728 UTC [common.deliver] Handle -> DEBU 113b Starting new deliver loop for 172.18.0.5:53830" +"2019-09-24 01:05:22.728 UTC [common.deliver] Handle -> DEBU 113c Attempting to read seek info message from 172.18.0.5:53830" +"2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 113f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 1140 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.733 UTC [policies] Evaluate -> DEBU 1141 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.733 UTC [msp] DeserializeIdentity -> DEBU 1142 Obtaining identity" +"2019-09-24 01:05:22.734 UTC [msp.identity] newIdentity -> DEBU 1143 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func1 -> DEBU 1144 0xc000201e90 gate 1569287122735014900 evaluation starts" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1145 0xc000201e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1146 0xc000201e90 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1147 0xc000201e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func2 -> DEBU 1148 0xc000201e90 principal evaluation fails" +"2019-09-24 01:05:22.735 UTC [cauthdsl] func1 -> DEBU 1149 0xc000201e90 gate 1569287122735014900 evaluation fails" +"2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.736 UTC [policies] Evaluate -> DEBU 114c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.736 UTC [cauthdsl] func1 -> DEBU 114d 0xc00036ba60 gate 1569287122736787000 evaluation starts" +"2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 114e 0xc00036ba60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 114f 0xc00036ba60 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 1150 0xc00036ba60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:22.737 UTC [cauthdsl] func2 -> DEBU 1151 0xc00036ba60 principal evaluation fails" +"2019-09-24 01:05:22.737 UTC [cauthdsl] func1 -> DEBU 1152 0xc00036ba60 gate 1569287122736787000 evaluation fails" +"2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1153 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1154 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.738 UTC [policies] func1 -> DEBU 1155 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1156 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1157 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.738 UTC [policies] Evaluate -> DEBU 1158 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:22.739 UTC [policies] Evaluate -> DEBU 1159 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.739 UTC [policies] Evaluate -> DEBU 115a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:22.739 UTC [cauthdsl] func1 -> DEBU 115b 0xc000178d90 gate 1569287122739317500 evaluation starts" +"2019-09-24 01:05:22.739 UTC [cauthdsl] func2 -> DEBU 115c 0xc000178d90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.739 UTC [cauthdsl] func2 -> DEBU 115d 0xc000178d90 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:22.739 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 115e Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:05:22.740 UTC [msp] Validate -> DEBU 115f MSP OrdererMSP validating identity" +"2019-09-24 01:05:22.740 UTC [cauthdsl] func2 -> DEBU 1160 0xc000178d90 principal matched by identity 0" +"2019-09-24 01:05:22.740 UTC [msp.identity] Verify -> DEBU 1161 Verify: digest = 00000000 59 6d 0d 79 67 7f d8 a6 b7 40 9a 8d 0a 9b 0a 2d |Ym.yg....@.....-| +00000010 8d ca 86 7b 53 41 60 a9 2b a6 46 cb c4 2f 9b e9 |...{SA`.+.F../..|" +"2019-09-24 01:05:22.741 UTC [msp.identity] Verify -> DEBU 1162 Verify: sig = 00000000 30 45 02 21 00 d0 41 1f 00 3f ec 3d 56 2d 2b 5f |0E.!..A..?.=V-+_| +00000010 fb 24 99 5c e8 98 38 2e c4 cc 49 a4 60 69 d8 4e |.$.\..8...I.`i.N| +00000020 07 41 c3 e3 89 02 20 53 a2 fa 8b 49 b1 fe 3a 0a |.A.... S...I..:.| +00000030 5b 66 d2 57 e2 7f 1d ee c2 ef 09 db 5b 07 c4 17 |[f.W........[...| +00000040 b2 74 72 77 48 6e 93 |.trwHn.|" +"2019-09-24 01:05:22.741 UTC [cauthdsl] func2 -> DEBU 1163 0xc000178d90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.741 UTC [cauthdsl] func1 -> DEBU 1164 0xc000178d90 gate 1569287122739317500 evaluation succeeds" +"2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1165 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1166 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:22.741 UTC [policies] Evaluate -> DEBU 1167 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 1168 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 1169 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:22.742 UTC [policies] Evaluate -> DEBU 116a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:22.742 UTC [common.deliver] deliverBlocks -> DEBU 116b [channel: businesschannel] Received seekInfo (0xc0008ef240) start: > stop: > from 172.18.0.5:53830" +"2019-09-24 01:05:22.742 UTC [fsblkstorage] Next -> DEBU 116c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:22.743 UTC [fsblkstorage] newBlockfileStream -> DEBU 116d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +"2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 116e Remaining bytes=[3986], Going to peek [8] bytes" +"2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 116f Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:22.743 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1170 blockbytes [3984] read from file [0]" +"2019-09-24 01:05:22.743 UTC [common.deliver] deliverBlocks -> DEBU 1171 [channel: businesschannel] Delivering block for (0xc0008ef240) for 172.18.0.5:53830" +"2019-09-24 01:05:22.743 UTC [common.deliver] deliverBlocks -> DEBU 1172 [channel: businesschannel] Done delivering to 172.18.0.5:53830 for (0xc0008ef240)" +"2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1173 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1174 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:22.744 UTC [common.deliver] Handle -> DEBU 1175 Waiting for new SeekInfo from 172.18.0.5:53830" +"2019-09-24 01:05:22.744 UTC [common.deliver] Handle -> DEBU 1176 Attempting to read seek info message from 172.18.0.5:53830" +"2019-09-24 01:05:22.744 UTC [fsblkstorage] waitForBlock -> DEBU 1177 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:22.745 UTC [fsblkstorage] waitForBlock -> DEBU 1178 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:22.748 UTC [common.deliver] Handle -> WARN 1179 Error reading from 172.18.0.5:53830: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:22.748 UTC [orderer.common.server] func1 -> DEBU 117a Closing Deliver stream" +"2019-09-24 01:05:22.748 UTC [grpc] infof -> DEBU 117c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:22.748 UTC [comm.grpc.server] 1 -> INFO 117b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53830 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6727ms +"2019-09-24 01:05:23.008 UTC [orderer.common.server] Deliver -> DEBU 117d Starting new Deliver handler" +"2019-09-24 01:05:23.008 UTC [common.deliver] Handle -> DEBU 117e Starting new deliver loop for 172.18.0.5:53832" +"2019-09-24 01:05:23.008 UTC [common.deliver] Handle -> DEBU 117f Attempting to read seek info message from 172.18.0.5:53832" +"2019-09-24 01:05:23.010 UTC [policies] Evaluate -> DEBU 1180 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1181 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1182 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1183 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.011 UTC [policies] Evaluate -> DEBU 1184 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func1 -> DEBU 1185 0xc0002b7a50 gate 1569287123012040000 evaluation starts" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1186 0xc0002b7a50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1187 0xc0002b7a50 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1188 0xc0002b7a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func2 -> DEBU 1189 0xc0002b7a50 principal evaluation fails" +"2019-09-24 01:05:23.012 UTC [cauthdsl] func1 -> DEBU 118a 0xc0002b7a50 gate 1569287123012040000 evaluation fails" +"2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.012 UTC [policies] Evaluate -> DEBU 118d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.013 UTC [cauthdsl] func1 -> DEBU 118e 0xc00044a2a0 gate 1569287123013446300 evaluation starts" +"2019-09-24 01:05:23.013 UTC [cauthdsl] func2 -> DEBU 118f 0xc00044a2a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.013 UTC [cauthdsl] func2 -> DEBU 1190 0xc00044a2a0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.014 UTC [cauthdsl] func2 -> DEBU 1191 0xc00044a2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.014 UTC [cauthdsl] func2 -> DEBU 1192 0xc00044a2a0 principal evaluation fails" +"2019-09-24 01:05:23.014 UTC [cauthdsl] func1 -> DEBU 1193 0xc00044a2a0 gate 1569287123013446300 evaluation fails" +"2019-09-24 01:05:23.014 UTC [policies] Evaluate -> DEBU 1194 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.014 UTC [policies] Evaluate -> DEBU 1195 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.015 UTC [policies] func1 -> DEBU 1196 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1197 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1198 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.015 UTC [policies] Evaluate -> DEBU 119a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.016 UTC [policies] Evaluate -> DEBU 119b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.016 UTC [cauthdsl] func1 -> DEBU 119c 0xc00044af90 gate 1569287123016672400 evaluation starts" +"2019-09-24 01:05:23.016 UTC [cauthdsl] func2 -> DEBU 119d 0xc00044af90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.016 UTC [cauthdsl] func2 -> DEBU 119e 0xc00044af90 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.017 UTC [cauthdsl] func2 -> DEBU 119f 0xc00044af90 principal matched by identity 0" +"2019-09-24 01:05:23.017 UTC [msp.identity] Verify -> DEBU 11a0 Verify: digest = 00000000 11 51 4b 7a 59 e4 ee 59 3a 4e e8 c3 7f fe 2c d4 |.QKzY..Y:N....,.| +00000010 a1 0c 34 f3 c3 c0 81 f9 64 95 67 e9 03 ef 43 26 |..4.....d.g...C&|" +"2019-09-24 01:05:23.017 UTC [msp.identity] Verify -> DEBU 11a1 Verify: sig = 00000000 30 44 02 20 1e 0e 44 b6 da 69 07 14 91 76 d2 bb |0D. ..D..i...v..| +00000010 35 81 d2 6c 7f 68 a1 fe 86 a5 df c7 23 21 a8 75 |5..l.h......#!.u| +00000020 05 31 1b c2 02 20 0d f8 5f 2d 7a 69 ab 7e 3d b1 |.1... .._-zi.~=.| +00000030 fa 97 57 d4 99 d3 90 59 d5 e8 22 15 96 03 e6 95 |..W....Y..".....| +00000040 7d 20 6f 7d f4 42 |} o}.B|" +"2019-09-24 01:05:23.017 UTC [cauthdsl] func2 -> DEBU 11a2 0xc00044af90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.017 UTC [cauthdsl] func1 -> DEBU 11a3 0xc00044af90 gate 1569287123016672400 evaluation succeeds" +"2019-09-24 01:05:23.017 UTC [policies] Evaluate -> DEBU 11a4 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.017 UTC [policies] Evaluate -> DEBU 11a5 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a6 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a8 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.018 UTC [policies] Evaluate -> DEBU 11a9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.018 UTC [common.deliver] deliverBlocks -> DEBU 11aa [channel: businesschannel] Received seekInfo (0xc0008efb80) start: > stop: > from 172.18.0.5:53832" +"2019-09-24 01:05:23.019 UTC [fsblkstorage] Next -> DEBU 11ab Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.019 UTC [fsblkstorage] newBlockfileStream -> DEBU 11ac newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +"2019-09-24 01:05:23.019 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11ad Remaining bytes=[3986], Going to peek [8] bytes" +"2019-09-24 01:05:23.020 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11ae Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:23.020 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11af blockbytes [3984] read from file [0]" +"2019-09-24 01:05:23.020 UTC [common.deliver] deliverBlocks -> DEBU 11b0 [channel: businesschannel] Delivering block for (0xc0008efb80) for 172.18.0.5:53832" +"2019-09-24 01:05:23.020 UTC [common.deliver] deliverBlocks -> DEBU 11b1 [channel: businesschannel] Done delivering to 172.18.0.5:53832 for (0xc0008efb80)" +"2019-09-24 01:05:23.021 UTC [fsblkstorage] waitForBlock -> DEBU 11b2 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.021 UTC [fsblkstorage] waitForBlock -> DEBU 11b3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.023 UTC [fsblkstorage] waitForBlock -> DEBU 11b4 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.023 UTC [fsblkstorage] waitForBlock -> DEBU 11b5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.021 UTC [common.deliver] Handle -> DEBU 11b6 Waiting for new SeekInfo from 172.18.0.5:53832" +"2019-09-24 01:05:23.023 UTC [common.deliver] Handle -> DEBU 11b7 Attempting to read seek info message from 172.18.0.5:53832" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11bc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11bd 0xc0001d0c40 gate 1569287123024573800 evaluation starts" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11be 0xc0001d0c40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11bf 0xc0001d0c40 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c0 0xc0001d0c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c1 0xc0001d0c40 principal evaluation fails" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11c2 0xc0001d0c40 gate 1569287123024573800 evaluation fails" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.024 UTC [policies] Evaluate -> DEBU 11c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func1 -> DEBU 11c6 0xc0001d1480 gate 1569287123024856200 evaluation starts" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0001d1480 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c8 0xc0001d1480 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11c9 0xc0001d1480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.024 UTC [cauthdsl] func2 -> DEBU 11ca 0xc0001d1480 principal evaluation fails" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11cb 0xc0001d1480 gate 1569287123024856200 evaluation fails" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cc Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.025 UTC [policies] func1 -> DEBU 11ce Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11cf Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11d3 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11d4 0xc0009461a0 gate 1569287123025334600 evaluation starts" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d5 0xc0009461a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d6 0xc0009461a0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11d7 0xc0009461a0 principal matched by identity 0" +"2019-09-24 01:05:23.025 UTC [msp.identity] Verify -> DEBU 11d8 Verify: digest = 00000000 f4 82 a7 c7 02 19 6d 03 39 db 43 c5 aa 56 4a ed |......m.9.C..VJ.| +00000010 61 85 e1 20 b2 a4 40 77 5d 92 02 03 71 bc bd c1 |a.. ..@w]...q...|" +"2019-09-24 01:05:23.025 UTC [msp.identity] Verify -> DEBU 11d9 Verify: sig = 00000000 30 44 02 20 09 cf fe 87 1c d8 0f 08 aa 52 0e 36 |0D. .........R.6| +00000010 02 2d 2f 54 a6 b4 dd c5 85 4d 9b bb 99 37 2d c1 |.-/T.....M...7-.| +00000020 ec 51 77 60 02 20 0b e0 e8 dc 8b c6 12 21 7d 19 |.Qw`. .......!}.| +00000030 75 c7 e1 11 b6 cf bc 23 bd 32 33 9a 40 60 b0 ed |u......#.23.@`..| +00000040 d0 ed 8d 4c 6b 7f |...Lk.|" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func2 -> DEBU 11da 0xc0009461a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.025 UTC [cauthdsl] func1 -> DEBU 11db 0xc0009461a0 gate 1569287123025334600 evaluation succeeds" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11dc Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11dd == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11de Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11df == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11e0 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.025 UTC [policies] Evaluate -> DEBU 11e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.025 UTC [common.deliver] deliverBlocks -> DEBU 11e2 [channel: businesschannel] Received seekInfo (0xc0008efe40) start: > stop: > from 172.18.0.5:53832" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] Next -> DEBU 11e3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] newBlockfileStream -> DEBU 11e4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e5 Remaining bytes=[37977], Going to peek [8] bytes" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e6 Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11e7 blockbytes [25480] read from file [0]" +"2019-09-24 01:05:23.026 UTC [common.deliver] deliverBlocks -> DEBU 11e8 [channel: businesschannel] Delivering block for (0xc0008efe40) for 172.18.0.5:53832" +"2019-09-24 01:05:23.026 UTC [common.deliver] deliverBlocks -> DEBU 11e9 [channel: businesschannel] Done delivering to 172.18.0.5:53832 for (0xc0008efe40)" +"2019-09-24 01:05:23.026 UTC [common.deliver] Handle -> DEBU 11ea Waiting for new SeekInfo from 172.18.0.5:53832" +"2019-09-24 01:05:23.026 UTC [common.deliver] Handle -> DEBU 11eb Attempting to read seek info message from 172.18.0.5:53832" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] waitForBlock -> DEBU 11ec Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.026 UTC [fsblkstorage] waitForBlock -> DEBU 11ed Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.028 UTC [fsblkstorage] waitForBlock -> DEBU 11ee Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.028 UTC [fsblkstorage] waitForBlock -> DEBU 11ef Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.037 UTC [grpc] infof -> DEBU 11f0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.039 UTC [common.deliver] Handle -> WARN 11f1 Error reading from 172.18.0.5:53832: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.039 UTC [orderer.common.server] func1 -> DEBU 11f2 Closing Deliver stream" +"2019-09-24 01:05:23.039 UTC [comm.grpc.server] 1 -> INFO 11f3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53832 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.9535ms +"2019-09-24 01:05:23.156 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11f4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:23.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f5 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2019-09-24 01:05:23.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 425.3µs " +"2019-09-24 01:05:23.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f7 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2019-09-24 01:05:23.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11f8 Sending msg of 28 bytes to 3 on channel businesschannel took 138.8µs" +"2019-09-24 01:05:23.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 237.6µs " +"2019-09-24 01:05:23.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203.5µs " +"2019-09-24 01:05:23.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:23.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11fc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:23.187 UTC [orderer.common.server] Deliver -> DEBU 11fd Starting new Deliver handler" +"2019-09-24 01:05:23.187 UTC [common.deliver] Handle -> DEBU 11fe Starting new deliver loop for 172.18.0.5:53834" +"2019-09-24 01:05:23.187 UTC [common.deliver] Handle -> DEBU 11ff Attempting to read seek info message from 172.18.0.5:53834" +"2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1200 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1201 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.187 UTC [policies] Evaluate -> DEBU 1202 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.188 UTC [policies] Evaluate -> DEBU 1203 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.188 UTC [policies] Evaluate -> DEBU 1204 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.188 UTC [cauthdsl] func1 -> DEBU 1205 0xc0009672b0 gate 1569287123188550800 evaluation starts" +"2019-09-24 01:05:23.188 UTC [cauthdsl] func2 -> DEBU 1206 0xc0009672b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1207 0xc0009672b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1208 0xc0009672b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.189 UTC [cauthdsl] func2 -> DEBU 1209 0xc0009672b0 principal evaluation fails" +"2019-09-24 01:05:23.190 UTC [cauthdsl] func1 -> DEBU 120a 0xc0009672b0 gate 1569287123188550800 evaluation fails" +"2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.190 UTC [policies] Evaluate -> DEBU 120d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.191 UTC [cauthdsl] func1 -> DEBU 120e 0xc000967ba0 gate 1569287123191168500 evaluation starts" +"2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 120f 0xc000967ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 1210 0xc000967ba0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.191 UTC [cauthdsl] func2 -> DEBU 1211 0xc000967ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.192 UTC [cauthdsl] func2 -> DEBU 1212 0xc000967ba0 principal evaluation fails" +"2019-09-24 01:05:23.192 UTC [cauthdsl] func1 -> DEBU 1213 0xc000967ba0 gate 1569287123191168500 evaluation fails" +"2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1214 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1215 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.193 UTC [policies] func1 -> DEBU 1216 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1217 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1218 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.193 UTC [policies] Evaluate -> DEBU 1219 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.194 UTC [policies] Evaluate -> DEBU 121a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.194 UTC [policies] Evaluate -> DEBU 121b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.194 UTC [cauthdsl] func1 -> DEBU 121c 0xc0003b3f50 gate 1569287123194272400 evaluation starts" +"2019-09-24 01:05:23.194 UTC [cauthdsl] func2 -> DEBU 121d 0xc0003b3f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.194 UTC [cauthdsl] func2 -> DEBU 121e 0xc0003b3f50 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.195 UTC [cauthdsl] func2 -> DEBU 121f 0xc0003b3f50 principal matched by identity 0" +"2019-09-24 01:05:23.195 UTC [msp.identity] Verify -> DEBU 1220 Verify: digest = 00000000 ab f6 6d 11 a8 27 5f 87 f8 61 72 ce 0e 61 90 d1 |..m..'_..ar..a..| +00000010 2d e5 2e ec 3e 0b 30 e4 99 1b e9 f8 b0 f1 c6 a2 |-...>.0.........|" +"2019-09-24 01:05:23.195 UTC [msp.identity] Verify -> DEBU 1221 Verify: sig = 00000000 30 45 02 21 00 bd d2 05 39 bb 04 aa a0 cc 5d bb |0E.!....9.....].| +00000010 67 68 23 f1 6f 18 71 27 d2 de 28 82 21 1d 08 f1 |gh#.o.q'..(.!...| +00000020 0c 1d c5 2b 9a 02 20 2b 3d 14 74 d0 be 1a ee 07 |...+.. +=.t.....| +00000030 f7 14 a8 23 7c 39 23 56 86 4b ea 34 f9 3b 38 6c |...#|9#V.K.4.;8l| +00000040 21 51 d7 f4 a2 35 c5 |!Q...5.|" +"2019-09-24 01:05:23.196 UTC [cauthdsl] func2 -> DEBU 1222 0xc0003b3f50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.196 UTC [cauthdsl] func1 -> DEBU 1223 0xc0003b3f50 gate 1569287123194272400 evaluation succeeds" +"2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1224 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1225 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1226 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1227 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.197 UTC [policies] Evaluate -> DEBU 1228 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.198 UTC [policies] Evaluate -> DEBU 1229 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.198 UTC [common.deliver] deliverBlocks -> DEBU 122a [channel: businesschannel] Received seekInfo (0xc0000891c0) start: > stop: > from 172.18.0.5:53834" +"2019-09-24 01:05:23.198 UTC [fsblkstorage] Next -> DEBU 122b Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.198 UTC [fsblkstorage] newBlockfileStream -> DEBU 122c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122d Remaining bytes=[89262], Going to peek [8] bytes" +"2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122e Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:23.199 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 122f blockbytes [25804] read from file [0]" +"2019-09-24 01:05:23.200 UTC [common.deliver] deliverBlocks -> DEBU 1230 [channel: businesschannel] Delivering block for (0xc0000891c0) for 172.18.0.5:53834" +"2019-09-24 01:05:23.200 UTC [common.deliver] deliverBlocks -> DEBU 1231 [channel: businesschannel] Done delivering to 172.18.0.5:53834 for (0xc0000891c0)" +"2019-09-24 01:05:23.201 UTC [fsblkstorage] waitForBlock -> DEBU 1232 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.202 UTC [fsblkstorage] waitForBlock -> DEBU 1233 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.202 UTC [fsblkstorage] waitForBlock -> DEBU 1234 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 1235 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.202 UTC [common.deliver] Handle -> DEBU 1236 Waiting for new SeekInfo from 172.18.0.5:53834" +"2019-09-24 01:05:23.204 UTC [common.deliver] Handle -> DEBU 1237 Attempting to read seek info message from 172.18.0.5:53834" +"2019-09-24 01:05:23.208 UTC [common.deliver] Handle -> WARN 1238 Error reading from 172.18.0.5:53834: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.209 UTC [orderer.common.server] func1 -> DEBU 1239 Closing Deliver stream" +"2019-09-24 01:05:23.209 UTC [comm.grpc.server] 1 -> INFO 123a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53834 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.4976ms +"2019-09-24 01:05:23.211 UTC [grpc] infof -> DEBU 123b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.361 UTC [orderer.common.server] Deliver -> DEBU 123c Starting new Deliver handler" +"2019-09-24 01:05:23.361 UTC [common.deliver] Handle -> DEBU 123d Starting new deliver loop for 172.18.0.5:53836" +"2019-09-24 01:05:23.362 UTC [common.deliver] Handle -> DEBU 123e Attempting to read seek info message from 172.18.0.5:53836" +"2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 123f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 1240 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.363 UTC [policies] Evaluate -> DEBU 1241 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.365 UTC [policies] Evaluate -> DEBU 1242 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.365 UTC [policies] Evaluate -> DEBU 1243 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.366 UTC [cauthdsl] func1 -> DEBU 1244 0xc00097fbb0 gate 1569287123366372400 evaluation starts" +"2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1245 0xc00097fbb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1246 0xc00097fbb0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.366 UTC [cauthdsl] func2 -> DEBU 1247 0xc00097fbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.367 UTC [cauthdsl] func2 -> DEBU 1248 0xc00097fbb0 principal evaluation fails" +"2019-09-24 01:05:23.368 UTC [cauthdsl] func1 -> DEBU 1249 0xc00097fbb0 gate 1569287123366372400 evaluation fails" +"2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.368 UTC [policies] Evaluate -> DEBU 124c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.368 UTC [cauthdsl] func1 -> DEBU 124d 0xc000d0e3f0 gate 1569287123368854300 evaluation starts" +"2019-09-24 01:05:23.368 UTC [cauthdsl] func2 -> DEBU 124e 0xc000d0e3f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.368 UTC [cauthdsl] func2 -> DEBU 124f 0xc000d0e3f0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.369 UTC [cauthdsl] func2 -> DEBU 1250 0xc000d0e3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.369 UTC [cauthdsl] func2 -> DEBU 1251 0xc000d0e3f0 principal evaluation fails" +"2019-09-24 01:05:23.369 UTC [cauthdsl] func1 -> DEBU 1252 0xc000d0e3f0 gate 1569287123368854300 evaluation fails" +"2019-09-24 01:05:23.369 UTC [policies] Evaluate -> DEBU 1253 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1254 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.370 UTC [policies] func1 -> DEBU 1255 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1256 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1257 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1258 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.370 UTC [policies] Evaluate -> DEBU 1259 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.371 UTC [policies] Evaluate -> DEBU 125a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.371 UTC [cauthdsl] func1 -> DEBU 125b 0xc000d0f0e0 gate 1569287123371529500 evaluation starts" +"2019-09-24 01:05:23.371 UTC [cauthdsl] func2 -> DEBU 125c 0xc000d0f0e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.372 UTC [cauthdsl] func2 -> DEBU 125d 0xc000d0f0e0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.372 UTC [cauthdsl] func2 -> DEBU 125e 0xc000d0f0e0 principal matched by identity 0" +"2019-09-24 01:05:23.372 UTC [msp.identity] Verify -> DEBU 125f Verify: digest = 00000000 30 0c 55 c4 23 3f 94 8e da 0c 61 83 2b 95 a4 52 |0.U.#?....a.+..R| +00000010 26 fb 4f 1b 1b 95 fb b5 f2 3b 64 11 82 96 f6 43 |&.O......;d....C|" +"2019-09-24 01:05:23.373 UTC [msp.identity] Verify -> DEBU 1260 Verify: sig = 00000000 30 44 02 20 24 10 9c 0f 02 33 a8 b5 4b 44 a1 66 |0D. $....3..KD.f| +00000010 bb 1b 05 db c4 f7 95 ab 27 49 1e e2 68 a8 1d d3 |........'I..h...| +00000020 ca 70 ff 7a 02 20 49 0c 5c 7b cc 72 3a 20 d4 21 |.p.z. I.\{.r: .!| +00000030 57 7d 5d d8 4b 0d 49 2d ee f8 1d 49 5f 13 e3 e3 |W}].K.I-...I_...| +00000040 85 1d 72 d6 99 49 |..r..I|" +"2019-09-24 01:05:23.373 UTC [cauthdsl] func2 -> DEBU 1261 0xc000d0f0e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.374 UTC [cauthdsl] func1 -> DEBU 1262 0xc000d0f0e0 gate 1569287123371529500 evaluation succeeds" +"2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1263 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1264 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.375 UTC [policies] Evaluate -> DEBU 1265 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1266 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1267 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.376 UTC [policies] Evaluate -> DEBU 1268 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.376 UTC [common.deliver] deliverBlocks -> DEBU 1269 [channel: businesschannel] Received seekInfo (0xc000089e00) start: > stop: > from 172.18.0.5:53836" +"2019-09-24 01:05:23.376 UTC [fsblkstorage] Next -> DEBU 126a Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.376 UTC [fsblkstorage] newBlockfileStream -> DEBU 126b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +"2019-09-24 01:05:23.376 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126c Remaining bytes=[63455], Going to peek [8] bytes" +"2019-09-24 01:05:23.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126d Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +"2019-09-24 01:05:23.377 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 126e blockbytes [25475] read from file [0]" +"2019-09-24 01:05:23.378 UTC [common.deliver] deliverBlocks -> DEBU 126f [channel: businesschannel] Delivering block for (0xc000089e00) for 172.18.0.5:53836" +"2019-09-24 01:05:23.379 UTC [common.deliver] deliverBlocks -> DEBU 1270 [channel: businesschannel] Done delivering to 172.18.0.5:53836 for (0xc000089e00)" +"2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1271 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1272 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1273 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.379 UTC [fsblkstorage] waitForBlock -> DEBU 1274 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.380 UTC [common.deliver] Handle -> DEBU 1275 Waiting for new SeekInfo from 172.18.0.5:53836" +"2019-09-24 01:05:23.380 UTC [common.deliver] Handle -> DEBU 1276 Attempting to read seek info message from 172.18.0.5:53836" +"2019-09-24 01:05:23.387 UTC [common.deliver] Handle -> WARN 1278 Error reading from 172.18.0.5:53836: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.388 UTC [orderer.common.server] func1 -> DEBU 1279 Closing Deliver stream" +"2019-09-24 01:05:23.388 UTC [comm.grpc.server] 1 -> INFO 127a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.1382ms +"2019-09-24 01:05:23.387 UTC [grpc] infof -> DEBU 1277 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.559 UTC [orderer.common.server] Deliver -> DEBU 127b Starting new Deliver handler" +"2019-09-24 01:05:23.559 UTC [common.deliver] Handle -> DEBU 127c Starting new deliver loop for 172.18.0.5:53838" +"2019-09-24 01:05:23.560 UTC [common.deliver] Handle -> DEBU 127d Attempting to read seek info message from 172.18.0.5:53838" +"2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 127e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 127f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.562 UTC [policies] Evaluate -> DEBU 1280 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.563 UTC [policies] Evaluate -> DEBU 1281 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.563 UTC [policies] Evaluate -> DEBU 1282 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.563 UTC [cauthdsl] func1 -> DEBU 1283 0xc000d714c0 gate 1569287123563597300 evaluation starts" +"2019-09-24 01:05:23.564 UTC [cauthdsl] func2 -> DEBU 1284 0xc000d714c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.564 UTC [cauthdsl] func2 -> DEBU 1285 0xc000d714c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.565 UTC [cauthdsl] func2 -> DEBU 1286 0xc000d714c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.566 UTC [cauthdsl] func2 -> DEBU 1287 0xc000d714c0 principal evaluation fails" +"2019-09-24 01:05:23.566 UTC [cauthdsl] func1 -> DEBU 1288 0xc000d714c0 gate 1569287123563597300 evaluation fails" +"2019-09-24 01:05:23.566 UTC [policies] Evaluate -> DEBU 1289 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.566 UTC [policies] Evaluate -> DEBU 128a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.567 UTC [policies] Evaluate -> DEBU 128b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.567 UTC [cauthdsl] func1 -> DEBU 128c 0xc000c569d0 gate 1569287123567839700 evaluation starts" +"2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128d 0xc000c569d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128e 0xc000c569d0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.568 UTC [cauthdsl] func2 -> DEBU 128f 0xc000c569d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.569 UTC [cauthdsl] func2 -> DEBU 1290 0xc000c569d0 principal evaluation fails" +"2019-09-24 01:05:23.569 UTC [cauthdsl] func1 -> DEBU 1291 0xc000c569d0 gate 1569287123567839700 evaluation fails" +"2019-09-24 01:05:23.569 UTC [policies] Evaluate -> DEBU 1292 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.570 UTC [policies] Evaluate -> DEBU 1293 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.570 UTC [policies] func1 -> DEBU 1294 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1295 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1296 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1297 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.571 UTC [policies] Evaluate -> DEBU 1298 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.573 UTC [policies] Evaluate -> DEBU 1299 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.573 UTC [cauthdsl] func1 -> DEBU 129a 0xc000c57830 gate 1569287123573263800 evaluation starts" +"2019-09-24 01:05:23.573 UTC [cauthdsl] func2 -> DEBU 129b 0xc000c57830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.574 UTC [cauthdsl] func2 -> DEBU 129c 0xc000c57830 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.574 UTC [cauthdsl] func2 -> DEBU 129d 0xc000c57830 principal matched by identity 0" +"2019-09-24 01:05:23.575 UTC [msp.identity] Verify -> DEBU 129e Verify: digest = 00000000 1d 45 42 46 a9 b9 89 43 fe b2 ec d7 b2 56 ba fc |.EBF...C.....V..| +00000010 1a 9a 09 90 0d 1a d5 3a ea f8 a5 7a b7 66 ec 66 |.......:...z.f.f|" +"2019-09-24 01:05:23.575 UTC [msp.identity] Verify -> DEBU 129f Verify: sig = 00000000 30 45 02 21 00 c8 b7 40 d1 a5 9f b5 2d f8 fb f4 |0E.!...@....-...| +00000010 9e 38 5d e6 af 74 5d 99 0b fe d4 46 48 f7 b7 8e |.8]..t]....FH...| +00000020 1a f2 12 3c 87 02 20 6b 6d af 69 9d 78 b5 2f 6b |...<.. km.i.x./k| +00000030 93 16 53 b6 65 de 97 81 2f 10 b3 7f b1 cb d3 8c |..S.e.../.......| +00000040 0b 0d c5 f6 37 70 6b |....7pk|" +"2019-09-24 01:05:23.576 UTC [cauthdsl] func2 -> DEBU 12a0 0xc000c57830 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.577 UTC [cauthdsl] func1 -> DEBU 12a1 0xc000c57830 gate 1569287123573263800 evaluation succeeds" +"2019-09-24 01:05:23.577 UTC [policies] Evaluate -> DEBU 12a2 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a4 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.578 UTC [policies] Evaluate -> DEBU 12a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.579 UTC [policies] Evaluate -> DEBU 12a6 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.579 UTC [policies] Evaluate -> DEBU 12a7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.580 UTC [common.deliver] deliverBlocks -> DEBU 12a8 [channel: businesschannel] Received seekInfo (0xc0008d2b80) start: > stop: > from 172.18.0.5:53838" +"2019-09-24 01:05:23.580 UTC [fsblkstorage] Next -> DEBU 12a9 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.581 UTC [fsblkstorage] newBlockfileStream -> DEBU 12aa newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +"2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ab Remaining bytes=[37977], Going to peek [8] bytes" +"2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ac Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +"2019-09-24 01:05:23.581 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ad blockbytes [25480] read from file [0]" +"2019-09-24 01:05:23.582 UTC [common.deliver] deliverBlocks -> DEBU 12ae [channel: businesschannel] Delivering block for (0xc0008d2b80) for 172.18.0.5:53838" +"2019-09-24 01:05:23.583 UTC [common.deliver] deliverBlocks -> DEBU 12af [channel: businesschannel] Done delivering to 172.18.0.5:53838 for (0xc0008d2b80)" +"2019-09-24 01:05:23.584 UTC [fsblkstorage] waitForBlock -> DEBU 12b0 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.584 UTC [fsblkstorage] waitForBlock -> DEBU 12b1 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.585 UTC [fsblkstorage] waitForBlock -> DEBU 12b2 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.585 UTC [fsblkstorage] waitForBlock -> DEBU 12b3 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.585 UTC [common.deliver] Handle -> DEBU 12b4 Waiting for new SeekInfo from 172.18.0.5:53838" +"2019-09-24 01:05:23.587 UTC [common.deliver] Handle -> DEBU 12b5 Attempting to read seek info message from 172.18.0.5:53838" +"2019-09-24 01:05:23.593 UTC [common.deliver] Handle -> WARN 12b6 Error reading from 172.18.0.5:53838: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.593 UTC [grpc] infof -> DEBU 12b7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.593 UTC [orderer.common.server] func1 -> DEBU 12b8 Closing Deliver stream" +"2019-09-24 01:05:23.595 UTC [comm.grpc.server] 1 -> INFO 12b9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53838 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.1422ms +"2019-09-24 01:05:23.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12ba Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:23.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bb Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-09-24 01:05:23.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.7µs " +"2019-09-24 01:05:23.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12bd Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2019-09-24 01:05:23.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12be Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2019-09-24 01:05:23.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 570.3µs " +"2019-09-24 01:05:23.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12c0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 459.8µs " +"2019-09-24 01:05:23.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c1 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:23.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12c2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:23.785 UTC [orderer.common.server] Deliver -> DEBU 12c3 Starting new Deliver handler" +"2019-09-24 01:05:23.786 UTC [common.deliver] Handle -> DEBU 12c4 Starting new deliver loop for 172.18.0.5:53840" +"2019-09-24 01:05:23.786 UTC [common.deliver] Handle -> DEBU 12c5 Attempting to read seek info message from 172.18.0.5:53840" +"2019-09-24 01:05:23.786 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.787 UTC [policies] Evaluate -> DEBU 12c9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.788 UTC [policies] Evaluate -> DEBU 12ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.788 UTC [cauthdsl] func1 -> DEBU 12cb 0xc00111d2c0 gate 1569287123788635400 evaluation starts" +"2019-09-24 01:05:23.788 UTC [cauthdsl] func2 -> DEBU 12cc 0xc00111d2c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12cd 0xc00111d2c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12ce 0xc00111d2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.789 UTC [cauthdsl] func2 -> DEBU 12cf 0xc00111d2c0 principal evaluation fails" +"2019-09-24 01:05:23.790 UTC [cauthdsl] func1 -> DEBU 12d0 0xc00111d2c0 gate 1569287123788635400 evaluation fails" +"2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.790 UTC [policies] Evaluate -> DEBU 12d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.790 UTC [cauthdsl] func1 -> DEBU 12d4 0xc00111db00 gate 1569287123790871200 evaluation starts" +"2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d5 0xc00111db00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d6 0xc00111db00 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d7 0xc00111db00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.791 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00111db00 principal evaluation fails" +"2019-09-24 01:05:23.791 UTC [cauthdsl] func1 -> DEBU 12d9 0xc00111db00 gate 1569287123790871200 evaluation fails" +"2019-09-24 01:05:23.791 UTC [policies] Evaluate -> DEBU 12da Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.791 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.792 UTC [policies] func1 -> DEBU 12dc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12dd Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12de == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.792 UTC [policies] Evaluate -> DEBU 12e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.793 UTC [policies] Evaluate -> DEBU 12e1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.793 UTC [cauthdsl] func1 -> DEBU 12e2 0xc0011cc910 gate 1569287123793092100 evaluation starts" +"2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e3 0xc0011cc910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0011cc910 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.793 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0011cc910 principal matched by identity 0" +"2019-09-24 01:05:23.793 UTC [msp.identity] Verify -> DEBU 12e6 Verify: digest = 00000000 67 f6 b2 de 24 4d 74 a8 20 d0 b7 03 b5 ed 97 94 |g...$Mt. .......| +00000010 1b 11 92 f4 80 2e 8c 09 98 a9 a5 59 26 c1 93 bc |...........Y&...|" +"2019-09-24 01:05:23.793 UTC [msp.identity] Verify -> DEBU 12e7 Verify: sig = 00000000 30 44 02 20 13 10 ed 64 61 f3 b7 1b 70 89 e1 a0 |0D. ...da...p...| +00000010 7c 71 0c a2 67 bc dc 21 0a dc 06 f8 ea 3c f7 30 ||q..g..!.....<.0| +00000020 5a 00 74 34 02 20 05 aa 7d 6a 27 27 e6 99 97 8a |Z.t4. ..}j''....| +00000030 bf 1c 62 a6 26 58 2b 0c 8c a7 a3 23 78 1d cf 7f |..b.&X+....#x...| +00000040 90 87 3c de 88 81 |..<...|" +"2019-09-24 01:05:23.794 UTC [cauthdsl] func2 -> DEBU 12e8 0xc0011cc910 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.794 UTC [cauthdsl] func1 -> DEBU 12e9 0xc0011cc910 gate 1569287123793092100 evaluation succeeds" +"2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ea Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12eb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ec Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.794 UTC [policies] Evaluate -> DEBU 12ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.795 UTC [policies] Evaluate -> DEBU 12ee Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.795 UTC [policies] Evaluate -> DEBU 12ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.795 UTC [common.deliver] deliverBlocks -> DEBU 12f0 [channel: businesschannel] Received seekInfo (0xc0008d33c0) start: > stop: > from 172.18.0.5:53840" +"2019-09-24 01:05:23.795 UTC [fsblkstorage] Next -> DEBU 12f1 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.796 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76768]" +"2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f3 Remaining bytes=[12494], Going to peek [8] bytes" +"2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f4 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +"2019-09-24 01:05:23.797 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f5 blockbytes [4522] read from file [0]" +"2019-09-24 01:05:23.797 UTC [common.deliver] deliverBlocks -> DEBU 12f6 [channel: businesschannel] Delivering block for (0xc0008d33c0) for 172.18.0.5:53840" +"2019-09-24 01:05:23.798 UTC [common.deliver] deliverBlocks -> DEBU 12f7 [channel: businesschannel] Done delivering to 172.18.0.5:53840 for (0xc0008d33c0)" +"2019-09-24 01:05:23.798 UTC [common.deliver] Handle -> DEBU 12f8 Waiting for new SeekInfo from 172.18.0.5:53840" +"2019-09-24 01:05:23.798 UTC [common.deliver] Handle -> DEBU 12f9 Attempting to read seek info message from 172.18.0.5:53840" +"2019-09-24 01:05:23.798 UTC [fsblkstorage] waitForBlock -> DEBU 12fa Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fb Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fc Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.799 UTC [fsblkstorage] waitForBlock -> DEBU 12fd Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.805 UTC [common.deliver] Handle -> WARN 12fe Error reading from 172.18.0.5:53840: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.805 UTC [orderer.common.server] func1 -> DEBU 12ff Closing Deliver stream" +"2019-09-24 01:05:23.807 UTC [comm.grpc.server] 1 -> INFO 1300 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53840 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.3402ms +"2019-09-24 01:05:23.809 UTC [grpc] infof -> DEBU 1301 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.968 UTC [orderer.common.server] Deliver -> DEBU 1302 Starting new Deliver handler" +"2019-09-24 01:05:23.968 UTC [common.deliver] Handle -> DEBU 1303 Starting new deliver loop for 172.18.0.5:53842" +"2019-09-24 01:05:23.969 UTC [common.deliver] Handle -> DEBU 1304 Attempting to read seek info message from 172.18.0.5:53842" +"2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1305 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1306 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.971 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:23.971 UTC [cauthdsl] func1 -> DEBU 130a 0xc000c7cf70 gate 1569287123971921700 evaluation starts" +"2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130b 0xc000c7cf70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130c 0xc000c7cf70 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130d 0xc000c7cf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:23.972 UTC [cauthdsl] func2 -> DEBU 130e 0xc000c7cf70 principal evaluation fails" +"2019-09-24 01:05:23.972 UTC [cauthdsl] func1 -> DEBU 130f 0xc000c7cf70 gate 1569287123971921700 evaluation fails" +"2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1310 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1311 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:23.972 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:23.973 UTC [cauthdsl] func1 -> DEBU 1313 0xc000c7d7c0 gate 1569287123973093700 evaluation starts" +"2019-09-24 01:05:23.973 UTC [cauthdsl] func2 -> DEBU 1314 0xc000c7d7c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.973 UTC [cauthdsl] func2 -> DEBU 1315 0xc000c7d7c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.974 UTC [cauthdsl] func2 -> DEBU 1316 0xc000c7d7c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:23.974 UTC [cauthdsl] func2 -> DEBU 1317 0xc000c7d7c0 principal evaluation fails" +"2019-09-24 01:05:23.974 UTC [cauthdsl] func1 -> DEBU 1318 0xc000c7d7c0 gate 1569287123973093700 evaluation fails" +"2019-09-24 01:05:23.974 UTC [policies] Evaluate -> DEBU 1319 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.974 UTC [policies] Evaluate -> DEBU 131a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:23.975 UTC [policies] func1 -> DEBU 131b Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131c Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 131f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:23.975 UTC [policies] Evaluate -> DEBU 1320 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:23.975 UTC [cauthdsl] func1 -> DEBU 1321 0xc000b024b0 gate 1569287123975962700 evaluation starts" +"2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1322 0xc000b024b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1323 0xc000b024b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:23.976 UTC [cauthdsl] func2 -> DEBU 1324 0xc000b024b0 principal matched by identity 0" +"2019-09-24 01:05:23.976 UTC [msp.identity] Verify -> DEBU 1325 Verify: digest = 00000000 14 da db b2 43 f2 ae 79 aa 4a a2 e3 8b 40 e8 0d |....C..y.J...@..| +00000010 7b ee e2 1c e3 67 69 92 66 cd 39 9e 91 50 67 92 |{....gi.f.9..Pg.|" +"2019-09-24 01:05:23.976 UTC [msp.identity] Verify -> DEBU 1326 Verify: sig = 00000000 30 45 02 21 00 84 b0 2c e7 c9 ad b6 bb 37 5c ba |0E.!...,.....7\.| +00000010 ff 86 12 50 cf b3 ab 9b 86 71 93 30 20 a0 1d 13 |...P.....q.0 ...| +00000020 ce b8 ef 5f d9 02 20 4c fb 40 fc 9a 74 94 ff 12 |..._.. L.@..t...| +00000030 5c 3a b7 8a 0c 9b 35 d3 79 a3 bb 8c 2b 84 83 c0 |\:....5.y...+...| +00000040 b6 5c 6b cf 6b a5 f7 |.\k.k..|" +"2019-09-24 01:05:23.977 UTC [cauthdsl] func2 -> DEBU 1327 0xc000b024b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:23.977 UTC [cauthdsl] func1 -> DEBU 1328 0xc000b024b0 gate 1569287123975962700 evaluation succeeds" +"2019-09-24 01:05:23.977 UTC [policies] Evaluate -> DEBU 1329 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.977 UTC [policies] Evaluate -> DEBU 132a == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132b Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132d Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:23.978 UTC [policies] Evaluate -> DEBU 132e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 132f [channel: businesschannel] Received seekInfo (0xc0008d38c0) start: > stop: > from 172.18.0.5:53842" +"2019-09-24 01:05:23.978 UTC [fsblkstorage] Next -> DEBU 1330 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:23.978 UTC [fsblkstorage] newBlockfileStream -> DEBU 1331 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81292]" +"2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1332 Remaining bytes=[7970], Going to peek [8] bytes" +"2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1333 Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +"2019-09-24 01:05:23.978 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1334 blockbytes [3982] read from file [0]" +"2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 1335 [channel: businesschannel] Delivering block for (0xc0008d38c0) for 172.18.0.5:53842" +"2019-09-24 01:05:23.978 UTC [common.deliver] deliverBlocks -> DEBU 1336 [channel: businesschannel] Done delivering to 172.18.0.5:53842 for (0xc0008d38c0)" +"2019-09-24 01:05:23.978 UTC [common.deliver] Handle -> DEBU 1337 Waiting for new SeekInfo from 172.18.0.5:53842" +"2019-09-24 01:05:23.979 UTC [common.deliver] Handle -> DEBU 1338 Attempting to read seek info message from 172.18.0.5:53842" +"2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 1339 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133a Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133b Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:23.979 UTC [fsblkstorage] waitForBlock -> DEBU 133c Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:23.985 UTC [grpc] infof -> DEBU 133d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:23.989 UTC [common.deliver] Handle -> WARN 133e Error reading from 172.18.0.5:53842: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:23.989 UTC [orderer.common.server] func1 -> DEBU 133f Closing Deliver stream" +"2019-09-24 01:05:23.990 UTC [comm.grpc.server] 1 -> INFO 1340 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53842 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.1934ms +"2019-09-24 01:05:24.130 UTC [orderer.common.server] Deliver -> DEBU 1341 Starting new Deliver handler" +"2019-09-24 01:05:24.130 UTC [common.deliver] Handle -> DEBU 1342 Starting new deliver loop for 172.18.0.5:53844" +"2019-09-24 01:05:24.130 UTC [common.deliver] Handle -> DEBU 1343 Attempting to read seek info message from 172.18.0.5:53844" +"2019-09-24 01:05:24.131 UTC [policies] Evaluate -> DEBU 1344 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.131 UTC [policies] Evaluate -> DEBU 1345 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.132 UTC [policies] Evaluate -> DEBU 1346 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:24.132 UTC [policies] Evaluate -> DEBU 1347 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.133 UTC [policies] Evaluate -> DEBU 1348 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:24.133 UTC [cauthdsl] func1 -> DEBU 1349 0xc0010a4a10 gate 1569287124133474200 evaluation starts" +"2019-09-24 01:05:24.133 UTC [cauthdsl] func2 -> DEBU 134a 0xc0010a4a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.134 UTC [cauthdsl] func2 -> DEBU 134b 0xc0010a4a10 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.134 UTC [cauthdsl] func2 -> DEBU 134c 0xc0010a4a10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:24.135 UTC [cauthdsl] func2 -> DEBU 134d 0xc0010a4a10 principal evaluation fails" +"2019-09-24 01:05:24.151 UTC [cauthdsl] func1 -> DEBU 134e 0xc0010a4a10 gate 1569287124133474200 evaluation fails" +"2019-09-24 01:05:24.151 UTC [policies] Evaluate -> DEBU 134f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.151 UTC [policies] Evaluate -> DEBU 1350 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1351 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:24.156 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1352 Sending msg of 28 bytes to 3 on channel testchainid took 47µs" +"2019-09-24 01:05:24.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1353 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 329.3µs " +"2019-09-24 01:05:24.152 UTC [policies] Evaluate -> DEBU 1354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:24.160 UTC [cauthdsl] func1 -> DEBU 1355 0xc0010a5250 gate 1569287124160173200 evaluation starts" +"2019-09-24 01:05:24.162 UTC [cauthdsl] func2 -> DEBU 1356 0xc0010a5250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.162 UTC [cauthdsl] func2 -> DEBU 1357 0xc0010a5250 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.163 UTC [cauthdsl] func2 -> DEBU 1358 0xc0010a5250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:24.163 UTC [cauthdsl] func2 -> DEBU 1359 0xc0010a5250 principal evaluation fails" +"2019-09-24 01:05:24.165 UTC [cauthdsl] func1 -> DEBU 135a 0xc0010a5250 gate 1569287124160173200 evaluation fails" +"2019-09-24 01:05:24.166 UTC [policies] Evaluate -> DEBU 135b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.167 UTC [policies] Evaluate -> DEBU 135c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.168 UTC [policies] func1 -> DEBU 135d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:24.168 UTC [policies] Evaluate -> DEBU 135e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:24.168 UTC [policies] Evaluate -> DEBU 135f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1360 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1361 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.170 UTC [policies] Evaluate -> DEBU 1362 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.171 UTC [cauthdsl] func1 -> DEBU 1363 0xc000d92430 gate 1569287124170983900 evaluation starts" +"2019-09-24 01:05:24.171 UTC [cauthdsl] func2 -> DEBU 1364 0xc000d92430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.171 UTC [cauthdsl] func2 -> DEBU 1365 0xc000d92430 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.172 UTC [cauthdsl] func2 -> DEBU 1366 0xc000d92430 principal matched by identity 0" +"2019-09-24 01:05:24.173 UTC [msp.identity] Verify -> DEBU 1367 Verify: digest = 00000000 f3 08 90 53 f3 a9 ec 67 42 21 34 72 d5 b5 2b 74 |...S...gB!4r..+t| +00000010 ca 7d 0b 95 ee 0b f5 07 2e 90 06 a8 d8 92 f7 6a |.}.............j|" +"2019-09-24 01:05:24.173 UTC [msp.identity] Verify -> DEBU 1368 Verify: sig = 00000000 30 45 02 21 00 91 d2 f4 55 96 70 0a 7d fa ec 51 |0E.!....U.p.}..Q| +00000010 18 91 b1 15 3c 66 98 d9 da e4 93 68 07 36 16 ee |......kq....| +00000040 2a 12 0c 95 81 eb a7 |*......|" +"2019-09-24 01:05:24.174 UTC [cauthdsl] func2 -> DEBU 1369 0xc000d92430 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.174 UTC [cauthdsl] func1 -> DEBU 136a 0xc000d92430 gate 1569287124170983900 evaluation succeeds" +"2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.174 UTC [policies] Evaluate -> DEBU 136e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.175 UTC [policies] Evaluate -> DEBU 136f Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.175 UTC [policies] Evaluate -> DEBU 1370 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1371 Sending msg of 28 bytes to 2 on channel businesschannel took 20.3µs" +"2019-09-24 01:05:24.176 UTC [common.deliver] deliverBlocks -> DEBU 1372 [channel: businesschannel] Received seekInfo (0xc00115dd80) start: > stop: > from 172.18.0.5:53844" +"2019-09-24 01:05:24.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1373 Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2019-09-24 01:05:24.176 UTC [fsblkstorage] Next -> DEBU 1374 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2019-09-24 01:05:24.176 UTC [fsblkstorage] newBlockfileStream -> DEBU 1375 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +"2019-09-24 01:05:24.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1376 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +"2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1377 Remaining bytes=[3986], Going to peek [8] bytes" +"2019-09-24 01:05:24.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1378 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +"2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1379 Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:24.176 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 137a blockbytes [3984] read from file [0]" +"2019-09-24 01:05:24.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:24.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 137c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:24.185 UTC [common.deliver] deliverBlocks -> DEBU 137d [channel: businesschannel] Delivering block for (0xc00115dd80) for 172.18.0.5:53844" +"2019-09-24 01:05:24.186 UTC [common.deliver] deliverBlocks -> DEBU 137e [channel: businesschannel] Done delivering to 172.18.0.5:53844 for (0xc00115dd80)" +"2019-09-24 01:05:24.186 UTC [common.deliver] Handle -> DEBU 137f Waiting for new SeekInfo from 172.18.0.5:53844" +"2019-09-24 01:05:24.186 UTC [common.deliver] Handle -> DEBU 1380 Attempting to read seek info message from 172.18.0.5:53844" +"2019-09-24 01:05:24.187 UTC [fsblkstorage] waitForBlock -> DEBU 1381 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:24.187 UTC [fsblkstorage] waitForBlock -> DEBU 1382 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:24.191 UTC [fsblkstorage] waitForBlock -> DEBU 1383 Came out of wait. maxAvailaBlockNumber=[5]" +"2019-09-24 01:05:24.194 UTC [fsblkstorage] waitForBlock -> DEBU 1384 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2019-09-24 01:05:24.199 UTC [common.deliver] Handle -> WARN 1385 Error reading from 172.18.0.5:53844: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:24.199 UTC [orderer.common.server] func1 -> DEBU 1386 Closing Deliver stream" +"2019-09-24 01:05:24.201 UTC [comm.grpc.server] 1 -> INFO 1387 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53844 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=71.5964ms +"2019-09-24 01:05:24.203 UTC [grpc] infof -> DEBU 1388 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:24.467 UTC [orderer.common.server] Deliver -> DEBU 1389 Starting new Deliver handler" +"2019-09-24 01:05:24.467 UTC [common.deliver] Handle -> DEBU 138a Starting new deliver loop for 172.18.0.5:53846" +"2019-09-24 01:05:24.468 UTC [common.deliver] Handle -> DEBU 138b Attempting to read seek info message from 172.18.0.5:53846" +"2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.469 UTC [policies] Evaluate -> DEBU 138e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.470 UTC [policies] Evaluate -> DEBU 138f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.470 UTC [policies] Evaluate -> DEBU 1390 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.470 UTC [msp] DeserializeIdentity -> DEBU 1391 Obtaining identity" +"2019-09-24 01:05:24.470 UTC [msp.identity] newIdentity -> DEBU 1392 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:24.471 UTC [cauthdsl] func1 -> DEBU 1393 0xc001124250 gate 1569287124471723900 evaluation starts" +"2019-09-24 01:05:24.472 UTC [cauthdsl] func2 -> DEBU 1394 0xc001124250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.472 UTC [cauthdsl] func2 -> DEBU 1395 0xc001124250 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.472 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1396 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:05:24.472 UTC [msp] Validate -> DEBU 1397 MSP OrdererMSP validating identity" +"2019-09-24 01:05:24.473 UTC [cauthdsl] func2 -> DEBU 1398 0xc001124250 principal matched by identity 0" +"2019-09-24 01:05:24.473 UTC [msp.identity] Verify -> DEBU 1399 Verify: digest = 00000000 bf 8a 55 a4 cc 72 a8 1d 83 6c e1 a1 ce 81 2c d1 |..U..r...l....,.| +00000010 63 bb 33 cf e9 e3 b1 c4 fc 29 33 03 76 a3 66 e5 |c.3......)3.v.f.|" +"2019-09-24 01:05:24.474 UTC [msp.identity] Verify -> DEBU 139a Verify: sig = 00000000 30 44 02 20 07 43 a8 46 25 51 25 32 d3 7b 4b 9b |0D. .C.F%Q%2.{K.| +00000010 4f 28 52 04 2e b9 1f eb 78 d0 70 66 25 4c 82 0c |O(R.....x.pf%L..| +00000020 3b 4f f4 ac 02 20 08 64 6d c5 10 a9 af c0 5d 75 |;O... .dm.....]u| +00000030 98 f8 f2 54 3f 04 ac 82 8f 27 bf 05 5d b3 23 4f |...T?....'..].#O| +00000040 81 67 e5 a9 99 67 |.g...g|" +"2019-09-24 01:05:24.475 UTC [cauthdsl] func2 -> DEBU 139b 0xc001124250 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.475 UTC [cauthdsl] func1 -> DEBU 139c 0xc001124250 gate 1569287124471723900 evaluation succeeds" +"2019-09-24 01:05:24.475 UTC [policies] Evaluate -> DEBU 139d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.475 UTC [policies] Evaluate -> DEBU 139e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 139f Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 13a0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.476 UTC [policies] Evaluate -> DEBU 13a1 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.477 UTC [policies] Evaluate -> DEBU 13a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.477 UTC [common.deliver] deliverBlocks -> DEBU 13a3 [channel: testchainid] Received seekInfo (0xc000403240) start: > stop: > from 172.18.0.5:53846" +"2019-09-24 01:05:24.478 UTC [fsblkstorage] Next -> DEBU 13a4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:24.478 UTC [fsblkstorage] newBlockfileStream -> DEBU 13a5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:24.478 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a6 Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:24.479 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a7 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:24.479 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a8 blockbytes [27690] read from file [0]" +"2019-09-24 01:05:24.479 UTC [common.deliver] deliverBlocks -> DEBU 13a9 [channel: testchainid] Delivering block for (0xc000403240) for 172.18.0.5:53846" +"2019-09-24 01:05:24.480 UTC [common.deliver] deliverBlocks -> DEBU 13aa [channel: testchainid] Done delivering to 172.18.0.5:53846 for (0xc000403240)" +"2019-09-24 01:05:24.482 UTC [common.deliver] Handle -> DEBU 13ab Waiting for new SeekInfo from 172.18.0.5:53846" +"2019-09-24 01:05:24.483 UTC [common.deliver] Handle -> DEBU 13ac Attempting to read seek info message from 172.18.0.5:53846" +"2019-09-24 01:05:24.487 UTC [common.deliver] Handle -> WARN 13ad Error reading from 172.18.0.5:53846: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:24.488 UTC [orderer.common.server] func1 -> DEBU 13ae Closing Deliver stream" +"2019-09-24 01:05:24.488 UTC [comm.grpc.server] 1 -> INFO 13b0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53846 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.7987ms +"2019-09-24 01:05:24.488 UTC [grpc] infof -> DEBU 13af transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:24.623 UTC [orderer.common.server] Deliver -> DEBU 13b1 Starting new Deliver handler" +"2019-09-24 01:05:24.623 UTC [common.deliver] Handle -> DEBU 13b2 Starting new deliver loop for 172.18.0.5:53848" +"2019-09-24 01:05:24.624 UTC [common.deliver] Handle -> DEBU 13b3 Attempting to read seek info message from 172.18.0.5:53848" +"2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.625 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.626 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.626 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.626 UTC [cauthdsl] func1 -> DEBU 13b9 0xc0012d8ec0 gate 1569287124626780800 evaluation starts" +"2019-09-24 01:05:24.626 UTC [cauthdsl] func2 -> DEBU 13ba 0xc0012d8ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.627 UTC [cauthdsl] func2 -> DEBU 13bb 0xc0012d8ec0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.628 UTC [cauthdsl] func2 -> DEBU 13bc 0xc0012d8ec0 principal matched by identity 0" +"2019-09-24 01:05:24.628 UTC [msp.identity] Verify -> DEBU 13bd Verify: digest = 00000000 90 ce 60 ca 2e d4 1e 66 4c 23 50 47 8a a9 b8 30 |..`....fL#PG...0| +00000010 a2 31 84 55 16 7a 21 21 ce 95 8a 31 18 dc 66 e8 |.1.U.z!!...1..f.|" +"2019-09-24 01:05:24.628 UTC [msp.identity] Verify -> DEBU 13be Verify: sig = 00000000 30 44 02 20 63 77 77 7e 3c dc c7 72 bf 8d 34 09 |0D. cww~<..r..4.| +00000010 79 76 26 7b c4 40 df 3c b2 cb be 69 1c 93 49 ef |yv&{.@.<...i..I.| +00000020 ed 47 9f aa 02 20 33 f5 22 c6 70 67 09 33 94 09 |.G... 3.".pg.3..| +00000030 26 2b 47 fe f4 de 66 94 8b e8 b3 18 90 49 cf 4f |&+G...f......I.O| +00000040 8e e6 40 f8 51 2a |..@.Q*|" +"2019-09-24 01:05:24.628 UTC [cauthdsl] func2 -> DEBU 13bf 0xc0012d8ec0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.629 UTC [cauthdsl] func1 -> DEBU 13c0 0xc0012d8ec0 gate 1569287124626780800 evaluation succeeds" +"2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c1 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c2 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.629 UTC [policies] Evaluate -> DEBU 13c3 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c5 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.630 UTC [policies] Evaluate -> DEBU 13c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.630 UTC [common.deliver] deliverBlocks -> DEBU 13c7 [channel: testchainid] Received seekInfo (0xc000362680) start: > stop: > from 172.18.0.5:53848" +"2019-09-24 01:05:24.631 UTC [fsblkstorage] Next -> DEBU 13c8 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:24.632 UTC [fsblkstorage] newBlockfileStream -> DEBU 13c9 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:24.632 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13ca Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:24.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cb Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:24.633 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cc blockbytes [27690] read from file [0]" +"2019-09-24 01:05:24.634 UTC [common.deliver] deliverBlocks -> DEBU 13cd [channel: testchainid] Delivering block for (0xc000362680) for 172.18.0.5:53848" +"2019-09-24 01:05:24.635 UTC [common.deliver] deliverBlocks -> DEBU 13ce [channel: testchainid] Done delivering to 172.18.0.5:53848 for (0xc000362680)" +"2019-09-24 01:05:24.636 UTC [common.deliver] Handle -> DEBU 13cf Waiting for new SeekInfo from 172.18.0.5:53848" +"2019-09-24 01:05:24.636 UTC [common.deliver] Handle -> DEBU 13d0 Attempting to read seek info message from 172.18.0.5:53848" +"2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.639 UTC [policies] Evaluate -> DEBU 13d4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.640 UTC [policies] Evaluate -> DEBU 13d5 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.640 UTC [cauthdsl] func1 -> DEBU 13d6 0xc000b3eef0 gate 1569287124640685200 evaluation starts" +"2019-09-24 01:05:24.640 UTC [cauthdsl] func2 -> DEBU 13d7 0xc000b3eef0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.642 UTC [cauthdsl] func2 -> DEBU 13d8 0xc000b3eef0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.642 UTC [cauthdsl] func2 -> DEBU 13d9 0xc000b3eef0 principal matched by identity 0" +"2019-09-24 01:05:24.643 UTC [msp.identity] Verify -> DEBU 13da Verify: digest = 00000000 3e 1d b3 4d 35 05 f3 28 11 0c 88 ea 0d c6 aa 0d |>..M5..(........| +00000010 3b 08 b8 6e aa 78 8d 93 a9 a3 df 29 3f 1c 78 00 |;..n.x.....)?.x.|" +"2019-09-24 01:05:24.643 UTC [msp.identity] Verify -> DEBU 13db Verify: sig = 00000000 30 45 02 21 00 de fc 2c e1 86 c6 bf c3 2a e6 83 |0E.!...,.....*..| +00000010 d1 ef 72 30 ec c7 aa 1b 64 96 76 1a 15 bd bf 69 |..r0....d.v....i| +00000020 5b 74 72 9e 79 02 20 59 dc a7 2f 77 d9 c6 d2 69 |[tr.y. Y../w...i| +00000030 2c 38 84 28 f8 fc 9c b1 4d 7a 71 37 89 23 a3 b9 |,8.(....Mzq7.#..| +00000040 39 61 30 b0 0d 5e f0 |9a0..^.|" +"2019-09-24 01:05:24.643 UTC [cauthdsl] func2 -> DEBU 13dc 0xc000b3eef0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.644 UTC [cauthdsl] func1 -> DEBU 13dd 0xc000b3eef0 gate 1569287124640685200 evaluation succeeds" +"2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13de Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13df == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13e0 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.644 UTC [policies] Evaluate -> DEBU 13e1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.645 UTC [policies] Evaluate -> DEBU 13e2 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.645 UTC [policies] Evaluate -> DEBU 13e3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.645 UTC [common.deliver] deliverBlocks -> DEBU 13e4 [channel: testchainid] Received seekInfo (0xc000363480) start: > stop: > from 172.18.0.5:53848" +"2019-09-24 01:05:24.646 UTC [fsblkstorage] Next -> DEBU 13e5 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:24.646 UTC [fsblkstorage] newBlockfileStream -> DEBU 13e6 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e7 Remaining bytes=[47980], Going to peek [8] bytes" +"2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e8 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:24.647 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13e9 blockbytes [20284] read from file [0]" +"2019-09-24 01:05:24.647 UTC [common.deliver] deliverBlocks -> DEBU 13ea [channel: testchainid] Delivering block for (0xc000363480) for 172.18.0.5:53848" +"2019-09-24 01:05:24.649 UTC [common.deliver] deliverBlocks -> DEBU 13eb [channel: testchainid] Done delivering to 172.18.0.5:53848 for (0xc000363480)" +"2019-09-24 01:05:24.649 UTC [common.deliver] Handle -> DEBU 13ec Waiting for new SeekInfo from 172.18.0.5:53848" +"2019-09-24 01:05:24.650 UTC [common.deliver] Handle -> DEBU 13ed Attempting to read seek info message from 172.18.0.5:53848" +"2019-09-24 01:05:24.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13ee Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:24.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ef Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2019-09-24 01:05:24.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 159.3µs " +"2019-09-24 01:05:24.656 UTC [common.deliver] Handle -> WARN 13f1 Error reading from 172.18.0.5:53848: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:24.659 UTC [orderer.common.server] func1 -> DEBU 13f3 Closing Deliver stream" +"2019-09-24 01:05:24.659 UTC [comm.grpc.server] 1 -> INFO 13f4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53848 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=37.1986ms +"2019-09-24 01:05:24.658 UTC [grpc] infof -> DEBU 13f2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:24.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f5 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2019-09-24 01:05:24.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13f6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-09-24 01:05:24.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 181.7µs " +"2019-09-24 01:05:24.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 290.8µs " +"2019-09-24 01:05:24.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13f9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:24.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13fa Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:24.775 UTC [orderer.common.server] Deliver -> DEBU 13fb Starting new Deliver handler" +"2019-09-24 01:05:24.776 UTC [common.deliver] Handle -> DEBU 13fc Starting new deliver loop for 172.18.0.5:53850" +"2019-09-24 01:05:24.776 UTC [common.deliver] Handle -> DEBU 13fd Attempting to read seek info message from 172.18.0.5:53850" +"2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 13fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 13ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 1400 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.777 UTC [policies] Evaluate -> DEBU 1401 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.778 UTC [policies] Evaluate -> DEBU 1402 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.778 UTC [cauthdsl] func1 -> DEBU 1403 0xc001307120 gate 1569287124778314800 evaluation starts" +"2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1404 0xc001307120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1405 0xc001307120 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.778 UTC [cauthdsl] func2 -> DEBU 1406 0xc001307120 principal matched by identity 0" +"2019-09-24 01:05:24.779 UTC [msp.identity] Verify -> DEBU 1407 Verify: digest = 00000000 67 c0 ac 2c 7b 49 37 85 69 9b 2a 19 d7 76 0f 07 |g..,{I7.i.*..v..| +00000010 0f 9a 92 f0 2f 9a 72 dc 1a 96 ae 0f 62 a8 c9 64 |..../.r.....b..d|" +"2019-09-24 01:05:24.779 UTC [msp.identity] Verify -> DEBU 1408 Verify: sig = 00000000 30 44 02 20 6c 46 c8 68 6a 1d d5 1d e8 8f 99 31 |0D. lF.hj......1| +00000010 64 24 d9 44 85 74 e4 63 29 61 24 cf ce b2 31 f3 |d$.D.t.c)a$...1.| +00000020 b9 3e 9e fd 02 20 39 ad 38 59 cc 80 57 9c 2c 39 |.>... 9.8Y..W.,9| +00000030 c0 5f 3e 70 81 94 d6 01 f5 9e 20 2a 02 46 c5 f2 |._>p...... *.F..| +00000040 5e 75 87 b0 ff 23 |^u...#|" +"2019-09-24 01:05:24.780 UTC [cauthdsl] func2 -> DEBU 1409 0xc001307120 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.780 UTC [cauthdsl] func1 -> DEBU 140a 0xc001307120 gate 1569287124778314800 evaluation succeeds" +"2019-09-24 01:05:24.780 UTC [policies] Evaluate -> DEBU 140b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.780 UTC [policies] Evaluate -> DEBU 140c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 140f Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.781 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.781 UTC [common.deliver] deliverBlocks -> DEBU 1411 [channel: testchainid] Received seekInfo (0xc000b72100) start: > stop: > from 172.18.0.5:53850" +"2019-09-24 01:05:24.782 UTC [fsblkstorage] Next -> DEBU 1412 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:24.782 UTC [fsblkstorage] newBlockfileStream -> DEBU 1413 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:24.782 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1414 Remaining bytes=[47980], Going to peek [8] bytes" +"2019-09-24 01:05:24.783 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1415 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:24.783 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1416 blockbytes [20284] read from file [0]" +"2019-09-24 01:05:24.783 UTC [common.deliver] deliverBlocks -> DEBU 1417 [channel: testchainid] Delivering block for (0xc000b72100) for 172.18.0.5:53850" +"2019-09-24 01:05:24.784 UTC [common.deliver] deliverBlocks -> DEBU 1418 [channel: testchainid] Done delivering to 172.18.0.5:53850 for (0xc000b72100)" +"2019-09-24 01:05:24.785 UTC [common.deliver] Handle -> DEBU 1419 Waiting for new SeekInfo from 172.18.0.5:53850" +"2019-09-24 01:05:24.785 UTC [common.deliver] Handle -> DEBU 141a Attempting to read seek info message from 172.18.0.5:53850" +"2019-09-24 01:05:24.793 UTC [common.deliver] Handle -> WARN 141b Error reading from 172.18.0.5:53850: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:24.793 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +"2019-09-24 01:05:24.793 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53850 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.864ms +"2019-09-24 01:05:24.794 UTC [grpc] infof -> DEBU 141e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:24.960 UTC [orderer.common.server] Deliver -> DEBU 141f Starting new Deliver handler" +"2019-09-24 01:05:24.960 UTC [common.deliver] Handle -> DEBU 1420 Starting new deliver loop for 172.18.0.5:53852" +"2019-09-24 01:05:24.961 UTC [common.deliver] Handle -> DEBU 1421 Attempting to read seek info message from 172.18.0.5:53852" +"2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1422 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1423 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1424 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:24.962 UTC [policies] Evaluate -> DEBU 1425 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.963 UTC [policies] Evaluate -> DEBU 1426 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:24.963 UTC [cauthdsl] func1 -> DEBU 1427 0xc0010f93a0 gate 1569287124963348800 evaluation starts" +"2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 1428 0xc0010f93a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 1429 0xc0010f93a0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:24.963 UTC [cauthdsl] func2 -> DEBU 142a 0xc0010f93a0 principal matched by identity 0" +"2019-09-24 01:05:24.964 UTC [msp.identity] Verify -> DEBU 142b Verify: digest = 00000000 a7 41 08 7e 65 7b 20 fe 82 7b 3b 69 80 62 51 f7 |.A.~e{ ..{;i.bQ.| +00000010 7e 88 a7 5b 04 43 87 0f aa c7 36 33 f2 c9 a9 f8 |~..[.C....63....|" +"2019-09-24 01:05:24.965 UTC [msp.identity] Verify -> DEBU 142c Verify: sig = 00000000 30 44 02 20 1a 7e dc 05 e6 28 2f e9 40 e7 f1 46 |0D. .~...(/.@..F| +00000010 3f 88 dc 61 dd 69 6c 1f 30 88 92 46 00 52 bf d6 |?..a.il.0..F.R..| +00000020 46 1e 98 8a 02 20 05 c8 40 a1 de 78 e7 7d b3 10 |F.... ..@..x.}..| +00000030 4e 05 fc 7c 5d 0b 22 56 e3 b2 99 ec 5b 60 27 48 |N..|]."V....[`'H| +00000040 d6 b4 ae 22 24 52 |..."$R|" +"2019-09-24 01:05:24.965 UTC [cauthdsl] func2 -> DEBU 142d 0xc0010f93a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.966 UTC [cauthdsl] func1 -> DEBU 142e 0xc0010f93a0 gate 1569287124963348800 evaluation succeeds" +"2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 142f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1430 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1431 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.966 UTC [policies] Evaluate -> DEBU 1432 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:24.967 UTC [policies] Evaluate -> DEBU 1433 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:24.967 UTC [policies] Evaluate -> DEBU 1434 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:24.967 UTC [common.deliver] deliverBlocks -> DEBU 1435 [channel: testchainid] Received seekInfo (0xc000b72880) start: > stop: > from 172.18.0.5:53852" +"2019-09-24 01:05:24.967 UTC [fsblkstorage] Next -> DEBU 1436 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 1437 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1438 Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1439 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143a blockbytes [27690] read from file [0]" +"2019-09-24 01:05:24.969 UTC [common.deliver] deliverBlocks -> DEBU 143b [channel: testchainid] Delivering block for (0xc000b72880) for 172.18.0.5:53852" +"2019-09-24 01:05:24.969 UTC [common.deliver] deliverBlocks -> DEBU 143c [channel: testchainid] Done delivering to 172.18.0.5:53852 for (0xc000b72880)" +"2019-09-24 01:05:24.970 UTC [common.deliver] Handle -> DEBU 143d Waiting for new SeekInfo from 172.18.0.5:53852" +"2019-09-24 01:05:24.970 UTC [common.deliver] Handle -> DEBU 143e Attempting to read seek info message from 172.18.0.5:53852" +"2019-09-24 01:05:24.977 UTC [common.deliver] Handle -> WARN 143f Error reading from 172.18.0.5:53852: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:24.977 UTC [orderer.common.server] func1 -> DEBU 1440 Closing Deliver stream" +"2019-09-24 01:05:24.977 UTC [comm.grpc.server] 1 -> INFO 1441 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53852 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.4715ms +"2019-09-24 01:05:24.980 UTC [grpc] infof -> DEBU 1442 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:25.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1443 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:25.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1444 Sending msg of 28 bytes to 3 on channel testchainid took 28µs" +"2019-09-24 01:05:25.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1445 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 131.7µs " +"2019-09-24 01:05:25.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1446 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2019-09-24 01:05:25.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1447 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2019-09-24 01:05:25.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1448 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113.4µs " +"2019-09-24 01:05:25.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1449 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.7µs " +"2019-09-24 01:05:25.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:25.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:25.656 UTC [orderer.common.cluster.step] handleMessage -> DEBU 144c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:25.657 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144d Sending msg of 28 bytes to 3 on channel testchainid took 14.1µs" +"2019-09-24 01:05:25.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.4µs " +"2019-09-24 01:05:25.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 144f Sending msg of 28 bytes to 2 on channel businesschannel took 26.2µs" +"2019-09-24 01:05:25.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1450 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 92µs " +"2019-09-24 01:05:25.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1451 Sending msg of 28 bytes to 3 on channel businesschannel took 25.8µs" +"2019-09-24 01:05:25.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1452 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.0839ms " +"2019-09-24 01:05:25.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1453 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:25.687 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1454 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:26.123 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1455 No inactive chains to try to replicate" +"2019-09-24 01:05:26.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1456 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:26.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1457 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2019-09-24 01:05:26.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1458 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +"2019-09-24 01:05:26.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1459 Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2019-09-24 01:05:26.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 145a Sending msg of 28 bytes to 3 on channel businesschannel took 96.8µs" +"2019-09-24 01:05:26.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151.7µs " +"2019-09-24 01:05:26.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 145c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 471.5µs " +"2019-09-24 01:05:26.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:26.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:26.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 145f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:26.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1460 Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2019-09-24 01:05:26.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1461 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.1µs " +"2019-09-24 01:05:26.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1462 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.3µs " +"2019-09-24 01:05:26.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1463 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:26.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1464 Sending msg of 28 bytes to 2 on channel businesschannel took 689.2µs" +"2019-09-24 01:05:26.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1465 Sending msg of 28 bytes to 3 on channel businesschannel took 24.3µs" +"2019-09-24 01:05:26.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1466 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.7µs " +"2019-09-24 01:05:26.683 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1467 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:27.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1468 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:27.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1469 Sending msg of 28 bytes to 3 on channel testchainid took 16.1µs" +"2019-09-24 01:05:27.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.7µs " +"2019-09-24 01:05:27.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 173.9µs " +"2019-09-24 01:05:27.183 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:27.184 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146d Sending msg of 28 bytes to 2 on channel businesschannel took 2.6923ms" +"2019-09-24 01:05:27.184 UTC [orderer.common.cluster.step] sendMessage -> DEBU 146e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.2µs " +"2019-09-24 01:05:27.186 UTC [orderer.common.cluster.step] handleMessage -> DEBU 146f Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:27.184 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1470 Sending msg of 28 bytes to 3 on channel businesschannel took 31.7µs" +"2019-09-24 01:05:27.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1471 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:27.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1472 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2019-09-24 01:05:27.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2019-09-24 01:05:27.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1474 Sending msg of 28 bytes to 2 on channel businesschannel took 811.3µs" +"2019-09-24 01:05:27.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1475 Sending msg of 28 bytes to 3 on channel businesschannel took 38.8µs" +"2019-09-24 01:05:27.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1476 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.5µs " +"2019-09-24 01:05:27.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1477 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3234ms " +"2019-09-24 01:05:27.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1478 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:27.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1479 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:28.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:28.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147b Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2019-09-24 01:05:28.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.7µs " +"2019-09-24 01:05:28.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147d Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2019-09-24 01:05:28.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147e Sending msg of 28 bytes to 3 on channel businesschannel took 130.8µs" +"2019-09-24 01:05:28.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.1µs " +"2019-09-24 01:05:28.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.4µs " +"2019-09-24 01:05:28.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1481 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:28.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1482 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:28.656 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1483 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:28.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1484 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2019-09-24 01:05:28.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1485 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77µs " +"2019-09-24 01:05:28.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1486 Sending msg of 28 bytes to 2 on channel businesschannel took 83.1µs" +"2019-09-24 01:05:28.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1487 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +"2019-09-24 01:05:28.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1488 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.3µs " +"2019-09-24 01:05:28.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.2µs " +"2019-09-24 01:05:28.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:28.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:29.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:29.160 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148d Sending msg of 28 bytes to 3 on channel testchainid took 17.3µs" +"2019-09-24 01:05:29.160 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2019-09-24 01:05:29.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148f Sending msg of 28 bytes to 2 on channel businesschannel took 52.6µs" +"2019-09-24 01:05:29.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1490 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2019-09-24 01:05:29.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1491 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.2µs " +"2019-09-24 01:05:29.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 35.3µs " +"2019-09-24 01:05:29.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1493 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:29.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1494 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:29.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1495 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:29.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1496 Sending msg of 28 bytes to 3 on channel testchainid took 21µs" +"2019-09-24 01:05:29.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1497 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.8µs " +"2019-09-24 01:05:29.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1498 Sending msg of 28 bytes to 2 on channel businesschannel took 51.7µs" +"2019-09-24 01:05:29.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1499 Sending msg of 28 bytes to 3 on channel businesschannel took 13µs" +"2019-09-24 01:05:29.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.2µs " +"2019-09-24 01:05:29.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:29.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5316ms " +"2019-09-24 01:05:29.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:30.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 149e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:30.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149f Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-09-24 01:05:30.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 273.6µs " +"2019-09-24 01:05:30.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a1 Sending msg of 28 bytes to 2 on channel businesschannel took 31.9µs" +"2019-09-24 01:05:30.178 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a3 Sending msg of 28 bytes to 3 on channel businesschannel took 110.2µs" +"2019-09-24 01:05:30.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211µs " +"2019-09-24 01:05:30.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.5µs " +"2019-09-24 01:05:30.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:30.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:30.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:30.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a8 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2019-09-24 01:05:30.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.8µs " +"2019-09-24 01:05:30.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14aa Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 01:05:30.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ab Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2019-09-24 01:05:30.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.8µs " +"2019-09-24 01:05:30.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45µs " +"2019-09-24 01:05:30.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ae Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:30.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14af Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:31.156 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:31.158 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.4µs " +"2019-09-24 01:05:31.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b1 Sending msg of 28 bytes to 3 on channel testchainid took 124.7µs" +"2019-09-24 01:05:31.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b3 Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2019-09-24 01:05:31.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b4 Sending msg of 28 bytes to 3 on channel businesschannel took 32.6µs" +"2019-09-24 01:05:31.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.7µs " +"2019-09-24 01:05:31.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 90.6µs " +"2019-09-24 01:05:31.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:31.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b8 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:31.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b9 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:31.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ba Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2019-09-24 01:05:31.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 248.9µs " +"2019-09-24 01:05:31.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bc Sending msg of 28 bytes to 2 on channel businesschannel took 21.8µs" +"2019-09-24 01:05:31.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14bd Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2019-09-24 01:05:31.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.8µs " +"2019-09-24 01:05:31.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 49.6µs " +"2019-09-24 01:05:31.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c0 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:31.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c1 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:32.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c2 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:32.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c3 Sending msg of 28 bytes to 3 on channel testchainid took 16.6µs" +"2019-09-24 01:05:32.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.3µs " +"2019-09-24 01:05:32.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c5 Sending msg of 28 bytes to 3 on channel businesschannel took 18.9µs" +"2019-09-24 01:05:32.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c6 Sending msg of 28 bytes to 2 on channel businesschannel took 12.4µs" +"2019-09-24 01:05:32.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 156.7µs " +"2019-09-24 01:05:32.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.4µs " +"2019-09-24 01:05:32.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c9 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:32.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ca Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:32.652 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cb Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:32.652 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cc Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2019-09-24 01:05:32.652 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +"2019-09-24 01:05:32.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ce Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2019-09-24 01:05:32.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cf Sending msg of 28 bytes to 3 on channel businesschannel took 25.5µs" +"2019-09-24 01:05:32.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +"2019-09-24 01:05:32.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.7µs " +"2019-09-24 01:05:32.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d2 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:32.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d3 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:33.158 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:33.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.9µs " +"2019-09-24 01:05:33.159 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d6 Sending msg of 28 bytes to 3 on channel testchainid took 131.2µs" +"2019-09-24 01:05:33.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d7 Sending msg of 28 bytes to 2 on channel businesschannel took 27.3µs" +"2019-09-24 01:05:33.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d8 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +"2019-09-24 01:05:33.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 216.9µs " +"2019-09-24 01:05:33.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.6µs " +"2019-09-24 01:05:33.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14db Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:33.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dc Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:33.661 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14dd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:33.663 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14de Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2019-09-24 01:05:33.673 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14df Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.0074ms " +"2019-09-24 01:05:33.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e0 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2019-09-24 01:05:33.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e1 Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 01:05:33.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.3µs " +"2019-09-24 01:05:33.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +"2019-09-24 01:05:33.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:33.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:33.912 UTC [orderer.common.server] Deliver -> DEBU 14e6 Starting new Deliver handler" +"2019-09-24 01:05:33.913 UTC [common.deliver] Handle -> DEBU 14e7 Starting new deliver loop for 172.18.0.5:53854" +"2019-09-24 01:05:33.913 UTC [common.deliver] Handle -> DEBU 14e8 Attempting to read seek info message from 172.18.0.5:53854" +"2019-09-24 01:05:33.934 UTC [orderer.common.server] Broadcast -> DEBU 14e9 Starting new Broadcast handler" +"2019-09-24 01:05:33.934 UTC [orderer.common.broadcast] Handle -> DEBU 14ea Starting new broadcast loop for 172.18.0.5:53856" +"2019-09-24 01:05:33.936 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 14eb [channel: businesschannel] Broadcast is processing config update message from 172.18.0.5:53856" +"2019-09-24 01:05:33.939 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 14ec Processing config update message for channel businesschannel" +"2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ed == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ee This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.941 UTC [policies] Evaluate -> DEBU 14ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:33.942 UTC [policies] Evaluate -> DEBU 14f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.943 UTC [policies] Evaluate -> DEBU 14f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:33.943 UTC [cauthdsl] func1 -> DEBU 14f2 0xc000de6d40 gate 1569287133943695700 evaluation starts" +"2019-09-24 01:05:33.944 UTC [cauthdsl] func2 -> DEBU 14f3 0xc000de6d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.945 UTC [cauthdsl] func2 -> DEBU 14f4 0xc000de6d40 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:33.945 UTC [cauthdsl] func2 -> DEBU 14f5 0xc000de6d40 principal matched by identity 0" +"2019-09-24 01:05:33.946 UTC [msp.identity] Verify -> DEBU 14f6 Verify: digest = 00000000 49 b6 9f ef 30 f2 3a 76 13 a8 b7 19 b8 2e f8 ed |I...0.:v........| +00000010 cb 90 0b 66 ce 8d d3 28 b4 40 5c 57 de 98 26 ec |...f...(.@\W..&.|" +"2019-09-24 01:05:33.950 UTC [msp.identity] Verify -> DEBU 14f7 Verify: sig = 00000000 30 45 02 21 00 b7 68 f2 8d 10 b4 d6 12 c0 ef 61 |0E.!..h........a| +00000010 93 d8 5d 40 ea f1 8d 2c de d7 03 7f b3 5f b5 c7 |..]@...,....._..| +00000020 b5 17 31 19 32 02 20 2b 5a 34 e4 4a 33 5a a4 f2 |..1.2. +Z4.J3Z..| +00000030 9a d9 d3 5d b9 01 e0 45 16 60 f0 57 45 ec 4c ff |...]...E.`.WE.L.| +00000040 bc 77 24 c4 7f 82 c1 |.w$....|" +"2019-09-24 01:05:33.951 UTC [cauthdsl] func2 -> DEBU 14f8 0xc000de6d40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.951 UTC [cauthdsl] func1 -> DEBU 14f9 0xc000de6d40 gate 1569287133943695700 evaluation succeeds" +"2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fa Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:33.952 UTC [policies] Evaluate -> DEBU 14fc Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14fe Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:05:33.953 UTC [policies] Evaluate -> DEBU 14ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1500 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1501 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:33.954 UTC [common.configtx] addToMap -> DEBU 1502 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1503 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1504 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:33.955 UTC [common.configtx] addToMap -> DEBU 1505 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1506 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1507 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:33.956 UTC [common.configtx] addToMap -> DEBU 1508 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:33.957 UTC [common.configtx] addToMap -> DEBU 1509 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:33.957 UTC [common.configtx] addToMap -> DEBU 150a Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150b Adding to config map: [Group] /Channel" +"2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150c Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:33.958 UTC [common.configtx] addToMap -> DEBU 150d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:33.959 UTC [common.configtx] addToMap -> DEBU 150e Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:33.959 UTC [common.configtx] addToMap -> DEBU 150f Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:33.960 UTC [common.configtx] addToMap -> DEBU 1510 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:33.960 UTC [common.configtx] addToMap -> DEBU 1511 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1512 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1513 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:33.961 UTC [common.configtx] addToMap -> DEBU 1514 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:33.962 UTC [common.configtx] addToMap -> DEBU 1515 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:33.962 UTC [common.configtx] addToMap -> DEBU 1516 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1517 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1518 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:33.963 UTC [common.configtx] addToMap -> DEBU 1519 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:33.964 UTC [common.configtx] addToMap -> DEBU 151a Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:33.964 UTC [common.configtx] addToMap -> DEBU 151b Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151c Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151d Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:33.965 UTC [common.configtx] verifyDeltaSet -> DEBU 151e Processing change to key: [Group] /Channel/Application" +"2019-09-24 01:05:33.966 UTC [common.configtx] policyForItem -> DEBU 151f Getting policy for item Application with mod_policy Admins" +"2019-09-24 01:05:33.966 UTC [policies] Manager -> DEBU 1520 Manager Channel looking up path []" +"2019-09-24 01:05:33.966 UTC [policies] Manager -> DEBU 1521 Manager Channel has managers Application" +"2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1522 Manager Channel has managers Orderer" +"2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1523 Manager Channel looking up path [Application]" +"2019-09-24 01:05:33.967 UTC [policies] Manager -> DEBU 1524 Manager Channel has managers Orderer" +"2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1525 Manager Channel has managers Application" +"2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1526 Manager Channel/Application looking up path []" +"2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1527 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:33.968 UTC [policies] Manager -> DEBU 1528 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:33.969 UTC [policies] Evaluate -> DEBU 1529 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 01:05:33.969 UTC [policies] Evaluate -> DEBU 152a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.970 UTC [policies] Evaluate -> DEBU 152b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:05:33.970 UTC [cauthdsl] deduplicate -> WARN 152c De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:33.970 UTC [cauthdsl] func1 -> DEBU 152d 0xc001053b00 gate 1569287133970817200 evaluation starts" +"2019-09-24 01:05:33.971 UTC [cauthdsl] func2 -> DEBU 152e 0xc001053b00 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:33.971 UTC [cauthdsl] func2 -> DEBU 152f 0xc001053b00 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:33.972 UTC [cauthdsl] func2 -> DEBU 1530 0xc001053b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 01:05:33.972 UTC [cauthdsl] func2 -> DEBU 1531 0xc001053b00 processing identity 1 with bytes of fd4750" +"2019-09-24 01:05:33.972 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1532 Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-09-24 01:05:33.972 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1533 Checking if identity carries the admin ou for Org2MSP" +"2019-09-24 01:05:33.972 UTC [msp] Validate -> DEBU 1534 MSP Org2MSP validating identity" +"2019-09-24 01:05:33.973 UTC [msp] getCertificationChain -> DEBU 1535 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:33.974 UTC [msp] hasOURole -> DEBU 1536 MSP Org2MSP checking if the identity is a client" +"2019-09-24 01:05:33.974 UTC [msp] getCertificationChain -> DEBU 1537 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:33.974 UTC [cauthdsl] func2 -> DEBU 1538 0xc001053b00 principal matched by identity 1" +"2019-09-24 01:05:33.974 UTC [msp.identity] Verify -> DEBU 1539 Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 153a Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +00000040 c9 eb 2b ab e2 96 |..+...|" +"2019-09-24 01:05:33.975 UTC [cauthdsl] func2 -> DEBU 153b 0xc001053b00 principal evaluation succeeds for identity 1" +"2019-09-24 01:05:33.975 UTC [cauthdsl] func1 -> DEBU 153c 0xc001053b00 gate 1569287133970817200 evaluation succeeds" +"2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153d Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:33.976 UTC [policies] Evaluate -> DEBU 153f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:05:33.976 UTC [cauthdsl] deduplicate -> WARN 1540 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:33.976 UTC [cauthdsl] func1 -> DEBU 1541 0xc00108a840 gate 1569287133976803400 evaluation starts" +"2019-09-24 01:05:33.976 UTC [cauthdsl] func2 -> DEBU 1542 0xc00108a840 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:33.976 UTC [cauthdsl] func2 -> DEBU 1543 0xc00108a840 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:33.976 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1544 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:05:33.976 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1545 Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:05:33.976 UTC [msp] Validate -> DEBU 1546 MSP Org1MSP validating identity" +"2019-09-24 01:05:33.977 UTC [msp] getCertificationChain -> DEBU 1547 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:33.977 UTC [msp] hasOURole -> DEBU 1548 MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:05:33.977 UTC [msp] getCertificationChain -> DEBU 1549 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:33.977 UTC [cauthdsl] func2 -> DEBU 154a 0xc00108a840 principal matched by identity 0" +"2019-09-24 01:05:33.977 UTC [msp.identity] Verify -> DEBU 154b Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +"2019-09-24 01:05:33.977 UTC [msp.identity] Verify -> DEBU 154c Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +00000040 31 77 20 8d 0c 60 |1w ..`|" +"2019-09-24 01:05:33.977 UTC [cauthdsl] func2 -> DEBU 154d 0xc00108a840 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.977 UTC [cauthdsl] func1 -> DEBU 154e 0xc00108a840 gate 1569287133976803400 evaluation succeeds" +"2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 154f Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1550 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1551 Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 01:05:33.977 UTC [policies] Evaluate -> DEBU 1552 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1553 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1554 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1555 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:33.977 UTC [common.configtx] verifyDeltaSet -> DEBU 1556 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1557 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1558 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.977 UTC [common.configtx] recurseConfigMap -> DEBU 1559 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 155f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1560 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1561 Setting policy for key LifecycleEndorsement to " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1562 Setting policy for key Readers to " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1563 Setting policy for key Writers to " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1564 Setting policy for key Admins to " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1565 Setting policy for key Endorsement to " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1566 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1567 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1568 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 1569 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 156a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.978 UTC [common.configtx] recurseConfigMap -> DEBU 156b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.980 UTC [common.configtx] recurseConfigMap -> DEBU 156c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.980 UTC [common.configtx] recurseConfigMap -> DEBU 156d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.981 UTC [common.configtx] recurseConfigMap -> DEBU 156e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.981 UTC [common.configtx] recurseConfigMap -> DEBU 156f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:33.981 UTC [common.channelconfig] NewStandardValues -> DEBU 1570 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1571 Processing field: HashingAlgorithm" +"2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1572 Processing field: BlockDataHashingStructure" +"2019-09-24 01:05:33.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1573 Processing field: OrdererAddresses" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1574 Processing field: Consortium" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1575 Processing field: Capabilities" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 1576 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1577 Processing field: ACLs" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1578 Processing field: Capabilities" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 1579 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157a Processing field: AnchorPeers" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] NewStandardValues -> DEBU 157b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 157c Processing field: MSP" +"2019-09-24 01:05:33.983 UTC [common.channelconfig] Validate -> DEBU 157d Anchor peers for org Org3MSP are " +"2019-09-24 01:05:33.983 UTC [common.channelconfig] validateMSP -> DEBU 157e Setting up MSP for org Org3MSP" +"2019-09-24 01:05:33.983 UTC [msp] newBccspMsp -> DEBU 157f Creating BCCSP-based MSP instance" +"2019-09-24 01:05:33.983 UTC [msp] New -> DEBU 1580 Creating Cache-MSP instance" +"2019-09-24 01:05:33.983 UTC [msp] Setup -> DEBU 1581 Setting up MSP instance Org3MSP" +"2019-09-24 01:05:33.984 UTC [msp.identity] newIdentity -> DEBU 1582 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 1583 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1584 Processing field: AnchorPeers" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 1585 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1586 Processing field: MSP" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] Validate -> DEBU 1587 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:05:33.984 UTC [common.channelconfig] validateMSP -> DEBU 1588 Setting up MSP for org Org1MSP" +"2019-09-24 01:05:33.984 UTC [msp] newBccspMsp -> DEBU 1589 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:33.984 UTC [msp] New -> DEBU 158a Creating Cache-MSP instance" +"2019-09-24 01:05:33.984 UTC [msp] Setup -> DEBU 158b Setting up MSP instance Org1MSP" +"2019-09-24 01:05:33.984 UTC [msp.identity] newIdentity -> DEBU 158c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] NewStandardValues -> DEBU 158d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:33.984 UTC [common.channelconfig] initializeProtosStruct -> DEBU 158e Processing field: AnchorPeers" +"2019-09-24 01:05:33.985 UTC [common.channelconfig] NewStandardValues -> DEBU 158f Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:33.985 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1590 Processing field: MSP" +"2019-09-24 01:05:33.985 UTC [common.channelconfig] Validate -> DEBU 1591 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:05:33.988 UTC [common.channelconfig] validateMSP -> DEBU 1592 Setting up MSP for org Org2MSP" +"2019-09-24 01:05:33.988 UTC [msp] newBccspMsp -> DEBU 1593 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:33.988 UTC [msp] New -> DEBU 1594 Creating Cache-MSP instance" +"2019-09-24 01:05:33.988 UTC [msp] Setup -> DEBU 1595 Setting up MSP instance Org2MSP" +"2019-09-24 01:05:33.988 UTC [msp.identity] newIdentity -> DEBU 1596 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] NewStandardValues -> DEBU 1597 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1598 Processing field: ConsensusType" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1599 Processing field: BatchSize" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159a Processing field: BatchTimeout" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159b Processing field: KafkaBrokers" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159c Processing field: ChannelRestrictions" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159d Processing field: Capabilities" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] NewStandardValues -> DEBU 159e Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:05:33.989 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159f Processing field: Endpoints" +"2019-09-24 01:05:33.991 UTC [common.channelconfig] NewStandardValues -> DEBU 15a0 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:33.991 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a1 Processing field: MSP" +"2019-09-24 01:05:33.992 UTC [common.channelconfig] validateMSP -> DEBU 15a2 Setting up MSP for org OrdererOrg" +"2019-09-24 01:05:33.992 UTC [msp] newBccspMsp -> DEBU 15a3 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:33.992 UTC [msp] New -> DEBU 15a4 Creating Cache-MSP instance" +"2019-09-24 01:05:33.992 UTC [msp] Setup -> DEBU 15a5 Setting up MSP instance OrdererMSP" +"2019-09-24 01:05:33.993 UTC [msp.identity] newIdentity -> DEBU 15a6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:05:33.994 UTC [msp.identity] newIdentity -> DEBU 15a7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:33.995 UTC [msp] Validate -> DEBU 15a8 MSP OrdererMSP validating identity" +"2019-09-24 01:05:33.995 UTC [msp] Setup -> DEBU 15a9 Setting up the MSP manager (4 msps)" +"2019-09-24 01:05:33.996 UTC [msp] Setup -> DEBU 15aa MSP manager setup complete, setup 4 msps" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ab Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ac Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ad Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15ae Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15af Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 01:05:33.996 UTC [policies] NewManagerImpl -> DEBU 15b0 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b1 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b2 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b3 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:05:33.997 UTC [policies] NewManagerImpl -> DEBU 15b4 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:05:33.997 UTC [policies] GetPolicy -> DEBU 15b5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:33.998 UTC [policies] GetPolicy -> DEBU 15b6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b7 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b8 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15b9 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:05:33.998 UTC [policies] NewManagerImpl -> DEBU 15ba Proposed new policy Admins for Channel/Application" +"2019-09-24 01:05:33.998 UTC [policies] GetPolicy -> DEBU 15bb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:33.999 UTC [policies] GetPolicy -> DEBU 15bc Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15bd Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15be Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15bf Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15c0 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:33.999 UTC [policies] NewManagerImpl -> DEBU 15c1 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c2 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c3 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c4 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:05:34.000 UTC [policies] NewManagerImpl -> DEBU 15c5 Proposed new policy Readers for Channel" +"2019-09-24 01:05:34.001 UTC [policies] NewManagerImpl -> DEBU 15c6 Proposed new policy Writers for Channel" +"2019-09-24 01:05:34.001 UTC [policies] NewManagerImpl -> DEBU 15c7 Proposed new policy Admins for Channel" +"2019-09-24 01:05:34.001 UTC [common.configtx] addToMap -> DEBU 15c8 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.001 UTC [common.configtx] addToMap -> DEBU 15c9 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15ca Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cb Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cc Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:05:34.002 UTC [common.configtx] addToMap -> DEBU 15cd Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15ce Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d0 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.003 UTC [common.configtx] addToMap -> DEBU 15d4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d6 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15d9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15da Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.004 UTC [common.configtx] addToMap -> DEBU 15db Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15dc Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15dd Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15de Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15df Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e0 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e1 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e3 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:05:34.005 UTC [common.configtx] addToMap -> DEBU 15e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:05:34.006 UTC [common.configtx] addToMap -> DEBU 15ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15eb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ed Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:05:34.007 UTC [common.configtx] addToMap -> DEBU 15ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15ef Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f1 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f2 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:05:34.008 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:05:34.009 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:05:34.010 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:05:34.010 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:05:34.010 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fa As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:05:34.010 UTC [common.channelconfig] LogSanityChecks -> DEBU 15fb As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:05:34.010 UTC [policies] Manager -> DEBU 15fc Manager Channel looking up path [Application]" +"2019-09-24 01:05:34.011 UTC [policies] Manager -> DEBU 15fd Manager Channel has managers Application" +"2019-09-24 01:05:34.011 UTC [policies] Manager -> DEBU 15fe Manager Channel has managers Orderer" +"2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 15ff Manager Channel/Application looking up path []" +"2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 1600 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:34.012 UTC [policies] Manager -> DEBU 1601 Manager Channel/Application has managers Org3MSP" +"2019-09-24 01:05:34.013 UTC [policies] Manager -> DEBU 1602 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1603 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1604 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:05:34.013 UTC [common.channelconfig] LogSanityChecks -> DEBU 1605 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:05:34.013 UTC [policies] Manager -> DEBU 1606 Manager Channel looking up path [Orderer]" +"2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1607 Manager Channel has managers Application" +"2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1608 Manager Channel has managers Orderer" +"2019-09-24 01:05:34.014 UTC [policies] Manager -> DEBU 1609 Manager Channel/Orderer looking up path []" +"2019-09-24 01:05:34.015 UTC [policies] Manager -> DEBU 160a Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160c As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160d As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:05:34.015 UTC [common.channelconfig] LogSanityChecks -> DEBU 160e As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:05:34.016 UTC [common.capabilities] Supported -> DEBU 160f Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:05:34.016 UTC [common.capabilities] Supported -> DEBU 1610 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:05:34.016 UTC [msp] GetDefaultSigningIdentity -> DEBU 1611 Obtaining default signing identity" +"2019-09-24 01:05:34.017 UTC [msp] GetDefaultSigningIdentity -> DEBU 1612 Obtaining default signing identity" +"2019-09-24 01:05:34.017 UTC [msp.identity] Sign -> DEBU 1613 Sign: plaintext: 0AD2060A1B08011A0608DED7A5EC0522...451660F05745EC4CFFBC7724C47F82C1 " +"2019-09-24 01:05:34.017 UTC [msp.identity] Sign -> DEBU 1614 Sign: digest: E83B6CB0CB64331C602EDC169A72C77EB57C913FF29C89149EAF224BD7B41D39 " +"2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1615 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1616 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1617 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1618 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.018 UTC [policies] Evaluate -> DEBU 1619 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:34.018 UTC [msp] DeserializeIdentity -> DEBU 161a Obtaining identity" +"2019-09-24 01:05:34.019 UTC [msp.identity] newIdentity -> DEBU 161b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.019 UTC [cauthdsl] func1 -> DEBU 161c 0xc0001d1240 gate 1569287134019658800 evaluation starts" +"2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161d 0xc0001d1240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161e 0xc0001d1240 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.019 UTC [cauthdsl] func2 -> DEBU 161f 0xc0001d1240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:34.020 UTC [cauthdsl] func2 -> DEBU 1620 0xc0001d1240 principal evaluation fails" +"2019-09-24 01:05:34.020 UTC [cauthdsl] func1 -> DEBU 1621 0xc0001d1240 gate 1569287134019658800 evaluation fails" +"2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1622 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1623 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.020 UTC [policies] Evaluate -> DEBU 1624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:05:34.020 UTC [cauthdsl] func1 -> DEBU 1625 0xc00044a3b0 gate 1569287134020644100 evaluation starts" +"2019-09-24 01:05:34.020 UTC [cauthdsl] func2 -> DEBU 1626 0xc00044a3b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1627 0xc00044a3b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1628 0xc00044a3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:34.021 UTC [cauthdsl] func2 -> DEBU 1629 0xc00044a3b0 principal evaluation fails" +"2019-09-24 01:05:34.021 UTC [cauthdsl] func1 -> DEBU 162a 0xc00044a3b0 gate 1569287134020644100 evaluation fails" +"2019-09-24 01:05:34.021 UTC [policies] Evaluate -> DEBU 162b Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.021 UTC [policies] Evaluate -> DEBU 162c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.021 UTC [policies] func1 -> DEBU 162d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Writers Org2MSP/Writers ]" +"2019-09-24 01:05:34.022 UTC [policies] Evaluate -> DEBU 162e Signature set did not satisfy policy /Channel/Application/Writers" +"2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 162f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1630 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1631 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.023 UTC [policies] Evaluate -> DEBU 1632 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:05:34.024 UTC [cauthdsl] func1 -> DEBU 1633 0xc00044b0c0 gate 1569287134023946200 evaluation starts" +"2019-09-24 01:05:34.024 UTC [cauthdsl] func2 -> DEBU 1634 0xc00044b0c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.024 UTC [cauthdsl] func2 -> DEBU 1635 0xc00044b0c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.024 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1636 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:05:34.024 UTC [msp] Validate -> DEBU 1637 MSP OrdererMSP validating identity" +"2019-09-24 01:05:34.025 UTC [cauthdsl] func2 -> DEBU 1638 0xc00044b0c0 principal matched by identity 0" +"2019-09-24 01:05:34.025 UTC [msp.identity] Verify -> DEBU 1639 Verify: digest = 00000000 e8 3b 6c b0 cb 64 33 1c 60 2e dc 16 9a 72 c7 7e |.;l..d3.`....r.~| +00000010 b5 7c 91 3f f2 9c 89 14 9e af 22 4b d7 b4 1d 39 |.|.?......"K...9|" +"2019-09-24 01:05:34.025 UTC [msp.identity] Verify -> DEBU 163a Verify: sig = 00000000 30 45 02 21 00 c2 c4 e5 1d c9 50 29 43 06 ff 62 |0E.!......P)C..b| +00000010 a2 4d 31 63 8f d4 19 45 73 28 e7 aa 84 be 07 cb |.M1c...Es(......| +00000020 7a 8b 70 c7 0d 02 20 43 38 d8 58 1a 1f 12 97 1d |z.p... C8.X.....| +00000030 b9 9a 26 76 46 99 eb a4 61 0a f0 b7 be bc b1 cb |..&vF...a.......| +00000040 18 c1 b7 68 5e f4 30 |...h^.0|" +"2019-09-24 01:05:34.026 UTC [cauthdsl] func2 -> DEBU 163b 0xc00044b0c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.026 UTC [cauthdsl] func1 -> DEBU 163c 0xc00044b0c0 gate 1569287134023946200 evaluation succeeds" +"2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 163f Signature set satisfies policy /Channel/Orderer/Writers" +"2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 1640 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2019-09-24 01:05:34.026 UTC [policies] Evaluate -> DEBU 1641 Signature set satisfies policy /Channel/Writers" +"2019-09-24 01:05:34.027 UTC [policies] Evaluate -> DEBU 1642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2019-09-24 01:05:34.027 UTC [orderer.common.msgprocessor] Apply -> DEBU 1643 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2019-09-24 01:05:34.027 UTC [common.channelconfig] NewStandardValues -> DEBU 1644 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1645 Processing field: HashingAlgorithm" +"2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1646 Processing field: BlockDataHashingStructure" +"2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1647 Processing field: OrdererAddresses" +"2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1648 Processing field: Consortium" +"2019-09-24 01:05:34.027 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1649 Processing field: Capabilities" +"2019-09-24 01:05:34.028 UTC [common.channelconfig] NewStandardValues -> DEBU 164a Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164b Processing field: ConsensusType" +"2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164c Processing field: BatchSize" +"2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164d Processing field: BatchTimeout" +"2019-09-24 01:05:34.028 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164e Processing field: KafkaBrokers" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 164f Processing field: ChannelRestrictions" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1650 Processing field: Capabilities" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] NewStandardValues -> DEBU 1651 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1652 Processing field: Endpoints" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] NewStandardValues -> DEBU 1653 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.029 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1654 Processing field: MSP" +"2019-09-24 01:05:34.030 UTC [common.channelconfig] validateMSP -> DEBU 1655 Setting up MSP for org OrdererOrg" +"2019-09-24 01:05:34.030 UTC [msp] newBccspMsp -> DEBU 1656 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.030 UTC [msp] New -> DEBU 1657 Creating Cache-MSP instance" +"2019-09-24 01:05:34.030 UTC [msp] Setup -> DEBU 1658 Setting up MSP instance OrdererMSP" +"2019-09-24 01:05:34.031 UTC [msp.identity] newIdentity -> DEBU 1659 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.032 UTC [msp.identity] newIdentity -> DEBU 165a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.033 UTC [msp] Validate -> DEBU 165b MSP OrdererMSP validating identity" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 165c Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165d Processing field: ACLs" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165e Processing field: Capabilities" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 165f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1660 Processing field: AnchorPeers" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] NewStandardValues -> DEBU 1661 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1662 Processing field: MSP" +"2019-09-24 01:05:34.035 UTC [common.channelconfig] Validate -> DEBU 1663 Anchor peers for org Org3MSP are " +"2019-09-24 01:05:34.035 UTC [common.channelconfig] validateMSP -> DEBU 1664 Setting up MSP for org Org3MSP" +"2019-09-24 01:05:34.035 UTC [msp] newBccspMsp -> DEBU 1665 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.035 UTC [msp] New -> DEBU 1666 Creating Cache-MSP instance" +"2019-09-24 01:05:34.035 UTC [msp] Setup -> DEBU 1667 Setting up MSP instance Org3MSP" +"2019-09-24 01:05:34.036 UTC [msp.identity] newIdentity -> DEBU 1668 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.036 UTC [common.channelconfig] NewStandardValues -> DEBU 1669 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166a Processing field: AnchorPeers" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 166b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 166c Processing field: MSP" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] Validate -> DEBU 166d Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:05:34.037 UTC [common.channelconfig] validateMSP -> DEBU 166e Setting up MSP for org Org1MSP" +"2019-09-24 01:05:34.037 UTC [msp] newBccspMsp -> DEBU 166f Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.037 UTC [msp] New -> DEBU 1670 Creating Cache-MSP instance" +"2019-09-24 01:05:34.037 UTC [msp] Setup -> DEBU 1671 Setting up MSP instance Org1MSP" +"2019-09-24 01:05:34.037 UTC [msp.identity] newIdentity -> DEBU 1672 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 1673 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1674 Processing field: AnchorPeers" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] NewStandardValues -> DEBU 1675 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1676 Processing field: MSP" +"2019-09-24 01:05:34.037 UTC [common.channelconfig] Validate -> DEBU 1677 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:05:34.037 UTC [common.channelconfig] validateMSP -> DEBU 1678 Setting up MSP for org Org2MSP" +"2019-09-24 01:05:34.037 UTC [msp] newBccspMsp -> DEBU 1679 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.037 UTC [msp] New -> DEBU 167a Creating Cache-MSP instance" +"2019-09-24 01:05:34.037 UTC [msp] Setup -> DEBU 167b Setting up MSP instance Org2MSP" +"2019-09-24 01:05:34.038 UTC [msp.identity] newIdentity -> DEBU 167c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.038 UTC [msp] Setup -> DEBU 167d Setting up the MSP manager (4 msps)" +"2019-09-24 01:05:34.038 UTC [msp] Setup -> DEBU 167e MSP manager setup complete, setup 4 msps" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 167f Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1680 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1681 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1682 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1683 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1684 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1685 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1686 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1687 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1688 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1689 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168a Proposed new policy Writers for Channel/Application" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168b Proposed new policy Admins for Channel/Application" +"2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168c Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168d Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 168e Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 168f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.038 UTC [policies] GetPolicy -> DEBU 1690 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1691 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1692 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1693 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1694 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1695 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:05:34.038 UTC [policies] NewManagerImpl -> DEBU 1696 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:05:34.039 UTC [policies] NewManagerImpl -> DEBU 1697 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 1698 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 1699 Proposed new policy Readers for Channel" +"2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 169a Proposed new policy Writers for Channel" +"2019-09-24 01:05:34.041 UTC [policies] NewManagerImpl -> DEBU 169b Proposed new policy Admins for Channel" +"2019-09-24 01:05:34.041 UTC [common.configtx] addToMap -> DEBU 169c Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169d Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169e Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 169f Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.050 UTC [common.configtx] addToMap -> DEBU 16a2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a5 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a6 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:05:34.051 UTC [common.configtx] addToMap -> DEBU 16a7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16a8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16a9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16aa Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ab Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:05:34.052 UTC [common.configtx] addToMap -> DEBU 16ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.053 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.054 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.054 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b3 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b4 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b5 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b6 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.055 UTC [common.configtx] addToMap -> DEBU 16b7 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16b8 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16b9 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16ba Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16bb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:05:34.056 UTC [common.configtx] addToMap -> DEBU 16bc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16bd Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16be Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16bf Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c0 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c1 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:05:34.057 UTC [common.configtx] addToMap -> DEBU 16c2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c3 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c4 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:05:34.058 UTC [common.configtx] addToMap -> DEBU 16c5 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c6 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:05:34.059 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:05:34.060 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:05:34.061 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16ce [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.5:53856" +"2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] propose -> INFO 16cf Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 16d0 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2019-09-24 01:05:34.062 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16d1 Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2019-09-24 01:05:34.069 UTC [common.deliver] Handle -> WARN 16d2 Error reading from 172.18.0.5:53854: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.073 UTC [orderer.common.server] func1 -> DEBU 16d3 Closing Deliver stream" +"2019-09-24 01:05:34.074 UTC [comm.grpc.server] 1 -> INFO 16d4 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53854 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=162.7584ms +"2019-09-24 01:05:34.075 UTC [grpc] infof -> DEBU 16d5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.075 UTC [grpc] warningf -> DEBU 16d6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53856: read: connection reset by peer" +"2019-09-24 01:05:34.075 UTC [orderer.common.broadcast] Handle -> WARN 16d7 Error reading from 172.18.0.5:53856: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.075 UTC [orderer.common.server] func1 -> DEBU 16d8 Closing Broadcast stream" +"2019-09-24 01:05:34.075 UTC [comm.grpc.server] 1 -> INFO 16d9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.5:53856 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=141.5818ms +"2019-09-24 01:05:34.075 UTC [grpc] infof -> DEBU 16da transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.116 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16db Sending msg of 37611 bytes to 2 on channel businesschannel took 20.5µs" +"2019-09-24 01:05:34.116 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16dc Sending msg of 37611 bytes to 3 on channel businesschannel took 12µs" +"2019-09-24 01:05:34.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16dd Send of ConsensusRequest for channel businesschannel with payload of size 37611 to orderer2.example.com(orderer2.example.com:7050) took 88.2µs " +"2019-09-24 01:05:34.116 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16de Send of ConsensusRequest for channel businesschannel with payload of size 37611 to orderer1.example.com(orderer1.example.com:7050) took 55.8µs " +"2019-09-24 01:05:34.122 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16df Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e0 Sending msg of 28 bytes to 2 on channel businesschannel took 19.9µs" +"2019-09-24 01:05:34.123 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e1 Sending msg of 28 bytes to 3 on channel businesschannel took 140.5µs" +"2019-09-24 01:05:34.124 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 198.5µs " +"2019-09-24 01:05:34.124 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16e3 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2019-09-24 01:05:34.125 UTC [common.configtx] addToMap -> DEBU 16e4 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.125 UTC [common.configtx] addToMap -> DEBU 16e5 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e8 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.126 UTC [common.configtx] addToMap -> DEBU 16e9 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ea Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16eb Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ec Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ed Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.127 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.128 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.129 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.130 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.131 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1701 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1702 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.131 UTC [common.configtx] verifyDeltaSet -> DEBU 1703 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.132 UTC [common.configtx] verifyDeltaSet -> DEBU 1704 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.132 UTC [common.configtx] verifyDeltaSet -> DEBU 1705 Processing change to key: [Group] /Channel/Application" +"2019-09-24 01:05:34.132 UTC [common.configtx] policyForItem -> DEBU 1706 Getting policy for item Application with mod_policy Admins" +"2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1707 Manager Channel looking up path []" +"2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1708 Manager Channel has managers Application" +"2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 1709 Manager Channel has managers Orderer" +"2019-09-24 01:05:34.133 UTC [policies] Manager -> DEBU 170a Manager Channel looking up path [Application]" +"2019-09-24 01:05:34.134 UTC [policies] Manager -> DEBU 170b Manager Channel has managers Application" +"2019-09-24 01:05:34.134 UTC [policies] Manager -> DEBU 170c Manager Channel has managers Orderer" +"2019-09-24 01:05:34.135 UTC [policies] Manager -> DEBU 170d Manager Channel/Application looking up path []" +"2019-09-24 01:05:34.135 UTC [policies] Manager -> DEBU 170e Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:34.136 UTC [policies] Manager -> DEBU 170f Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1710 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1711 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.137 UTC [policies] Evaluate -> DEBU 1712 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:05:34.137 UTC [cauthdsl] deduplicate -> WARN 1713 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:34.138 UTC [cauthdsl] func1 -> DEBU 1714 0xc000291d70 gate 1569287134138151300 evaluation starts" +"2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1715 0xc000291d70 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1716 0xc000291d70 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.138 UTC [cauthdsl] func2 -> DEBU 1717 0xc000291d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 01:05:34.139 UTC [cauthdsl] func2 -> DEBU 1718 0xc000291d70 processing identity 1 with bytes of fd4750" +"2019-09-24 01:05:34.139 UTC [cauthdsl] func2 -> DEBU 1719 0xc000291d70 principal matched by identity 1" +"2019-09-24 01:05:34.139 UTC [msp.identity] Verify -> DEBU 171a Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 171b Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +00000040 c9 eb 2b ab e2 96 |..+...|" +"2019-09-24 01:05:34.140 UTC [cauthdsl] func2 -> DEBU 171c 0xc000291d70 principal evaluation succeeds for identity 1" +"2019-09-24 01:05:34.140 UTC [cauthdsl] func1 -> DEBU 171d 0xc000291d70 gate 1569287134138151300 evaluation succeeds" +"2019-09-24 01:05:34.140 UTC [policies] Evaluate -> DEBU 171e Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.141 UTC [policies] Evaluate -> DEBU 171f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.141 UTC [policies] Evaluate -> DEBU 1720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:05:34.141 UTC [cauthdsl] deduplicate -> WARN 1721 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 1722 0xc000b7c4b0 gate 1569287134143627600 evaluation starts" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 1723 0xc000b7c4b0 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 1724 0xc000b7c4b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.144 UTC [cauthdsl] func2 -> DEBU 1725 0xc000b7c4b0 principal matched by identity 0" +"2019-09-24 01:05:34.145 UTC [msp.identity] Verify -> DEBU 1726 Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +"2019-09-24 01:05:34.146 UTC [msp.identity] Verify -> DEBU 1727 Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +00000040 31 77 20 8d 0c 60 |1w ..`|" +"2019-09-24 01:05:34.146 UTC [cauthdsl] func2 -> DEBU 1728 0xc000b7c4b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.146 UTC [cauthdsl] func1 -> DEBU 1729 0xc000b7c4b0 gate 1569287134143627600 evaluation succeeds" +"2019-09-24 01:05:34.146 UTC [policies] Evaluate -> DEBU 172a Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.146 UTC [policies] Evaluate -> DEBU 172b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.147 UTC [policies] Evaluate -> DEBU 172c Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 01:05:34.148 UTC [policies] Evaluate -> DEBU 172d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 01:05:34.148 UTC [common.configtx] verifyDeltaSet -> DEBU 172e Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.148 UTC [common.configtx] verifyDeltaSet -> DEBU 172f Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.149 UTC [common.configtx] recurseConfigMap -> DEBU 1730 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1731 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1732 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1733 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.150 UTC [common.configtx] recurseConfigMap -> DEBU 1734 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1735 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1736 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1737 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.151 UTC [common.configtx] recurseConfigMap -> DEBU 1738 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 1739 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173a Setting policy for key Admins to " +"2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173b Setting policy for key Endorsement to " +"2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173c Setting policy for key LifecycleEndorsement to " +"2019-09-24 01:05:34.152 UTC [common.configtx] recurseConfigMap -> DEBU 173d Setting policy for key Readers to " +"2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 173e Setting policy for key Writers to " +"2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 173f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1740 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1741 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.153 UTC [common.configtx] recurseConfigMap -> DEBU 1742 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1743 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1744 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1745 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1746 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1747 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.154 UTC [common.configtx] recurseConfigMap -> DEBU 1748 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.155 UTC [common.channelconfig] NewStandardValues -> DEBU 1749 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174a Processing field: HashingAlgorithm" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174b Processing field: BlockDataHashingStructure" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174c Processing field: OrdererAddresses" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174d Processing field: Consortium" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 174e Processing field: Capabilities" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] NewStandardValues -> DEBU 174f Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1750 Processing field: ConsensusType" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1751 Processing field: BatchSize" +"2019-09-24 01:05:34.155 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1752 Processing field: BatchTimeout" +"2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1753 Processing field: KafkaBrokers" +"2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1754 Processing field: ChannelRestrictions" +"2019-09-24 01:05:34.156 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: Capabilities" +"2019-09-24 01:05:34.158 UTC [common.channelconfig] NewStandardValues -> DEBU 1756 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:05:34.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: Endpoints" +"2019-09-24 01:05:34.158 UTC [common.channelconfig] NewStandardValues -> DEBU 1758 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.158 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1759 Processing field: MSP" +"2019-09-24 01:05:34.158 UTC [common.channelconfig] validateMSP -> DEBU 175a Setting up MSP for org OrdererOrg" +"2019-09-24 01:05:34.158 UTC [msp] newBccspMsp -> DEBU 175b Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.158 UTC [msp] New -> DEBU 175c Creating Cache-MSP instance" +"2019-09-24 01:05:34.158 UTC [msp] Setup -> DEBU 175d Setting up MSP instance OrdererMSP" +"2019-09-24 01:05:34.159 UTC [msp.identity] newIdentity -> DEBU 175e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.159 UTC [msp.identity] newIdentity -> DEBU 175f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.159 UTC [msp] Validate -> DEBU 1760 MSP OrdererMSP validating identity" +"2019-09-24 01:05:34.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1761 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:05:34.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: ACLs" +"2019-09-24 01:05:34.159 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1763 Processing field: Capabilities" +"2019-09-24 01:05:34.159 UTC [common.channelconfig] NewStandardValues -> DEBU 1764 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1765 Processing field: AnchorPeers" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] NewStandardValues -> DEBU 1766 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1767 Processing field: MSP" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] Validate -> DEBU 1768 Anchor peers for org Org3MSP are " +"2019-09-24 01:05:34.160 UTC [common.channelconfig] validateMSP -> DEBU 1769 Setting up MSP for org Org3MSP" +"2019-09-24 01:05:34.160 UTC [msp] newBccspMsp -> DEBU 176a Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.160 UTC [msp] New -> DEBU 176b Creating Cache-MSP instance" +"2019-09-24 01:05:34.160 UTC [msp] Setup -> DEBU 176c Setting up MSP instance Org3MSP" +"2019-09-24 01:05:34.160 UTC [msp.identity] newIdentity -> DEBU 176d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] NewStandardValues -> DEBU 176e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.160 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176f Processing field: AnchorPeers" +"2019-09-24 01:05:34.161 UTC [common.channelconfig] NewStandardValues -> DEBU 1770 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.161 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1771 Processing field: MSP" +"2019-09-24 01:05:34.161 UTC [common.channelconfig] Validate -> DEBU 1772 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:05:34.161 UTC [common.channelconfig] validateMSP -> DEBU 1773 Setting up MSP for org Org1MSP" +"2019-09-24 01:05:34.161 UTC [msp] newBccspMsp -> DEBU 1774 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.161 UTC [msp] New -> DEBU 1775 Creating Cache-MSP instance" +"2019-09-24 01:05:34.161 UTC [msp] Setup -> DEBU 1776 Setting up MSP instance Org1MSP" +"2019-09-24 01:05:34.161 UTC [msp.identity] newIdentity -> DEBU 1777 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.162 UTC [common.channelconfig] NewStandardValues -> DEBU 1778 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1779 Processing field: AnchorPeers" +"2019-09-24 01:05:34.162 UTC [common.channelconfig] NewStandardValues -> DEBU 177a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.162 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177b Processing field: MSP" +"2019-09-24 01:05:34.163 UTC [common.channelconfig] Validate -> DEBU 177c Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:05:34.163 UTC [common.channelconfig] validateMSP -> DEBU 177d Setting up MSP for org Org2MSP" +"2019-09-24 01:05:34.163 UTC [msp] newBccspMsp -> DEBU 177e Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.163 UTC [msp] New -> DEBU 177f Creating Cache-MSP instance" +"2019-09-24 01:05:34.163 UTC [msp] Setup -> DEBU 1780 Setting up MSP instance Org2MSP" +"2019-09-24 01:05:34.163 UTC [msp.identity] newIdentity -> DEBU 1781 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.164 UTC [msp] Setup -> DEBU 1782 Setting up the MSP manager (4 msps)" +"2019-09-24 01:05:34.164 UTC [msp] Setup -> DEBU 1783 MSP manager setup complete, setup 4 msps" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1784 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1785 Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1786 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1787 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1788 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.164 UTC [policies] NewManagerImpl -> DEBU 1789 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178a Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178d Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178e Proposed new policy Writers for Channel/Application" +"2019-09-24 01:05:34.165 UTC [policies] NewManagerImpl -> DEBU 178f Proposed new policy Admins for Channel/Application" +"2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1790 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1791 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1792 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1793 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.166 UTC [policies] GetPolicy -> DEBU 1794 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1795 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1796 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1797 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1798 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 1799 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179a Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179b Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179c Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179d Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179e Proposed new policy Admins for Channel" +"2019-09-24 01:05:34.166 UTC [policies] NewManagerImpl -> DEBU 179f Proposed new policy Readers for Channel" +"2019-09-24 01:05:34.167 UTC [policies] NewManagerImpl -> DEBU 17a0 Proposed new policy Writers for Channel" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a1 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a2 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a3 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a4 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a6 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.167 UTC [common.configtx] addToMap -> DEBU 17a7 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:05:34.168 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:05:34.169 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.171 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17bf Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.172 UTC [common.configtx] addToMap -> DEBU 17c0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c2 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c3 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c7 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:05:34.173 UTC [common.configtx] addToMap -> DEBU 17c8 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17c9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17ca Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cb Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cc Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cd Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17ce Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:05:34.174 UTC [common.configtx] addToMap -> DEBU 17cf Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d0 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d1 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:05:34.176 UTC [common.configtx] addToMap -> DEBU 17d2 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:05:34.177 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d3 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:05:34.177 UTC [common.channelconfig] LogSanityChecks -> DEBU 17d4 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d5 Manager Channel looking up path [Application]" +"2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d6 Manager Channel has managers Application" +"2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d7 Manager Channel has managers Orderer" +"2019-09-24 01:05:34.177 UTC [policies] Manager -> DEBU 17d8 Manager Channel/Application looking up path []" +"2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17d9 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17da Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:34.178 UTC [policies] Manager -> DEBU 17db Manager Channel/Application has managers Org3MSP" +"2019-09-24 01:05:34.178 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dc As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:05:34.178 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dd As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:05:34.179 UTC [common.channelconfig] LogSanityChecks -> DEBU 17de As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17df Manager Channel looking up path [Orderer]" +"2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e0 Manager Channel has managers Application" +"2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e1 Manager Channel has managers Orderer" +"2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e2 Manager Channel/Orderer looking up path []" +"2019-09-24 01:05:34.180 UTC [policies] Manager -> DEBU 17e3 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:05:34.180 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e4 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e5 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e6 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:05:34.181 UTC [common.channelconfig] LogSanityChecks -> DEBU 17e7 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:05:34.182 UTC [common.capabilities] Supported -> DEBU 17e8 Orderer capability V1_4_2 is supported and is enabled" +"2019-09-24 01:05:34.182 UTC [common.capabilities] Supported -> DEBU 17e9 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:05:34.182 UTC [orderer.common.server] func1 -> DEBU 17ea Executing callback to update root CAs" +"2019-09-24 01:05:34.182 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17eb updating root CAs for channel [businesschannel]" +"2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ec adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ed adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ee adding app root CAs for MSP [Org3MSP]" +"2019-09-24 01:05:34.183 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ef adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:05:34.183 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17f0 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2019-09-24 01:05:34.184 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 17f1 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2019-09-24 01:05:34.184 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f2 Obtaining default signing identity" +"2019-09-24 01:05:34.184 UTC [msp] GetDefaultSigningIdentity -> DEBU 17f3 Obtaining default signing identity" +"2019-09-24 01:05:34.184 UTC [msp.identity] Sign -> DEBU 17f4 Sign: plaintext: 0A020806120B0A090A03010203100418...7753DF7643369D922ACFE698672C5C72 " +"2019-09-24 01:05:34.184 UTC [msp.identity] Sign -> DEBU 17f5 Sign: digest: 1B37C09E55ED9D029821E575F2C20E5076EC4EE09A1A73F9D448AA9EDE158720 " +"2019-09-24 01:05:34.188 UTC [fsblkstorage] indexBlock -> DEBU 17f6 Indexing block [blockNum=6, blockHash=[]byte{0x46, 0x52, 0x27, 0x1b, 0xc, 0xf, 0xee, 0x5b, 0x83, 0xd9, 0x75, 0x78, 0x16, 0xfe, 0x4a, 0x8a, 0xe, 0x49, 0x25, 0x33, 0x16, 0xa2, 0x38, 0x7a, 0x1c, 0x12, 0xa6, 0x93, 0x54, 0xce, 0xb5, 0x65} txOffsets= +txId=ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085 locPointer=offset=71, bytesLength=37480 +]" +"2019-09-24 01:05:34.191 UTC [fsblkstorage] updateCheckpoint -> DEBU 17f7 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127751], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-09-24 01:05:34.194 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 17f8 [channel: businesschannel] Wrote block [6]" +"2019-09-24 01:05:34.194 UTC [fsblkstorage] waitForBlock -> DEBU 17f9 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:34.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fa Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:34.195 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fb Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:34.196 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 17fc blockbytes [38486] read from file [0]" +"2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.196 UTC [policies] Evaluate -> DEBU 17ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.197 UTC [policies] Evaluate -> DEBU 1800 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.197 UTC [policies] Evaluate -> DEBU 1801 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.197 UTC [msp] DeserializeIdentity -> DEBU 1802 Obtaining identity" +"2019-09-24 01:05:34.126 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 67µs " +"2019-09-24 01:05:34.200 UTC [fsblkstorage] waitForBlock -> DEBU 1803 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:34.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1804 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1805 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1806 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:34.205 UTC [msp.identity] newIdentity -> DEBU 1807 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.209 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1808 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:34.210 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1809 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.211 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180a Sending msg of 28 bytes to 3 on channel testchainid took 17.9µs" +"2019-09-24 01:05:34.211 UTC [orderer.common.cluster.step] sendMessage -> DEBU 180b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 121.8µs " +"2019-09-24 01:05:34.212 UTC [cauthdsl] func1 -> DEBU 180c 0xc001055970 gate 1569287134212604500 evaluation starts" +"2019-09-24 01:05:34.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 180f Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2019-09-24 01:05:34.213 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1810 Sending msg of 28 bytes to 3 on channel businesschannel took 10µs" +"2019-09-24 01:05:34.213 UTC [cauthdsl] func2 -> DEBU 180e 0xc001055970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1811 0xc001055970 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1812 0xc001055970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.214 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1813 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.8µs " +"2019-09-24 01:05:34.214 UTC [cauthdsl] func2 -> DEBU 1814 0xc001055970 principal evaluation fails" +"2019-09-24 01:05:34.214 UTC [cauthdsl] func1 -> DEBU 1815 0xc001055970 gate 1569287134212604500 evaluation fails" +"2019-09-24 01:05:34.215 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1816 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 591.7µs " +"2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1817 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1818 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.215 UTC [policies] Evaluate -> DEBU 1819 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func1 -> DEBU 181a 0xc0011374c0 gate 1569287134216034300 evaluation starts" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181b 0xc0011374c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181c 0xc0011374c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181d 0xc0011374c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func2 -> DEBU 181e 0xc0011374c0 principal evaluation fails" +"2019-09-24 01:05:34.216 UTC [cauthdsl] func1 -> DEBU 181f 0xc0011374c0 gate 1569287134216034300 evaluation fails" +"2019-09-24 01:05:34.216 UTC [policies] Evaluate -> DEBU 1820 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.217 UTC [policies] Evaluate -> DEBU 1821 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.217 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.217 UTC [cauthdsl] func1 -> DEBU 1823 0xc001137d20 gate 1569287134217406700 evaluation starts" +"2019-09-24 01:05:34.217 UTC [cauthdsl] func2 -> DEBU 1824 0xc001137d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.217 UTC [cauthdsl] func2 -> DEBU 1825 0xc001137d20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.218 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1826 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:05:34.218 UTC [msp] Validate -> DEBU 1827 MSP Org2MSP validating identity" +"2019-09-24 01:05:34.219 UTC [msp] getCertificationChain -> DEBU 1828 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.219 UTC [cauthdsl] func2 -> DEBU 1829 0xc001137d20 principal matched by identity 0" +"2019-09-24 01:05:34.219 UTC [msp.identity] Verify -> DEBU 182a Verify: digest = 00000000 5f c9 82 d3 3e 00 6f f1 92 cd 90 d4 3d b5 aa 20 |_...>.o.....=.. | +00000010 36 77 45 5b ad 59 ae 34 c8 6d ef d3 7d 2a a8 ed |6wE[.Y.4.m..}*..|" +"2019-09-24 01:05:34.219 UTC [msp.identity] Verify -> DEBU 182b Verify: sig = 00000000 30 44 02 20 0a f9 8c 60 f7 b1 ec a6 08 d4 c5 96 |0D. ...`........| +00000010 a2 8d b5 d1 30 d7 65 fb b5 6c 0c 9a 03 83 ca c7 |....0.e..l......| +00000020 af 5f d0 3b 02 20 1c 36 5a a9 fd 2c e9 4e 5d 99 |._.;. .6Z..,.N].| +00000030 5b d9 fd 96 b6 da e7 4e 15 38 ce 87 c3 22 34 48 |[......N.8..."4H| +00000040 7d c0 9c 51 b2 3e |}..Q.>|" +"2019-09-24 01:05:34.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.212 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180d Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:34.220 UTC [cauthdsl] func2 -> DEBU 182d 0xc001137d20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.221 UTC [orderer.common.cluster.step] handleMessage -> DEBU 182e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.221 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 182f blockbytes [38486] read from file [0]" +"2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1831 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1832 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1833 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1834 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.222 UTC [policies] Evaluate -> DEBU 1835 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.223 UTC [msp] DeserializeIdentity -> DEBU 1836 Obtaining identity" +"2019-09-24 01:05:34.223 UTC [msp.identity] newIdentity -> DEBU 1837 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.224 UTC [cauthdsl] func1 -> DEBU 1838 0xc001184de0 gate 1569287134224431900 evaluation starts" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 1839 0xc001184de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183a 0xc001184de0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183b 0xc001184de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func2 -> DEBU 183c 0xc001184de0 principal evaluation fails" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func1 -> DEBU 183d 0xc001184de0 gate 1569287134224431900 evaluation fails" +"2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 183e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 183f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.225 UTC [policies] Evaluate -> DEBU 1840 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.225 UTC [cauthdsl] func1 -> DEBU 1841 0xc001185f60 gate 1569287134225880800 evaluation starts" +"2019-09-24 01:05:34.226 UTC [cauthdsl] func2 -> DEBU 1842 0xc001185f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.226 UTC [cauthdsl] func2 -> DEBU 1843 0xc001185f60 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:34.226 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1844 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:34.226 UTC [msp] Validate -> DEBU 1845 MSP Org1MSP validating identity" +"2019-09-24 01:05:34.227 UTC [msp] getCertificationChain -> DEBU 1846 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:34.227 UTC [cauthdsl] func2 -> DEBU 1847 0xc001185f60 principal matched by identity 0" +"2019-09-24 01:05:34.227 UTC [msp.identity] Verify -> DEBU 1848 Verify: digest = 00000000 c4 f9 50 3e 53 01 d3 d2 39 27 88 2c 33 53 75 11 |..P>S...9'.,3Su.| +00000010 38 f3 ab 2b f6 34 63 9f cf e2 f8 d0 fd 14 f5 cc |8..+.4c.........|" +"2019-09-24 01:05:34.228 UTC [msp.identity] Verify -> DEBU 1849 Verify: sig = 00000000 30 44 02 20 17 eb 84 12 8c 55 f2 2c 6b 1e 37 fa |0D. .....U.,k.7.| +00000010 7b 98 ec dd be 41 bf ba 9d e0 12 68 a9 e9 86 30 |{....A.....h...0| +00000020 4b ab bc 76 02 20 08 ef 22 27 95 8d f9 5a 14 4a |K..v. .."'...Z.J| +00000030 72 fd 47 c6 74 b0 5c 45 3a 33 4c ec ba 1d d2 04 |r.G.t.\E:3L.....| +00000040 8d 91 b7 ea 04 6f |.....o|" +"2019-09-24 01:05:34.222 UTC [cauthdsl] func1 -> DEBU 1830 0xc001137d20 gate 1569287134217406700 evaluation succeeds" +"2019-09-24 01:05:34.229 UTC [cauthdsl] func2 -> DEBU 184a 0xc001185f60 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.231 UTC [cauthdsl] func1 -> DEBU 184c 0xc001185f60 gate 1569287134225880800 evaluation succeeds" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 184f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1850 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1851 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:34.232 UTC [policies] Evaluate -> DEBU 1852 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:34.233 UTC [common.deliver] deliverBlocks -> DEBU 1853 [channel: businesschannel] Delivering block for (0xc00115ddc0) for 172.18.0.7:48428" +"2019-09-24 01:05:34.233 UTC [fsblkstorage] waitForBlock -> DEBU 1854 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:34.230 UTC [policies] Evaluate -> DEBU 184b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1855 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1856 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1857 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.234 UTC [policies] Evaluate -> DEBU 1858 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:34.235 UTC [policies] Evaluate -> DEBU 1859 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:34.235 UTC [common.deliver] deliverBlocks -> DEBU 185a [channel: businesschannel] Delivering block for (0xc00104e9c0) for 172.18.0.9:60592" +"2019-09-24 01:05:34.236 UTC [fsblkstorage] waitForBlock -> DEBU 185b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:34.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 185c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:34.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185d Sending msg of 28 bytes to 3 on channel testchainid took 19.8µs" +"2019-09-24 01:05:34.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 613.6µs " +"2019-09-24 01:05:34.679 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185f Sending msg of 28 bytes to 2 on channel businesschannel took 58.5µs" +"2019-09-24 01:05:34.682 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1860 Sending msg of 28 bytes to 3 on channel businesschannel took 350.8µs" +"2019-09-24 01:05:34.682 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1861 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4485ms " +"2019-09-24 01:05:34.686 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1862 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:34.690 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1863 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.3149ms " +"2019-09-24 01:05:34.691 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1864 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:35.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1865 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:35.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1866 Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2019-09-24 01:05:35.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1867 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 458.2µs " +"2019-09-24 01:05:35.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1868 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.8µs " +"2019-09-24 01:05:35.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1869 Sending msg of 28 bytes to 2 on channel businesschannel took 34.2µs" +"2019-09-24 01:05:35.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186a Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2019-09-24 01:05:35.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:35.184 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:35.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 309.2µs " +"2019-09-24 01:05:35.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:35.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186f Sending msg of 28 bytes to 3 on channel testchainid took 779.4µs" +"2019-09-24 01:05:35.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1870 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 386.1µs " +"2019-09-24 01:05:35.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1871 Sending msg of 28 bytes to 2 on channel businesschannel took 30µs" +"2019-09-24 01:05:35.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1872 Sending msg of 28 bytes to 3 on channel businesschannel took 48.6µs" +"2019-09-24 01:05:35.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1873 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 655.8µs " +"2019-09-24 01:05:35.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1874 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.7µs " +"2019-09-24 01:05:35.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1875 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:35.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1876 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:36.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1877 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:36.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1878 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 01:05:36.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1879 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.7µs " +"2019-09-24 01:05:36.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187a Sending msg of 28 bytes to 2 on channel businesschannel took 57µs" +"2019-09-24 01:05:36.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 187b Sending msg of 28 bytes to 3 on channel businesschannel took 63.7µs" +"2019-09-24 01:05:36.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 187c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 223.8µs " +"2019-09-24 01:05:36.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187d Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:36.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 187e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:36.183 UTC [orderer.common.cluster.step] sendMessage -> DEBU 187f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.9838ms " +"2019-09-24 01:05:36.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1880 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:36.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1881 Sending msg of 28 bytes to 3 on channel testchainid took 118.9µs" +"2019-09-24 01:05:36.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1882 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.3µs " +"2019-09-24 01:05:36.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1883 Sending msg of 28 bytes to 2 on channel businesschannel took 27.9µs" +"2019-09-24 01:05:36.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1884 Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2019-09-24 01:05:36.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1885 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.5µs " +"2019-09-24 01:05:36.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1886 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:36.680 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1887 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 3.8291ms " +"2019-09-24 01:05:36.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1888 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:37.154 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1889 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:37.155 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188a Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2019-09-24 01:05:37.156 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2019-09-24 01:05:37.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 188c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 469.8µs " +"2019-09-24 01:05:37.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188d Sending msg of 28 bytes to 2 on channel businesschannel took 155.7µs" +"2019-09-24 01:05:37.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 188e Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:37.181 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 188f Sending msg of 28 bytes to 3 on channel businesschannel took 3.0392ms" +"2019-09-24 01:05:37.181 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1890 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 156.8µs " +"2019-09-24 01:05:37.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1891 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:37.218 UTC [orderer.common.server] Deliver -> DEBU 1892 Starting new Deliver handler" +"2019-09-24 01:05:37.218 UTC [common.deliver] Handle -> DEBU 1893 Starting new deliver loop for 172.18.0.5:53882" +"2019-09-24 01:05:37.219 UTC [common.deliver] Handle -> DEBU 1894 Attempting to read seek info message from 172.18.0.5:53882" +"2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1895 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1896 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.220 UTC [policies] Evaluate -> DEBU 1897 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.221 UTC [policies] Evaluate -> DEBU 1898 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.221 UTC [policies] Evaluate -> DEBU 1899 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.222 UTC [msp] DeserializeIdentity -> DEBU 189a Obtaining identity" +"2019-09-24 01:05:37.223 UTC [msp.identity] newIdentity -> DEBU 189b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:37.223 UTC [cauthdsl] func1 -> DEBU 189c 0xc000c24100 gate 1569287137223612500 evaluation starts" +"2019-09-24 01:05:37.223 UTC [cauthdsl] func2 -> DEBU 189d 0xc000c24100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 189e 0xc000c24100 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 189f 0xc000c24100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:37.224 UTC [cauthdsl] func2 -> DEBU 18a0 0xc000c24100 principal evaluation fails" +"2019-09-24 01:05:37.225 UTC [cauthdsl] func1 -> DEBU 18a1 0xc000c24100 gate 1569287137223612500 evaluation fails" +"2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.226 UTC [policies] Evaluate -> DEBU 18a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.227 UTC [cauthdsl] func1 -> DEBU 18a5 0xc000c25240 gate 1569287137226618500 evaluation starts" +"2019-09-24 01:05:37.227 UTC [cauthdsl] func2 -> DEBU 18a6 0xc000c25240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.227 UTC [cauthdsl] func2 -> DEBU 18a7 0xc000c25240 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.228 UTC [cauthdsl] func2 -> DEBU 18a8 0xc000c25240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:37.228 UTC [cauthdsl] func2 -> DEBU 18a9 0xc000c25240 principal evaluation fails" +"2019-09-24 01:05:37.228 UTC [cauthdsl] func1 -> DEBU 18aa 0xc000c25240 gate 1569287137226618500 evaluation fails" +"2019-09-24 01:05:37.229 UTC [policies] Evaluate -> DEBU 18ab Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.229 UTC [policies] Evaluate -> DEBU 18ac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.230 UTC [policies] Evaluate -> DEBU 18ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.230 UTC [cauthdsl] func1 -> DEBU 18ae 0xc000c25aa0 gate 1569287137230096500 evaluation starts" +"2019-09-24 01:05:37.230 UTC [cauthdsl] func2 -> DEBU 18af 0xc000c25aa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.230 UTC [cauthdsl] func2 -> DEBU 18b0 0xc000c25aa0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.231 UTC [cauthdsl] func2 -> DEBU 18b1 0xc000c25aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:37.232 UTC [cauthdsl] func2 -> DEBU 18b2 0xc000c25aa0 principal evaluation fails" +"2019-09-24 01:05:37.232 UTC [cauthdsl] func1 -> DEBU 18b3 0xc000c25aa0 gate 1569287137230096500 evaluation fails" +"2019-09-24 01:05:37.232 UTC [policies] Evaluate -> DEBU 18b4 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.232 UTC [policies] Evaluate -> DEBU 18b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.233 UTC [policies] func1 -> DEBU 18b6 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b7 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18b9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:37.233 UTC [policies] Evaluate -> DEBU 18ba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.234 UTC [policies] Evaluate -> DEBU 18bb == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:37.234 UTC [cauthdsl] func1 -> DEBU 18bc 0xc0010207b0 gate 1569287137234520500 evaluation starts" +"2019-09-24 01:05:37.234 UTC [cauthdsl] func2 -> DEBU 18bd 0xc0010207b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.234 UTC [cauthdsl] func2 -> DEBU 18be 0xc0010207b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.235 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18bf Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:05:37.235 UTC [msp] Validate -> DEBU 18c0 MSP OrdererMSP validating identity" +"2019-09-24 01:05:37.236 UTC [cauthdsl] func2 -> DEBU 18c1 0xc0010207b0 principal matched by identity 0" +"2019-09-24 01:05:37.236 UTC [msp.identity] Verify -> DEBU 18c2 Verify: digest = 00000000 af 06 5d 55 26 1b fa 36 18 3c 15 47 32 e7 5f 9f |..]U&..6.<.G2._.| +00000010 05 c5 39 d1 a7 35 f0 b1 74 f5 75 18 d6 5d dd c3 |..9..5..t.u..]..|" +"2019-09-24 01:05:37.236 UTC [msp.identity] Verify -> DEBU 18c3 Verify: sig = 00000000 30 45 02 21 00 a7 a1 1a bf 53 9e b1 89 58 03 ef |0E.!.....S...X..| +00000010 32 94 21 f3 df a1 28 ba 2e 44 d0 3f f3 f1 f4 f9 |2.!...(..D.?....| +00000020 dd a6 44 4c 91 02 20 34 ba 00 ef fb 07 3f 1e 26 |..DL.. 4.....?.&| +00000030 06 6f 2c 54 7c c9 f5 af e4 56 db b8 d4 f1 9a 3a |.o,T|....V.....:| +00000040 56 0b 00 0c ab 04 b8 |V......|" +"2019-09-24 01:05:37.237 UTC [cauthdsl] func2 -> DEBU 18c4 0xc0010207b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.237 UTC [cauthdsl] func1 -> DEBU 18c5 0xc0010207b0 gate 1569287137234520500 evaluation succeeds" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c8 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18ca Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:37.237 UTC [policies] Evaluate -> DEBU 18cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:37.238 UTC [common.deliver] deliverBlocks -> DEBU 18cc [channel: businesschannel] Received seekInfo (0xc0011f5e80) start: > stop: > from 172.18.0.5:53882" +"2019-09-24 01:05:37.238 UTC [fsblkstorage] Next -> DEBU 18cd Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:37.238 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ce newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:37.238 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18cf Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:37.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d0 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:37.239 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18d1 blockbytes [38486] read from file [0]" +"2019-09-24 01:05:37.239 UTC [common.deliver] deliverBlocks -> DEBU 18d2 [channel: businesschannel] Delivering block for (0xc0011f5e80) for 172.18.0.5:53882" +"2019-09-24 01:05:37.240 UTC [common.deliver] deliverBlocks -> DEBU 18d3 [channel: businesschannel] Done delivering to 172.18.0.5:53882 for (0xc0011f5e80)" +"2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d4 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d5 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d6 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.240 UTC [fsblkstorage] waitForBlock -> DEBU 18d7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.240 UTC [common.deliver] Handle -> DEBU 18d8 Waiting for new SeekInfo from 172.18.0.5:53882" +"2019-09-24 01:05:37.242 UTC [common.deliver] Handle -> DEBU 18d9 Attempting to read seek info message from 172.18.0.5:53882" +"2019-09-24 01:05:37.247 UTC [common.deliver] Handle -> WARN 18da Error reading from 172.18.0.5:53882: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:37.248 UTC [orderer.common.server] func1 -> DEBU 18dc Closing Deliver stream" +"2019-09-24 01:05:37.249 UTC [comm.grpc.server] 1 -> INFO 18dd streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53882 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=30.9501ms +"2019-09-24 01:05:37.248 UTC [grpc] infof -> DEBU 18db transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:37.381 UTC [orderer.common.server] Deliver -> DEBU 18de Starting new Deliver handler" +"2019-09-24 01:05:37.382 UTC [common.deliver] Handle -> DEBU 18df Starting new deliver loop for 172.18.0.5:53884" +"2019-09-24 01:05:37.382 UTC [common.deliver] Handle -> DEBU 18e0 Attempting to read seek info message from 172.18.0.5:53884" +"2019-09-24 01:05:37.383 UTC [policies] Evaluate -> DEBU 18e1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:37.384 UTC [policies] Evaluate -> DEBU 18e2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.385 UTC [policies] Evaluate -> DEBU 18e3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.386 UTC [policies] Evaluate -> DEBU 18e4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.386 UTC [policies] Evaluate -> DEBU 18e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func1 -> DEBU 18e6 0xc000bf3c20 gate 1569287137386994200 evaluation starts" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e7 0xc000bf3c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e8 0xc000bf3c20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18e9 0xc000bf3c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func2 -> DEBU 18ea 0xc000bf3c20 principal evaluation fails" +"2019-09-24 01:05:37.387 UTC [cauthdsl] func1 -> DEBU 18eb 0xc000bf3c20 gate 1569287137386994200 evaluation fails" +"2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ec Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.388 UTC [policies] Evaluate -> DEBU 18ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.389 UTC [cauthdsl] func1 -> DEBU 18ef 0xc001292460 gate 1569287137388971200 evaluation starts" +"2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f0 0xc001292460 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f1 0xc001292460 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f2 0xc001292460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:37.389 UTC [cauthdsl] func2 -> DEBU 18f3 0xc001292460 principal evaluation fails" +"2019-09-24 01:05:37.390 UTC [cauthdsl] func1 -> DEBU 18f4 0xc001292460 gate 1569287137388971200 evaluation fails" +"2019-09-24 01:05:37.390 UTC [policies] Evaluate -> DEBU 18f5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.391 UTC [policies] Evaluate -> DEBU 18f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.391 UTC [policies] Evaluate -> DEBU 18f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.391 UTC [cauthdsl] func1 -> DEBU 18f8 0xc001292cb0 gate 1569287137391462600 evaluation starts" +"2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18f9 0xc001292cb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fa 0xc001292cb0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fb 0xc001292cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:37.392 UTC [cauthdsl] func2 -> DEBU 18fc 0xc001292cb0 principal evaluation fails" +"2019-09-24 01:05:37.392 UTC [cauthdsl] func1 -> DEBU 18fd 0xc001292cb0 gate 1569287137391462600 evaluation fails" +"2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 18fe Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 18ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.393 UTC [policies] func1 -> DEBU 1900 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1901 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1902 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.393 UTC [policies] Evaluate -> DEBU 1903 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:37.394 UTC [policies] Evaluate -> DEBU 1904 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.394 UTC [policies] Evaluate -> DEBU 1905 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:37.394 UTC [cauthdsl] func1 -> DEBU 1906 0xc0012939a0 gate 1569287137394705700 evaluation starts" +"2019-09-24 01:05:37.394 UTC [cauthdsl] func2 -> DEBU 1907 0xc0012939a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.394 UTC [cauthdsl] func2 -> DEBU 1908 0xc0012939a0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.395 UTC [cauthdsl] func2 -> DEBU 1909 0xc0012939a0 principal matched by identity 0" +"2019-09-24 01:05:37.396 UTC [msp.identity] Verify -> DEBU 190a Verify: digest = 00000000 e0 1d ee 34 5e 6d 4d 94 17 f2 e1 18 66 10 aa ef |...4^mM.....f...| +00000010 19 35 69 6f 16 82 cb 9a 6a a5 e1 e9 25 48 73 5e |.5io....j...%Hs^|" +"2019-09-24 01:05:37.396 UTC [msp.identity] Verify -> DEBU 190b Verify: sig = 00000000 30 45 02 21 00 fa 58 1b 92 ff 1f 2e 50 0b 13 92 |0E.!..X.....P...| +00000010 99 c8 4c 4f 1c 4c 49 4e 2b 13 eb 11 48 57 a7 db |..LO.LIN+...HW..| +00000020 37 a6 f5 ac aa 02 20 7d ce ec 3a 22 c1 6b c1 9b |7..... }..:".k..| +00000030 39 1a 5b eb 87 a5 96 c6 72 37 fc 28 6b 81 09 09 |9.[.....r7.(k...| +00000040 c1 55 47 0e 1a 44 e9 |.UG..D.|" +"2019-09-24 01:05:37.397 UTC [cauthdsl] func2 -> DEBU 190c 0xc0012939a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.397 UTC [cauthdsl] func1 -> DEBU 190d 0xc0012939a0 gate 1569287137394705700 evaluation succeeds" +"2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 190e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 190f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 1910 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.398 UTC [policies] Evaluate -> DEBU 1911 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.399 UTC [policies] Evaluate -> DEBU 1912 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:37.399 UTC [policies] Evaluate -> DEBU 1913 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:37.399 UTC [common.deliver] deliverBlocks -> DEBU 1914 [channel: businesschannel] Received seekInfo (0xc00100e340) start: > stop: > from 172.18.0.5:53884" +"2019-09-24 01:05:37.399 UTC [fsblkstorage] Next -> DEBU 1915 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:37.400 UTC [fsblkstorage] newBlockfileStream -> DEBU 1916 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:37.400 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1917 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:37.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1918 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:37.401 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1919 blockbytes [38486] read from file [0]" +"2019-09-24 01:05:37.402 UTC [common.deliver] deliverBlocks -> DEBU 191a [channel: businesschannel] Delivering block for (0xc00100e340) for 172.18.0.5:53884" +"2019-09-24 01:05:37.402 UTC [common.deliver] deliverBlocks -> DEBU 191b [channel: businesschannel] Done delivering to 172.18.0.5:53884 for (0xc00100e340)" +"2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191c Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191e Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.403 UTC [fsblkstorage] waitForBlock -> DEBU 191f Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.403 UTC [common.deliver] Handle -> DEBU 1920 Waiting for new SeekInfo from 172.18.0.5:53884" +"2019-09-24 01:05:37.404 UTC [common.deliver] Handle -> DEBU 1921 Attempting to read seek info message from 172.18.0.5:53884" +"2019-09-24 01:05:37.408 UTC [grpc] warningf -> DEBU 1922 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53884: read: connection reset by peer" +"2019-09-24 01:05:37.409 UTC [common.deliver] Handle -> WARN 1923 Error reading from 172.18.0.5:53884: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:37.410 UTC [orderer.common.server] func1 -> DEBU 1924 Closing Deliver stream" +"2019-09-24 01:05:37.410 UTC [comm.grpc.server] 1 -> INFO 1925 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53884 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.8282ms +"2019-09-24 01:05:37.412 UTC [grpc] infof -> DEBU 1926 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:37.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1927 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:37.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1928 Sending msg of 28 bytes to 3 on channel testchainid took 108µs" +"2019-09-24 01:05:37.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1929 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 475µs " +"2019-09-24 01:05:37.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 192a Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +"2019-09-24 01:05:37.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 192b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5552ms " +"2019-09-24 01:05:37.685 UTC [orderer.common.cluster.step] handleMessage -> DEBU 192c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:37.692 UTC [orderer.common.cluster.step] sendMessage -> DEBU 192d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +"2019-09-24 01:05:37.698 UTC [orderer.common.cluster.step] handleMessage -> DEBU 192e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:37.698 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 192f Sending msg of 28 bytes to 3 on channel businesschannel took 12.2533ms" +"2019-09-24 01:05:37.873 UTC [orderer.common.server] Deliver -> DEBU 1930 Starting new Deliver handler" +"2019-09-24 01:05:37.873 UTC [common.deliver] Handle -> DEBU 1931 Starting new deliver loop for 172.18.0.5:53886" +"2019-09-24 01:05:37.873 UTC [common.deliver] Handle -> DEBU 1932 Attempting to read seek info message from 172.18.0.5:53886" +"2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1933 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1934 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1935 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.874 UTC [policies] Evaluate -> DEBU 1936 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.875 UTC [policies] Evaluate -> DEBU 1937 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.875 UTC [cauthdsl] func1 -> DEBU 1938 0xc000d91ba0 gate 1569287137875248000 evaluation starts" +"2019-09-24 01:05:37.875 UTC [cauthdsl] func2 -> DEBU 1939 0xc000d91ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193a 0xc000d91ba0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193b 0xc000d91ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:37.876 UTC [cauthdsl] func2 -> DEBU 193c 0xc000d91ba0 principal evaluation fails" +"2019-09-24 01:05:37.877 UTC [cauthdsl] func1 -> DEBU 193d 0xc000d91ba0 gate 1569287137875248000 evaluation fails" +"2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 193e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 193f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.877 UTC [policies] Evaluate -> DEBU 1940 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func1 -> DEBU 1941 0xc000e563e0 gate 1569287137877981700 evaluation starts" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1942 0xc000e563e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1943 0xc000e563e0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1944 0xc000e563e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func2 -> DEBU 1945 0xc000e563e0 principal evaluation fails" +"2019-09-24 01:05:37.878 UTC [cauthdsl] func1 -> DEBU 1946 0xc000e563e0 gate 1569287137877981700 evaluation fails" +"2019-09-24 01:05:37.878 UTC [policies] Evaluate -> DEBU 1947 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1949 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func1 -> DEBU 194a 0xc000e56c20 gate 1569287137879176500 evaluation starts" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194b 0xc000e56c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194c 0xc000e56c20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194d 0xc000e56c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func2 -> DEBU 194e 0xc000e56c20 principal evaluation fails" +"2019-09-24 01:05:37.879 UTC [cauthdsl] func1 -> DEBU 194f 0xc000e56c20 gate 1569287137879176500 evaluation fails" +"2019-09-24 01:05:37.879 UTC [policies] Evaluate -> DEBU 1950 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1951 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.880 UTC [policies] func1 -> DEBU 1952 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1953 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1954 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.880 UTC [policies] Evaluate -> DEBU 1955 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:37.881 UTC [policies] Evaluate -> DEBU 1956 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.881 UTC [policies] Evaluate -> DEBU 1957 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:37.881 UTC [cauthdsl] func1 -> DEBU 1958 0xc000e57910 gate 1569287137881527900 evaluation starts" +"2019-09-24 01:05:37.881 UTC [cauthdsl] func2 -> DEBU 1959 0xc000e57910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.882 UTC [cauthdsl] func2 -> DEBU 195a 0xc000e57910 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:37.882 UTC [cauthdsl] func2 -> DEBU 195b 0xc000e57910 principal matched by identity 0" +"2019-09-24 01:05:37.883 UTC [msp.identity] Verify -> DEBU 195c Verify: digest = 00000000 85 5c 02 f4 e2 ae 22 57 9d d6 34 20 d9 22 7c bf |.\...."W..4 ."|.| +00000010 ec a8 d1 98 51 8d 66 b2 90 fe 67 b8 2a f5 26 8f |....Q.f...g.*.&.|" +"2019-09-24 01:05:37.883 UTC [msp.identity] Verify -> DEBU 195d Verify: sig = 00000000 30 45 02 21 00 c4 e0 d2 6f 87 bc 63 b0 e1 9f 42 |0E.!....o..c...B| +00000010 cc de 7b 46 73 d6 7f a8 00 0f 4a 8a 2a 36 a0 30 |..{Fs.....J.*6.0| +00000020 46 d0 7c b9 4e 02 20 23 72 df db 2a e9 6f c6 23 |F.|.N. #r..*.o.#| +00000030 24 38 09 a1 1b 1d 1c c4 52 b5 48 7c 24 ae 6f 6a |$8......R.H|$.oj| +00000040 3b f9 79 b6 40 f8 b9 |;.y.@..|" +"2019-09-24 01:05:37.883 UTC [cauthdsl] func2 -> DEBU 195e 0xc000e57910 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.883 UTC [cauthdsl] func1 -> DEBU 195f 0xc000e57910 gate 1569287137881527900 evaluation succeeds" +"2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1960 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1961 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1962 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1963 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:37.884 UTC [policies] Evaluate -> DEBU 1964 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:37.885 UTC [policies] Evaluate -> DEBU 1965 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:37.885 UTC [common.deliver] deliverBlocks -> DEBU 1966 [channel: businesschannel] Received seekInfo (0xc000e50780) start: > stop: > from 172.18.0.5:53886" +"2019-09-24 01:05:37.885 UTC [fsblkstorage] Next -> DEBU 1967 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:37.885 UTC [fsblkstorage] newBlockfileStream -> DEBU 1968 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:37.886 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1969 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:37.886 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196a Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:37.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 196b blockbytes [38486] read from file [0]" +"2019-09-24 01:05:37.889 UTC [common.deliver] deliverBlocks -> DEBU 196c [channel: businesschannel] Delivering block for (0xc000e50780) for 172.18.0.5:53886" +"2019-09-24 01:05:37.890 UTC [common.deliver] deliverBlocks -> DEBU 196d [channel: businesschannel] Done delivering to 172.18.0.5:53886 for (0xc000e50780)" +"2019-09-24 01:05:37.890 UTC [common.deliver] Handle -> DEBU 196e Waiting for new SeekInfo from 172.18.0.5:53886" +"2019-09-24 01:05:37.890 UTC [common.deliver] Handle -> DEBU 196f Attempting to read seek info message from 172.18.0.5:53886" +"2019-09-24 01:05:37.891 UTC [fsblkstorage] waitForBlock -> DEBU 1970 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.891 UTC [fsblkstorage] waitForBlock -> DEBU 1971 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.892 UTC [fsblkstorage] waitForBlock -> DEBU 1972 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:37.892 UTC [fsblkstorage] waitForBlock -> DEBU 1973 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:37.901 UTC [grpc] infof -> DEBU 1974 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:37.902 UTC [common.deliver] Handle -> WARN 1975 Error reading from 172.18.0.5:53886: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:37.902 UTC [orderer.common.server] func1 -> DEBU 1976 Closing Deliver stream" +"2019-09-24 01:05:37.902 UTC [comm.grpc.server] 1 -> INFO 1977 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53886 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=29.153ms +"2019-09-24 01:05:38.068 UTC [orderer.common.server] Deliver -> DEBU 1978 Starting new Deliver handler" +"2019-09-24 01:05:38.069 UTC [common.deliver] Handle -> DEBU 1979 Starting new deliver loop for 172.18.0.5:53888" +"2019-09-24 01:05:38.069 UTC [common.deliver] Handle -> DEBU 197a Attempting to read seek info message from 172.18.0.5:53888" +"2019-09-24 01:05:38.070 UTC [policies] Evaluate -> DEBU 197b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.070 UTC [policies] Evaluate -> DEBU 197c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.071 UTC [policies] Evaluate -> DEBU 197f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.071 UTC [cauthdsl] func1 -> DEBU 1980 0xc001364fa0 gate 1569287138071814100 evaluation starts" +"2019-09-24 01:05:38.071 UTC [cauthdsl] func2 -> DEBU 1981 0xc001364fa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1982 0xc001364fa0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1983 0xc001364fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.072 UTC [cauthdsl] func2 -> DEBU 1984 0xc001364fa0 principal evaluation fails" +"2019-09-24 01:05:38.072 UTC [cauthdsl] func1 -> DEBU 1985 0xc001364fa0 gate 1569287138071814100 evaluation fails" +"2019-09-24 01:05:38.072 UTC [policies] Evaluate -> DEBU 1986 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.073 UTC [policies] Evaluate -> DEBU 1987 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.073 UTC [policies] Evaluate -> DEBU 1988 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.073 UTC [cauthdsl] func1 -> DEBU 1989 0xc001365850 gate 1569287138073715400 evaluation starts" +"2019-09-24 01:05:38.073 UTC [cauthdsl] func2 -> DEBU 198a 0xc001365850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198b 0xc001365850 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198c 0xc001365850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.074 UTC [cauthdsl] func2 -> DEBU 198d 0xc001365850 principal evaluation fails" +"2019-09-24 01:05:38.075 UTC [cauthdsl] func1 -> DEBU 198e 0xc001365850 gate 1569287138073715400 evaluation fails" +"2019-09-24 01:05:38.075 UTC [policies] Evaluate -> DEBU 198f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.075 UTC [policies] Evaluate -> DEBU 1990 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.076 UTC [policies] Evaluate -> DEBU 1991 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.076 UTC [cauthdsl] func1 -> DEBU 1992 0xc001124150 gate 1569287138076554500 evaluation starts" +"2019-09-24 01:05:38.077 UTC [cauthdsl] func2 -> DEBU 1993 0xc001124150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.077 UTC [cauthdsl] func2 -> DEBU 1994 0xc001124150 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.078 UTC [cauthdsl] func2 -> DEBU 1995 0xc001124150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.078 UTC [cauthdsl] func2 -> DEBU 1996 0xc001124150 principal evaluation fails" +"2019-09-24 01:05:38.078 UTC [cauthdsl] func1 -> DEBU 1997 0xc001124150 gate 1569287138076554500 evaluation fails" +"2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 1998 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 1999 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.079 UTC [policies] func1 -> DEBU 199a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2019-09-24 01:05:38.079 UTC [policies] Evaluate -> DEBU 199b Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.080 UTC [policies] Evaluate -> DEBU 199f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.080 UTC [cauthdsl] func1 -> DEBU 19a0 0xc001124f40 gate 1569287138080588400 evaluation starts" +"2019-09-24 01:05:38.080 UTC [cauthdsl] func2 -> DEBU 19a1 0xc001124f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.081 UTC [cauthdsl] func2 -> DEBU 19a2 0xc001124f40 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.081 UTC [cauthdsl] func2 -> DEBU 19a3 0xc001124f40 principal matched by identity 0" +"2019-09-24 01:05:38.081 UTC [msp.identity] Verify -> DEBU 19a4 Verify: digest = 00000000 53 62 b1 55 12 0b bc 07 b7 cf 25 c2 93 87 ae 8c |Sb.U......%.....| +00000010 bc 42 79 5a f0 8a 33 0a 86 3c e4 8d 45 63 f6 f5 |.ByZ..3..<..Ec..|" +"2019-09-24 01:05:38.081 UTC [msp.identity] Verify -> DEBU 19a5 Verify: sig = 00000000 30 45 02 21 00 fe 8e 33 cb b8 fb 63 1e d7 67 2d |0E.!...3...c..g-| +00000010 a9 59 2b 2d 8a 71 4e 18 48 98 15 43 2f e4 8d 1a |.Y+-.qN.H..C/...| +00000020 3c e4 8b 3d 0f 02 20 5c 72 85 cc 92 98 08 d1 82 |<..=.. \r.......| +00000030 81 e1 61 4e 25 46 50 4a b9 6f 39 90 89 32 37 dd |..aN%FPJ.o9..27.| +00000040 8e 8a d3 8b 1c da 7e |......~|" +"2019-09-24 01:05:38.082 UTC [cauthdsl] func2 -> DEBU 19a6 0xc001124f40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.082 UTC [cauthdsl] func1 -> DEBU 19a7 0xc001124f40 gate 1569287138080588400 evaluation succeeds" +"2019-09-24 01:05:38.082 UTC [policies] Evaluate -> DEBU 19a8 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.082 UTC [policies] Evaluate -> DEBU 19a9 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19aa Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ac Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.083 UTC [policies] Evaluate -> DEBU 19ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.083 UTC [common.deliver] deliverBlocks -> DEBU 19ae [channel: businesschannel] Received seekInfo (0xc000cb0540) start: > stop: > from 172.18.0.5:53888" +"2019-09-24 01:05:38.083 UTC [fsblkstorage] Next -> DEBU 19af Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.084 UTC [fsblkstorage] newBlockfileStream -> DEBU 19b0 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b1 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b2 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:38.084 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19b3 blockbytes [38486] read from file [0]" +"2019-09-24 01:05:38.084 UTC [common.deliver] deliverBlocks -> DEBU 19b4 [channel: businesschannel] Delivering block for (0xc000cb0540) for 172.18.0.5:53888" +"2019-09-24 01:05:38.085 UTC [common.deliver] deliverBlocks -> DEBU 19b5 [channel: businesschannel] Done delivering to 172.18.0.5:53888 for (0xc000cb0540)" +"2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b6 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b7 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.085 UTC [fsblkstorage] waitForBlock -> DEBU 19b8 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.086 UTC [fsblkstorage] waitForBlock -> DEBU 19b9 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.085 UTC [common.deliver] Handle -> DEBU 19ba Waiting for new SeekInfo from 172.18.0.5:53888" +"2019-09-24 01:05:38.086 UTC [common.deliver] Handle -> DEBU 19bb Attempting to read seek info message from 172.18.0.5:53888" +"2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.090 UTC [policies] Evaluate -> DEBU 19bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.091 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.091 UTC [cauthdsl] func1 -> DEBU 19c1 0xc000dd31c0 gate 1569287138091630700 evaluation starts" +"2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c2 0xc000dd31c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c3 0xc000dd31c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c4 0xc000dd31c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.092 UTC [cauthdsl] func2 -> DEBU 19c5 0xc000dd31c0 principal evaluation fails" +"2019-09-24 01:05:38.092 UTC [cauthdsl] func1 -> DEBU 19c6 0xc000dd31c0 gate 1569287138091630700 evaluation fails" +"2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.093 UTC [policies] Evaluate -> DEBU 19c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.093 UTC [cauthdsl] func1 -> DEBU 19ca 0xc000dd3b20 gate 1569287138093670200 evaluation starts" +"2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cb 0xc000dd3b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cc 0xc000dd3b20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19cd 0xc000dd3b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.094 UTC [cauthdsl] func2 -> DEBU 19ce 0xc000dd3b20 principal evaluation fails" +"2019-09-24 01:05:38.094 UTC [cauthdsl] func1 -> DEBU 19cf 0xc000dd3b20 gate 1569287138093670200 evaluation fails" +"2019-09-24 01:05:38.094 UTC [policies] Evaluate -> DEBU 19d0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.094 UTC [policies] Evaluate -> DEBU 19d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.095 UTC [policies] Evaluate -> DEBU 19d2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.095 UTC [cauthdsl] func1 -> DEBU 19d3 0xc00125a360 gate 1569287138095346300 evaluation starts" +"2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d4 0xc00125a360 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d5 0xc00125a360 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.095 UTC [cauthdsl] func2 -> DEBU 19d6 0xc00125a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.096 UTC [cauthdsl] func2 -> DEBU 19d7 0xc00125a360 principal evaluation fails" +"2019-09-24 01:05:38.096 UTC [cauthdsl] func1 -> DEBU 19d8 0xc00125a360 gate 1569287138095346300 evaluation fails" +"2019-09-24 01:05:38.097 UTC [policies] Evaluate -> DEBU 19d9 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.097 UTC [policies] Evaluate -> DEBU 19da == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.097 UTC [policies] func1 -> DEBU 19db Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19dc Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.098 UTC [policies] Evaluate -> DEBU 19e0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.098 UTC [cauthdsl] func1 -> DEBU 19e1 0xc00125b060 gate 1569287138098283200 evaluation starts" +"2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e2 0xc00125b060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e3 0xc00125b060 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.098 UTC [cauthdsl] func2 -> DEBU 19e4 0xc00125b060 principal matched by identity 0" +"2019-09-24 01:05:38.098 UTC [msp.identity] Verify -> DEBU 19e5 Verify: digest = 00000000 19 ca 49 4b 7b 89 52 ca 5d 86 7b 23 90 b8 d6 19 |..IK{.R.].{#....| +00000010 d1 88 e0 93 93 6c 3d 12 7c c8 a8 90 a2 3e 22 18 |.....l=.|....>".|" +"2019-09-24 01:05:38.099 UTC [msp.identity] Verify -> DEBU 19e6 Verify: sig = 00000000 30 44 02 20 1a a7 f4 17 04 3e 99 b2 2a 45 41 e7 |0D. .....>..*EA.| +00000010 ea ae a6 05 a1 80 2f a7 8e ac 77 5a 73 88 27 19 |....../...wZs.'.| +00000020 a4 1e c7 e3 02 20 16 d0 93 62 d5 08 a1 99 42 a3 |..... ...b....B.| +00000030 fd 9b 33 ba f6 ad 5e f7 75 43 6e 8b 72 ba ce bc |..3...^.uCn.r...| +00000040 29 a2 98 3e 30 d5 |)..>0.|" +"2019-09-24 01:05:38.099 UTC [cauthdsl] func2 -> DEBU 19e7 0xc00125b060 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.100 UTC [cauthdsl] func1 -> DEBU 19e8 0xc00125b060 gate 1569287138098283200 evaluation succeeds" +"2019-09-24 01:05:38.100 UTC [policies] Evaluate -> DEBU 19e9 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.100 UTC [policies] Evaluate -> DEBU 19ea == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.101 UTC [policies] Evaluate -> DEBU 19eb Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.101 UTC [policies] Evaluate -> DEBU 19ec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.102 UTC [policies] Evaluate -> DEBU 19ed Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.102 UTC [policies] Evaluate -> DEBU 19ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.102 UTC [common.deliver] deliverBlocks -> DEBU 19ef [channel: businesschannel] Received seekInfo (0xc00097c300) start: > stop: > from 172.18.0.5:53888" +"2019-09-24 01:05:38.102 UTC [fsblkstorage] Next -> DEBU 19f0 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.103 UTC [fsblkstorage] newBlockfileStream -> DEBU 19f1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:38.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f2 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:38.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f3 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:38.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19f4 blockbytes [38486] read from file [0]" +"2019-09-24 01:05:38.104 UTC [common.deliver] deliverBlocks -> DEBU 19f5 [channel: businesschannel] Delivering block for (0xc00097c300) for 172.18.0.5:53888" +"2019-09-24 01:05:38.105 UTC [common.deliver] deliverBlocks -> DEBU 19f6 [channel: businesschannel] Done delivering to 172.18.0.5:53888 for (0xc00097c300)" +"2019-09-24 01:05:38.105 UTC [common.deliver] Handle -> DEBU 19f7 Waiting for new SeekInfo from 172.18.0.5:53888" +"2019-09-24 01:05:38.105 UTC [common.deliver] Handle -> DEBU 19f8 Attempting to read seek info message from 172.18.0.5:53888" +"2019-09-24 01:05:38.105 UTC [fsblkstorage] waitForBlock -> DEBU 19f9 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fa Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fb Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.106 UTC [fsblkstorage] waitForBlock -> DEBU 19fc Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.112 UTC [grpc] infof -> DEBU 19fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:38.113 UTC [common.deliver] Handle -> WARN 19fe Error reading from 172.18.0.5:53888: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:38.113 UTC [orderer.common.server] func1 -> DEBU 19ff Closing Deliver stream" +"2019-09-24 01:05:38.113 UTC [comm.grpc.server] 1 -> INFO 1a00 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53888 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=45.0784ms +"2019-09-24 01:05:38.152 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a01 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:38.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a02 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2019-09-24 01:05:38.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 730.3µs " +"2019-09-24 01:05:38.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a04 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2019-09-24 01:05:38.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a05 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2019-09-24 01:05:38.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 352.1µs " +"2019-09-24 01:05:38.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 231.3µs " +"2019-09-24 01:05:38.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:38.179 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:38.281 UTC [orderer.common.server] Deliver -> DEBU 1a0a Starting new Deliver handler" +"2019-09-24 01:05:38.282 UTC [common.deliver] Handle -> DEBU 1a0b Starting new deliver loop for 172.18.0.5:53890" +"2019-09-24 01:05:38.282 UTC [common.deliver] Handle -> DEBU 1a0c Attempting to read seek info message from 172.18.0.5:53890" +"2019-09-24 01:05:38.282 UTC [policies] Evaluate -> DEBU 1a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.282 UTC [policies] Evaluate -> DEBU 1a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.283 UTC [policies] Evaluate -> DEBU 1a11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.283 UTC [cauthdsl] func1 -> DEBU 1a12 0xc0011d61e0 gate 1569287138283467200 evaluation starts" +"2019-09-24 01:05:38.283 UTC [cauthdsl] func2 -> DEBU 1a13 0xc0011d61e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a14 0xc0011d61e0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a15 0xc0011d61e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.284 UTC [cauthdsl] func2 -> DEBU 1a16 0xc0011d61e0 principal evaluation fails" +"2019-09-24 01:05:38.285 UTC [cauthdsl] func1 -> DEBU 1a17 0xc0011d61e0 gate 1569287138283467200 evaluation fails" +"2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a18 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.285 UTC [policies] Evaluate -> DEBU 1a1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.286 UTC [cauthdsl] func1 -> DEBU 1a1b 0xc0011d6a20 gate 1569287138286192600 evaluation starts" +"2019-09-24 01:05:38.286 UTC [cauthdsl] func2 -> DEBU 1a1c 0xc0011d6a20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.286 UTC [cauthdsl] func2 -> DEBU 1a1d 0xc0011d6a20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.287 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc0011d6a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.287 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc0011d6a20 principal evaluation fails" +"2019-09-24 01:05:38.287 UTC [cauthdsl] func1 -> DEBU 1a20 0xc0011d6a20 gate 1569287138286192600 evaluation fails" +"2019-09-24 01:05:38.288 UTC [policies] Evaluate -> DEBU 1a21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.288 UTC [policies] Evaluate -> DEBU 1a22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.289 UTC [policies] Evaluate -> DEBU 1a23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.289 UTC [cauthdsl] func1 -> DEBU 1a24 0xc0011d7260 gate 1569287138289368000 evaluation starts" +"2019-09-24 01:05:38.289 UTC [cauthdsl] func2 -> DEBU 1a25 0xc0011d7260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.289 UTC [cauthdsl] func2 -> DEBU 1a26 0xc0011d7260 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.290 UTC [cauthdsl] func2 -> DEBU 1a27 0xc0011d7260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.290 UTC [cauthdsl] func2 -> DEBU 1a28 0xc0011d7260 principal evaluation fails" +"2019-09-24 01:05:38.290 UTC [cauthdsl] func1 -> DEBU 1a29 0xc0011d7260 gate 1569287138289368000 evaluation fails" +"2019-09-24 01:05:38.290 UTC [policies] Evaluate -> DEBU 1a2a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.291 UTC [policies] func1 -> DEBU 1a2c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2d Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.291 UTC [policies] Evaluate -> DEBU 1a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.292 UTC [policies] Evaluate -> DEBU 1a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.292 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.292 UTC [cauthdsl] func1 -> DEBU 1a32 0xc0011d7f60 gate 1569287138292554100 evaluation starts" +"2019-09-24 01:05:38.292 UTC [cauthdsl] func2 -> DEBU 1a33 0xc0011d7f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.293 UTC [cauthdsl] func2 -> DEBU 1a34 0xc0011d7f60 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.293 UTC [cauthdsl] func2 -> DEBU 1a35 0xc0011d7f60 principal matched by identity 0" +"2019-09-24 01:05:38.293 UTC [msp.identity] Verify -> DEBU 1a36 Verify: digest = 00000000 00 6d ea a3 2b ba 0d 69 2d c0 c7 7f d4 ce 33 0c |.m..+..i-.....3.| +00000010 22 e7 8b 5e b9 81 e6 ca 77 ff 99 75 41 88 31 f7 |"..^....w..uA.1.|" +"2019-09-24 01:05:38.293 UTC [msp.identity] Verify -> DEBU 1a37 Verify: sig = 00000000 30 44 02 20 48 af e0 9a 04 5d 7f 4a 8f da 87 71 |0D. H....].J...q| +00000010 de 8e d0 0d 42 6a 8f b8 99 3c 86 b1 64 31 5c 71 |....Bj...<..d1\q| +00000020 31 f6 eb 16 02 20 53 b7 44 a9 c5 2b b3 06 6e fb |1.... S.D..+..n.| +00000030 ac 39 73 98 32 d0 26 2d 30 d4 73 cd 08 a0 06 ad |.9s.2.&-0.s.....| +00000040 25 ae bb fc 1e 66 |%....f|" +"2019-09-24 01:05:38.294 UTC [cauthdsl] func2 -> DEBU 1a38 0xc0011d7f60 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.294 UTC [cauthdsl] func1 -> DEBU 1a39 0xc0011d7f60 gate 1569287138292554100 evaluation succeeds" +"2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3c Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.294 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.295 UTC [policies] Evaluate -> DEBU 1a3e Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.295 UTC [policies] Evaluate -> DEBU 1a3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.295 UTC [common.deliver] deliverBlocks -> DEBU 1a40 [channel: businesschannel] Received seekInfo (0xc000cb0dc0) start: > stop: > from 172.18.0.5:53890" +"2019-09-24 01:05:38.295 UTC [fsblkstorage] Next -> DEBU 1a41 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.295 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a42 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a43 Remaining bytes=[127751], Going to peek [8] bytes" +"2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a44 Returning blockbytes - length=[25804], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:38.296 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a45 blockbytes [25804] read from file [0]" +"2019-09-24 01:05:38.296 UTC [common.deliver] deliverBlocks -> DEBU 1a46 [channel: businesschannel] Delivering block for (0xc000cb0dc0) for 172.18.0.5:53890" +"2019-09-24 01:05:38.297 UTC [common.deliver] deliverBlocks -> DEBU 1a47 [channel: businesschannel] Done delivering to 172.18.0.5:53890 for (0xc000cb0dc0)" +"2019-09-24 01:05:38.297 UTC [fsblkstorage] waitForBlock -> DEBU 1a48 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.297 UTC [fsblkstorage] waitForBlock -> DEBU 1a49 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.298 UTC [fsblkstorage] waitForBlock -> DEBU 1a4a Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.298 UTC [fsblkstorage] waitForBlock -> DEBU 1a4b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.297 UTC [common.deliver] Handle -> DEBU 1a4c Waiting for new SeekInfo from 172.18.0.5:53890" +"2019-09-24 01:05:38.300 UTC [common.deliver] Handle -> DEBU 1a4d Attempting to read seek info message from 172.18.0.5:53890" +"2019-09-24 01:05:38.306 UTC [grpc] infof -> DEBU 1a4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:38.308 UTC [common.deliver] Handle -> WARN 1a4f Error reading from 172.18.0.5:53890: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:38.308 UTC [orderer.common.server] func1 -> DEBU 1a50 Closing Deliver stream" +"2019-09-24 01:05:38.308 UTC [comm.grpc.server] 1 -> INFO 1a51 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53890 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.726ms +"2019-09-24 01:05:38.450 UTC [orderer.common.server] Deliver -> DEBU 1a52 Starting new Deliver handler" +"2019-09-24 01:05:38.450 UTC [common.deliver] Handle -> DEBU 1a53 Starting new deliver loop for 172.18.0.5:53892" +"2019-09-24 01:05:38.451 UTC [common.deliver] Handle -> DEBU 1a54 Attempting to read seek info message from 172.18.0.5:53892" +"2019-09-24 01:05:38.452 UTC [policies] Evaluate -> DEBU 1a55 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.453 UTC [policies] Evaluate -> DEBU 1a56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.453 UTC [policies] Evaluate -> DEBU 1a57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.454 UTC [policies] Evaluate -> DEBU 1a58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.454 UTC [policies] Evaluate -> DEBU 1a59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.455 UTC [cauthdsl] func1 -> DEBU 1a5a 0xc0008f8170 gate 1569287138454855200 evaluation starts" +"2019-09-24 01:05:38.455 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc0008f8170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.455 UTC [cauthdsl] func2 -> DEBU 1a5c 0xc0008f8170 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.456 UTC [cauthdsl] func2 -> DEBU 1a5d 0xc0008f8170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.456 UTC [cauthdsl] func2 -> DEBU 1a5e 0xc0008f8170 principal evaluation fails" +"2019-09-24 01:05:38.456 UTC [cauthdsl] func1 -> DEBU 1a5f 0xc0008f8170 gate 1569287138454855200 evaluation fails" +"2019-09-24 01:05:38.456 UTC [policies] Evaluate -> DEBU 1a60 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.457 UTC [policies] Evaluate -> DEBU 1a61 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.457 UTC [policies] Evaluate -> DEBU 1a62 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.457 UTC [cauthdsl] func1 -> DEBU 1a63 0xc0008f89b0 gate 1569287138457662500 evaluation starts" +"2019-09-24 01:05:38.458 UTC [cauthdsl] func2 -> DEBU 1a64 0xc0008f89b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.458 UTC [cauthdsl] func2 -> DEBU 1a65 0xc0008f89b0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.459 UTC [cauthdsl] func2 -> DEBU 1a66 0xc0008f89b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.459 UTC [cauthdsl] func2 -> DEBU 1a67 0xc0008f89b0 principal evaluation fails" +"2019-09-24 01:05:38.459 UTC [cauthdsl] func1 -> DEBU 1a68 0xc0008f89b0 gate 1569287138457662500 evaluation fails" +"2019-09-24 01:05:38.459 UTC [policies] Evaluate -> DEBU 1a69 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.459 UTC [policies] Evaluate -> DEBU 1a6a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.460 UTC [policies] Evaluate -> DEBU 1a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.460 UTC [cauthdsl] func1 -> DEBU 1a6c 0xc0008f91f0 gate 1569287138460610900 evaluation starts" +"2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6d 0xc0008f91f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6e 0xc0008f91f0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.461 UTC [cauthdsl] func2 -> DEBU 1a6f 0xc0008f91f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.462 UTC [cauthdsl] func2 -> DEBU 1a70 0xc0008f91f0 principal evaluation fails" +"2019-09-24 01:05:38.462 UTC [cauthdsl] func1 -> DEBU 1a71 0xc0008f91f0 gate 1569287138460610900 evaluation fails" +"2019-09-24 01:05:38.462 UTC [policies] Evaluate -> DEBU 1a72 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.462 UTC [policies] Evaluate -> DEBU 1a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.462 UTC [policies] func1 -> DEBU 1a74 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a75 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a76 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.463 UTC [policies] Evaluate -> DEBU 1a77 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.464 UTC [policies] Evaluate -> DEBU 1a78 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.464 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.464 UTC [cauthdsl] func1 -> DEBU 1a7a 0xc0008f9f40 gate 1569287138464677900 evaluation starts" +"2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7b 0xc0008f9f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7c 0xc0008f9f40 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.465 UTC [cauthdsl] func2 -> DEBU 1a7d 0xc0008f9f40 principal matched by identity 0" +"2019-09-24 01:05:38.465 UTC [msp.identity] Verify -> DEBU 1a7e Verify: digest = 00000000 cd c0 63 2f 74 72 5b 36 1d 38 a3 62 4a 11 37 85 |..c/tr[6.8.bJ.7.| +00000010 3e cf 6a c5 8b 68 9a c0 68 32 16 05 56 2f 8d 07 |>.j..h..h2..V/..|" +"2019-09-24 01:05:38.465 UTC [msp.identity] Verify -> DEBU 1a7f Verify: sig = 00000000 30 45 02 21 00 fa 35 f6 ba c4 34 17 12 57 9c fb |0E.!..5...4..W..| +00000010 ce 79 20 16 d8 e4 54 51 65 bc 04 c1 bc f4 92 76 |.y ...TQe......v| +00000020 3e 7d e8 bd 1d 02 20 3e 6e f7 dd a9 2f 0a 66 6c |>}.... >n.../.fl| +00000030 a1 ce b1 49 b0 7e a8 bf 31 34 48 59 b0 df d2 fb |...I.~..14HY....| +00000040 70 e7 8a 3b 19 63 1d |p..;.c.|" +"2019-09-24 01:05:38.466 UTC [cauthdsl] func2 -> DEBU 1a80 0xc0008f9f40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.466 UTC [cauthdsl] func1 -> DEBU 1a81 0xc0008f9f40 gate 1569287138464677900 evaluation succeeds" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a82 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a83 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a84 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a86 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.466 UTC [policies] Evaluate -> DEBU 1a87 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.467 UTC [common.deliver] deliverBlocks -> DEBU 1a88 [channel: businesschannel] Received seekInfo (0xc00097cc80) start: > stop: > from 172.18.0.5:53892" +"2019-09-24 01:05:38.467 UTC [fsblkstorage] Next -> DEBU 1a89 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.467 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a8a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[25807]" +"2019-09-24 01:05:38.467 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8b Remaining bytes=[101944], Going to peek [8] bytes" +"2019-09-24 01:05:38.468 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8c Returning blockbytes - length=[25475], placementInfo={fileNum=[0], startOffset=[25807], bytesOffset=[25810]}" +"2019-09-24 01:05:38.468 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a8d blockbytes [25475] read from file [0]" +"2019-09-24 01:05:38.469 UTC [common.deliver] deliverBlocks -> DEBU 1a8e [channel: businesschannel] Delivering block for (0xc00097cc80) for 172.18.0.5:53892" +"2019-09-24 01:05:38.469 UTC [common.deliver] deliverBlocks -> DEBU 1a8f [channel: businesschannel] Done delivering to 172.18.0.5:53892 for (0xc00097cc80)" +"2019-09-24 01:05:38.470 UTC [common.deliver] Handle -> DEBU 1a90 Waiting for new SeekInfo from 172.18.0.5:53892" +"2019-09-24 01:05:38.471 UTC [common.deliver] Handle -> DEBU 1a92 Attempting to read seek info message from 172.18.0.5:53892" +"2019-09-24 01:05:38.470 UTC [fsblkstorage] waitForBlock -> DEBU 1a91 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.472 UTC [fsblkstorage] waitForBlock -> DEBU 1a93 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.473 UTC [fsblkstorage] waitForBlock -> DEBU 1a94 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.473 UTC [fsblkstorage] waitForBlock -> DEBU 1a95 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.475 UTC [common.deliver] Handle -> WARN 1a97 Error reading from 172.18.0.5:53892: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:38.476 UTC [orderer.common.server] func1 -> DEBU 1a98 Closing Deliver stream" +"2019-09-24 01:05:38.476 UTC [comm.grpc.server] 1 -> INFO 1a99 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53892 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.7697ms +"2019-09-24 01:05:38.475 UTC [grpc] infof -> DEBU 1a96 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:38.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a9a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:38.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a9b Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2019-09-24 01:05:38.658 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a9c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.6µs " +"2019-09-24 01:05:38.662 UTC [orderer.common.server] Deliver -> DEBU 1a9d Starting new Deliver handler" +"2019-09-24 01:05:38.662 UTC [common.deliver] Handle -> DEBU 1a9e Starting new deliver loop for 172.18.0.5:53894" +"2019-09-24 01:05:38.662 UTC [common.deliver] Handle -> DEBU 1a9f Attempting to read seek info message from 172.18.0.5:53894" +"2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.663 UTC [policies] Evaluate -> DEBU 1aa2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.664 UTC [policies] Evaluate -> DEBU 1aa3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.664 UTC [policies] Evaluate -> DEBU 1aa4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.664 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0001d4590 gate 1569287138664938900 evaluation starts" +"2019-09-24 01:05:38.665 UTC [cauthdsl] func2 -> DEBU 1aa6 0xc0001d4590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.665 UTC [cauthdsl] func2 -> DEBU 1aa7 0xc0001d4590 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.666 UTC [cauthdsl] func2 -> DEBU 1aa8 0xc0001d4590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.666 UTC [cauthdsl] func2 -> DEBU 1aa9 0xc0001d4590 principal evaluation fails" +"2019-09-24 01:05:38.666 UTC [cauthdsl] func1 -> DEBU 1aaa 0xc0001d4590 gate 1569287138664938900 evaluation fails" +"2019-09-24 01:05:38.666 UTC [policies] Evaluate -> DEBU 1aab Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.667 UTC [policies] Evaluate -> DEBU 1aac == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.667 UTC [policies] Evaluate -> DEBU 1aad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.667 UTC [cauthdsl] func1 -> DEBU 1aae 0xc0001d4f50 gate 1569287138667467400 evaluation starts" +"2019-09-24 01:05:38.667 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0001d4f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.667 UTC [cauthdsl] func2 -> DEBU 1ab0 0xc0001d4f50 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.668 UTC [cauthdsl] func2 -> DEBU 1ab1 0xc0001d4f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.668 UTC [cauthdsl] func2 -> DEBU 1ab2 0xc0001d4f50 principal evaluation fails" +"2019-09-24 01:05:38.668 UTC [cauthdsl] func1 -> DEBU 1ab3 0xc0001d4f50 gate 1569287138667467400 evaluation fails" +"2019-09-24 01:05:38.668 UTC [policies] Evaluate -> DEBU 1ab4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.668 UTC [policies] Evaluate -> DEBU 1ab5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.669 UTC [policies] Evaluate -> DEBU 1ab6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.669 UTC [cauthdsl] func1 -> DEBU 1ab7 0xc0001d5b30 gate 1569287138669416400 evaluation starts" +"2019-09-24 01:05:38.669 UTC [cauthdsl] func2 -> DEBU 1ab8 0xc0001d5b30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1ab9 0xc0001d5b30 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1aba 0xc0001d5b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.670 UTC [cauthdsl] func2 -> DEBU 1abb 0xc0001d5b30 principal evaluation fails" +"2019-09-24 01:05:38.670 UTC [cauthdsl] func1 -> DEBU 1abc 0xc0001d5b30 gate 1569287138669416400 evaluation fails" +"2019-09-24 01:05:38.670 UTC [policies] Evaluate -> DEBU 1abd Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1abe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.671 UTC [policies] func1 -> DEBU 1abf Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1ac0 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.671 UTC [policies] Evaluate -> DEBU 1ac1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.672 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.672 UTC [cauthdsl] func1 -> DEBU 1ac5 0xc0003b2de0 gate 1569287138672824900 evaluation starts" +"2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac6 0xc0003b2de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac7 0xc0003b2de0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.673 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc0003b2de0 principal matched by identity 0" +"2019-09-24 01:05:38.673 UTC [msp.identity] Verify -> DEBU 1ac9 Verify: digest = 00000000 f5 83 e4 34 a5 2f 94 dc 18 92 9e 6c ab b7 84 2f |...4./.....l.../| +00000010 13 c6 98 ad f8 4d ce 75 f7 ef ba 73 3d b4 f6 ba |.....M.u...s=...|" +"2019-09-24 01:05:38.674 UTC [msp.identity] Verify -> DEBU 1aca Verify: sig = 00000000 30 44 02 20 54 68 1e b6 01 b1 f0 ce ce 98 1d e8 |0D. Th..........| +00000010 4f 9b 61 81 f8 1e f0 f0 43 c4 8f ff a6 ef ba a0 |O.a.....C.......| +00000020 36 1d 38 42 02 20 5e bf 56 1d 16 77 b2 a3 d3 7b |6.8B. ^.V..w...{| +00000030 02 12 ad 91 b9 18 be 4f dd 1b ba 0c de a5 80 68 |.......O.......h| +00000040 fd 38 18 bf 0e e0 |.8....|" +"2019-09-24 01:05:38.674 UTC [cauthdsl] func2 -> DEBU 1acb 0xc0003b2de0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.675 UTC [cauthdsl] func1 -> DEBU 1acc 0xc0003b2de0 gate 1569287138672824900 evaluation succeeds" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1acd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1acf Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad1 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.675 UTC [policies] Evaluate -> DEBU 1ad2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.676 UTC [common.deliver] deliverBlocks -> DEBU 1ad3 [channel: businesschannel] Received seekInfo (0xc000cb1640) start: > stop: > from 172.18.0.5:53894" +"2019-09-24 01:05:38.676 UTC [fsblkstorage] Next -> DEBU 1ad4 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 1ad5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[51285]" +"2019-09-24 01:05:38.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad6 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 01:05:38.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ad8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.6µs " +"2019-09-24 01:05:38.677 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ad9 Sending msg of 28 bytes to 2 on channel businesschannel took 11.8µs" +"2019-09-24 01:05:38.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ad7 Remaining bytes=[76466], Going to peek [8] bytes" +"2019-09-24 01:05:38.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ada Returning blockbytes - length=[25480], placementInfo={fileNum=[0], startOffset=[51285], bytesOffset=[51288]}" +"2019-09-24 01:05:38.678 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1adc blockbytes [25480] read from file [0]" +"2019-09-24 01:05:38.678 UTC [common.deliver] deliverBlocks -> DEBU 1add [channel: businesschannel] Delivering block for (0xc000cb1640) for 172.18.0.5:53894" +"2019-09-24 01:05:38.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1adb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 228.6µs " +"2019-09-24 01:05:38.678 UTC [common.deliver] deliverBlocks -> DEBU 1ade [channel: businesschannel] Done delivering to 172.18.0.5:53894 for (0xc000cb1640)" +"2019-09-24 01:05:38.679 UTC [common.deliver] Handle -> DEBU 1adf Waiting for new SeekInfo from 172.18.0.5:53894" +"2019-09-24 01:05:38.679 UTC [common.deliver] Handle -> DEBU 1ae0 Attempting to read seek info message from 172.18.0.5:53894" +"2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae1 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae2 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae3 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.679 UTC [fsblkstorage] waitForBlock -> DEBU 1ae4 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:38.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ae6 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:38.689 UTC [grpc] infof -> DEBU 1ae7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:38.689 UTC [common.deliver] Handle -> WARN 1ae8 Error reading from 172.18.0.5:53894: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:38.689 UTC [orderer.common.server] func1 -> DEBU 1ae9 Closing Deliver stream" +"2019-09-24 01:05:38.690 UTC [comm.grpc.server] 1 -> INFO 1aea streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53894 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.3731ms +"2019-09-24 01:05:38.889 UTC [orderer.common.server] Deliver -> DEBU 1aeb Starting new Deliver handler" +"2019-09-24 01:05:38.889 UTC [common.deliver] Handle -> DEBU 1aec Starting new deliver loop for 172.18.0.5:53896" +"2019-09-24 01:05:38.890 UTC [common.deliver] Handle -> DEBU 1aed Attempting to read seek info message from 172.18.0.5:53896" +"2019-09-24 01:05:38.891 UTC [policies] Evaluate -> DEBU 1aee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1aef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.892 UTC [policies] Evaluate -> DEBU 1af2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.893 UTC [cauthdsl] func1 -> DEBU 1af3 0xc000178980 gate 1569287138893165700 evaluation starts" +"2019-09-24 01:05:38.893 UTC [cauthdsl] func2 -> DEBU 1af4 0xc000178980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.893 UTC [cauthdsl] func2 -> DEBU 1af5 0xc000178980 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.894 UTC [cauthdsl] func2 -> DEBU 1af6 0xc000178980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:38.894 UTC [cauthdsl] func2 -> DEBU 1af7 0xc000178980 principal evaluation fails" +"2019-09-24 01:05:38.894 UTC [cauthdsl] func1 -> DEBU 1af8 0xc000178980 gate 1569287138893165700 evaluation fails" +"2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1af9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1afa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.895 UTC [policies] Evaluate -> DEBU 1afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.895 UTC [cauthdsl] func1 -> DEBU 1afc 0xc000179560 gate 1569287138895394600 evaluation starts" +"2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1afd 0xc000179560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1afe 0xc000179560 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.895 UTC [cauthdsl] func2 -> DEBU 1aff 0xc000179560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:38.896 UTC [cauthdsl] func2 -> DEBU 1b00 0xc000179560 principal evaluation fails" +"2019-09-24 01:05:38.896 UTC [cauthdsl] func1 -> DEBU 1b01 0xc000179560 gate 1569287138895394600 evaluation fails" +"2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.896 UTC [policies] Evaluate -> DEBU 1b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.897 UTC [cauthdsl] func1 -> DEBU 1b05 0xc000179db0 gate 1569287138896992100 evaluation starts" +"2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b06 0xc000179db0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b07 0xc000179db0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b08 0xc000179db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:38.897 UTC [cauthdsl] func2 -> DEBU 1b09 0xc000179db0 principal evaluation fails" +"2019-09-24 01:05:38.898 UTC [cauthdsl] func1 -> DEBU 1b0a 0xc000179db0 gate 1569287138896992100 evaluation fails" +"2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0b Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.898 UTC [policies] func1 -> DEBU 1b0d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:38.898 UTC [policies] Evaluate -> DEBU 1b0e Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b0f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.899 UTC [policies] Evaluate -> DEBU 1b12 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:38.899 UTC [cauthdsl] func1 -> DEBU 1b13 0xc0002b6800 gate 1569287138899462200 evaluation starts" +"2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b14 0xc0002b6800 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b15 0xc0002b6800 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:38.899 UTC [cauthdsl] func2 -> DEBU 1b16 0xc0002b6800 principal matched by identity 0" +"2019-09-24 01:05:38.900 UTC [msp.identity] Verify -> DEBU 1b17 Verify: digest = 00000000 c1 8e f7 81 4e 7a 32 8a 6d 42 5e 02 9b f1 d2 9b |....Nz2.mB^.....| +00000010 99 27 a6 b1 66 16 e6 2e 4f 42 3f 4e e5 10 36 19 |.'..f...OB?N..6.|" +"2019-09-24 01:05:38.900 UTC [msp.identity] Verify -> DEBU 1b18 Verify: sig = 00000000 30 45 02 21 00 d0 19 ba d1 28 05 8d b1 22 92 8f |0E.!.....(..."..| +00000010 79 b8 1c e9 49 c4 bf 01 92 0d e0 1e 95 bc 0f 2c |y...I..........,| +00000020 60 2b a8 5b a9 02 20 5e 6d 53 2b 11 87 5a 31 d6 |`+.[.. ^mS+..Z1.| +00000030 5b c4 55 96 4f 84 fd 37 b2 f1 bb e9 5f dd 2b f5 |[.U.O..7...._.+.| +00000040 ee 3e 94 22 65 db 8e |.>."e..|" +"2019-09-24 01:05:38.900 UTC [cauthdsl] func2 -> DEBU 1b19 0xc0002b6800 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.900 UTC [cauthdsl] func1 -> DEBU 1b1a 0xc0002b6800 gate 1569287138899462200 evaluation succeeds" +"2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1d Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:38.901 UTC [policies] Evaluate -> DEBU 1b1f Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:38.902 UTC [policies] Evaluate -> DEBU 1b20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:38.902 UTC [common.deliver] deliverBlocks -> DEBU 1b21 [channel: businesschannel] Received seekInfo (0xc00097d840) start: > stop: > from 172.18.0.5:53896" +"2019-09-24 01:05:38.902 UTC [fsblkstorage] Next -> DEBU 1b22 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:38.902 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b23 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[76768]" +"2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b24 Remaining bytes=[50983], Going to peek [8] bytes" +"2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b25 Returning blockbytes - length=[4522], placementInfo={fileNum=[0], startOffset=[76768], bytesOffset=[76770]}" +"2019-09-24 01:05:38.903 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b26 blockbytes [4522] read from file [0]" +"2019-09-24 01:05:38.904 UTC [common.deliver] deliverBlocks -> DEBU 1b27 [channel: businesschannel] Delivering block for (0xc00097d840) for 172.18.0.5:53896" +"2019-09-24 01:05:38.904 UTC [common.deliver] deliverBlocks -> DEBU 1b28 [channel: businesschannel] Done delivering to 172.18.0.5:53896 for (0xc00097d840)" +"2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b29 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2a Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2b Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:38.905 UTC [fsblkstorage] waitForBlock -> DEBU 1b2c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:38.905 UTC [common.deliver] Handle -> DEBU 1b2d Waiting for new SeekInfo from 172.18.0.5:53896" +"2019-09-24 01:05:38.905 UTC [common.deliver] Handle -> DEBU 1b2e Attempting to read seek info message from 172.18.0.5:53896" +"2019-09-24 01:05:38.928 UTC [grpc] warningf -> DEBU 1b2f transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.2:7050->172.18.0.5:53896: read: connection reset by peer" +"2019-09-24 01:05:38.928 UTC [common.deliver] Handle -> WARN 1b30 Error reading from 172.18.0.5:53896: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:38.928 UTC [orderer.common.server] func1 -> DEBU 1b31 Closing Deliver stream" +"2019-09-24 01:05:38.928 UTC [comm.grpc.server] 1 -> INFO 1b32 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=39.3689ms +"2019-09-24 01:05:38.929 UTC [grpc] infof -> DEBU 1b33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:39.086 UTC [orderer.common.server] Deliver -> DEBU 1b34 Starting new Deliver handler" +"2019-09-24 01:05:39.086 UTC [common.deliver] Handle -> DEBU 1b35 Starting new deliver loop for 172.18.0.5:53898" +"2019-09-24 01:05:39.086 UTC [common.deliver] Handle -> DEBU 1b36 Attempting to read seek info message from 172.18.0.5:53898" +"2019-09-24 01:05:39.089 UTC [policies] Evaluate -> DEBU 1b37 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.089 UTC [policies] Evaluate -> DEBU 1b38 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.090 UTC [policies] Evaluate -> DEBU 1b39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:39.090 UTC [policies] Evaluate -> DEBU 1b3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.091 UTC [policies] Evaluate -> DEBU 1b3b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:39.091 UTC [cauthdsl] func1 -> DEBU 1b3c 0xc0001d0470 gate 1569287139091180000 evaluation starts" +"2019-09-24 01:05:39.091 UTC [cauthdsl] func2 -> DEBU 1b3d 0xc0001d0470 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.091 UTC [cauthdsl] func2 -> DEBU 1b3e 0xc0001d0470 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.092 UTC [cauthdsl] func2 -> DEBU 1b3f 0xc0001d0470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:39.092 UTC [cauthdsl] func2 -> DEBU 1b40 0xc0001d0470 principal evaluation fails" +"2019-09-24 01:05:39.092 UTC [cauthdsl] func1 -> DEBU 1b41 0xc0001d0470 gate 1569287139091180000 evaluation fails" +"2019-09-24 01:05:39.092 UTC [policies] Evaluate -> DEBU 1b42 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.093 UTC [policies] Evaluate -> DEBU 1b43 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.093 UTC [policies] Evaluate -> DEBU 1b44 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:39.094 UTC [cauthdsl] func1 -> DEBU 1b45 0xc0001d0cb0 gate 1569287139094077400 evaluation starts" +"2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b46 0xc0001d0cb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b47 0xc0001d0cb0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.094 UTC [cauthdsl] func2 -> DEBU 1b48 0xc0001d0cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:39.095 UTC [cauthdsl] func2 -> DEBU 1b49 0xc0001d0cb0 principal evaluation fails" +"2019-09-24 01:05:39.095 UTC [cauthdsl] func1 -> DEBU 1b4a 0xc0001d0cb0 gate 1569287139094077400 evaluation fails" +"2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.095 UTC [policies] Evaluate -> DEBU 1b4d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:39.095 UTC [cauthdsl] func1 -> DEBU 1b4e 0xc0001d14f0 gate 1569287139095961300 evaluation starts" +"2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b4f 0xc0001d14f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b50 0xc0001d14f0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b51 0xc0001d14f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:39.096 UTC [cauthdsl] func2 -> DEBU 1b52 0xc0001d14f0 principal evaluation fails" +"2019-09-24 01:05:39.096 UTC [cauthdsl] func1 -> DEBU 1b53 0xc0001d14f0 gate 1569287139095961300 evaluation fails" +"2019-09-24 01:05:39.096 UTC [policies] Evaluate -> DEBU 1b54 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.097 UTC [policies] Evaluate -> DEBU 1b55 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.097 UTC [policies] func1 -> DEBU 1b56 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b57 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b58 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.098 UTC [policies] Evaluate -> DEBU 1b5b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.099 UTC [cauthdsl] func1 -> DEBU 1b5c 0xc000946210 gate 1569287139099190200 evaluation starts" +"2019-09-24 01:05:39.099 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc000946210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.099 UTC [cauthdsl] func2 -> DEBU 1b5e 0xc000946210 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.100 UTC [cauthdsl] func2 -> DEBU 1b5f 0xc000946210 principal matched by identity 0" +"2019-09-24 01:05:39.100 UTC [msp.identity] Verify -> DEBU 1b60 Verify: digest = 00000000 7c 36 e9 6d 28 59 67 9f cc 45 46 77 ff 15 da d9 ||6.m(Yg..EFw....| +00000010 6f 4c d1 d7 96 a0 7f 95 07 07 53 fd f8 9f 28 a5 |oL........S...(.|" +"2019-09-24 01:05:39.100 UTC [msp.identity] Verify -> DEBU 1b61 Verify: sig = 00000000 30 44 02 20 6a 0e ae 6f b0 4b 7f 52 db fc 98 9a |0D. j..o.K.R....| +00000010 87 fc e9 91 b4 05 24 e8 d9 d5 9a cc 79 f4 6c 07 |......$.....y.l.| +00000020 4f da 65 cf 02 20 54 46 d0 a2 8a a5 71 7e 5f 82 |O.e.. TF....q~_.| +00000030 c0 14 88 c4 37 42 b4 28 f1 83 25 e7 d0 d1 cf e7 |....7B.(..%.....| +00000040 ea fd 58 48 f3 f5 |..XH..|" +"2019-09-24 01:05:39.101 UTC [cauthdsl] func2 -> DEBU 1b62 0xc000946210 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.101 UTC [cauthdsl] func1 -> DEBU 1b63 0xc000946210 gate 1569287139099190200 evaluation succeeds" +"2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b64 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b65 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b66 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.101 UTC [policies] Evaluate -> DEBU 1b67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.102 UTC [policies] Evaluate -> DEBU 1b68 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.102 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.102 UTC [common.deliver] deliverBlocks -> DEBU 1b6a [channel: businesschannel] Received seekInfo (0xc000cb1e80) start: > stop: > from 172.18.0.5:53898" +"2019-09-24 01:05:39.103 UTC [fsblkstorage] Next -> DEBU 1b6b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:39.103 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b6c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[81292]" +"2019-09-24 01:05:39.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6d Remaining bytes=[46459], Going to peek [8] bytes" +"2019-09-24 01:05:39.103 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6e Returning blockbytes - length=[3982], placementInfo={fileNum=[0], startOffset=[81292], bytesOffset=[81294]}" +"2019-09-24 01:05:39.104 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b6f blockbytes [3982] read from file [0]" +"2019-09-24 01:05:39.104 UTC [common.deliver] deliverBlocks -> DEBU 1b70 [channel: businesschannel] Delivering block for (0xc000cb1e80) for 172.18.0.5:53898" +"2019-09-24 01:05:39.105 UTC [common.deliver] deliverBlocks -> DEBU 1b71 [channel: businesschannel] Done delivering to 172.18.0.5:53898 for (0xc000cb1e80)" +"2019-09-24 01:05:39.105 UTC [common.deliver] Handle -> DEBU 1b72 Waiting for new SeekInfo from 172.18.0.5:53898" +"2019-09-24 01:05:39.105 UTC [common.deliver] Handle -> DEBU 1b73 Attempting to read seek info message from 172.18.0.5:53898" +"2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b74 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b75 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b76 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.106 UTC [fsblkstorage] waitForBlock -> DEBU 1b77 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.113 UTC [grpc] infof -> DEBU 1b78 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:39.113 UTC [common.deliver] Handle -> WARN 1b79 Error reading from 172.18.0.5:53898: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:39.114 UTC [orderer.common.server] func1 -> DEBU 1b7a Closing Deliver stream" +"2019-09-24 01:05:39.114 UTC [comm.grpc.server] 1 -> INFO 1b7b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53898 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.3614ms +"2019-09-24 01:05:39.174 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b7c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:39.174 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7d Sending msg of 28 bytes to 3 on channel testchainid took 16.7µs" +"2019-09-24 01:05:39.174 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b7e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200µs " +"2019-09-24 01:05:39.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b7f Sending msg of 28 bytes to 2 on channel businesschannel took 48µs" +"2019-09-24 01:05:39.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b80 Sending msg of 28 bytes to 3 on channel businesschannel took 276.6µs" +"2019-09-24 01:05:39.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b82 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +"2019-09-24 01:05:39.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 74.6µs " +"2019-09-24 01:05:39.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b84 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:39.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b83 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:39.310 UTC [orderer.common.server] Deliver -> DEBU 1b85 Starting new Deliver handler" +"2019-09-24 01:05:39.310 UTC [common.deliver] Handle -> DEBU 1b86 Starting new deliver loop for 172.18.0.5:53900" +"2019-09-24 01:05:39.311 UTC [common.deliver] Handle -> DEBU 1b87 Attempting to read seek info message from 172.18.0.5:53900" +"2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.312 UTC [policies] Evaluate -> DEBU 1b8a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:39.313 UTC [policies] Evaluate -> DEBU 1b8b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.313 UTC [policies] Evaluate -> DEBU 1b8c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:39.314 UTC [cauthdsl] func1 -> DEBU 1b8d 0xc0009672c0 gate 1569287139314216500 evaluation starts" +"2019-09-24 01:05:39.314 UTC [cauthdsl] func2 -> DEBU 1b8e 0xc0009672c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.314 UTC [cauthdsl] func2 -> DEBU 1b8f 0xc0009672c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.315 UTC [cauthdsl] func2 -> DEBU 1b90 0xc0009672c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:39.315 UTC [cauthdsl] func2 -> DEBU 1b91 0xc0009672c0 principal evaluation fails" +"2019-09-24 01:05:39.315 UTC [cauthdsl] func1 -> DEBU 1b92 0xc0009672c0 gate 1569287139314216500 evaluation fails" +"2019-09-24 01:05:39.315 UTC [policies] Evaluate -> DEBU 1b93 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.316 UTC [policies] Evaluate -> DEBU 1b94 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.316 UTC [policies] Evaluate -> DEBU 1b95 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:39.316 UTC [cauthdsl] func1 -> DEBU 1b96 0xc000967bb0 gate 1569287139316435500 evaluation starts" +"2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b97 0xc000967bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b98 0xc000967bb0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.316 UTC [cauthdsl] func2 -> DEBU 1b99 0xc000967bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:39.317 UTC [cauthdsl] func2 -> DEBU 1b9a 0xc000967bb0 principal evaluation fails" +"2019-09-24 01:05:39.317 UTC [cauthdsl] func1 -> DEBU 1b9b 0xc000967bb0 gate 1569287139316435500 evaluation fails" +"2019-09-24 01:05:39.317 UTC [policies] Evaluate -> DEBU 1b9c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.317 UTC [policies] Evaluate -> DEBU 1b9d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.318 UTC [policies] Evaluate -> DEBU 1b9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:39.318 UTC [cauthdsl] func1 -> DEBU 1b9f 0xc00097e630 gate 1569287139318412300 evaluation starts" +"2019-09-24 01:05:39.318 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc00097e630 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.318 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc00097e630 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.319 UTC [cauthdsl] func2 -> DEBU 1ba2 0xc00097e630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:39.319 UTC [cauthdsl] func2 -> DEBU 1ba3 0xc00097e630 principal evaluation fails" +"2019-09-24 01:05:39.319 UTC [cauthdsl] func1 -> DEBU 1ba4 0xc00097e630 gate 1569287139318412300 evaluation fails" +"2019-09-24 01:05:39.319 UTC [policies] Evaluate -> DEBU 1ba5 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.319 UTC [policies] Evaluate -> DEBU 1ba6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.319 UTC [policies] func1 -> DEBU 1ba7 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1ba8 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1bab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.320 UTC [policies] Evaluate -> DEBU 1bac == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.320 UTC [cauthdsl] func1 -> DEBU 1bad 0xc00097f3e0 gate 1569287139320572800 evaluation starts" +"2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1bae 0xc00097f3e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1baf 0xc00097f3e0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.321 UTC [cauthdsl] func2 -> DEBU 1bb0 0xc00097f3e0 principal matched by identity 0" +"2019-09-24 01:05:39.321 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 f5 db 81 ad 57 6d 12 69 c4 69 47 01 66 9d 53 04 |....Wm.i.iG.f.S.| +00000010 63 60 e7 9b 9e 60 60 15 85 41 7c 94 a0 20 4c 9e |c`...``..A|.. L.|" +"2019-09-24 01:05:39.321 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 45 02 21 00 eb 6a 32 7f 80 4e 2e 0a 76 ea f0 |0E.!..j2..N..v..| +00000010 66 e0 79 ed eb 9c 70 fa 72 b8 b2 90 8f 48 67 fe |f.y...p.r....Hg.| +00000020 2d e6 c8 3d 8f 02 20 5e df 5d c3 8c 72 f6 78 b6 |-..=.. ^.]..r.x.| +00000030 99 ee 44 44 d0 d0 93 db 78 5d 22 c6 5e 97 62 19 |..DD....x]".^.b.| +00000040 29 e0 a4 97 c2 34 97 |)....4.|" +"2019-09-24 01:05:39.322 UTC [cauthdsl] func2 -> DEBU 1bb3 0xc00097f3e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.322 UTC [cauthdsl] func1 -> DEBU 1bb4 0xc00097f3e0 gate 1569287139320572800 evaluation succeeds" +"2019-09-24 01:05:39.322 UTC [policies] Evaluate -> DEBU 1bb5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.322 UTC [policies] Evaluate -> DEBU 1bb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb7 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bb9 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.323 UTC [policies] Evaluate -> DEBU 1bba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.323 UTC [common.deliver] deliverBlocks -> DEBU 1bbb [channel: businesschannel] Received seekInfo (0xc001254cc0) start: > stop: > from 172.18.0.5:53900" +"2019-09-24 01:05:39.323 UTC [fsblkstorage] Next -> DEBU 1bbc Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:39.323 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bbd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[85276]" +"2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bbe Remaining bytes=[42475], Going to peek [8] bytes" +"2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bbf Returning blockbytes - length=[3984], placementInfo={fileNum=[0], startOffset=[85276], bytesOffset=[85278]}" +"2019-09-24 01:05:39.324 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bc0 blockbytes [3984] read from file [0]" +"2019-09-24 01:05:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1bc1 [channel: businesschannel] Delivering block for (0xc001254cc0) for 172.18.0.5:53900" +"2019-09-24 01:05:39.325 UTC [common.deliver] deliverBlocks -> DEBU 1bc2 [channel: businesschannel] Done delivering to 172.18.0.5:53900 for (0xc001254cc0)" +"2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc3 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc4 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc5 Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.326 UTC [fsblkstorage] waitForBlock -> DEBU 1bc6 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.326 UTC [common.deliver] Handle -> DEBU 1bc7 Waiting for new SeekInfo from 172.18.0.5:53900" +"2019-09-24 01:05:39.327 UTC [common.deliver] Handle -> DEBU 1bc8 Attempting to read seek info message from 172.18.0.5:53900" +"2019-09-24 01:05:39.336 UTC [grpc] infof -> DEBU 1bc9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:39.336 UTC [common.deliver] Handle -> WARN 1bca Error reading from 172.18.0.5:53900: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:39.336 UTC [orderer.common.server] func1 -> DEBU 1bcb Closing Deliver stream" +"2019-09-24 01:05:39.336 UTC [comm.grpc.server] 1 -> INFO 1bcc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53900 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.2543ms +"2019-09-24 01:05:39.492 UTC [orderer.common.server] Deliver -> DEBU 1bcd Starting new Deliver handler" +"2019-09-24 01:05:39.492 UTC [common.deliver] Handle -> DEBU 1bce Starting new deliver loop for 172.18.0.5:53902" +"2019-09-24 01:05:39.492 UTC [common.deliver] Handle -> DEBU 1bcf Attempting to read seek info message from 172.18.0.5:53902" +"2019-09-24 01:05:39.493 UTC [policies] Evaluate -> DEBU 1bd0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.493 UTC [policies] Evaluate -> DEBU 1bd1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.494 UTC [policies] Evaluate -> DEBU 1bd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func1 -> DEBU 1bd5 0xc000d031e0 gate 1569287139495076300 evaluation starts" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc000d031e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd7 0xc000d031e0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd8 0xc000d031e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc000d031e0 principal evaluation fails" +"2019-09-24 01:05:39.495 UTC [cauthdsl] func1 -> DEBU 1bda 0xc000d031e0 gate 1569287139495076300 evaluation fails" +"2019-09-24 01:05:39.496 UTC [policies] Evaluate -> DEBU 1bdb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.497 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.497 UTC [policies] Evaluate -> DEBU 1bdd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:39.497 UTC [cauthdsl] func1 -> DEBU 1bde 0xc000d03a20 gate 1569287139497626700 evaluation starts" +"2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1bdf 0xc000d03a20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be0 0xc000d03a20 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be1 0xc000d03a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2019-09-24 01:05:39.498 UTC [cauthdsl] func2 -> DEBU 1be2 0xc000d03a20 principal evaluation fails" +"2019-09-24 01:05:39.498 UTC [cauthdsl] func1 -> DEBU 1be3 0xc000d03a20 gate 1569287139497626700 evaluation fails" +"2019-09-24 01:05:39.498 UTC [policies] Evaluate -> DEBU 1be4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.499 UTC [policies] Evaluate -> DEBU 1be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.499 UTC [policies] Evaluate -> DEBU 1be6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:39.499 UTC [cauthdsl] func1 -> DEBU 1be7 0xc000d70280 gate 1569287139499141800 evaluation starts" +"2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1be8 0xc000d70280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1be9 0xc000d70280 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1bea 0xc000d70280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2019-09-24 01:05:39.499 UTC [cauthdsl] func2 -> DEBU 1beb 0xc000d70280 principal evaluation fails" +"2019-09-24 01:05:39.500 UTC [cauthdsl] func1 -> DEBU 1bec 0xc000d70280 gate 1569287139499141800 evaluation fails" +"2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bed Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bee == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.500 UTC [policies] func1 -> DEBU 1bef Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2019-09-24 01:05:39.500 UTC [policies] Evaluate -> DEBU 1bf0 Signature set did not satisfy policy /Channel/Application/Readers" +"2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.501 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.501 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc000d710c0 gate 1569287139501849500 evaluation starts" +"2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc000d710c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc000d710c0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.502 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc000d710c0 principal matched by identity 0" +"2019-09-24 01:05:39.502 UTC [msp.identity] Verify -> DEBU 1bf9 Verify: digest = 00000000 52 91 7d 92 f4 e1 fd 1f cc 54 6c 09 ca f0 20 4f |R.}......Tl... O| +00000010 b3 35 38 70 52 f7 18 ca 2f 31 8c aa e2 4e 29 c6 |.58pR.../1...N).|" +"2019-09-24 01:05:39.503 UTC [msp.identity] Verify -> DEBU 1bfa Verify: sig = 00000000 30 45 02 21 00 fb 11 9e 8d 21 87 45 63 06 65 86 |0E.!.....!.Ec.e.| +00000010 9d ba 20 55 fd 10 3e ee 82 40 27 69 fe b1 8f 90 |.. U..>..@'i....| +00000020 d1 a5 4f 01 87 02 20 5f 60 83 6b 98 8d a6 d4 60 |..O... _`.k....`| +00000030 83 31 2f 2f 0b c7 e3 d7 46 30 27 c8 dc d6 7f 05 |.1//....F0'.....| +00000040 03 de d4 53 98 e4 c5 |...S...|" +"2019-09-24 01:05:39.504 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc000d710c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.504 UTC [cauthdsl] func1 -> DEBU 1bfc 0xc000d710c0 gate 1569287139501849500 evaluation succeeds" +"2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bfd Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.504 UTC [policies] Evaluate -> DEBU 1c01 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.505 UTC [policies] Evaluate -> DEBU 1c02 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.506 UTC [common.deliver] deliverBlocks -> DEBU 1c03 [channel: businesschannel] Received seekInfo (0xc001255180) start: > stop: > from 172.18.0.5:53902" +"2019-09-24 01:05:39.506 UTC [fsblkstorage] Next -> DEBU 1c04 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2019-09-24 01:05:39.508 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c05 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89262]" +"2019-09-24 01:05:39.508 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c06 Remaining bytes=[38489], Going to peek [8] bytes" +"2019-09-24 01:05:39.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c07 Returning blockbytes - length=[38486], placementInfo={fileNum=[0], startOffset=[89262], bytesOffset=[89265]}" +"2019-09-24 01:05:39.509 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c08 blockbytes [38486] read from file [0]" +"2019-09-24 01:05:39.510 UTC [common.deliver] deliverBlocks -> DEBU 1c09 [channel: businesschannel] Delivering block for (0xc001255180) for 172.18.0.5:53902" +"2019-09-24 01:05:39.510 UTC [common.deliver] deliverBlocks -> DEBU 1c0a [channel: businesschannel] Done delivering to 172.18.0.5:53902 for (0xc001255180)" +"2019-09-24 01:05:39.511 UTC [fsblkstorage] waitForBlock -> DEBU 1c0b Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.511 UTC [fsblkstorage] waitForBlock -> DEBU 1c0c Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.511 UTC [common.deliver] Handle -> DEBU 1c0d Waiting for new SeekInfo from 172.18.0.5:53902" +"2019-09-24 01:05:39.511 UTC [common.deliver] Handle -> DEBU 1c0e Attempting to read seek info message from 172.18.0.5:53902" +"2019-09-24 01:05:39.512 UTC [fsblkstorage] waitForBlock -> DEBU 1c0f Came out of wait. maxAvailaBlockNumber=[6]" +"2019-09-24 01:05:39.512 UTC [fsblkstorage] waitForBlock -> DEBU 1c10 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2019-09-24 01:05:39.517 UTC [common.deliver] Handle -> WARN 1c11 Error reading from 172.18.0.5:53902: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:39.518 UTC [orderer.common.server] func1 -> DEBU 1c13 Closing Deliver stream" +"2019-09-24 01:05:39.518 UTC [comm.grpc.server] 1 -> INFO 1c14 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53902 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=26.1105ms +"2019-09-24 01:05:39.517 UTC [grpc] infof -> DEBU 1c12 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:39.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c15 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:39.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c16 Sending msg of 28 bytes to 3 on channel testchainid took 60.4µs" +"2019-09-24 01:05:39.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c17 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 200µs " +"2019-09-24 01:05:39.673 UTC [orderer.common.server] Deliver -> DEBU 1c18 Starting new Deliver handler" +"2019-09-24 01:05:39.673 UTC [common.deliver] Handle -> DEBU 1c19 Starting new deliver loop for 172.18.0.5:53904" +"2019-09-24 01:05:39.673 UTC [common.deliver] Handle -> DEBU 1c1a Attempting to read seek info message from 172.18.0.5:53904" +"2019-09-24 01:05:39.673 UTC [policies] Evaluate -> DEBU 1c1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.674 UTC [policies] Evaluate -> DEBU 1c1f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.674 UTC [cauthdsl] func1 -> DEBU 1c20 0xc000d0f280 gate 1569287139674423200 evaluation starts" +"2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c21 0xc000d0f280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c22 0xc000d0f280 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.674 UTC [cauthdsl] func2 -> DEBU 1c23 0xc000d0f280 principal matched by identity 0" +"2019-09-24 01:05:39.675 UTC [msp.identity] Verify -> DEBU 1c24 Verify: digest = 00000000 de 40 2f d6 dd a1 bf 6c d4 18 b6 1b 1c ef 0b ef |.@/....l........| +00000010 c9 37 1e 39 30 64 a7 4d 07 fe 6f 1b 56 7e 70 f0 |.7.90d.M..o.V~p.|" +"2019-09-24 01:05:39.675 UTC [msp.identity] Verify -> DEBU 1c25 Verify: sig = 00000000 30 45 02 21 00 98 fc 6d 8b 41 cb 3f 9a 4a 48 98 |0E.!...m.A.?.JH.| +00000010 b0 17 7a 94 a9 54 6f 75 c4 61 71 d2 f5 71 16 a1 |..z..Tou.aq..q..| +00000020 c9 7e e3 fc 3b 02 20 07 42 79 7c c0 f3 c7 f4 d2 |.~..;. .By|.....| +00000030 3b d6 8b bb 26 f0 c2 09 48 77 a9 8b 3e 00 a6 50 |;...&...Hw..>..P| +00000040 92 f6 0b 83 90 1d 01 |.......|" +"2019-09-24 01:05:39.675 UTC [cauthdsl] func2 -> DEBU 1c26 0xc000d0f280 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.675 UTC [cauthdsl] func1 -> DEBU 1c27 0xc000d0f280 gate 1569287139674423200 evaluation succeeds" +"2019-09-24 01:05:39.675 UTC [policies] Evaluate -> DEBU 1c28 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.675 UTC [policies] Evaluate -> DEBU 1c29 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2a Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2c Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.676 UTC [policies] Evaluate -> DEBU 1c2d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c2e Sending msg of 28 bytes to 2 on channel businesschannel took 272.5µs" +"2019-09-24 01:05:39.676 UTC [common.deliver] deliverBlocks -> DEBU 1c2f [channel: testchainid] Received seekInfo (0xc00104e980) start: > stop: > from 172.18.0.5:53904" +"2019-09-24 01:05:39.677 UTC [fsblkstorage] Next -> DEBU 1c30 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:39.677 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c31 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c32 Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c33 Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:39.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c34 blockbytes [27690] read from file [0]" +"2019-09-24 01:05:39.678 UTC [common.deliver] deliverBlocks -> DEBU 1c36 [channel: testchainid] Delivering block for (0xc00104e980) for 172.18.0.5:53904" +"2019-09-24 01:05:39.678 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c35 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2019-09-24 01:05:39.678 UTC [common.deliver] deliverBlocks -> DEBU 1c37 [channel: testchainid] Done delivering to 172.18.0.5:53904 for (0xc00104e980)" +"2019-09-24 01:05:39.678 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 229.7µs " +"2019-09-24 01:05:39.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c39 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.8µs " +"2019-09-24 01:05:39.681 UTC [common.deliver] Handle -> DEBU 1c3a Waiting for new SeekInfo from 172.18.0.5:53904" +"2019-09-24 01:05:39.681 UTC [common.deliver] Handle -> DEBU 1c3b Attempting to read seek info message from 172.18.0.5:53904" +"2019-09-24 01:05:39.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3c Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:39.682 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c3d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:39.686 UTC [grpc] infof -> DEBU 1c3e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:39.686 UTC [common.deliver] Handle -> WARN 1c3f Error reading from 172.18.0.5:53904: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:39.686 UTC [orderer.common.server] func1 -> DEBU 1c40 Closing Deliver stream" +"2019-09-24 01:05:39.686 UTC [comm.grpc.server] 1 -> INFO 1c41 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53904 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.5763ms +"2019-09-24 01:05:39.835 UTC [orderer.common.server] Deliver -> DEBU 1c42 Starting new Deliver handler" +"2019-09-24 01:05:39.835 UTC [common.deliver] Handle -> DEBU 1c43 Starting new deliver loop for 172.18.0.5:53906" +"2019-09-24 01:05:39.836 UTC [common.deliver] Handle -> DEBU 1c44 Attempting to read seek info message from 172.18.0.5:53906" +"2019-09-24 01:05:39.837 UTC [policies] Evaluate -> DEBU 1c45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.837 UTC [policies] Evaluate -> DEBU 1c46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.838 UTC [policies] Evaluate -> DEBU 1c47 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.838 UTC [policies] Evaluate -> DEBU 1c48 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.839 UTC [policies] Evaluate -> DEBU 1c49 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.839 UTC [cauthdsl] func1 -> DEBU 1c4a 0xc000b03be0 gate 1569287139839943800 evaluation starts" +"2019-09-24 01:05:39.840 UTC [cauthdsl] func2 -> DEBU 1c4b 0xc000b03be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.840 UTC [cauthdsl] func2 -> DEBU 1c4c 0xc000b03be0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.841 UTC [cauthdsl] func2 -> DEBU 1c4d 0xc000b03be0 principal matched by identity 0" +"2019-09-24 01:05:39.841 UTC [msp.identity] Verify -> DEBU 1c4e Verify: digest = 00000000 42 9f ae 40 c6 4a 34 d7 db ba f3 f2 0f 2f 27 77 |B..@.J4....../'w| +00000010 4a a3 92 9f 38 e9 83 1c ee 4b 2d ba 0c a4 74 6d |J...8....K-...tm|" +"2019-09-24 01:05:39.841 UTC [msp.identity] Verify -> DEBU 1c4f Verify: sig = 00000000 30 44 02 20 40 d9 c1 cf da 3c e5 77 60 72 31 1a |0D. @....<.w`r1.| +00000010 0e 67 c6 d9 66 3c 6d af 7c 19 8d c9 bc e2 9b 73 |.g..f..kM..X..-.....| +00000040 47 64 a2 c8 64 0c |Gd..d.|" +"2019-09-24 01:05:39.843 UTC [cauthdsl] func2 -> DEBU 1c50 0xc000b03be0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.844 UTC [cauthdsl] func1 -> DEBU 1c51 0xc000b03be0 gate 1569287139839943800 evaluation succeeds" +"2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c52 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c53 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c54 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.844 UTC [policies] Evaluate -> DEBU 1c55 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.845 UTC [policies] Evaluate -> DEBU 1c56 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.845 UTC [policies] Evaluate -> DEBU 1c57 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.845 UTC [common.deliver] deliverBlocks -> DEBU 1c58 [channel: testchainid] Received seekInfo (0xc00104f180) start: > stop: > from 172.18.0.5:53906" +"2019-09-24 01:05:39.846 UTC [fsblkstorage] Next -> DEBU 1c59 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:39.846 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c5a newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:39.846 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5b Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:39.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5c Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:39.847 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c5d blockbytes [27690] read from file [0]" +"2019-09-24 01:05:39.848 UTC [common.deliver] deliverBlocks -> DEBU 1c5e [channel: testchainid] Delivering block for (0xc00104f180) for 172.18.0.5:53906" +"2019-09-24 01:05:39.849 UTC [common.deliver] deliverBlocks -> DEBU 1c5f [channel: testchainid] Done delivering to 172.18.0.5:53906 for (0xc00104f180)" +"2019-09-24 01:05:39.850 UTC [common.deliver] Handle -> DEBU 1c60 Waiting for new SeekInfo from 172.18.0.5:53906" +"2019-09-24 01:05:39.850 UTC [common.deliver] Handle -> DEBU 1c61 Attempting to read seek info message from 172.18.0.5:53906" +"2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c62 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c63 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c64 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c65 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.852 UTC [policies] Evaluate -> DEBU 1c66 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:39.853 UTC [cauthdsl] func1 -> DEBU 1c67 0xc000d92190 gate 1569287139852992600 evaluation starts" +"2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c68 0xc000d92190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c69 0xc000d92190 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:39.853 UTC [cauthdsl] func2 -> DEBU 1c6a 0xc000d92190 principal matched by identity 0" +"2019-09-24 01:05:39.853 UTC [msp.identity] Verify -> DEBU 1c6b Verify: digest = 00000000 9d 29 eb a6 9a 33 8f be 1d d6 b5 08 ea 78 7c 7b |.)...3.......x|{| +00000010 89 95 27 51 cb aa e8 37 88 86 54 2a a3 26 58 dd |..'Q...7..T*.&X.|" +"2019-09-24 01:05:39.854 UTC [msp.identity] Verify -> DEBU 1c6c Verify: sig = 00000000 30 44 02 20 72 a8 da bf 00 a4 28 23 1c 71 64 1b |0D. r.....(#.qd.| +00000010 62 98 98 10 70 7c 05 e3 69 03 67 32 27 e4 32 e9 |b...p|..i.g2'.2.| +00000020 7a 35 68 34 02 20 07 29 34 c4 73 4a 3e e2 23 32 |z5h4. .)4.sJ>.#2| +00000030 9d ce 9d c3 57 ed e2 66 15 c9 57 4d bf 10 78 78 |....W..f..WM..xx| +00000040 12 4c fd 35 8d 99 |.L.5..|" +"2019-09-24 01:05:39.854 UTC [cauthdsl] func2 -> DEBU 1c6d 0xc000d92190 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.854 UTC [cauthdsl] func1 -> DEBU 1c6e 0xc000d92190 gate 1569287139852992600 evaluation succeeds" +"2019-09-24 01:05:39.854 UTC [policies] Evaluate -> DEBU 1c6f Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c70 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c71 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c72 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:39.855 UTC [policies] Evaluate -> DEBU 1c73 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:39.856 UTC [policies] Evaluate -> DEBU 1c74 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:39.856 UTC [common.deliver] deliverBlocks -> DEBU 1c75 [channel: testchainid] Received seekInfo (0xc001255940) start: > stop: > from 172.18.0.5:53906" +"2019-09-24 01:05:39.857 UTC [fsblkstorage] Next -> DEBU 1c76 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:39.857 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c77 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:39.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c78 Remaining bytes=[47980], Going to peek [8] bytes" +"2019-09-24 01:05:39.858 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c79 Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:39.860 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c7a blockbytes [20284] read from file [0]" +"2019-09-24 01:05:39.861 UTC [common.deliver] deliverBlocks -> DEBU 1c7b [channel: testchainid] Delivering block for (0xc001255940) for 172.18.0.5:53906" +"2019-09-24 01:05:39.862 UTC [common.deliver] deliverBlocks -> DEBU 1c7c [channel: testchainid] Done delivering to 172.18.0.5:53906 for (0xc001255940)" +"2019-09-24 01:05:39.862 UTC [common.deliver] Handle -> DEBU 1c7d Waiting for new SeekInfo from 172.18.0.5:53906" +"2019-09-24 01:05:39.863 UTC [common.deliver] Handle -> DEBU 1c7e Attempting to read seek info message from 172.18.0.5:53906" +"2019-09-24 01:05:39.872 UTC [common.deliver] Handle -> WARN 1c7f Error reading from 172.18.0.5:53906: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:39.872 UTC [orderer.common.server] func1 -> DEBU 1c80 Closing Deliver stream" +"2019-09-24 01:05:39.872 UTC [comm.grpc.server] 1 -> INFO 1c81 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53906 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=36.6184ms +"2019-09-24 01:05:39.872 UTC [grpc] infof -> DEBU 1c82 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:40.003 UTC [orderer.common.server] Deliver -> DEBU 1c83 Starting new Deliver handler" +"2019-09-24 01:05:40.003 UTC [common.deliver] Handle -> DEBU 1c84 Starting new deliver loop for 172.18.0.5:53908" +"2019-09-24 01:05:40.003 UTC [common.deliver] Handle -> DEBU 1c85 Attempting to read seek info message from 172.18.0.5:53908" +"2019-09-24 01:05:40.005 UTC [policies] Evaluate -> DEBU 1c86 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:40.005 UTC [policies] Evaluate -> DEBU 1c87 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:40.006 UTC [policies] Evaluate -> DEBU 1c88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:40.007 UTC [policies] Evaluate -> DEBU 1c89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:40.007 UTC [policies] Evaluate -> DEBU 1c8a == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:40.008 UTC [cauthdsl] func1 -> DEBU 1c8b 0xc001091e80 gate 1569287140008220900 evaluation starts" +"2019-09-24 01:05:40.008 UTC [cauthdsl] func2 -> DEBU 1c8c 0xc001091e80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:40.008 UTC [cauthdsl] func2 -> DEBU 1c8d 0xc001091e80 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:40.009 UTC [cauthdsl] func2 -> DEBU 1c8e 0xc001091e80 principal matched by identity 0" +"2019-09-24 01:05:40.009 UTC [msp.identity] Verify -> DEBU 1c8f Verify: digest = 00000000 4c e2 a6 02 a4 91 7a cc 6d 79 e9 50 4f 39 2e ec |L.....z.my.PO9..| +00000010 c0 8d 44 d2 7e 90 82 52 1a 7a 54 1a 4e c1 83 d0 |..D.~..R.zT.N...|" +"2019-09-24 01:05:40.009 UTC [msp.identity] Verify -> DEBU 1c90 Verify: sig = 00000000 30 45 02 21 00 ce 59 76 bb 6d 7f 51 db 8b 3c 26 |0E.!..Yv.m.Q..<&| +00000010 31 64 48 dd c0 a2 c3 a0 09 1c 13 79 8c 57 2e a3 |1dH........y.W..| +00000020 5a 8a b1 bb 13 02 20 05 17 f0 1a 69 3c a6 76 51 |Z..... ....i<.vQ| +00000030 f9 6f 28 91 77 cf 3f 5d 03 25 22 4b fc 27 7d 79 |.o(.w.?].%"K.'}y| +00000040 6b 54 2a bd 5e 15 45 |kT*.^.E|" +"2019-09-24 01:05:40.011 UTC [cauthdsl] func2 -> DEBU 1c91 0xc001091e80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:40.011 UTC [cauthdsl] func1 -> DEBU 1c92 0xc001091e80 gate 1569287140008220900 evaluation succeeds" +"2019-09-24 01:05:40.012 UTC [policies] Evaluate -> DEBU 1c93 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:40.012 UTC [policies] Evaluate -> DEBU 1c94 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c95 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c96 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c97 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:40.013 UTC [policies] Evaluate -> DEBU 1c98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:40.014 UTC [common.deliver] deliverBlocks -> DEBU 1c99 [channel: testchainid] Received seekInfo (0xc00104f580) start: > stop: > from 172.18.0.5:53908" +"2019-09-24 01:05:40.014 UTC [fsblkstorage] Next -> DEBU 1c9a Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:40.014 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c9b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2019-09-24 01:05:40.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9c Remaining bytes=[47980], Going to peek [8] bytes" +"2019-09-24 01:05:40.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9d Returning blockbytes - length=[20284], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2019-09-24 01:05:40.016 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c9e blockbytes [20284] read from file [0]" +"2019-09-24 01:05:40.017 UTC [common.deliver] deliverBlocks -> DEBU 1c9f [channel: testchainid] Delivering block for (0xc00104f580) for 172.18.0.5:53908" +"2019-09-24 01:05:40.017 UTC [common.deliver] deliverBlocks -> DEBU 1ca0 [channel: testchainid] Done delivering to 172.18.0.5:53908 for (0xc00104f580)" +"2019-09-24 01:05:40.017 UTC [common.deliver] Handle -> DEBU 1ca1 Waiting for new SeekInfo from 172.18.0.5:53908" +"2019-09-24 01:05:40.018 UTC [common.deliver] Handle -> DEBU 1ca2 Attempting to read seek info message from 172.18.0.5:53908" +"2019-09-24 01:05:40.030 UTC [common.deliver] Handle -> WARN 1ca3 Error reading from 172.18.0.5:53908: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:40.030 UTC [orderer.common.server] func1 -> DEBU 1ca4 Closing Deliver stream" +"2019-09-24 01:05:40.031 UTC [comm.grpc.server] 1 -> INFO 1ca5 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53908 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.4195ms +"2019-09-24 01:05:40.031 UTC [grpc] infof -> DEBU 1ca6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:40.157 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:40.158 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca8 Sending msg of 28 bytes to 3 on channel testchainid took 82.1µs" +"2019-09-24 01:05:40.159 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2796ms " +"2019-09-24 01:05:40.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caa Sending msg of 28 bytes to 2 on channel businesschannel took 52.9µs" +"2019-09-24 01:05:40.177 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cab Sending msg of 28 bytes to 3 on channel businesschannel took 23.6µs" +"2019-09-24 01:05:40.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.4µs " +"2019-09-24 01:05:40.178 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 221.2µs " +"2019-09-24 01:05:40.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cae Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:40.182 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1caf Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:40.186 UTC [orderer.common.server] Deliver -> DEBU 1cb0 Starting new Deliver handler" +"2019-09-24 01:05:40.186 UTC [common.deliver] Handle -> DEBU 1cb1 Starting new deliver loop for 172.18.0.5:53910" +"2019-09-24 01:05:40.186 UTC [common.deliver] Handle -> DEBU 1cb2 Attempting to read seek info message from 172.18.0.5:53910" +"2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:40.186 UTC [policies] Evaluate -> DEBU 1cb5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2019-09-24 01:05:40.187 UTC [policies] Evaluate -> DEBU 1cb6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:40.187 UTC [policies] Evaluate -> DEBU 1cb7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2019-09-24 01:05:40.187 UTC [cauthdsl] func1 -> DEBU 1cb8 0xc00104dba0 gate 1569287140187347000 evaluation starts" +"2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cb9 0xc00104dba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cba 0xc00104dba0 processing identity 0 with bytes of fd4750" +"2019-09-24 01:05:40.187 UTC [cauthdsl] func2 -> DEBU 1cbb 0xc00104dba0 principal matched by identity 0" +"2019-09-24 01:05:40.187 UTC [msp.identity] Verify -> DEBU 1cbc Verify: digest = 00000000 bf 22 10 4a 95 eb e4 03 ca 66 e3 31 da 69 8e a4 |.".J.....f.1.i..| +00000010 20 85 dc 94 a9 7d 16 72 22 83 19 38 a0 05 ac a3 | ....}.r"..8....|" +"2019-09-24 01:05:40.187 UTC [msp.identity] Verify -> DEBU 1cbd Verify: sig = 00000000 30 44 02 20 65 d8 48 ab 8a 8a 76 ed 9f 14 bb ab |0D. e.H...v.....| +00000010 85 05 40 29 c9 ab de 75 3f 56 25 79 23 0e b0 78 |..@)...u?V%y#..x| +00000020 4f f7 7c 2e 02 20 27 5c d8 48 b5 28 36 5a b1 67 |O.|.. '\.H.(6Z.g| +00000030 4b 91 4b bc 92 49 0b 9f 72 20 62 16 55 5b 2c 35 |K.K..I..r b.U[,5| +00000040 da 47 2b 81 4f 51 |.G+.OQ|" +"2019-09-24 01:05:40.188 UTC [cauthdsl] func2 -> DEBU 1cbe 0xc00104dba0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:40.188 UTC [cauthdsl] func1 -> DEBU 1cbf 0xc00104dba0 gate 1569287140187347000 evaluation succeeds" +"2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc0 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc2 Signature set satisfies policy /Channel/Orderer/Readers" +"2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2019-09-24 01:05:40.188 UTC [policies] Evaluate -> DEBU 1cc4 Signature set satisfies policy /Channel/Readers" +"2019-09-24 01:05:40.189 UTC [policies] Evaluate -> DEBU 1cc5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2019-09-24 01:05:40.189 UTC [common.deliver] deliverBlocks -> DEBU 1cc6 [channel: testchainid] Received seekInfo (0xc00115c540) start: > stop: > from 172.18.0.5:53910" +"2019-09-24 01:05:40.189 UTC [fsblkstorage] Next -> DEBU 1cc7 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2019-09-24 01:05:40.189 UTC [fsblkstorage] newBlockfileStream -> DEBU 1cc8 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[20287]" +"2019-09-24 01:05:40.189 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cc9 Remaining bytes=[27693], Going to peek [8] bytes" +"2019-09-24 01:05:40.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1cca Returning blockbytes - length=[27690], placementInfo={fileNum=[0], startOffset=[20287], bytesOffset=[20290]}" +"2019-09-24 01:05:40.190 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ccb blockbytes [27690] read from file [0]" +"2019-09-24 01:05:40.190 UTC [common.deliver] deliverBlocks -> DEBU 1ccc [channel: testchainid] Delivering block for (0xc00115c540) for 172.18.0.5:53910" +"2019-09-24 01:05:40.190 UTC [common.deliver] deliverBlocks -> DEBU 1ccd [channel: testchainid] Done delivering to 172.18.0.5:53910 for (0xc00115c540)" +"2019-09-24 01:05:40.190 UTC [common.deliver] Handle -> DEBU 1cce Waiting for new SeekInfo from 172.18.0.5:53910" +"2019-09-24 01:05:40.190 UTC [common.deliver] Handle -> DEBU 1ccf Attempting to read seek info message from 172.18.0.5:53910" +"2019-09-24 01:05:40.199 UTC [common.deliver] Handle -> WARN 1cd0 Error reading from 172.18.0.5:53910: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:40.199 UTC [orderer.common.server] func1 -> DEBU 1cd1 Closing Deliver stream" +"2019-09-24 01:05:40.199 UTC [comm.grpc.server] 1 -> INFO 1cd2 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.5:53910 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.8943ms +"2019-09-24 01:05:40.199 UTC [grpc] infof -> DEBU 1cd3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:40.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd4 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:40.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd5 Sending msg of 28 bytes to 3 on channel testchainid took 8µs" +"2019-09-24 01:05:40.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.1µs " +"2019-09-24 01:05:40.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd7 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2019-09-24 01:05:40.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd8 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +"2019-09-24 01:05:40.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.6µs " +"2019-09-24 01:05:40.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 142.2µs " +"2019-09-24 01:05:40.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdb Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:40.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdc Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:41.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdd Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:41.154 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cde Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2019-09-24 01:05:41.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.5µs " +"2019-09-24 01:05:41.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 186.9µs " +"2019-09-24 01:05:41.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce1 Sending msg of 28 bytes to 2 on channel businesschannel took 413.4µs" +"2019-09-24 01:05:41.180 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce2 Sending msg of 28 bytes to 3 on channel businesschannel took 24.6µs" +"2019-09-24 01:05:41.180 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.5µs " +"2019-09-24 01:05:41.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce4 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:41.187 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce5 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:41.655 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce6 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:41.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce7 Sending msg of 28 bytes to 3 on channel testchainid took 163.3µs" +"2019-09-24 01:05:41.657 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 705.1µs " +"2019-09-24 01:05:41.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce9 Sending msg of 28 bytes to 2 on channel businesschannel took 84.2µs" +"2019-09-24 01:05:41.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cea Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2019-09-24 01:05:41.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ceb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 379µs " +"2019-09-24 01:05:41.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 140.7µs " +"2019-09-24 01:05:41.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ced Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:41.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cee Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:42.155 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cef Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:42.157 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.9µs " +"2019-09-24 01:05:42.157 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel testchainid took 25.3µs" +"2019-09-24 01:05:42.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf2 Sending msg of 28 bytes to 2 on channel businesschannel took 28.7µs" +"2019-09-24 01:05:42.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf3 Sending msg of 28 bytes to 3 on channel businesschannel took 15.6µs" +"2019-09-24 01:05:42.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.6µs " +"2019-09-24 01:05:42.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf5 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:42.177 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 710.3µs " +"2019-09-24 01:05:42.181 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf7 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:42.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf8 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:42.654 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf9 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2019-09-24 01:05:42.654 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.6µs " +"2019-09-24 01:05:42.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfb Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +"2019-09-24 01:05:42.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfc Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2019-09-24 01:05:42.677 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 679.1µs " +"2019-09-24 01:05:42.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfe Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:42.679 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.2175ms " +"2019-09-24 01:05:42.681 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d00 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:43.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d01 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:43.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d02 Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2019-09-24 01:05:43.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +"2019-09-24 01:05:43.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d04 Sending msg of 28 bytes to 3 on channel businesschannel took 19.6µs" +"2019-09-24 01:05:43.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d05 Sending msg of 28 bytes to 2 on channel businesschannel took 6.5µs" +"2019-09-24 01:05:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 72.4µs " +"2019-09-24 01:05:43.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 45.8µs " +"2019-09-24 01:05:43.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d08 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:43.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d09 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:43.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:43.656 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100.8µs " +"2019-09-24 01:05:43.656 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0c Sending msg of 28 bytes to 3 on channel testchainid took 229.6µs" +"2019-09-24 01:05:43.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0d Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2019-09-24 01:05:43.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0e Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2019-09-24 01:05:43.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.9µs " +"2019-09-24 01:05:43.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 209.8µs " +"2019-09-24 01:05:43.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d11 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:43.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d12 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:44.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d13 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:44.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d14 Sending msg of 28 bytes to 3 on channel testchainid took 51.7µs" +"2019-09-24 01:05:44.154 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.3µs " +"2019-09-24 01:05:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d16 Sending msg of 28 bytes to 2 on channel businesschannel took 48.8µs" +"2019-09-24 01:05:44.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d17 Sending msg of 28 bytes to 3 on channel businesschannel took 7.9µs" +"2019-09-24 01:05:44.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.9µs " +"2019-09-24 01:05:44.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d19 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 594.4µs " +"2019-09-24 01:05:44.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:44.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:44.654 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:44.655 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1d Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2019-09-24 01:05:44.655 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 87.2µs " +"2019-09-24 01:05:44.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1f Sending msg of 28 bytes to 2 on channel businesschannel took 53.5µs" +"2019-09-24 01:05:44.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d20 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2019-09-24 01:05:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.4µs " +"2019-09-24 01:05:44.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d22 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 63.1µs " +"2019-09-24 01:05:44.679 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d23 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:44.680 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d24 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:45.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d25 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:45.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d26 Sending msg of 28 bytes to 3 on channel testchainid took 18.9µs" +"2019-09-24 01:05:45.155 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.232ms " +"2019-09-24 01:05:45.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d28 Sending msg of 28 bytes to 2 on channel businesschannel took 36.7µs" +"2019-09-24 01:05:45.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 314.2µs " +"2019-09-24 01:05:45.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2a Sending msg of 28 bytes to 3 on channel businesschannel took 87.7µs" +"2019-09-24 01:05:45.178 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:45.179 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.24ms " +"2019-09-24 01:05:45.180 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:45.652 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:45.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2f Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-09-24 01:05:45.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d30 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.3µs " +"2019-09-24 01:05:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d31 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2019-09-24 01:05:45.675 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d32 Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2019-09-24 01:05:45.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.7µs " +"2019-09-24 01:05:45.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d34 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 61.1µs " +"2019-09-24 01:05:45.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d35 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:45.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d36 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:46.153 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d37 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:46.153 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d38 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2019-09-24 01:05:46.153 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d39 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +"2019-09-24 01:05:46.175 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d3a Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2019-09-24 01:05:46.176 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d3b Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2019-09-24 01:05:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 69.5µs " +"2019-09-24 01:05:46.176 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.9µs " +"2019-09-24 01:05:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:46.177 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:46.653 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d40 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:46.653 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d41 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2019-09-24 01:05:46.653 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d42 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.9µs " +"2019-09-24 01:05:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d43 Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2019-09-24 01:05:46.676 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d44 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2019-09-24 01:05:46.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 127.1µs " +"2019-09-24 01:05:46.676 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d46 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226µs " +"2019-09-24 01:05:46.677 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d47 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:46.678 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d48 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:47.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d49 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:47.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4a Sending msg of 28 bytes to 3 on channel testchainid took 31.3µs" +"2019-09-24 01:05:47.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.6µs " +"2019-09-24 01:05:47.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4c Sending msg of 28 bytes to 2 on channel businesschannel took 23.9µs" +"2019-09-24 01:05:47.141 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d4d Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2019-09-24 01:05:47.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89µs " +"2019-09-24 01:05:47.141 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d4f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.2µs " +"2019-09-24 01:05:47.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d50 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:47.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d51 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:47.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d52 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:47.619 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d53 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2019-09-24 01:05:47.620 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d54 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.7µs " +"2019-09-24 01:05:47.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d55 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" +"2019-09-24 01:05:47.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d56 Sending msg of 28 bytes to 3 on channel businesschannel took 48.2µs" +"2019-09-24 01:05:47.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +"2019-09-24 01:05:47.644 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d58 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.2µs " +"2019-09-24 01:05:47.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d59 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:47.648 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d5a Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:48.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d5b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:48.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5c Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2019-09-24 01:05:48.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d5d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.4µs " +"2019-09-24 01:05:48.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5e Sending msg of 28 bytes to 2 on channel businesschannel took 54.3µs" +"2019-09-24 01:05:48.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d5f Sending msg of 28 bytes to 3 on channel businesschannel took 82µs" +"2019-09-24 01:05:48.143 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.1µs " +"2019-09-24 01:05:48.146 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d61 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6971ms " +"2019-09-24 01:05:48.147 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d62 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:48.148 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d63 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:48.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d64 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:48.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d65 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +"2019-09-24 01:05:48.618 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d66 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.3µs " +"2019-09-24 01:05:49.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d67 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:49.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d68 Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2019-09-24 01:05:49.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d69 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.8µs " +"2019-09-24 01:05:49.368 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d6a Sending msg of 28 bytes to 2 on channel businesschannel took 29.1µs" +"2019-09-24 01:05:49.368 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d6b Sending msg of 28 bytes to 3 on channel businesschannel took 37.1µs" +"2019-09-24 01:05:49.368 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98µs " +"2019-09-24 01:05:49.369 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.8µs " +"2019-09-24 01:05:49.385 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d6e Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:49.387 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d6f Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:49.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d70 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:49.628 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d71 Sending msg of 28 bytes to 3 on channel testchainid took 26.4µs" +"2019-09-24 01:05:49.629 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d72 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.6µs " +"2019-09-24 01:05:49.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d73 Sending msg of 28 bytes to 2 on channel businesschannel took 16.9µs" +"2019-09-24 01:05:49.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d74 Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.6µs " +"2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 62.6µs " +"2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d77 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:49.642 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d78 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:50.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d79 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:50.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7a Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2019-09-24 01:05:50.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.9µs " +"2019-09-24 01:05:50.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7c Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2019-09-24 01:05:50.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d7d Sending msg of 28 bytes to 3 on channel businesschannel took 18.3µs" +"2019-09-24 01:05:50.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.4µs " +"2019-09-24 01:05:50.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.1µs " +"2019-09-24 01:05:50.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d80 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:50.143 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d81 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:50.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d82 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:50.620 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d83 Sending msg of 28 bytes to 3 on channel testchainid took 21.8µs" +"2019-09-24 01:05:50.621 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 525.9µs " +"2019-09-24 01:05:50.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d85 Sending msg of 28 bytes to 2 on channel businesschannel took 29.2µs" +"2019-09-24 01:05:50.642 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d86 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2019-09-24 01:05:50.642 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.3µs " +"2019-09-24 01:05:50.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d88 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:50.645 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.8357ms " +"2019-09-24 01:05:50.647 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d8a Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:51.118 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d8b Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:51.118 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8c Sending msg of 28 bytes to 3 on channel testchainid took 19.3µs" +"2019-09-24 01:05:51.118 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.6µs " +"2019-09-24 01:05:51.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8e Sending msg of 28 bytes to 3 on channel businesschannel took 58.4µs" +"2019-09-24 01:05:51.142 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d8f Sending msg of 28 bytes to 2 on channel businesschannel took 17.8µs" +"2019-09-24 01:05:51.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 98.4µs " +"2019-09-24 01:05:51.142 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.1µs " +"2019-09-24 01:05:51.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d93 Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:51.144 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d92 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:51.618 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d94 Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:51.618 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d95 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2019-09-24 01:05:51.619 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.1µs " +"2019-09-24 01:05:51.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d97 Sending msg of 28 bytes to 2 on channel businesschannel took 28.4µs" +"2019-09-24 01:05:51.641 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d98 Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +"2019-09-24 01:05:51.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 277.6µs " +"2019-09-24 01:05:51.641 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.9µs " +"2019-09-24 01:05:51.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9b Received message from orderer1.example.com(172.18.0.4:54914): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:51.644 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9c Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel businesschannel with payload of size 28" +"2019-09-24 01:05:52.119 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d9d Received message from orderer2.example.com(172.18.0.3:44808): ConsensusRequest for channel testchainid with payload of size 28" +"2019-09-24 01:05:52.119 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d9e Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2019-09-24 01:05:52.119 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 222.7µs " diff --git a/hyperledger_fabric/v1.4.3/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.3/raft/logs/dev_peer0.log new file mode 100644 index 00000000..3c1a91c7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/raft/logs/dev_peer0.log @@ -0,0 +1,24357 @@ +"2019-09-24 01:04:18.599 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[string]interface{} value for peer.BCCSP" +"2019-09-24 01:04:18.600 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-09-24 01:04:18.600 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for peer.BCCSP.Default setting to string SW" +"2019-09-24 01:04:18.600 UTC [viperutil] getKeysRecursively -> DEBU 004 Found map[string]interface{} value for peer.BCCSP.SW" +"2019-09-24 01:04:18.601 UTC [viperutil] unmarshalJSON -> DEBU 005 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value" +"2019-09-24 01:04:18.601 UTC [viperutil] getKeysRecursively -> DEBU 006 Found real value for peer.BCCSP.SW.Hash setting to string SHA2" +"2019-09-24 01:04:18.602 UTC [viperutil] unmarshalJSON -> DEBU 007 Unmarshal JSON: value is not a string: 256" +"2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 008 Found real value for peer.BCCSP.SW.Security setting to int 256" +"2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 009 Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore" +"2019-09-24 01:04:18.603 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input" +"2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string " +"2019-09-24 01:04:18.603 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for peer.BCCSP.PKCS11" +"2019-09-24 01:04:18.604 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.605 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for peer.BCCSP.PKCS11.Library setting to " +"2019-09-24 01:04:18.607 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.608 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for peer.BCCSP.PKCS11.Label setting to " +"2019-09-24 01:04:18.610 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.610 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for peer.BCCSP.PKCS11.Pin setting to " +"2019-09-24 01:04:18.612 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.612 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for peer.BCCSP.PKCS11.Hash setting to " +"2019-09-24 01:04:18.613 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.613 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for peer.BCCSP.PKCS11.Security setting to " +"2019-09-24 01:04:18.613 UTC [viperutil] getKeysRecursively -> DEBU 017 Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore" +"2019-09-24 01:04:18.615 UTC [viperutil] unmarshalJSON -> DEBU 018 Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.616 UTC [viperutil] getKeysRecursively -> DEBU 019 Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to " +"2019-09-24 01:04:18.617 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 01a map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]]" +"2019-09-24 01:04:18.620 UTC [bccsp_sw] openKeyStore -> DEBU 01b KeyStore opened at [/etc/hyperledger/fabric/msp/keystore]...done" +"2019-09-24 01:04:18.620 UTC [bccsp] initBCCSP -> DEBU 01c Initialize BCCSP [SW]" +"2019-09-24 01:04:18.620 UTC [msp] getPemMaterialFromDir -> DEBU 01d Reading directory /etc/hyperledger/fabric/msp/signcerts" +"2019-09-24 01:04:18.623 UTC [msp] getPemMaterialFromDir -> DEBU 01e Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem" +"2019-09-24 01:04:18.626 UTC [msp] getPemMaterialFromDir -> DEBU 01f Reading directory /etc/hyperledger/fabric/msp/cacerts" +"2019-09-24 01:04:18.629 UTC [msp] getPemMaterialFromDir -> DEBU 020 Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem" +"2019-09-24 01:04:18.632 UTC [msp] getPemMaterialFromDir -> DEBU 021 Reading directory /etc/hyperledger/fabric/msp/admincerts" +"2019-09-24 01:04:18.634 UTC [msp] getPemMaterialFromDir -> DEBU 022 Reading directory /etc/hyperledger/fabric/msp/intermediatecerts" +"2019-09-24 01:04:18.634 UTC [msp] getMspConfig -> DEBU 023 Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory]" +"2019-09-24 01:04:18.634 UTC [msp] getPemMaterialFromDir -> DEBU 024 Reading directory /etc/hyperledger/fabric/msp/tlscacerts" +"2019-09-24 01:04:18.637 UTC [msp] getPemMaterialFromDir -> DEBU 025 Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem" +"2019-09-24 01:04:18.638 UTC [msp] getPemMaterialFromDir -> DEBU 026 Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts" +"2019-09-24 01:04:18.639 UTC [msp] getMspConfig -> DEBU 027 TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory]" +"2019-09-24 01:04:18.639 UTC [msp] getPemMaterialFromDir -> DEBU 028 Reading directory /etc/hyperledger/fabric/msp/crls" +"2019-09-24 01:04:18.639 UTC [msp] getMspConfig -> DEBU 029 crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory]" +"2019-09-24 01:04:18.642 UTC [msp] getMspConfig -> DEBU 02a Loading NodeOUs" +"2019-09-24 01:04:18.653 UTC [msp] newBccspMsp -> DEBU 02b Creating BCCSP-based MSP instance" +"2019-09-24 01:04:18.653 UTC [msp] New -> DEBU 02c Creating Cache-MSP instance" +"2019-09-24 01:04:18.653 UTC [msp] loadLocaMSP -> DEBU 02d Created new local MSP" +"2019-09-24 01:04:18.653 UTC [msp] Setup -> DEBU 02e Setting up MSP instance Org1MSP" +"2019-09-24 01:04:18.653 UTC [msp.identity] newIdentity -> DEBU 02f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:18.654 UTC [msp.identity] newIdentity -> DEBU 030 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:04:18.656 UTC [bccsp_sw] loadPrivateKey -> DEBU 031 Loading private key [ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1] at [/etc/hyperledger/fabric/msp/keystore/ebb94f2fd2aaf8cf5865ca6eb5a23e4895e63591bbdfe2673706e3e9025c9bf1_sk]..." +"2019-09-24 01:04:18.658 UTC [msp.identity] newIdentity -> DEBU 032 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:04:18.658 UTC [msp] setupSigningIdentity -> DEBU 033 Signing identity expires at 2029-09-21 00:59:00 +0000 UTC" +"2019-09-24 01:04:18.660 UTC [nodeCmd] serve -> INFO 034 Starting peer: + Version: 1.4.3 + Commit SHA: development build + Go version: go1.12.9 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.15 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-09-24 01:04:18.661 UTC [msp] GetDefaultSigningIdentity -> DEBU 035 Obtaining default signing identity" +"2019-09-24 01:04:18.662 UTC [msp.identity] Sign -> DEBU 036 Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-09-24 01:04:18.662 UTC [msp.identity] Sign -> DEBU 037 Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-09-24 01:04:18.662 UTC [ledgermgmt] initialize -> INFO 038 Initializing ledger mgmt" +"2019-09-24 01:04:18.662 UTC [kvledger] NewProvider -> INFO 039 Initializing ledger provider" +"2019-09-24 01:04:18.662 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03a CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/]" +"2019-09-24 01:04:18.663 UTC [kvledger.util] logDirStatus -> DEBU 03b Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist" +"2019-09-24 01:04:18.663 UTC [kvledger.util] logDirStatus -> DEBU 03c After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists" +"2019-09-24 01:04:18.678 UTC [historyleveldb] NewHistoryDBProvider -> DEBU 03d constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb" +"2019-09-24 01:04:18.679 UTC [kvledger.util] CreateDirIfMissing -> DEBU 03e CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/]" +"2019-09-24 01:04:18.679 UTC [kvledger.util] logDirStatus -> DEBU 03f Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist" +"2019-09-24 01:04:18.679 UTC [kvledger.util] logDirStatus -> DEBU 040 After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists" +"2019-09-24 01:04:18.696 UTC [kvledger.util] CreateDirIfMissing -> DEBU 041 CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/]" +"2019-09-24 01:04:18.701 UTC [kvledger.util] logDirStatus -> DEBU 042 Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist" +"2019-09-24 01:04:18.701 UTC [kvledger.util] logDirStatus -> DEBU 043 After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists" +"2019-09-24 01:04:18.718 UTC [kvledger] NewProvider -> INFO 044 ledger provider Initialized" +"2019-09-24 01:04:18.719 UTC [confighistory] newDBProvider -> DEBU 045 Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory" +"2019-09-24 01:04:18.720 UTC [kvledger.util] CreateDirIfMissing -> DEBU 046 CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/]" +"2019-09-24 01:04:18.720 UTC [kvledger.util] logDirStatus -> DEBU 047 Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist" +"2019-09-24 01:04:18.720 UTC [kvledger.util] logDirStatus -> DEBU 048 After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists" +"2019-09-24 01:04:18.730 UTC [kvledger.util] CreateDirIfMissing -> DEBU 049 CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/]" +"2019-09-24 01:04:18.730 UTC [kvledger.util] logDirStatus -> DEBU 04a Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist" +"2019-09-24 01:04:18.730 UTC [kvledger.util] logDirStatus -> DEBU 04b After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists" +"2019-09-24 01:04:18.739 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04c CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/]" +"2019-09-24 01:04:18.739 UTC [kvledger.util] logDirStatus -> DEBU 04d Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist" +"2019-09-24 01:04:18.739 UTC [kvledger.util] logDirStatus -> DEBU 04e After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists" +"2019-09-24 01:04:18.748 UTC [kvledger.util] CreateDirIfMissing -> DEBU 04f CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/]" +"2019-09-24 01:04:18.748 UTC [kvledger.util] logDirStatus -> DEBU 050 Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist" +"2019-09-24 01:04:18.748 UTC [kvledger.util] logDirStatus -> DEBU 051 After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists" +"2019-09-24 01:04:18.757 UTC [stateleveldb] NewVersionedDBProvider -> DEBU 052 constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb" +"2019-09-24 01:04:18.758 UTC [kvledger.util] CreateDirIfMissing -> DEBU 053 CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/]" +"2019-09-24 01:04:18.758 UTC [kvledger.util] logDirStatus -> DEBU 054 Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist" +"2019-09-24 01:04:18.758 UTC [kvledger.util] logDirStatus -> DEBU 055 After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists" +"2019-09-24 01:04:18.766 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 056 Recovering under construction ledger" +"2019-09-24 01:04:18.768 UTC [kvledger] recoverUnderConstructionLedger -> DEBU 057 No under construction ledger found. Quitting recovery" +"2019-09-24 01:04:18.768 UTC [ledgermgmt] initialize -> INFO 058 ledger mgmt initialized" +"2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 059 Auto-detected peer address: 172.18.0.7:7051" +"2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05a Returning peer0.org1.example.com:7051" +"2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05b Auto-detected peer address: 172.18.0.7:7051" +"2019-09-24 01:04:18.769 UTC [peer] func1 -> INFO 05c Returning peer0.org1.example.com:7051" +"2019-09-24 01:04:18.785 UTC [nodeCmd] serve -> INFO 05d Starting peer with TLS enabled" +"2019-09-24 01:04:18.801 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05e Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-09-24 01:04:18.801 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 05f Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-09-24 01:04:18.815 UTC [inproccontroller] Register -> DEBU 060 Registering chaincode instance: lscc-1.4.3" +"2019-09-24 01:04:18.815 UTC [sccapi] registerSysCC -> INFO 061 system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-09-24 01:04:18.816 UTC [inproccontroller] Register -> DEBU 062 Registering chaincode instance: cscc-1.4.3" +"2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 063 system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-09-24 01:04:18.816 UTC [inproccontroller] Register -> DEBU 064 Registering chaincode instance: qscc-1.4.3" +"2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 065 system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-09-24 01:04:18.816 UTC [sccapi] registerSysCC -> INFO 066 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled" +"2019-09-24 01:04:18.817 UTC [nodeCmd] serve -> DEBU 067 Running peer" +"2019-09-24 01:04:18.817 UTC [msp] GetDefaultSigningIdentity -> DEBU 068 Obtaining default signing identity" +"2019-09-24 01:04:18.818 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for peer.handlers" +"2019-09-24 01:04:18.818 UTC [viperutil] getKeysRecursively -> DEBU 06a Found map[string]interface{} value for peer.handlers.endorsers" +"2019-09-24 01:04:18.819 UTC [viperutil] getKeysRecursively -> DEBU 06b Found map[string]interface{} value for peer.handlers.endorsers.escc" +"2019-09-24 01:04:18.820 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.820 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for peer.handlers.endorsers.escc.library setting to " +"2019-09-24 01:04:18.821 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-09-24 01:04:18.821 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement" +"2019-09-24 01:04:18.821 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[string]interface{} value for peer.handlers.validators" +"2019-09-24 01:04:18.822 UTC [viperutil] getKeysRecursively -> DEBU 071 Found map[string]interface{} value for peer.handlers.validators.vscc" +"2019-09-24 01:04:18.822 UTC [viperutil] unmarshalJSON -> DEBU 072 Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value" +"2019-09-24 01:04:18.822 UTC [viperutil] getKeysRecursively -> DEBU 073 Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation" +"2019-09-24 01:04:18.823 UTC [viperutil] unmarshalJSON -> DEBU 074 Unmarshal JSON: value is not a string: " +"2019-09-24 01:04:18.824 UTC [viperutil] getKeysRecursively -> DEBU 075 Found real value for peer.handlers.validators.vscc.library setting to " +"2019-09-24 01:04:18.825 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-09-24 01:04:18.825 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]]" +"2019-09-24 01:04:18.825 UTC [viperutil] unmarshalJSON -> DEBU 078 Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]]" +"2019-09-24 01:04:18.825 UTC [viperutil] getKeysRecursively -> DEBU 079 Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]]" +"2019-09-24 01:04:18.826 UTC [viperutil] EnhancedExactUnmarshalKey -> DEBU 07a map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]]" +"2019-09-24 01:04:18.836 UTC [gossip.service] func1 -> INFO 07b Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-09-24 01:04:18.858 UTC [msp] DeserializeIdentity -> DEBU 07c Obtaining identity" +"2019-09-24 01:04:18.858 UTC [msp.identity] newIdentity -> DEBU 07d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:04:18.860 UTC [msp] Validate -> DEBU 07e MSP Org1MSP validating identity" +"2019-09-24 01:04:18.861 UTC [msp] getCertificationChain -> DEBU 07f MSP Org1MSP getting certification chain" +"2019-09-24 01:04:18.862 UTC [gossip.discovery] periodicalSendAlive -> DEBU 080 Sleeping 5s" +"2019-09-24 01:04:18.862 UTC [gossip.gossip] NewGossipService -> INFO 081 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f, Metadata: " +"2019-09-24 01:04:18.863 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 082 Sleeping 25s" +"2019-09-24 01:04:18.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 083 Obtaining default signing identity" +"2019-09-24 01:04:18.864 UTC [msp.identity] Sign -> DEBU 084 Sign: plaintext: 1801AA01D7060A20D925A8D65F6B3C84...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:18.864 UTC [msp.identity] Sign -> DEBU 085 Sign: digest: F0FB10D3C1457F727357F6D557E9312864F3FC1AE0BF8DD0E150BF246E3CC1E9 " +"2019-09-24 01:04:18.865 UTC [gossip.pull] Add -> DEBU 086 Added �%��_k<���\<���8 [:5AT�!�]�, total items: 1" +"2019-09-24 01:04:18.865 UTC [gossip.gossip] start -> INFO 087 Gossip instance peer0.org1.example.com:7051 started" +"2019-09-24 01:04:18.865 UTC [gossip.gossip] syncDiscovery -> DEBU 088 Entering discovery sync with interval 4s" +"2019-09-24 01:04:18.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 089 Obtaining default signing identity" +"2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08a Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08b Sign: digest: 9FFF7CC1A7A9C4DC45A7632F9C88E82E49EDCEF86988E2E05267116067760F24 " +"2019-09-24 01:04:18.866 UTC [msp] GetDefaultSigningIdentity -> DEBU 08c Obtaining default signing identity" +"2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:18.866 UTC [msp.identity] Sign -> DEBU 08e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:18.867 UTC [gossip.discovery] Connect -> DEBU 08f Skipping connecting to myself" +"2019-09-24 01:04:18.867 UTC [chaincode] LaunchConfig -> DEBU 090 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 01:04:18.867 UTC [chaincode] Start -> DEBU 091 start container: lscc:1.4.3" +"2019-09-24 01:04:18.868 UTC [chaincode] Start -> DEBU 092 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 01:04:18.868 UTC [chaincode] Start -> DEBU 093 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.3 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-09-24 01:04:18.869 UTC [container] lockContainer -> DEBU 094 waiting for container(lscc-1.4.3) lock" +"2019-09-24 01:04:18.869 UTC [container] lockContainer -> DEBU 095 got container (lscc-1.4.3) lock" +"2019-09-24 01:04:18.870 UTC [inproccontroller] getInstance -> DEBU 096 chaincode instance created for lscc-1.4.3" +"2019-09-24 01:04:18.870 UTC [container] unlockContainer -> DEBU 097 container lock deleted(lscc-1.4.3)" +"2019-09-24 01:04:18.870 UTC [inproccontroller] func1 -> DEBU 099 chaincode started for lscc-1.4.3" +"2019-09-24 01:04:18.871 UTC [container] lockContainer -> DEBU 09a waiting for container(lscc-1.4.3) lock" +"2019-09-24 01:04:18.872 UTC [container] lockContainer -> DEBU 09b got container (lscc-1.4.3) lock" +"2019-09-24 01:04:18.872 UTC [container] unlockContainer -> DEBU 09c container lock deleted(lscc-1.4.3)" +"2019-09-24 01:04:18.870 UTC [inproccontroller] func2 -> DEBU 098 chaincode-support started for lscc-1.4.3" +"2019-09-24 01:04:18.873 UTC [chaincode] handleMessage -> DEBU 09d [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 09e Received REGISTER in state created" +"2019-09-24 01:04:18.874 UTC [chaincode] Register -> DEBU 09f registered handler complete for chaincode lscc:1.4.3" +"2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 0a0 Got REGISTER for chaincodeID = name:"lscc:1.4.3" , sending back REGISTERED" +"2019-09-24 01:04:18.874 UTC [chaincode] HandleRegister -> DEBU 0a1 Changed state to established for name:"lscc:1.4.3" " +"2019-09-24 01:04:18.875 UTC [chaincode] sendReady -> DEBU 0a2 sending READY for chaincode name:"lscc:1.4.3" " +"2019-09-24 01:04:18.875 UTC [chaincode] sendReady -> DEBU 0a3 Changed to state ready for chaincode name:"lscc:1.4.3" " +"2019-09-24 01:04:18.875 UTC [chaincode] Launch -> DEBU 0a4 launch complete" +"2019-09-24 01:04:18.875 UTC [chaincode] Execute -> DEBU 0a5 Entry" +"2019-09-24 01:04:18.876 UTC [chaincode] handleMessage -> DEBU 0a6 [287005e4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:18.876 UTC [chaincode] Notify -> DEBU 0a7 [287005e4] notifying Txid:287005e4-508e-431f-ad8c-1116299b9ab8, channelID:" +"2019-09-24 01:04:18.876 UTC [chaincode] Execute -> DEBU 0a8 Exit" +"2019-09-24 01:04:18.876 UTC [sccapi] deploySysCC -> INFO 0a9 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-09-24 01:04:18.877 UTC [chaincode] LaunchConfig -> DEBU 0aa launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ab start container: cscc:1.4.3" +"2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ac start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 01:04:18.877 UTC [chaincode] Start -> DEBU 0ad start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.3 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0ae waiting for container(cscc-1.4.3) lock" +"2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0af got container (cscc-1.4.3) lock" +"2019-09-24 01:04:18.877 UTC [inproccontroller] getInstance -> DEBU 0b0 chaincode instance created for cscc-1.4.3" +"2019-09-24 01:04:18.877 UTC [container] unlockContainer -> DEBU 0b1 container lock deleted(cscc-1.4.3)" +"2019-09-24 01:04:18.878 UTC [inproccontroller] func2 -> DEBU 0b2 chaincode-support started for cscc-1.4.3" +"2019-09-24 01:04:18.878 UTC [inproccontroller] func1 -> DEBU 0b3 chaincode started for cscc-1.4.3" +"2019-09-24 01:04:18.878 UTC [chaincode] handleMessage -> DEBU 0b4 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b5 Received REGISTER in state created" +"2019-09-24 01:04:18.878 UTC [chaincode] Register -> DEBU 0b6 registered handler complete for chaincode cscc:1.4.3" +"2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b7 Got REGISTER for chaincodeID = name:"cscc:1.4.3" , sending back REGISTERED" +"2019-09-24 01:04:18.878 UTC [chaincode] HandleRegister -> DEBU 0b8 Changed state to established for name:"cscc:1.4.3" " +"2019-09-24 01:04:18.878 UTC [chaincode] sendReady -> DEBU 0b9 sending READY for chaincode name:"cscc:1.4.3" " +"2019-09-24 01:04:18.878 UTC [chaincode] sendReady -> DEBU 0ba Changed to state ready for chaincode name:"cscc:1.4.3" " +"2019-09-24 01:04:18.878 UTC [chaincode] Launch -> DEBU 0bb launch complete" +"2019-09-24 01:04:18.878 UTC [chaincode] Execute -> DEBU 0bc Entry" +"2019-09-24 01:04:18.878 UTC [cscc] Init -> INFO 0bd Init CSCC" +"2019-09-24 01:04:18.879 UTC [chaincode] handleMessage -> DEBU 0be [161b3d83] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:18.879 UTC [chaincode] Notify -> DEBU 0bf [161b3d83] notifying Txid:161b3d83-cd56-426d-baf4-bf498d387a4d, channelID:" +"2019-09-24 01:04:18.879 UTC [chaincode] Execute -> DEBU 0c0 Exit" +"2019-09-24 01:04:18.879 UTC [sccapi] deploySysCC -> INFO 0c1 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-09-24 01:04:18.880 UTC [chaincode] LaunchConfig -> DEBU 0c2 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.3,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c3 start container: qscc:1.4.3" +"2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c4 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 01:04:18.880 UTC [chaincode] Start -> DEBU 0c5 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.3 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0c6 waiting for container(qscc-1.4.3) lock" +"2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0c7 got container (qscc-1.4.3) lock" +"2019-09-24 01:04:18.880 UTC [inproccontroller] getInstance -> DEBU 0c8 chaincode instance created for qscc-1.4.3" +"2019-09-24 01:04:18.880 UTC [container] unlockContainer -> DEBU 0c9 container lock deleted(qscc-1.4.3)" +"2019-09-24 01:04:18.880 UTC [container] lockContainer -> DEBU 0ca waiting for container(qscc-1.4.3) lock" +"2019-09-24 01:04:18.881 UTC [container] lockContainer -> DEBU 0cb got container (qscc-1.4.3) lock" +"2019-09-24 01:04:18.881 UTC [container] unlockContainer -> DEBU 0cc container lock deleted(qscc-1.4.3)" +"2019-09-24 01:04:18.881 UTC [inproccontroller] func2 -> DEBU 0cd chaincode-support started for qscc-1.4.3" +"2019-09-24 01:04:18.881 UTC [inproccontroller] func1 -> DEBU 0ce chaincode started for qscc-1.4.3" +"2019-09-24 01:04:18.881 UTC [chaincode] handleMessage -> DEBU 0cf [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d0 Received REGISTER in state created" +"2019-09-24 01:04:18.881 UTC [chaincode] Register -> DEBU 0d1 registered handler complete for chaincode qscc:1.4.3" +"2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d2 Got REGISTER for chaincodeID = name:"qscc:1.4.3" , sending back REGISTERED" +"2019-09-24 01:04:18.881 UTC [chaincode] HandleRegister -> DEBU 0d3 Changed state to established for name:"qscc:1.4.3" " +"2019-09-24 01:04:18.882 UTC [chaincode] sendReady -> DEBU 0d4 sending READY for chaincode name:"qscc:1.4.3" " +"2019-09-24 01:04:18.882 UTC [chaincode] sendReady -> DEBU 0d5 Changed to state ready for chaincode name:"qscc:1.4.3" " +"2019-09-24 01:04:18.882 UTC [chaincode] Launch -> DEBU 0d6 launch complete" +"2019-09-24 01:04:18.882 UTC [chaincode] Execute -> DEBU 0d7 Entry" +"2019-09-24 01:04:18.882 UTC [qscc] Init -> INFO 0d8 Init QSCC" +"2019-09-24 01:04:18.882 UTC [chaincode] handleMessage -> DEBU 0d9 [2feec172] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:18.882 UTC [chaincode] Notify -> DEBU 0da [2feec172] notifying Txid:2feec172-327a-4973-9187-c44a0443d1bc, channelID:" +"2019-09-24 01:04:18.882 UTC [chaincode] Execute -> DEBU 0db Exit" +"2019-09-24 01:04:18.882 UTC [sccapi] deploySysCC -> INFO 0dc system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-09-24 01:04:18.883 UTC [sccapi] deploySysCC -> INFO 0dd system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-09-24 01:04:18.883 UTC [nodeCmd] serve -> INFO 0de Deployed system chaincodes" +"2019-09-24 01:04:18.883 UTC [ccprovider] ListInstalledChaincodes -> DEBU 0df Returning []" +"2019-09-24 01:04:18.884 UTC [discovery] NewService -> INFO 0e0 Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-09-24 01:04:18.884 UTC [nodeCmd] registerDiscoveryService -> INFO 0e1 Discovery service activated" +"2019-09-24 01:04:18.885 UTC [nodeCmd] serve -> INFO 0e2 Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-09-24 01:04:18.885 UTC [nodeCmd] serve -> INFO 0e3 Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-09-24 01:04:18.885 UTC [kvledger] LoadPreResetHeight -> INFO 0e4 Loading prereset height from path [/var/hyperledger/production/ledgersData/chains]" +"2019-09-24 01:04:18.885 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0e5 Loading Pre-reset heights" +"2019-09-24 01:04:18.885 UTC [fsblkstorage] preRestHtFiles -> INFO 0e6 Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting" +"2019-09-24 01:04:18.885 UTC [fsblkstorage] LoadPreResetHeight -> INFO 0e7 Pre-reset heights loaded" +"2019-09-24 01:04:18.877 UTC [container] lockContainer -> DEBU 0e8 waiting for container(cscc-1.4.3) lock" +"2019-09-24 01:04:18.886 UTC [container] lockContainer -> DEBU 0e9 got container (cscc-1.4.3) lock" +"2019-09-24 01:04:18.886 UTC [container] unlockContainer -> DEBU 0ea container lock deleted(cscc-1.4.3)" +"2019-09-24 01:04:19.540 UTC [comm.grpc.server] 1 -> INFO 0eb unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:21.54Z grpc.peer_address=172.18.0.6:43942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.2µs +"2019-09-24 01:04:19.544 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ec Obtaining default signing identity" +"2019-09-24 01:04:19.544 UTC [msp.identity] Sign -> DEBU 0ed Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:19.544 UTC [msp.identity] Sign -> DEBU 0ee Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:19.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0ef Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43942" +"2019-09-24 01:04:19.545 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f0 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43942" +"2019-09-24 01:04:19.545 UTC [msp] DeserializeIdentity -> DEBU 0f1 Obtaining identity" +"2019-09-24 01:04:19.547 UTC [msp.identity] newIdentity -> DEBU 0f2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE-----" +"2019-09-24 01:04:19.547 UTC [msp] Validate -> DEBU 0f3 MSP Org1MSP validating identity" +"2019-09-24 01:04:19.552 UTC [msp] getCertificationChain -> DEBU 0f4 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:19.553 UTC [msp.identity] Verify -> DEBU 0f5 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:19.553 UTC [grpc] infof -> DEBU 0f6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:19.553 UTC [msp.identity] Verify -> DEBU 0f7 Verify: sig = 00000000 30 44 02 20 48 0c 20 b3 6c cc 9d 85 70 28 54 0c |0D. H. .l...p(T.| +00000010 ca 02 0e 92 a5 bd d4 b1 1c d7 9e 92 6c 89 a0 62 |............l..b| +00000020 8f 7e f7 d0 02 20 56 d2 3e 12 4e 66 21 02 2a 3f |.~... V.>.Nf!.*?| +00000030 25 93 28 c2 9b e8 0a 0d 90 c0 4d 83 2f 8e a3 7f |%.(.......M./...| +00000040 d3 ef 7d 43 36 ee |..}C6.|" +"2019-09-24 01:04:19.554 UTC [gossip.comm] authenticateRemotePeer -> DEBU 0f8 Authenticated 172.18.0.6:43942" +"2019-09-24 01:04:19.554 UTC [gossip.comm] GossipStream -> DEBU 0f9 Servicing 172.18.0.6:43942" +"2019-09-24 01:04:19.554 UTC [gossip.comm] readFromStream -> DEBU 0fa Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:19.555 UTC [gossip.comm] func2 -> DEBU 0fb Client 172.18.0.6:43942 disconnected" +"2019-09-24 01:04:19.555 UTC [comm.grpc.server] 1 -> INFO 0fc streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:29.543Z grpc.peer_address=172.18.0.6:43942 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.4058ms +"2019-09-24 01:04:19.555 UTC [gossip.comm] writeToStream -> DEBU 0fd Closing writing to stream" +"2019-09-24 01:04:19.557 UTC [comm.grpc.server] 1 -> INFO 0fe unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:21.556Z grpc.peer_address=172.18.0.6:43944 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=196.6µs +"2019-09-24 01:04:19.561 UTC [msp] GetDefaultSigningIdentity -> DEBU 0ff Obtaining default signing identity" +"2019-09-24 01:04:19.561 UTC [msp.identity] Sign -> DEBU 100 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:19.561 UTC [msp.identity] Sign -> DEBU 101 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:19.562 UTC [gossip.comm] authenticateRemotePeer -> DEBU 102 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43944" +"2019-09-24 01:04:19.563 UTC [gossip.comm] authenticateRemotePeer -> DEBU 103 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43944" +"2019-09-24 01:04:19.564 UTC [msp.identity] Verify -> DEBU 104 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:19.564 UTC [msp.identity] Verify -> DEBU 105 Verify: sig = 00000000 30 44 02 20 5e c5 a7 ac e9 20 ec a3 77 65 db bd |0D. ^.... ..we..| +00000010 8f 61 62 c4 e5 d6 36 4b 48 71 54 b2 14 1b 59 b8 |.ab...6KHqT...Y.| +00000020 53 82 3c 51 02 20 20 e7 79 08 3c 00 0e 6f 99 86 |S. DEBU 106 Authenticated 172.18.0.6:43944" +"2019-09-24 01:04:19.565 UTC [gossip.comm] GossipStream -> DEBU 107 Servicing 172.18.0.6:43944" +"2019-09-24 01:04:19.566 UTC [gossip.gossip] handleMessage -> DEBU 108 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:9221380010016404981 tag:EMPTY mem_req: > > , Envelope: 1107 bytes, Signature: 0 bytes" +"2019-09-24 01:04:19.566 UTC [gossip.gossip] handleMessage -> DEBU 109 Exiting" +"2019-09-24 01:04:19.566 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10a Got message: GossipMessage: nonce:9221380010016404981 tag:EMPTY mem_req: > > , Envelope: 1107 bytes, Signature: 0 bytes" +"2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10b Verify: digest = 00000000 a6 53 cd 4e fe 4f 65 a2 e5 8d 8c fa 99 3f 71 dc |.S.N.Oe......?q.| +00000010 b7 78 78 f5 ce 6f 77 af 5b 61 80 7c 3d e4 09 cc |.xx..ow.[a.|=...|" +"2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10c Verify: sig = 00000000 30 44 02 20 37 3a 05 66 63 d6 c3 52 56 3d d4 8e |0D. 7:.fc..RV=..| +00000010 b4 0d f7 e6 41 20 18 8a a5 06 6f 36 ab 1e ea 3d |....A ....o6...=| +00000020 73 9b f1 c7 02 20 6a 1e d3 47 b4 17 07 f4 4d 2e |s.... j..G....M.| +00000030 76 e8 ab 8c 0d ac f6 e7 4a 34 ac a8 81 f1 0a 9c |v.......J4......| +00000040 bf ba a1 0c ab 09 |......|" +"2019-09-24 01:04:19.567 UTC [msp.identity] Verify -> DEBU 10d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:19.568 UTC [msp.identity] Verify -> DEBU 10e Verify: sig = 00000000 30 44 02 20 3c b3 6a 79 43 7f bd 8f bf 69 dc 0c |0D. <.jyC....i..| +00000010 00 d5 c5 fc cd 35 85 63 1c 6a d7 45 47 c6 ac 30 |.....5.c.j.EG..0| +00000020 7b e4 53 65 02 20 3b 63 cc 2d b9 0e 78 b3 52 61 |{.Se. ;c.-..x.Ra| +00000030 99 4d 7b ea 56 82 88 62 c9 85 b4 0e 17 36 7b d8 |.M{.V..b.....6{.| +00000040 c8 93 21 77 d4 08 |..!w..|" +"2019-09-24 01:04:19.568 UTC [gossip.discovery] handleAliveMessage -> DEBU 10f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:19.568 UTC [gossip.discovery] learnNewMembers -> DEBU 110 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]}" +"2019-09-24 01:04:19.569 UTC [gossip.discovery] learnNewMembers -> DEBU 111 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:19.569 UTC [gossip.discovery] learnNewMembers -> DEBU 112 Exiting" +"2019-09-24 01:04:19.569 UTC [gossip.discovery] handleAliveMessage -> DEBU 113 Exiting" +"2019-09-24 01:04:19.569 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114 Exiting" +"2019-09-24 01:04:19.570 UTC [gossip.discovery] sendMemResponse -> DEBU 115 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:19.570 UTC [msp] GetDefaultSigningIdentity -> DEBU 116 Obtaining default signing identity" +"2019-09-24 01:04:19.570 UTC [msp.identity] Sign -> DEBU 117 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:19.570 UTC [msp.identity] Sign -> DEBU 118 Sign: digest: A2F561CEF2B4365B9213507DC6593F2F86108D16ED807EB900A430B9A3898EB1 " +"2019-09-24 01:04:19.571 UTC [msp] GetDefaultSigningIdentity -> DEBU 119 Obtaining default signing identity" +"2019-09-24 01:04:19.571 UTC [msp.identity] Sign -> DEBU 11a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:19.571 UTC [msp.identity] Sign -> DEBU 11b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:19.572 UTC [gossip.comm] Send -> DEBU 11c Entering, sending GossipMessage: Channel: , nonce: 9221380010016404981, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:19.573 UTC [gossip.comm] sendToEndpoint -> DEBU 11d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9221380010016404981, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2195 bytes, Signature: 0 bytes" +"2019-09-24 01:04:19.573 UTC [gossip.comm] sendToEndpoint -> DEBU 11e Exiting" +"2019-09-24 01:04:19.573 UTC [gossip.discovery] sendMemResponse -> DEBU 11f Exiting, replying with alive: > alive:\006\037\306/\306D\344\216\010" > > " +"2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 120 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.527 UTC [gossip.pull] HandleMessage -> DEBU 121 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.527 UTC [gossip.pull] SendDigest -> DEBU 122 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 123 Exiting" +"2019-09-24 01:04:22.527 UTC [gossip.gossip] handleMessage -> DEBU 124 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.528 UTC [gossip.gossip] handleMessage -> DEBU 125 Exiting" +"2019-09-24 01:04:22.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 126 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.529 UTC [msp.identity] Verify -> DEBU 127 Verify: digest = 00000000 12 f3 39 e4 64 f1 86 24 af 44 34 58 f7 f4 d6 14 |..9.d..$.D4X....| +00000010 58 7e c7 5c 3f 80 f1 87 13 12 36 10 40 81 80 9c |X~.\?.....6.@...|" +"2019-09-24 01:04:22.530 UTC [msp.identity] Verify -> DEBU 128 Verify: sig = 00000000 30 45 02 21 00 b4 e2 01 9e 86 c5 fb 79 92 9c fe |0E.!........y...| +00000010 27 92 93 b9 23 cd 90 3f 16 fc b9 e6 e6 02 2c 16 |'...#..?......,.| +00000020 f9 4c cc 11 dc 02 20 20 45 5f 75 25 89 21 58 6d |.L.... E_u%.!Xm| +00000030 31 43 a2 1a ee 61 a0 67 b4 6d a1 4a 67 77 11 ef |1C...a.g.m.Jgw..| +00000040 20 03 52 e1 d8 de 53 | .R...S|" +"2019-09-24 01:04:22.530 UTC [msp.identity] Verify -> DEBU 129 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:22.531 UTC [msp.identity] Verify -> DEBU 12a Verify: sig = 00000000 30 44 02 20 71 01 b4 6d 26 cc 0c d7 e9 c6 91 26 |0D. q..m&......&| +00000010 3f 4d b8 8d bd be ca b0 36 5d e2 aa 42 a1 fb 2f |?M......6]..B../| +00000020 99 e4 1a cd 02 20 2c 86 f7 dc dd 52 58 5a e8 2b |..... ,....RXZ.+| +00000030 0f ef 99 45 25 be 07 a2 3c 2b e0 34 4a 33 60 1c |...E%...<+.4J3`.| +00000040 cc 57 eb 68 66 66 |.W.hff|" +"2019-09-24 01:04:22.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 12b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:22.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 12c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:04:22.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 12d updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 12e Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 12f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:22.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 130 Exiting" +"2019-09-24 01:04:22.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 131 Exiting" +"2019-09-24 01:04:22.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 132 Exiting" +"2019-09-24 01:04:22.534 UTC [gossip.discovery] sendMemResponse -> DEBU 133 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:22.535 UTC [msp] GetDefaultSigningIdentity -> DEBU 134 Obtaining default signing identity" +"2019-09-24 01:04:22.535 UTC [msp.identity] Sign -> DEBU 135 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:22.535 UTC [msp.identity] Sign -> DEBU 136 Sign: digest: EBB5737678BA30EDFD636E9306A9E8D1823896E4B7728B3E9ED648F4FF999C38 " +"2019-09-24 01:04:22.536 UTC [msp] GetDefaultSigningIdentity -> DEBU 137 Obtaining default signing identity" +"2019-09-24 01:04:22.536 UTC [msp.identity] Sign -> DEBU 138 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:22.536 UTC [msp.identity] Sign -> DEBU 139 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:22.536 UTC [gossip.comm] Send -> DEBU 13a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:22.537 UTC [gossip.discovery] sendMemResponse -> DEBU 13b Exiting, replying with alive: > alive:-]\026\206\270PY\177\242/b\362R\017+\321\252\262n\372Y\243\351>\213\333" > > " +"2019-09-24 01:04:22.537 UTC [gossip.comm] sendToEndpoint -> DEBU 13c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.537 UTC [gossip.comm] sendToEndpoint -> DEBU 13d Exiting" +"2019-09-24 01:04:22.864 UTC [gossip.pull] Hello -> DEBU 13e Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:22.866 UTC [gossip.comm] Send -> DEBU 13f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:22.866 UTC [gossip.comm] sendToEndpoint -> DEBU 140 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.867 UTC [gossip.comm] sendToEndpoint -> DEBU 141 Exiting" +"2019-09-24 01:04:22.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 142 Obtaining default signing identity" +"2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 143 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 144 Sign: digest: 2855E10F782B53DEA7D402B4BC9FDE4A9CAAC8D32B7DE8BC56361D84DD3CD1B9 " +"2019-09-24 01:04:22.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 145 Obtaining default signing identity" +"2019-09-24 01:04:22.868 UTC [msp.identity] Sign -> DEBU 146 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:22.869 UTC [msp.identity] Sign -> DEBU 147 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:22.869 UTC [gossip.gossip] handleMessage -> DEBU 148 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.871 UTC [gossip.pull] HandleMessage -> DEBU 14a GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.871 UTC [gossip.gossip] handleMessage -> DEBU 14b Exiting" +"2019-09-24 01:04:22.871 UTC [gossip.comm] Send -> DEBU 149 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:22.873 UTC [gossip.comm] sendToEndpoint -> DEBU 14c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1094 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.873 UTC [gossip.comm] sendToEndpoint -> DEBU 14d Exiting" +"2019-09-24 01:04:22.876 UTC [gossip.gossip] handleMessage -> DEBU 14e Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.876 UTC [gossip.gossip] handleMessage -> DEBU 14f Exiting" +"2019-09-24 01:04:22.876 UTC [gossip.discovery] handleMsgFromComm -> DEBU 150 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 01:04:22.877 UTC [msp.identity] Verify -> DEBU 151 Verify: digest = 00000000 28 55 e1 0f 78 2b 53 de a7 d4 02 b4 bc 9f de 4a |(U..x+S........J| +00000010 9c aa c8 d3 2b 7d e8 bc 56 36 1d 84 dd 3c d1 b9 |....+}..V6...<..|" +"2019-09-24 01:04:22.877 UTC [msp.identity] Verify -> DEBU 152 Verify: sig = 00000000 30 45 02 21 00 de d8 cd bb 95 9c cd f5 24 4c 3c |0E.!.........$L<| +00000010 ee 79 74 60 6f 59 67 4b e3 2b 79 a0 2a 29 71 49 |.yt`oYgK.+y.*)qI| +00000020 8b 8e 6a 75 0f 02 20 04 8c 0c 0d 4a 63 7e 38 8f |..ju.. ....Jc~8.| +00000030 36 22 36 98 71 c7 29 de e1 c7 02 88 bf 4e cc ea |6"6.q.)......N..| +00000040 6e 6a e3 8c 22 86 71 |nj..".q|" +"2019-09-24 01:04:22.878 UTC [msp.identity] Verify -> DEBU 153 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:22.878 UTC [msp.identity] Verify -> DEBU 154 Verify: sig = 00000000 30 44 02 20 6f 1b 21 cc 7a 8d 81 2f 04 21 e5 8e |0D. o.!.z../.!..| +00000010 51 ed b6 37 f9 a0 6a 65 22 53 4b 0c de ec 9e 42 |Q..7..je"SK....B| +00000020 9d 3a a6 5f 02 20 75 aa 96 9b cf 29 b5 30 66 9d |.:._. u....).0f.| +00000030 be 55 4b 0b 96 57 f2 7a 21 02 c6 60 30 e7 df a3 |.UK..W.z!..`0...| +00000040 8f 06 76 ae 68 3b |..v.h;|" +"2019-09-24 01:04:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 155 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:22.878 UTC [gossip.discovery] isSentByMe -> DEBU 156 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 157 Exiting" +"2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 158 Verify: digest = 00000000 5a 7a 93 00 75 b6 23 ce 05 2f b0 59 4e 04 5a d1 |Zz..u.#../.YN.Z.| +00000010 8b 3e 10 0a 45 f3 64 4c f7 83 75 e6 a3 7c 70 7c |.>..E.dL..u..|p||" +"2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 159 Verify: sig = 00000000 30 45 02 21 00 cf 4c b7 ac cf 78 44 55 8f 5d 5a |0E.!..L...xDU.]Z| +00000010 87 95 52 09 a4 04 6c 80 e2 19 46 c0 bb 11 4d 52 |..R...l...F...MR| +00000020 33 9b 76 08 57 02 20 59 19 14 28 72 f9 4c b9 fb |3.v.W. Y..(r.L..| +00000030 0a 03 1b c2 29 be 9b f0 2f 66 f4 72 c4 19 b3 59 |....).../f.r...Y| +00000040 ac 37 f3 57 08 cd b1 |.7.W...|" +"2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 15a Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:22.879 UTC [msp.identity] Verify -> DEBU 15b Verify: sig = 00000000 30 45 02 21 00 8a 22 41 e0 61 0e 5f 81 3f b6 6a |0E.!.."A.a._.?.j| +00000010 41 9e 47 d4 1f 60 6d 08 90 83 ef f0 87 6b a7 3b |A.G..`m......k.;| +00000020 63 83 10 08 b7 02 20 7b 45 41 d8 c0 58 db 8b dd |c..... {EA..X...| +00000030 ad 8f 87 0f 09 39 86 54 7f 98 f9 33 5e 80 96 79 |.....9.T...3^..y| +00000040 63 d7 ae 8b 51 bf 7b |c...Q.{|" +"2019-09-24 01:04:22.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 15c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15e updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:22.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 15f Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 160 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:22.880 UTC [gossip.discovery] learnExistingMembers -> DEBU 161 Exiting" +"2019-09-24 01:04:22.880 UTC [gossip.discovery] handleAliveMessage -> DEBU 162 Exiting" +"2019-09-24 01:04:22.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 163 Exiting" +"2019-09-24 01:04:23.526 UTC [gossip.gossip] handleMessage -> DEBU 164 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:23.527 UTC [gossip.pull] HandleMessage -> DEBU 165 GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:23.527 UTC [gossip.gossip] handleMessage -> DEBU 166 Exiting" +"2019-09-24 01:04:23.528 UTC [gossip.pull] SendRes -> DEBU 167 Sending 1 IDENTITY_MSG items to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:23.531 UTC [gossip.gossip] handleMessage -> DEBU 168 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:23.532 UTC [gossip.gossip] handleMessage -> DEBU 169 Exiting" +"2019-09-24 01:04:23.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:23.533 UTC [msp.identity] Verify -> DEBU 16b Verify: digest = 00000000 3f 18 18 af 54 dd 3c 26 4a 07 43 c3 4f 46 41 19 |?...T.<&J.C.OFA.| +00000010 40 a4 30 55 79 a8 a1 38 43 e1 d9 8a da e7 1d 4d |@.0Uy..8C......M|" +"2019-09-24 01:04:23.533 UTC [msp.identity] Verify -> DEBU 16c Verify: sig = 00000000 30 45 02 21 00 b8 8c 4d c4 8e bc 14 13 9f 2f 97 |0E.!...M....../.| +00000010 8d 12 d1 30 4e 60 44 2e b0 9a 6a 7f b0 5e f5 4e |...0N`D...j..^.N| +00000020 49 6b 73 ff 53 02 20 2e d6 ce 00 dd c8 ad 94 22 |Iks.S. ........"| +00000030 44 4f b5 33 b8 d0 84 80 1a d2 e4 47 8b a7 a2 7b |DO.3.......G...{| +00000040 0b db 02 36 5b 7f c2 |...6[..|" +"2019-09-24 01:04:23.534 UTC [msp.identity] Verify -> DEBU 16d Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:23.534 UTC [msp.identity] Verify -> DEBU 16e Verify: sig = 00000000 30 44 02 20 54 0b b3 bf 60 0f bb b3 94 f0 67 63 |0D. T...`.....gc| +00000010 d2 7e 17 d4 3c c0 3b 60 fd 50 c2 29 d4 f8 87 71 |.~..<.;`.P.)...q| +00000020 4e 10 87 bf 02 20 21 67 e7 e9 30 96 b2 3d e6 f5 |N.... !g..0..=..| +00000030 26 6c 78 7f 12 6f 43 82 4c 7d 61 e7 a8 7c 09 12 |&lx..oC.L}a..|..| +00000040 f8 7b 02 6a bf 02 |.{.j..|" +"2019-09-24 01:04:23.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 16f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:23.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 170 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:04:23.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 171 updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 172 Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 173 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:23.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 174 Exiting" +"2019-09-24 01:04:23.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 175 Exiting" +"2019-09-24 01:04:23.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 176 Exiting" +"2019-09-24 01:04:23.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 177 Obtaining default signing identity" +"2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 178 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 179 Sign: digest: 9CEC1B70556CCF561B469C0BC6D5B347EAB3CDCE5DD91E40FFDDA501A0C5C29F " +"2019-09-24 01:04:23.864 UTC [msp] GetDefaultSigningIdentity -> DEBU 17a Obtaining default signing identity" +"2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 17b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:23.864 UTC [msp.identity] Sign -> DEBU 17c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:23.865 UTC [gossip.discovery] periodicalSendAlive -> DEBU 17d Sleeping 5s" +"2019-09-24 01:04:23.867 UTC [gossip.pull] SendReq -> DEBU 17e Sending [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to peer1.org1.example.com:7051" +"2019-09-24 01:04:23.867 UTC [gossip.comm] Send -> DEBU 17f Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:23.867 UTC [gossip.comm] sendToEndpoint -> DEBU 180 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:23.867 UTC [gossip.comm] sendToEndpoint -> DEBU 181 Exiting" +"2019-09-24 01:04:23.868 UTC [gossip.gossip] handleMessage -> DEBU 182 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 18374924587763373038, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 01:04:23.869 UTC [msp.identity] Verify -> DEBU 183 Verify: digest = 00000000 09 4a 3d 37 1d 50 54 7a 09 18 4c ca 94 e8 c2 63 |.J=7.PTz..L....c| +00000010 fe ce 97 59 47 0e 19 d5 32 6c e4 1d 62 3f a6 d3 |...YG...2l..b?..|" +"2019-09-24 01:04:23.869 UTC [msp.identity] Verify -> DEBU 184 Verify: sig = 00000000 30 44 02 20 57 88 0b 88 0e 64 f3 f4 10 f2 5c f1 |0D. W....d....\.| +00000010 89 c1 c2 46 61 cd 47 7f e0 40 6e 42 89 17 c7 ca |...Fa.G..@nB....| +00000020 58 4c 19 ed 02 20 4a 64 ea 4a e7 be 89 4f 2a 15 |XL... Jd.J...O*.| +00000030 c2 96 d6 da 69 79 ce 7f 3f 36 5d c9 16 de 38 35 |....iy..?6]...85| +00000040 43 2a 40 54 4d 96 |C*@TM.|" +"2019-09-24 01:04:23.870 UTC [gossip.pull] HandleMessage -> DEBU 185 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 18374924587763373038, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 01:04:23.870 UTC [gossip.gossip] func2 -> DEBU 186 Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 69 116 74 120 69 56 69 56 48 101 56 103 51 104 103 47 118 49 73 88 99 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 80 102 111 117 43 101 66 81 80 122 113 10 51 78 70 87 83 68 43 101 119 75 121 102 77 100 75 79 75 75 112 102 99 104 52 47 104 76 68 47 48 113 52 48 87 53 49 98 82 108 68 84 75 111 76 119 52 73 67 104 121 111 76 79 51 69 90 117 118 90 57 55 100 98 112 119 10 105 113 99 97 66 101 90 68 55 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 76 53 52 122 43 102 79 74 76 54 51 75 110 105 69 120 72 109 98 77 115 48 100 115 107 69 53 102 43 77 106 111 66 79 52 90 78 122 106 89 57 65 50 65 105 65 109 103 70 81 50 10 81 112 81 85 69 114 48 104 49 108 43 75 117 76 55 73 118 84 85 107 98 73 118 79 122 116 113 113 48 99 76 111 54 105 112 114 53 81 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 01:04:23.870 UTC [gossip.pull] HandleMessage -> DEBU 187 Added �o��X +8T)�YR�^",�:��uO�.��� to the in memory item map, total items: 2" +"2019-09-24 01:04:23.871 UTC [gossip.gossip] handleMessage -> DEBU 188 Exiting" +"2019-09-24 01:04:23.872 UTC [gossip.comm] Send -> DEBU 189 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 18a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:23.872 UTC [gossip.comm] sendToEndpoint -> DEBU 18b Exiting" +"2019-09-24 01:04:25.661 UTC [endorser] ProcessProposal -> DEBU 18c Entering: request from 172.18.0.5:49804" +"2019-09-24 01:04:25.661 UTC [protoutils] ValidateProposalMessage -> DEBU 18d ValidateProposalMessage starts for signed proposal 0xc002839db0" +"2019-09-24 01:04:25.661 UTC [protoutils] validateChannelHeader -> DEBU 18e validateChannelHeader info: header type 1" +"2019-09-24 01:04:25.661 UTC [protoutils] checkSignatureFromCreator -> DEBU 18f begin" +"2019-09-24 01:04:25.661 UTC [msp] DeserializeIdentity -> DEBU 190 Obtaining identity" +"2019-09-24 01:04:25.662 UTC [msp.identity] newIdentity -> DEBU 191 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.662 UTC [protoutils] checkSignatureFromCreator -> DEBU 192 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:04:25.662 UTC [msp] Validate -> DEBU 193 MSP Org1MSP validating identity" +"2019-09-24 01:04:25.662 UTC [msp] getCertificationChain -> DEBU 194 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:25.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 195 creator is valid" +"2019-09-24 01:04:25.663 UTC [msp.identity] Verify -> DEBU 196 Verify: digest = 00000000 8e 86 bb a3 15 c4 12 a0 3d ce 88 07 63 c7 17 c1 |........=...c...| +00000010 c5 d6 f2 3a 78 d7 03 6a 64 db d1 46 7a 77 f9 88 |...:x..jd..Fzw..|" +"2019-09-24 01:04:25.663 UTC [msp.identity] Verify -> DEBU 197 Verify: sig = 00000000 30 45 02 21 00 fe b0 fd c8 ef 03 53 cf 9c 73 39 |0E.!.......S..s9| +00000010 dc bb 99 a7 23 10 fe 32 6a 17 fb e5 3f 0a f2 b3 |....#..2j...?...| +00000020 79 a5 8d 67 d1 02 20 4c 5f 72 ad ff 89 b9 fa 46 |y..g.. L_r.....F| +00000030 cb 14 bf 76 f8 ea 7e 15 37 59 42 9b 78 92 eb 97 |...v..~.7YB.x...| +00000040 4a e9 4b 25 ba 1a ff |J.K%...|" +"2019-09-24 01:04:25.663 UTC [protoutils] checkSignatureFromCreator -> DEBU 198 exits successfully" +"2019-09-24 01:04:25.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 199 validateChaincodeProposalMessage starts for proposal 0xc00288f0a0, header 0xc00290c6e0" +"2019-09-24 01:04:25.663 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 19a validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 01:04:25.664 UTC [endorser] preProcess -> DEBU 19b [][0fa9a48c] processing txid: 0fa9a48c09972a34f19aed7fdfc70d0718fba652c1eeca4fd699e846fa16b56b" +"2019-09-24 01:04:25.664 UTC [endorser] SimulateProposal -> DEBU 19c [][0fa9a48c] Entry chaincode: name:"cscc" " +"2019-09-24 01:04:25.664 UTC [endorser] callChaincode -> INFO 19d [][0fa9a48c] Entry chaincode: name:"cscc" " +"2019-09-24 01:04:25.664 UTC [chaincode] Execute -> DEBU 19e Entry" +"2019-09-24 01:04:25.665 UTC [cscc] Invoke -> DEBU 19f Invoke function: JoinChain" +"2019-09-24 01:04:25.666 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1a0 Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:25.666 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1a1 Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:25.666 UTC [msp] Validate -> DEBU 1a2 MSP Org1MSP validating identity" +"2019-09-24 01:04:25.667 UTC [msp] getCertificationChain -> DEBU 1a3 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:25.668 UTC [msp] hasOURole -> DEBU 1a4 MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:25.668 UTC [msp] getCertificationChain -> DEBU 1a5 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:25.669 UTC [msp.identity] Verify -> DEBU 1a6 Verify: digest = 00000000 8e 86 bb a3 15 c4 12 a0 3d ce 88 07 63 c7 17 c1 |........=...c...| +00000010 c5 d6 f2 3a 78 d7 03 6a 64 db d1 46 7a 77 f9 88 |...:x..jd..Fzw..|" +"2019-09-24 01:04:25.669 UTC [msp.identity] Verify -> DEBU 1a7 Verify: sig = 00000000 30 45 02 21 00 fe b0 fd c8 ef 03 53 cf 9c 73 39 |0E.!.......S..s9| +00000010 dc bb 99 a7 23 10 fe 32 6a 17 fb e5 3f 0a f2 b3 |....#..2j...?...| +00000020 79 a5 8d 67 d1 02 20 4c 5f 72 ad ff 89 b9 fa 46 |y..g.. L_r.....F| +00000030 cb 14 bf 76 f8 ea 7e 15 37 59 42 9b 78 92 eb 97 |...v..~.7YB.x...| +00000040 4a e9 4b 25 ba 1a ff |J.K%...|" +"2019-09-24 01:04:25.669 UTC [ledgermgmt] CreateLedger -> INFO 1a8 Creating ledger [businesschannel] with genesis block" +"2019-09-24 01:04:25.671 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1a9 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2019-09-24 01:04:25.671 UTC [kvledger.util] CreateDirIfMissing -> DEBU 1aa CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/]" +"2019-09-24 01:04:25.671 UTC [kvledger.util] logDirStatus -> DEBU 1ab Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist" +"2019-09-24 01:04:25.672 UTC [kvledger.util] logDirStatus -> DEBU 1ac After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists" +"2019-09-24 01:04:25.672 UTC [fsblkstorage] newBlockfileMgr -> INFO 1ad Getting block information from block storage" +"2019-09-24 01:04:25.672 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1ae Retrieving checkpoint info from block files" +"2019-09-24 01:04:25.672 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1af retrieveLastFileSuffix()" +"2019-09-24 01:04:25.673 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 1b0 retrieveLastFileSuffix() - biggestFileNum = -1" +"2019-09-24 01:04:25.673 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b1 Last file number found = -1" +"2019-09-24 01:04:25.673 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 1b2 No block file found" +"2019-09-24 01:04:25.674 UTC [fsblkstorage] newBlockfileMgr -> DEBU 1b3 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002869640)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2019-09-24 01:04:25.677 UTC [fsblkstorage] newBlockIndex -> DEBU 1b4 newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]]" +"2019-09-24 01:04:25.679 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1b5 Starting to process collection eligibility events" +"2019-09-24 01:04:25.679 UTC [leveldbhelper] GetIterator -> DEBU 1b6 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}]" +"2019-09-24 01:04:25.679 UTC [pvtdatastorage] processCollElgEvents -> DEBU 1b7 Converted [0] inelligible mising data entries to elligible" +"2019-09-24 01:04:25.679 UTC [pvtdatastorage] func1 -> DEBU 1b8 Waiting for collection eligibility event" +"2019-09-24 01:04:25.679 UTC [pvtdatastorage] OpenStore -> DEBU 1b9 Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false]" +"2019-09-24 01:04:25.680 UTC [leveldbhelper] GetIterator -> DEBU 1ba Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}]" +"2019-09-24 01:04:25.680 UTC [kvledger] newKVLedger -> DEBU 1bb Creating KVLedger ledgerID=businesschannel: " +"2019-09-24 01:04:25.681 UTC [kvledger] lastPersistedCommitHash -> DEBU 1bc Chain is empty" +"2019-09-24 01:04:25.681 UTC [kvledger] newKVLedger -> DEBU 1bd Register state db for chaincode lifecycle events: false" +"2019-09-24 01:04:25.681 UTC [kvledger] recoverDBs -> DEBU 1be Entering recoverDB()" +"2019-09-24 01:04:25.682 UTC [kvledger] syncStateAndHistoryDBWithBlockstore -> DEBU 1bf Block storage is empty." +"2019-09-24 01:04:25.682 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c0 [businesschannel:] Filtering pvtData of invalidation transactions" +"2019-09-24 01:04:25.682 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c1 [businesschannel:] Committing pvtData of [0] old blocks to the stateDB" +"2019-09-24 01:04:25.682 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c2 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:04:25.682 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c3 lock acquired on oldBlockCommit for committing pvtData of old blocks to state database" +"2019-09-24 01:04:25.683 UTC [lockbasedtxmgr] RemoveStaleAndCommitPvtDataOfOldBlocks -> DEBU 1c4 Constructing unique pvtData by removing duplicate entries" +"2019-09-24 01:04:25.683 UTC [kvledger] applyValidTxPvtDataOfOldBlocks -> DEBU 1c5 [businesschannel:] Clearing the bookkeeping information from pvtdatastore" +"2019-09-24 01:04:25.686 UTC [kvledger] CommitWithPvtData -> DEBU 1c6 [businesschannel] Validating state for block [0]" +"2019-09-24 01:04:25.686 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c7 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:04:25.686 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c8 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:04:25.687 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 1c9 Validating new block with num trans = [1]" +"2019-09-24 01:04:25.687 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1ca ValidateAndPrepareBatch() for block number = [0]" +"2019-09-24 01:04:25.687 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1cb preprocessing ProtoBlock..." +"2019-09-24 01:04:25.687 UTC [valimpl] preprocessProtoBlock -> DEBU 1cc txType=CONFIG" +"2019-09-24 01:04:25.687 UTC [valimpl] processNonEndorserTx -> DEBU 1cd Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 01:04:25.688 UTC [valimpl] processNonEndorserTx -> DEBU 1ce Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 01:04:25.688 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 1cf constructing new tx simulator" +"2019-09-24 01:04:25.688 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 1d0 constructing new tx simulator txid = []" +"2019-09-24 01:04:25.689 UTC [peer] GenerateSimulationResults -> DEBU 1d1 Processing CONFIG" +"2019-09-24 01:04:25.690 UTC [peer] processChannelConfigTx -> DEBU 1d2 channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 01:04:25.690 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 1d3 Simulation completed, getting simulation results" +"2019-09-24 01:04:25.690 UTC [lockbasedtxmgr] Done -> DEBU 1d4 Done with transaction simulation / query execution []" +"2019-09-24 01:04:25.690 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 1d5 Block [0] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 01:04:25.690 UTC [valinternal] ApplyWriteSet -> DEBU 1d6 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a26540)}" +"2019-09-24 01:04:25.690 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d7 validating rwset..." +"2019-09-24 01:04:25.691 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d8 postprocessing ProtoBlock..." +"2019-09-24 01:04:25.691 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 1d9 ValidateAndPrepareBatch() complete" +"2019-09-24 01:04:25.691 UTC [kvledger] CommitWithPvtData -> DEBU 1da [businesschannel] Adding CommitHash to the block [0]" +"2019-09-24 01:04:25.691 UTC [kvledger] CommitWithPvtData -> DEBU 1db [businesschannel] Committing block [0] to storage" +"2019-09-24 01:04:25.692 UTC [ledgerstorage] CommitWithPvtData -> DEBU 1dc Writing block [0] to pvt block store" +"2019-09-24 01:04:25.694 UTC [pvtdatastorage] Prepare -> DEBU 1dd Saved 0 private data write sets for block [0]" +"2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1de Indexing block [blockNum=0, blockHash=[]byte{0x2f, 0xbc, 0x19, 0xc6, 0x1e, 0x52, 0xc5, 0x88, 0xe6, 0x4e, 0xa4, 0x19, 0xae, 0x2b, 0x7c, 0x3f, 0x7, 0x35, 0xa0, 0xe4, 0x28, 0x1e, 0xc1, 0x63, 0xa9, 0x5f, 0x8c, 0xba, 0xac, 0xe2, 0x90, 0xc5} txOffsets= +txId=ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551 locPointer=offset=39, bytesLength=25762 +]" +"2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1df Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25762] for tx ID: [ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551] to txid-index" +"2019-09-24 01:04:25.695 UTC [fsblkstorage] indexBlock -> DEBU 1e0 Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=25762] for tx number:[0] ID: [ba18852f15f8b6c1379163a2379c00e8b13a712d787e2d280c6e92a841f19551] to blockNumTranNum index" +"2019-09-24 01:04:25.697 UTC [fsblkstorage] updateCheckpoint -> DEBU 1e1 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[25808], isChainEmpty=[false], lastBlockNumber=[0]" +"2019-09-24 01:04:25.697 UTC [pvtdatastorage] Commit -> DEBU 1e2 Committing private data for block [0]" +"2019-09-24 01:04:25.699 UTC [pvtdatastorage] Commit -> DEBU 1e3 Committed private data for block [0]" +"2019-09-24 01:04:25.699 UTC [kvledger] CommitWithPvtData -> DEBU 1e4 [businesschannel] Committing block [0] transactions to state database" +"2019-09-24 01:04:25.699 UTC [pvtdatastorage] func1 -> DEBU 1e5 Purger started: Purging expired private data till block number [0]" +"2019-09-24 01:04:25.700 UTC [pvtdatastorage] retrieveExpiryEntries -> DEBU 1e6 retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0}" +"2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1e7 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:04:25.700 UTC [leveldbhelper] GetIterator -> DEBU 1e8 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}]" +"2019-09-24 01:04:25.700 UTC [pvtdatastorage] func1 -> DEBU 1e9 Purger finished" +"2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ea Preparing potential purge list working-set for expiringAtBlk [0]" +"2019-09-24 01:04:25.700 UTC [leveldbhelper] GetIterator -> DEBU 1eb Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}]" +"2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1ec Committing updates to state database" +"2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1ed No expiry entry found for expiringAtBlk [0]" +"2019-09-24 01:04:25.700 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 1ee Building the expiry schedules based on the update batch" +"2019-09-24 01:04:25.700 UTC [lockbasedtxmgr] Commit -> DEBU 1ef Write lock acquired for committing updates to state database" +"2019-09-24 01:04:25.700 UTC [stateleveldb] ApplyUpdates -> DEBU 1f0 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 01:04:25.702 UTC [lockbasedtxmgr] Commit -> DEBU 1f1 Updates committed to state database and the write lock is released" +"2019-09-24 01:04:25.702 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1f2 Preparing potential purge list working-set for expiringAtBlk [1]" +"2019-09-24 01:04:25.702 UTC [leveldbhelper] GetIterator -> DEBU 1f3 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}]" +"2019-09-24 01:04:25.702 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 1f4 No expiry entry found for expiringAtBlk [1]" +"2019-09-24 01:04:25.702 UTC [lockbasedtxmgr] func1 -> DEBU 1f5 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:04:25.702 UTC [kvledger] CommitWithPvtData -> DEBU 1f6 [businesschannel] Committing block [0] transactions to history database" +"2019-09-24 01:04:25.702 UTC [historyleveldb] Commit -> DEBU 1f7 Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions" +"2019-09-24 01:04:25.702 UTC [historyleveldb] Commit -> DEBU 1f8 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 01:04:25.703 UTC [historyleveldb] Commit -> DEBU 1f9 Channel [businesschannel]: Updates committed to history database for blockNo [0]" +"2019-09-24 01:04:25.703 UTC [kvledger] CommitWithPvtData -> INFO 1fa [businesschannel] Committed block [0] with 1 transaction(s) in 17ms (state_validation=5ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[]" +"2019-09-24 01:04:25.705 UTC [ledgermgmt] CreateLedger -> INFO 1fb Created ledger [businesschannel] with genesis block" +"2019-09-24 01:04:25.705 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 1fc constructing new query executor txid = [957956d9-4be1-4b43-9b49-8b325c1bda27]" +"2019-09-24 01:04:25.705 UTC [stateleveldb] GetState -> DEBU 1fd GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY" +"2019-09-24 01:04:25.705 UTC [lockbasedtxmgr] Done -> DEBU 1fe Done with transaction simulation / query execution [957956d9-4be1-4b43-9b49-8b325c1bda27]" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 1ff Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 200 Processing field: HashingAlgorithm" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 201 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 202 Processing field: OrdererAddresses" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 203 Processing field: Consortium" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 204 Processing field: Capabilities" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 205 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 206 Processing field: ACLs" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 207 Processing field: Capabilities" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 208 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 209 Processing field: AnchorPeers" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] NewStandardValues -> DEBU 20a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:25.705 UTC [common.channelconfig] initializeProtosStruct -> DEBU 20b Processing field: MSP" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] Validate -> DEBU 20c Anchor peers for org Org1MSP are " +"2019-09-24 01:04:25.706 UTC [common.channelconfig] validateMSP -> DEBU 20d Setting up MSP for org Org1MSP" +"2019-09-24 01:04:25.706 UTC [msp] newBccspMsp -> DEBU 20e Creating BCCSP-based MSP instance" +"2019-09-24 01:04:25.706 UTC [msp] New -> DEBU 20f Creating Cache-MSP instance" +"2019-09-24 01:04:25.706 UTC [msp] Setup -> DEBU 210 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:25.706 UTC [msp.identity] newIdentity -> DEBU 211 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] NewStandardValues -> DEBU 212 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 213 Processing field: AnchorPeers" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] NewStandardValues -> DEBU 214 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] initializeProtosStruct -> DEBU 215 Processing field: MSP" +"2019-09-24 01:04:25.706 UTC [common.channelconfig] Validate -> DEBU 216 Anchor peers for org Org2MSP are " +"2019-09-24 01:04:25.706 UTC [common.channelconfig] validateMSP -> DEBU 217 Setting up MSP for org Org2MSP" +"2019-09-24 01:04:25.706 UTC [msp] newBccspMsp -> DEBU 218 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:25.706 UTC [msp] New -> DEBU 219 Creating Cache-MSP instance" +"2019-09-24 01:04:25.706 UTC [msp] Setup -> DEBU 21a Setting up MSP instance Org2MSP" +"2019-09-24 01:04:25.707 UTC [msp.identity] newIdentity -> DEBU 21b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 21c Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21d Processing field: ConsensusType" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21e Processing field: BatchSize" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 21f Processing field: BatchTimeout" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 220 Processing field: KafkaBrokers" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 221 Processing field: ChannelRestrictions" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 222 Processing field: Capabilities" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 223 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 224 Processing field: Endpoints" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] NewStandardValues -> DEBU 225 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] initializeProtosStruct -> DEBU 226 Processing field: MSP" +"2019-09-24 01:04:25.707 UTC [common.channelconfig] validateMSP -> DEBU 227 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:25.707 UTC [msp] newBccspMsp -> DEBU 228 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:25.707 UTC [msp] New -> DEBU 229 Creating Cache-MSP instance" +"2019-09-24 01:04:25.707 UTC [msp] Setup -> DEBU 22a Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:25.707 UTC [msp.identity] newIdentity -> DEBU 22b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.708 UTC [msp.identity] newIdentity -> DEBU 22c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:25.708 UTC [msp] Validate -> DEBU 22d MSP OrdererMSP validating identity" +"2019-09-24 01:04:25.708 UTC [msp] Setup -> DEBU 22e Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:25.708 UTC [msp] Setup -> DEBU 22f MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:25.708 UTC [policies] NewManagerImpl -> DEBU 230 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 231 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 232 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 233 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 234 Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 235 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 236 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 237 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 238 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 239 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23a Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23b Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23c Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23d Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 23f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 240 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 241 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 242 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 243 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 244 Proposed new policy Writers for Channel" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 245 Proposed new policy Admins for Channel" +"2019-09-24 01:04:25.709 UTC [policies] NewManagerImpl -> DEBU 246 Proposed new policy Readers for Channel" +"2019-09-24 01:04:25.709 UTC [common.configtx] addToMap -> DEBU 247 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 248 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 249 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:25.713 UTC [common.configtx] addToMap -> DEBU 24d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 24e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 24f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 250 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 251 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 252 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:25.714 UTC [common.configtx] addToMap -> DEBU 253 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 254 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 255 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 256 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 257 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:25.715 UTC [common.configtx] addToMap -> DEBU 258 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 259 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25a Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25c Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25d Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25e Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 25f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:25.716 UTC [common.configtx] addToMap -> DEBU 260 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 261 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 262 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 263 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 264 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 265 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 266 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 267 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:25.717 UTC [common.configtx] addToMap -> DEBU 268 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 269 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26b Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:25.718 UTC [common.configtx] addToMap -> DEBU 26c Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26d Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26e Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 26f Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:25.719 UTC [common.configtx] addToMap -> DEBU 270 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:25.720 UTC [common.configtx] addToMap -> DEBU 271 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:25.720 UTC [common.configtx] addToMap -> DEBU 272 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:25.720 UTC [common.capabilities] Supported -> DEBU 273 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:25.720 UTC [common.capabilities] Supported -> DEBU 274 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:25.720 UTC [common.channelconfig] LogSanityChecks -> DEBU 275 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:25.720 UTC [common.channelconfig] LogSanityChecks -> DEBU 276 As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:25.720 UTC [policies] Manager -> DEBU 277 Manager Channel looking up path [Application]" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 278 Manager Channel has managers Orderer" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 279 Manager Channel has managers Application" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27a Manager Channel/Application looking up path []" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27b Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 27c Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27d As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27e As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:25.721 UTC [common.channelconfig] LogSanityChecks -> DEBU 27f As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:25.721 UTC [policies] Manager -> DEBU 280 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 281 Manager Channel has managers Application" +"2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 282 Manager Channel has managers Orderer" +"2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 283 Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:25.722 UTC [policies] Manager -> DEBU 284 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 285 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 286 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 287 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:25.722 UTC [common.channelconfig] LogSanityChecks -> DEBU 288 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:25.722 UTC [gossip.service] ProcessConfigUpdate -> DEBU 289 Processing new config for channel businesschannel" +"2019-09-24 01:04:25.722 UTC [gossip.service] ProcessConfigUpdate -> DEBU 28a Calling out because config was updated for channel businesschannel" +"2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28b Org1MSP anchor peers: []" +"2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28c Org2MSP anchor peers: []" +"2019-09-24 01:04:25.722 UTC [gossip.service] updateAnchors -> DEBU 28d Creating state provider for chainID businesschannel" +"2019-09-24 01:04:25.722 UTC [gossip.gossip] JoinChan -> INFO 28e Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 01:04:25.722 UTC [gossip.gossip] learnAnchorPeers -> INFO 28f No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-09-24 01:04:25.722 UTC [gossip.gossip] learnAnchorPeers -> INFO 290 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-09-24 01:04:25.722 UTC [peer] updateTrustedRoots -> DEBU 291 Updating trusted root authorities for channel businesschannel" +"2019-09-24 01:04:25.737 UTC [peer] buildTrustedRootsForChain -> DEBU 292 updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 293 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 294 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:25.738 UTC [peer] buildTrustedRootsForChain -> DEBU 295 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:25.739 UTC [kvledger.util] CreateDirIfMissing -> DEBU 296 CreateDirIfMissing [/var/hyperledger/production/transientStore/]" +"2019-09-24 01:04:25.739 UTC [kvledger.util] logDirStatus -> DEBU 297 Before creating dir - [/var/hyperledger/production/transientStore/] does not exist" +"2019-09-24 01:04:25.740 UTC [kvledger.util] logDirStatus -> DEBU 298 After creating dir - [/var/hyperledger/production/transientStore/] exists" +"2019-09-24 01:04:25.751 UTC [gossip.service] InitializeChannel -> DEBU 299 Creating state provider for chainID businesschannel" +"2019-09-24 01:04:25.753 UTC [msp] GetDefaultSigningIdentity -> DEBU 29a Obtaining default signing identity" +"2019-09-24 01:04:25.753 UTC [msp.identity] Sign -> DEBU 29b Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 " +"2019-09-24 01:04:25.753 UTC [msp.identity] Sign -> DEBU 29c Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 " +"2019-09-24 01:04:25.754 UTC [gossip.privdata] NewReconciler -> DEBU 29d Private data reconciliation is enabled" +"2019-09-24 01:04:25.757 UTC [gossip.state] NewGossipStateProvider -> INFO 29e Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-09-24 01:04:25.757 UTC [gossip.state] NewGossipStateProvider -> DEBU 29f Updating gossip ledger height to 1" +"2019-09-24 01:04:25.757 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a0 Obtaining default signing identity" +"2019-09-24 01:04:25.758 UTC [msp.identity] Sign -> DEBU 2a1 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020801 " +"2019-09-24 01:04:25.758 UTC [msp.identity] Sign -> DEBU 2a2 Sign: digest: C6683BE853D565E431E2E27D6D9AB1A500773910996A866C5B6477689A162499 " +"2019-09-24 01:04:25.758 UTC [gossip.service] InitializeChannel -> DEBU 2a3 Delivery uses dynamic leader election mechanism, channel businesschannel" +"2019-09-24 01:04:25.759 UTC [peer] InitChain -> DEBU 2a4 Initializing channel businesschannel" +"2019-09-24 01:04:25.759 UTC [nodeCmd] func6 -> DEBU 2a5 Deploying system CC, for channel " +"2019-09-24 01:04:25.759 UTC [gossip.election] handleMessages -> DEBU 2a7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:25.759 UTC [gossip.election] waitForMembershipStabilization -> DEBU 2a6 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:25.760 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a8 constructing new tx simulator" +"2019-09-24 01:04:25.760 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a9 constructing new tx simulator txid = [638d9655-8058-4978-98f9-0a293f945ce1]" +"2019-09-24 01:04:25.760 UTC [chaincode] Execute -> DEBU 2aa Entry" +"2019-09-24 01:04:25.760 UTC [chaincode] handleMessage -> DEBU 2ab [638d9655] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:25.761 UTC [chaincode] Notify -> DEBU 2ac [638d9655] notifying Txid:638d9655-8058-4978-98f9-0a293f945ce1, channelID:businesschannel" +"2019-09-24 01:04:25.761 UTC [chaincode] Execute -> DEBU 2ad Exit" +"2019-09-24 01:04:25.761 UTC [sccapi] deploySysCC -> INFO 2ae system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-09-24 01:04:25.761 UTC [lockbasedtxmgr] Done -> DEBU 2af Done with transaction simulation / query execution [638d9655-8058-4978-98f9-0a293f945ce1]" +"2019-09-24 01:04:25.761 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b0 constructing new tx simulator" +"2019-09-24 01:04:25.762 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b1 constructing new tx simulator txid = [f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e]" +"2019-09-24 01:04:25.762 UTC [chaincode] Execute -> DEBU 2b2 Entry" +"2019-09-24 01:04:25.762 UTC [cscc] Init -> INFO 2b3 Init CSCC" +"2019-09-24 01:04:25.762 UTC [chaincode] handleMessage -> DEBU 2b4 [f9e35f71] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:25.763 UTC [chaincode] Notify -> DEBU 2b5 [f9e35f71] notifying Txid:f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e, channelID:businesschannel" +"2019-09-24 01:04:25.763 UTC [chaincode] Execute -> DEBU 2b6 Exit" +"2019-09-24 01:04:25.763 UTC [sccapi] deploySysCC -> INFO 2b7 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-09-24 01:04:25.763 UTC [lockbasedtxmgr] Done -> DEBU 2b8 Done with transaction simulation / query execution [f9e35f71-7d80-4bb1-a6d5-f77a043c4b0e]" +"2019-09-24 01:04:25.763 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b9 constructing new tx simulator" +"2019-09-24 01:04:25.764 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2ba constructing new tx simulator txid = [053fbb7b-6f84-47dd-94e8-03f558f80f47]" +"2019-09-24 01:04:25.764 UTC [chaincode] Execute -> DEBU 2bb Entry" +"2019-09-24 01:04:25.764 UTC [qscc] Init -> INFO 2bc Init QSCC" +"2019-09-24 01:04:25.764 UTC [chaincode] handleMessage -> DEBU 2bd [053fbb7b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:25.764 UTC [chaincode] Notify -> DEBU 2be [053fbb7b] notifying Txid:053fbb7b-6f84-47dd-94e8-03f558f80f47, channelID:businesschannel" +"2019-09-24 01:04:25.765 UTC [chaincode] Execute -> DEBU 2bf Exit" +"2019-09-24 01:04:25.765 UTC [sccapi] deploySysCC -> INFO 2c0 system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-09-24 01:04:25.765 UTC [lockbasedtxmgr] Done -> DEBU 2c1 Done with transaction simulation / query execution [053fbb7b-6f84-47dd-94e8-03f558f80f47]" +"2019-09-24 01:04:25.765 UTC [sccapi] deploySysCC -> INFO 2c2 system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled" +"2019-09-24 01:04:25.765 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2c3 constructing new query executor txid = [11e7aafd-9a80-4de9-bbd4-f6e8514966e7]" +"2019-09-24 01:04:25.766 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 2c4 Returning []" +"2019-09-24 01:04:25.766 UTC [lockbasedtxmgr] Done -> DEBU 2c5 Done with transaction simulation / query execution [11e7aafd-9a80-4de9-bbd4-f6e8514966e7]" +"2019-09-24 01:04:25.766 UTC [msp] GetDefaultSigningIdentity -> DEBU 2c6 Obtaining default signing identity" +"2019-09-24 01:04:25.766 UTC [msp.identity] Sign -> DEBU 2c7 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020801 " +"2019-09-24 01:04:25.767 UTC [msp.identity] Sign -> DEBU 2c8 Sign: digest: E131F7E7888DCCC272F6314434C9524AC7074B63C2A5EE0F2504861E522C4A2D " +"2019-09-24 01:04:25.767 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 2c9 Listeners for channel businesschannel invoked" +"2019-09-24 01:04:25.767 UTC [chaincode] handleMessage -> DEBU 2ca [0fa9a48c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:25.767 UTC [chaincode] Notify -> DEBU 2cb [0fa9a48c] notifying Txid:0fa9a48c09972a34f19aed7fdfc70d0718fba652c1eeca4fd699e846fa16b56b, channelID:" +"2019-09-24 01:04:25.768 UTC [chaincode] Execute -> DEBU 2cc Exit" +"2019-09-24 01:04:25.768 UTC [endorser] callChaincode -> INFO 2cd [][0fa9a48c] Exit chaincode: name:"cscc" (104ms)" +"2019-09-24 01:04:25.768 UTC [endorser] SimulateProposal -> DEBU 2ce [][0fa9a48c] Exit" +"2019-09-24 01:04:25.768 UTC [endorser] func1 -> DEBU 2cf Exit: request from 172.18.0.5:49804" +"2019-09-24 01:04:25.768 UTC [comm.grpc.server] 1 -> INFO 2d0 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49804 grpc.code=OK grpc.call_duration=108.5891ms +"2019-09-24 01:04:25.775 UTC [grpc] infof -> DEBU 2d1 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:26.525 UTC [gossip.gossip] handleMessage -> DEBU 2d2 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.525 UTC [gossip.pull] HandleMessage -> DEBU 2d3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.525 UTC [gossip.pull] SendDigest -> DEBU 2d4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:26.525 UTC [gossip.gossip] handleMessage -> DEBU 2d5 Exiting" +"2019-09-24 01:04:26.527 UTC [gossip.gossip] handleMessage -> DEBU 2d6 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > > , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.527 UTC [gossip.gossip] handleMessage -> DEBU 2d7 Exiting" +"2019-09-24 01:04:26.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8 Got message: GossipMessage: tag:EMPTY mem_req:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > > , Envelope: 1099 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2d9 Verify: digest = 00000000 18 1b 9b e4 e2 ee e7 21 9a 3e 0c 66 f7 7c 95 57 |.......!.>.f.|.W| +00000010 ce 93 38 d0 36 3b 71 0c af 1b b4 de 50 db 91 a2 |..8.6;q.....P...|" +"2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2da Verify: sig = 00000000 30 45 02 21 00 f5 13 72 47 67 dc 00 ea dd da 48 |0E.!...rGg.....H| +00000010 20 0c e7 8e b3 46 b9 ea e3 a3 75 cd 2a b2 69 7c | ....F....u.*.i|| +00000020 a8 2e 8e 8e 3c 02 20 4a f7 ab 74 17 9b df 56 16 |....<. J..t...V.| +00000030 d2 c4 0d c7 67 9b 34 ca 49 9c 55 e1 16 92 ba 3b |....g.4.I.U....;| +00000040 dc 93 70 f8 fd a7 f7 |..p....|" +"2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2db Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:26.528 UTC [msp.identity] Verify -> DEBU 2dc Verify: sig = 00000000 30 45 02 21 00 9b 84 82 d1 69 c3 2b 40 8b d2 c9 |0E.!.....i.+@...| +00000010 bb 62 b5 b7 c5 3e f6 2e 02 94 0c 9e 2c 58 92 98 |.b...>......,X..| +00000020 37 5a da 9a d4 02 20 54 37 f4 ff 28 10 85 19 e6 |7Z.... T7..(....| +00000030 93 97 45 a7 08 1b 53 ce 6d d6 09 99 0f 7a 30 05 |..E...S.m....z0.| +00000040 64 b9 6f 0a 50 e4 92 |d.o.P..|" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2de Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2df updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e0 Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" " +"2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e2 Exiting" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3 Exiting" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e4 Exiting" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] sendMemResponse -> DEBU 2e5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:26.529 UTC [gossip.comm] Send -> DEBU 2e6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:26.529 UTC [gossip.discovery] sendMemResponse -> DEBU 2e7 Exiting, replying with alive:\366.\002\224\014\236,X\222\2307Z\332\232\324\002 T7\364\377(\020\205\031\346\223\227E\247\010\033S\316m\326\t\231\017z0\005d\271o\nP\344\222" > > alive:\326E\306\312" secret_envelope: > " +"2019-09-24 01:04:26.529 UTC [gossip.comm] sendToEndpoint -> DEBU 2e8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2187 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2e9 Exiting" +"2019-09-24 01:04:26.714 UTC [endorser] ProcessProposal -> DEBU 2ea Entering: request from 172.18.0.5:49812" +"2019-09-24 01:04:26.714 UTC [protoutils] ValidateProposalMessage -> DEBU 2eb ValidateProposalMessage starts for signed proposal 0xc0003e3cc0" +"2019-09-24 01:04:26.715 UTC [protoutils] validateChannelHeader -> DEBU 2ec validateChannelHeader info: header type 3" +"2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ed begin" +"2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ee creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:04:26.715 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ef creator is valid" +"2019-09-24 01:04:26.716 UTC [msp.identity] Verify -> DEBU 2f0 Verify: digest = 00000000 61 12 37 db cc e7 15 e1 38 89 49 19 c9 de 16 ed |a.7.....8.I.....| +00000010 bb 2e 8c 2d 52 16 0a 38 e0 e1 37 3b 66 71 80 f4 |...-R..8..7;fq..|" +"2019-09-24 01:04:26.716 UTC [msp.identity] Verify -> DEBU 2f1 Verify: sig = 00000000 30 45 02 21 00 d2 7b b5 08 af 46 87 18 00 5f cc |0E.!..{...F..._.| +00000010 01 a4 50 f0 c0 aa 62 a7 6e c7 b5 a9 a3 b5 5e aa |..P...b.n.....^.| +00000020 fd 44 33 68 ed 02 20 60 86 b9 c1 93 ce c5 9c 5c |.D3h.. `.......\| +00000030 23 86 09 68 96 f4 fb d8 93 9f 89 2a 11 50 6d ad |#..h.......*.Pm.| +00000040 dc f7 c4 e6 62 0a 11 |....b..|" +"2019-09-24 01:04:26.716 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f2 exits successfully" +"2019-09-24 01:04:26.716 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2f3 validateChaincodeProposalMessage starts for proposal 0xc00012a0e0, header 0xc0024820f0" +"2019-09-24 01:04:26.716 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2f4 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 01:04:26.717 UTC [endorser] preProcess -> DEBU 2f5 [][805b1cf4] processing txid: 805b1cf4866a1b94f5e8023fb57cd89be24c284e163a5b8e5eee1fb52db99783" +"2019-09-24 01:04:26.717 UTC [endorser] SimulateProposal -> DEBU 2f6 [][805b1cf4] Entry chaincode: name:"cscc" " +"2019-09-24 01:04:26.717 UTC [endorser] callChaincode -> INFO 2f7 [][805b1cf4] Entry chaincode: name:"cscc" " +"2019-09-24 01:04:26.717 UTC [chaincode] Execute -> DEBU 2f8 Entry" +"2019-09-24 01:04:26.718 UTC [cscc] Invoke -> DEBU 2f9 Invoke function: GetChannels" +"2019-09-24 01:04:26.718 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2fa Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:26.718 UTC [msp] Validate -> DEBU 2fb MSP Org1MSP validating identity" +"2019-09-24 01:04:26.719 UTC [msp] getCertificationChain -> DEBU 2fc MSP Org1MSP getting certification chain" +"2019-09-24 01:04:26.719 UTC [msp.identity] Verify -> DEBU 2fd Verify: digest = 00000000 61 12 37 db cc e7 15 e1 38 89 49 19 c9 de 16 ed |a.7.....8.I.....| +00000010 bb 2e 8c 2d 52 16 0a 38 e0 e1 37 3b 66 71 80 f4 |...-R..8..7;fq..|" +"2019-09-24 01:04:26.720 UTC [msp.identity] Verify -> DEBU 2fe Verify: sig = 00000000 30 45 02 21 00 d2 7b b5 08 af 46 87 18 00 5f cc |0E.!..{...F..._.| +00000010 01 a4 50 f0 c0 aa 62 a7 6e c7 b5 a9 a3 b5 5e aa |..P...b.n.....^.| +00000020 fd 44 33 68 ed 02 20 60 86 b9 c1 93 ce c5 9c 5c |.D3h.. `.......\| +00000030 23 86 09 68 96 f4 fb d8 93 9f 89 2a 11 50 6d ad |#..h.......*.Pm.| +00000040 dc f7 c4 e6 62 0a 11 |....b..|" +"2019-09-24 01:04:26.720 UTC [chaincode] handleMessage -> DEBU 2ff [805b1cf4] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:26.720 UTC [chaincode] Notify -> DEBU 300 [805b1cf4] notifying Txid:805b1cf4866a1b94f5e8023fb57cd89be24c284e163a5b8e5eee1fb52db99783, channelID:" +"2019-09-24 01:04:26.721 UTC [chaincode] Execute -> DEBU 301 Exit" +"2019-09-24 01:04:26.721 UTC [endorser] callChaincode -> INFO 302 [][805b1cf4] Exit chaincode: name:"cscc" (4ms)" +"2019-09-24 01:04:26.721 UTC [endorser] SimulateProposal -> DEBU 303 [][805b1cf4] Exit" +"2019-09-24 01:04:26.725 UTC [endorser] func1 -> DEBU 304 Exit: request from 172.18.0.5:49812" +"2019-09-24 01:04:26.726 UTC [comm.grpc.server] 1 -> INFO 305 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49812 grpc.code=OK grpc.call_duration=11.7387ms +"2019-09-24 01:04:26.729 UTC [grpc] warningf -> DEBU 306 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49812: read: connection reset by peer" +"2019-09-24 01:04:26.729 UTC [grpc] infof -> DEBU 307 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:26.760 UTC [gossip.election] waitForMembershipStabilization -> DEBU 308 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting, peers found 1" +"2019-09-24 01:04:26.760 UTC [gossip.election] leaderElection -> DEBU 309 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:26.761 UTC [gossip.election] propose -> DEBU 30a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:26.761 UTC [gossip.election] propose -> DEBU 30b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:26.761 UTC [msp] GetDefaultSigningIdentity -> DEBU 30c Obtaining default signing identity" +"2019-09-24 01:04:26.761 UTC [msp.identity] Sign -> DEBU 30d Sign: plaintext: 120F627573696E6573736368616E6E65...E31F120C08F4AAA7C9D9C8CEE3151001 " +"2019-09-24 01:04:26.761 UTC [msp.identity] Sign -> DEBU 30e Sign: digest: FF06CAAFDF4977F4871EF8D7E5F8C245971B93C6F3C0F09EBF814ECA99201AFF " +"2019-09-24 01:04:26.762 UTC [gossip.election] waitForInterrupt -> DEBU 30f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:26.867 UTC [gossip.pull] Hello -> DEBU 310 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:26.867 UTC [gossip.comm] Send -> DEBU 311 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:26.868 UTC [gossip.comm] sendToEndpoint -> DEBU 312 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.868 UTC [gossip.comm] sendToEndpoint -> DEBU 313 Exiting" +"2019-09-24 01:04:26.870 UTC [gossip.gossip] handleMessage -> DEBU 314 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.871 UTC [gossip.pull] HandleMessage -> DEBU 315 GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.871 UTC [gossip.gossip] handleMessage -> DEBU 316 Exiting" +"2019-09-24 01:04:26.873 UTC [msp] GetDefaultSigningIdentity -> DEBU 317 Obtaining default signing identity" +"2019-09-24 01:04:26.873 UTC [msp.identity] Sign -> DEBU 318 Sign: plaintext: 18012A84070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:04:26.873 UTC [msp.identity] Sign -> DEBU 319 Sign: digest: 8EA726AFA067356E11C06B650B9CBED8CA4AB1EDD475507AC1F759B195DF9445 " +"2019-09-24 01:04:26.874 UTC [msp] GetDefaultSigningIdentity -> DEBU 31a Obtaining default signing identity" +"2019-09-24 01:04:26.874 UTC [msp.identity] Sign -> DEBU 31b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:26.874 UTC [msp.identity] Sign -> DEBU 31c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:26.875 UTC [gossip.comm] Send -> DEBU 31d Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:26.876 UTC [gossip.comm] sendToEndpoint -> DEBU 31e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1095 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.877 UTC [gossip.comm] sendToEndpoint -> DEBU 31f Exiting" +"2019-09-24 01:04:26.879 UTC [gossip.gossip] handleMessage -> DEBU 320 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.879 UTC [gossip.gossip] handleMessage -> DEBU 321 Exiting" +"2019-09-24 01:04:26.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 322 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2188 bytes, Signature: 0 bytes" +"2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 323 Verify: digest = 00000000 8e a7 26 af a0 67 35 6e 11 c0 6b 65 0b 9c be d8 |..&..g5n..ke....| +00000010 ca 4a b1 ed d4 75 50 7a c1 f7 59 b1 95 df 94 45 |.J...uPz..Y....E|" +"2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 324 Verify: sig = 00000000 30 45 02 21 00 be 4e 0e 8b e1 35 1e c8 23 08 36 |0E.!..N...5..#.6| +00000010 92 cf c7 b5 a9 1e fc 44 bd 0c cc 04 32 07 30 24 |.......D....2.0$| +00000020 04 7a 9c bb 18 02 20 0c a8 5e f1 46 8c e0 d8 ae |.z.... ..^.F....| +00000030 c6 2e 1b 7c 03 07 72 ca c7 c9 2a f3 e4 e3 70 d6 |...|..r...*...p.| +00000040 cc 8b 81 b3 a2 e1 78 |......x|" +"2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 325 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:26.880 UTC [msp.identity] Verify -> DEBU 326 Verify: sig = 00000000 30 45 02 21 00 e6 a8 09 3d e8 9a 55 4a ab c4 d2 |0E.!....=..UJ...| +00000010 3b 18 b1 af b7 5f 76 5b 9d 96 62 7d 87 7b ab 67 |;...._v[..b}.{.g| +00000020 9d 8d 4d 22 e3 02 20 1e 31 84 ad 2e 0f 74 39 ca |..M".. .1....t9.| +00000030 5a a5 3f 25 57 fb d8 94 c9 9c b5 b9 aa 4c 4b e4 |Z.?%W........LK.| +00000040 cf 1e f2 dd 5c 7b b4 |....\{.|" +"2019-09-24 01:04:26.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 327 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----\nMIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2\n6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ\nPbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:26.881 UTC [gossip.discovery] isSentByMe -> DEBU 328 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\246\006-----BEGIN CERTIFICATE-----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\ndoG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO\n-----END CERTIFICATE-----\n" > , Envelope: 905 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:26.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 329 Exiting" +"2019-09-24 01:04:26.881 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32a Exiting" +"2019-09-24 01:04:28.583 UTC [gossip.gossip] handleMessage -> DEBU 32b Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:28.583 UTC [gossip.gossip] handleMessage -> DEBU 32c Exiting" +"2019-09-24 01:04:28.583 UTC [gossip.discovery] handleMsgFromComm -> DEBU 32d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:28.585 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 32e Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 32f Verify: digest = 00000000 e7 0a 65 09 05 f7 f2 33 9e 11 63 ee 5e 8a a3 16 |..e....3..c.^...| +00000010 b0 ac 62 bb e2 ce b8 40 c9 ec 4c 48 ec 8c 08 fd |..b....@..LH....|" +"2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 330 Verify: sig = 00000000 30 45 02 21 00 cd 55 ab 1f b0 44 21 fb 71 ae 72 |0E.!..U...D!.q.r| +00000010 2e 4e 85 c6 de ab 53 6a 3a 1f 9a 2a d3 72 ed 6f |.N....Sj:..*.r.o| +00000020 c8 ff 7e c8 d2 02 20 6b 2d ec d8 e8 bc 51 3d 94 |..~... k-....Q=.| +00000030 4b d2 6c 97 34 50 95 58 97 07 9d a6 5f f4 67 0a |K.l.4P.X...._.g.| +00000040 85 2f b8 4d 88 cf a7 |./.M...|" +"2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 331 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:28.585 UTC [msp.identity] Verify -> DEBU 332 Verify: sig = 00000000 30 45 02 21 00 d7 3a 96 c4 c2 26 c1 bc d3 fe 26 |0E.!..:...&....&| +00000010 47 b1 f6 a1 c7 c7 ad 51 76 94 4e a3 56 81 e8 32 |G......Qv.N.V..2| +00000020 0b 3f 1d 04 ff 02 20 33 2f c0 a8 08 78 bb 15 19 |.?.... 3/...x...| +00000030 e5 51 b3 6b 51 71 a5 1d d5 ad ee d6 4f f9 fe f2 |.Q.kQq......O...| +00000040 c2 3b 7c d6 7b 56 4e |.;|.{VN|" +"2019-09-24 01:04:28.586 UTC [gossip.discovery] handleAliveMessage -> DEBU 333 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:28.586 UTC [gossip.discovery] learnExistingMembers -> DEBU 334 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 335 updating membership: timestamp: " +"2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 336 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 337 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:28.587 UTC [gossip.discovery] learnExistingMembers -> DEBU 338 Exiting" +"2019-09-24 01:04:28.587 UTC [gossip.discovery] handleAliveMessage -> DEBU 339 Exiting" +"2019-09-24 01:04:28.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33a Exiting" +"2019-09-24 01:04:28.670 UTC [endorser] ProcessProposal -> DEBU 33b Entering: request from 172.18.0.5:49820" +"2019-09-24 01:04:28.670 UTC [protoutils] ValidateProposalMessage -> DEBU 33c ValidateProposalMessage starts for signed proposal 0xc002483a90" +"2019-09-24 01:04:28.670 UTC [protoutils] validateChannelHeader -> DEBU 33d validateChannelHeader info: header type 3" +"2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 33e begin" +"2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 33f creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 340 creator is valid" +"2019-09-24 01:04:28.670 UTC [msp.identity] Verify -> DEBU 341 Verify: digest = 00000000 5e 8f fe 6d 87 85 5a 3c 72 79 e9 66 2d 79 ab f6 |^..m..Z DEBU 342 Verify: sig = 00000000 30 45 02 21 00 d7 7f 6f 13 cc 24 43 50 4c 90 e8 |0E.!...o..$CPL..| +00000010 13 72 2f e1 98 e0 e5 52 3d a4 4f 95 91 e3 08 62 |.r/....R=.O....b| +00000020 1b 6a c4 db c4 02 20 60 d9 a2 99 a2 c9 48 76 dd |.j.... `.....Hv.| +00000030 16 40 d2 28 3c 9e a1 d3 68 fe 69 17 f2 22 79 87 |.@.(<...h.i.."y.| +00000040 31 0e d2 df 37 f8 62 |1...7.b|" +"2019-09-24 01:04:28.670 UTC [protoutils] checkSignatureFromCreator -> DEBU 343 exits successfully" +"2019-09-24 01:04:28.671 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 344 validateChaincodeProposalMessage starts for proposal 0xc00012b5e0, header 0xc002483f40" +"2019-09-24 01:04:28.671 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 345 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 01:04:28.671 UTC [endorser] preProcess -> DEBU 346 [][4d028da1] processing txid: 4d028da15790cbbccd1ce09019c3707640c0b9fb5aa98ebbb0baa7c8bc4c79bb" +"2019-09-24 01:04:28.671 UTC [endorser] SimulateProposal -> DEBU 347 [][4d028da1] Entry chaincode: name:"qscc" " +"2019-09-24 01:04:28.671 UTC [endorser] callChaincode -> INFO 348 [][4d028da1] Entry chaincode: name:"qscc" " +"2019-09-24 01:04:28.671 UTC [chaincode] Execute -> DEBU 349 Entry" +"2019-09-24 01:04:28.671 UTC [qscc] Invoke -> DEBU 34a Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 01:04:28.684 UTC [aclmgmt] CheckACL -> DEBU 34b acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 01:04:28.684 UTC [aclmgmt] CheckACL -> DEBU 34c acl check(/Channel/Application/Readers)" +"2019-09-24 01:04:28.684 UTC [policies] Evaluate -> DEBU 34d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:28.685 UTC [policies] Evaluate -> DEBU 34e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:28.685 UTC [policies] Evaluate -> DEBU 34f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:28.685 UTC [msp] DeserializeIdentity -> DEBU 350 Obtaining identity" +"2019-09-24 01:04:28.686 UTC [msp.identity] newIdentity -> DEBU 351 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:28.686 UTC [cauthdsl] func1 -> DEBU 352 0xc002657850 gate 1569287068686398000 evaluation starts" +"2019-09-24 01:04:28.686 UTC [cauthdsl] func2 -> DEBU 353 0xc002657850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:28.686 UTC [cauthdsl] func2 -> DEBU 354 0xc002657850 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:28.686 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 355 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:28.686 UTC [msp] Validate -> DEBU 356 MSP Org1MSP validating identity" +"2019-09-24 01:04:28.687 UTC [msp] getCertificationChain -> DEBU 357 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:28.687 UTC [cauthdsl] func2 -> DEBU 358 0xc002657850 principal matched by identity 0" +"2019-09-24 01:04:28.688 UTC [msp.identity] Verify -> DEBU 359 Verify: digest = 00000000 5e 8f fe 6d 87 85 5a 3c 72 79 e9 66 2d 79 ab f6 |^..m..Z DEBU 35a Verify: sig = 00000000 30 45 02 21 00 d7 7f 6f 13 cc 24 43 50 4c 90 e8 |0E.!...o..$CPL..| +00000010 13 72 2f e1 98 e0 e5 52 3d a4 4f 95 91 e3 08 62 |.r/....R=.O....b| +00000020 1b 6a c4 db c4 02 20 60 d9 a2 99 a2 c9 48 76 dd |.j.... `.....Hv.| +00000030 16 40 d2 28 3c 9e a1 d3 68 fe 69 17 f2 22 79 87 |.@.(<...h.i.."y.| +00000040 31 0e d2 df 37 f8 62 |1...7.b|" +"2019-09-24 01:04:28.688 UTC [cauthdsl] func2 -> DEBU 35b 0xc002657850 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:28.688 UTC [cauthdsl] func1 -> DEBU 35c 0xc002657850 gate 1569287068686398000 evaluation succeeds" +"2019-09-24 01:04:28.688 UTC [policies] Evaluate -> DEBU 35d Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 35e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 35f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:28.689 UTC [policies] Evaluate -> DEBU 360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:28.689 UTC [chaincode] handleMessage -> DEBU 361 [4d028da1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:28.690 UTC [chaincode] Notify -> DEBU 362 [4d028da1] notifying Txid:4d028da15790cbbccd1ce09019c3707640c0b9fb5aa98ebbb0baa7c8bc4c79bb, channelID:" +"2019-09-24 01:04:28.690 UTC [chaincode] Execute -> DEBU 363 Exit" +"2019-09-24 01:04:28.690 UTC [endorser] callChaincode -> INFO 364 [][4d028da1] Exit chaincode: name:"qscc" (19ms)" +"2019-09-24 01:04:28.690 UTC [endorser] SimulateProposal -> DEBU 365 [][4d028da1] Exit" +"2019-09-24 01:04:28.690 UTC [endorser] func1 -> DEBU 366 Exit: request from 172.18.0.5:49820" +"2019-09-24 01:04:28.691 UTC [comm.grpc.server] 1 -> INFO 367 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49820 grpc.code=OK grpc.call_duration=21.4423ms +"2019-09-24 01:04:29.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 368 Obtaining default signing identity" +"2019-09-24 01:04:29.211 UTC [msp.identity] Sign -> DEBU 369 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151008 " +"2019-09-24 01:04:29.211 UTC [msp.identity] Sign -> DEBU 36a Sign: digest: 503E01FB6F84183DF9B14EA6BE1C7882E11E457CF18F8F53E20AF7ACCB23D831 " +"2019-09-24 01:04:29.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 36b Obtaining default signing identity" +"2019-09-24 01:04:29.212 UTC [msp.identity] Sign -> DEBU 36c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:29.212 UTC [msp.identity] Sign -> DEBU 36d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:29.213 UTC [gossip.discovery] periodicalSendAlive -> DEBU 36e Sleeping 5s" +"2019-09-24 01:04:29.217 UTC [grpc] infof -> DEBU 36f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:29.217 UTC [gossip.comm] Send -> DEBU 370 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:29.218 UTC [gossip.comm] sendToEndpoint -> DEBU 371 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:29.219 UTC [gossip.comm] sendToEndpoint -> DEBU 372 Exiting" +"2019-09-24 01:04:29.726 UTC [gossip.comm] Send -> DEBU 373 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:29.726 UTC [gossip.comm] sendToEndpoint -> DEBU 374 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:29.726 UTC [gossip.comm] sendToEndpoint -> DEBU 375 Exiting" +"2019-09-24 01:04:29.731 UTC [gossip.gossip] handleMessage -> DEBU 376 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes" +"2019-09-24 01:04:29.732 UTC [msp.identity] Verify -> DEBU 377 Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +"2019-09-24 01:04:29.732 UTC [msp.identity] Verify -> DEBU 378 Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +"2019-09-24 01:04:29.731 UTC [gossip.comm] Send -> DEBU 379 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:29.734 UTC [gossip.comm] sendToEndpoint -> DEBU 37a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 01:04:29.734 UTC [gossip.comm] sendToEndpoint -> DEBU 37c Exiting" +"2019-09-24 01:04:29.734 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:29.735 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 37e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 37f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:29.735 UTC [policies] Evaluate -> DEBU 380 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:29.736 UTC [msp] DeserializeIdentity -> DEBU 381 Obtaining identity" +"2019-09-24 01:04:29.736 UTC [msp.identity] newIdentity -> DEBU 382 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE-----" +"2019-09-24 01:04:29.737 UTC [cauthdsl] func1 -> DEBU 383 0xc002674bf0 gate 1569287069737694100 evaluation starts" +"2019-09-24 01:04:29.737 UTC [cauthdsl] func2 -> DEBU 384 0xc002674bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:29.737 UTC [cauthdsl] func2 -> DEBU 385 0xc002674bf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:29.738 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 386 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:29.738 UTC [msp] Validate -> DEBU 387 MSP Org1MSP validating identity" +"2019-09-24 01:04:29.739 UTC [msp] getCertificationChain -> DEBU 388 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:29.739 UTC [cauthdsl] func2 -> DEBU 389 0xc002674bf0 principal matched by identity 0" +"2019-09-24 01:04:29.740 UTC [msp.identity] Verify -> DEBU 38a Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +"2019-09-24 01:04:29.740 UTC [msp.identity] Verify -> DEBU 38b Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +"2019-09-24 01:04:29.742 UTC [cauthdsl] func2 -> DEBU 38c 0xc002674bf0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:29.742 UTC [cauthdsl] func1 -> DEBU 38d 0xc002674bf0 gate 1569287069737694100 evaluation succeeds" +"2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 38e Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 38f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 390 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:29.743 UTC [policies] Evaluate -> DEBU 391 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:29.743 UTC [gossip.gossip] handleMessage -> DEBU 392 Exiting" +"2019-09-24 01:04:29.907 UTC [gossip.gossip] handleMessage -> DEBU 393 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:29.907 UTC [gossip.pull] HandleMessage -> DEBU 394 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 395 Exiting" +"2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 396 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:29.908 UTC [gossip.gossip] handleMessage -> DEBU 397 Exiting" +"2019-09-24 01:04:29.916 UTC [gossip.gossip] handleMessage -> DEBU 398 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 01:04:29.917 UTC [msp.identity] Verify -> DEBU 399 Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +"2019-09-24 01:04:29.917 UTC [msp.identity] Verify -> DEBU 39a Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +"2019-09-24 01:04:29.918 UTC [gossip.gossip] handleMessage -> DEBU 39b Exiting" +"2019-09-24 01:04:30.526 UTC [gossip.gossip] handleMessage -> DEBU 39c Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.526 UTC [gossip.pull] HandleMessage -> DEBU 39d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.526 UTC [gossip.pull] SendDigest -> DEBU 39e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:30.526 UTC [gossip.gossip] handleMessage -> DEBU 39f Exiting" +"2019-09-24 01:04:30.529 UTC [gossip.gossip] handleMessage -> DEBU 3a0 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.529 UTC [gossip.gossip] handleMessage -> DEBU 3a1 Exiting" +"2019-09-24 01:04:30.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a2 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a3 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a4 Verify: digest = 00000000 82 57 2b 80 a1 9d 2c 27 03 4a 71 ef af 98 9c 5d |.W+...,'.Jq....]| +00000010 b9 b3 0f 0d d2 f8 c0 00 17 0f 71 87 39 30 f7 d8 |..........q.90..|" +"2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a5 Verify: sig = 00000000 30 45 02 21 00 fc 45 ca 66 35 8a 43 6e dc cc 08 |0E.!..E.f5.Cn...| +00000010 62 81 1f 90 73 40 2e 46 93 12 f9 cf fe 50 58 69 |b...s@.F.....PXi| +00000020 c7 c7 e0 19 ef 02 20 47 d4 96 b1 43 86 4a cc 30 |...... G...C.J.0| +00000030 3d 12 0e 6c a4 68 60 1b af db 77 a7 87 89 d1 bb |=..l.h`...w.....| +00000040 d3 57 f2 f8 ae b4 b6 |.W.....|" +"2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a6 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:30.530 UTC [msp.identity] Verify -> DEBU 3a7 Verify: sig = 00000000 30 45 02 21 00 d6 49 b2 99 50 e9 8c 35 c1 07 43 |0E.!..I..P..5..C| +00000010 4e 45 90 0a 7f da 67 2c 7d ec 23 a4 b2 62 d0 31 |NE....g,}.#..b.1| +00000020 40 65 51 e4 2e 02 20 48 c6 a1 61 51 f7 83 34 f5 |@eQ... H..aQ..4.| +00000030 10 dd 0d f1 f1 ee a9 9a 43 9e d2 ce 98 62 2c f3 |........C....b,.| +00000040 db 42 c1 69 9c 76 7c |.B.i.v||" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aa updating membership: timestamp: " +"2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ab Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ac Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ad Exiting" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ae Exiting" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3af Exiting" +"2019-09-24 01:04:30.530 UTC [gossip.discovery] sendMemResponse -> DEBU 3b0 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:30.531 UTC [gossip.comm] Send -> DEBU 3b1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:30.531 UTC [gossip.discovery] sendMemResponse -> DEBU 3b2 Exiting, replying with alive: > alive: > " +"2019-09-24 01:04:30.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.531 UTC [gossip.comm] sendToEndpoint -> DEBU 3b4 Exiting" +"2019-09-24 01:04:30.725 UTC [gossip.channel] reportMembershipChanges -> INFO 3b5 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-09-24 01:04:30.868 UTC [gossip.pull] Hello -> DEBU 3b6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:30.868 UTC [gossip.comm] Send -> DEBU 3b7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:30.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3b8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.869 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9 Exiting" +"2019-09-24 01:04:30.871 UTC [gossip.gossip] handleMessage -> DEBU 3ba Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.871 UTC [gossip.pull] HandleMessage -> DEBU 3bb GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.872 UTC [gossip.gossip] handleMessage -> DEBU 3bc Exiting" +"2019-09-24 01:04:30.877 UTC [msp] GetDefaultSigningIdentity -> DEBU 3bd Obtaining default signing identity" +"2019-09-24 01:04:30.877 UTC [msp.identity] Sign -> DEBU 3be Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151009 " +"2019-09-24 01:04:30.877 UTC [msp.identity] Sign -> DEBU 3bf Sign: digest: 18F2220278F127E6AC94A93CCC42696FA9C0B510881E359748E9B580769B494A " +"2019-09-24 01:04:30.877 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c0 Obtaining default signing identity" +"2019-09-24 01:04:30.878 UTC [msp.identity] Sign -> DEBU 3c1 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:30.878 UTC [msp.identity] Sign -> DEBU 3c2 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:30.878 UTC [gossip.comm] Send -> DEBU 3c3 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:30.878 UTC [gossip.comm] sendToEndpoint -> DEBU 3c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.879 UTC [gossip.comm] sendToEndpoint -> DEBU 3c5 Exiting" +"2019-09-24 01:04:30.881 UTC [gossip.gossip] handleMessage -> DEBU 3c6 Entering, 172.18.0.6:43944 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.882 UTC [gossip.gossip] handleMessage -> DEBU 3c7 Exiting" +"2019-09-24 01:04:30.882 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes" +"2019-09-24 01:04:30.883 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:30.883 UTC [msp.identity] Verify -> DEBU 3ca Verify: digest = 00000000 18 f2 22 02 78 f1 27 e6 ac 94 a9 3c cc 42 69 6f |..".x.'....<.Bio| +00000010 a9 c0 b5 10 88 1e 35 97 48 e9 b5 80 76 9b 49 4a |......5.H...v.IJ|" +"2019-09-24 01:04:30.884 UTC [msp.identity] Verify -> DEBU 3cb Verify: sig = 00000000 30 44 02 20 33 fb 58 f6 6d da ed 98 5d 3a 28 b3 |0D. 3.X.m...]:(.| +00000010 cc 71 78 3b cb 76 a9 18 90 f0 2a fc dd e9 b8 7f |.qx;.v....*.....| +00000020 ef ca 9b c7 02 20 03 8a 30 4c 96 6d 98 fd b8 d5 |..... ..0L.m....| +00000030 3b b5 d9 19 e5 41 2f a5 5a 39 5d f9 3b 41 26 2e |;....A/.Z9].;A&.| +00000040 dc da fa d4 6c 2e |....l.|" +"2019-09-24 01:04:30.886 UTC [msp.identity] Verify -> DEBU 3cc Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:30.886 UTC [msp.identity] Verify -> DEBU 3cd Verify: sig = 00000000 30 45 02 21 00 e2 5b 54 75 48 42 4f f1 5a 09 0f |0E.!..[TuHBO.Z..| +00000010 84 5b ca 9c fa 1d f7 7f 5a 3a 32 a8 09 37 50 1d |.[......Z:2..7P.| +00000020 6e 14 00 c5 87 02 20 11 b4 fd a8 70 d3 cb 4a cb |n..... ....p..J.| +00000030 dc 29 bf c2 48 c2 cb ea 09 f7 eb dd 4e 9d 92 18 |.)..H.......N...| +00000040 63 62 00 33 66 c7 0d |cb.3f..|" +"2019-09-24 01:04:30.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:30.888 UTC [gossip.discovery] isSentByMe -> DEBU 3cf Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:30.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 3d0 Exiting" +"2019-09-24 01:04:30.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3d1 Exiting" +"2019-09-24 01:04:31.762 UTC [gossip.election] waitForInterrupt -> DEBU 3d2 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:31.763 UTC [gossip.election] beLeader -> INFO 3d3 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Becoming a leader" +"2019-09-24 01:04:31.763 UTC [gossip.service] func1 -> INFO 3d4 Elected as a leader, starting delivery service for channel businesschannel" +"2019-09-24 01:04:31.763 UTC [deliveryClient] StartDeliverForChannel -> DEBU 3d5 This peer will pass blocks from orderer service to other peers for channel businesschannel" +"2019-09-24 01:04:31.763 UTC [gossip.election] leaderElection -> DEBU 3d6 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:31.763 UTC [gossip.election] IsLeader -> DEBU 3d7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:31.763 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d8 Obtaining default signing identity" +"2019-09-24 01:04:31.763 UTC [msp.identity] Sign -> DEBU 3d9 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510021801 " +"2019-09-24 01:04:31.763 UTC [msp.identity] Sign -> DEBU 3da Sign: digest: 48BB9EE71D606B70252E932C70612B7F184577C39E62F9F1E0DF64C0A2E69531 " +"2019-09-24 01:04:31.763 UTC [gossip.election] waitForInterrupt -> DEBU 3db d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:31.764 UTC [ConnProducer] NewConnection -> DEBU 3dc Creating a new connection" +"2019-09-24 01:04:31.765 UTC [grpc] DialContext -> DEBU 3dd parsed scheme: """ +"2019-09-24 01:04:31.765 UTC [grpc] DialContext -> DEBU 3de scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:31.765 UTC [grpc] watcher -> DEBU 3df ccResolverWrapper: sending new addresses to cc: [{orderer0.example.com:7050 0 }]" +"2019-09-24 01:04:31.765 UTC [grpc] switchBalancer -> DEBU 3e0 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:31.765 UTC [grpc] HandleSubConnStateChange -> DEBU 3e1 pickfirstBalancer: HandleSubConnStateChange: 0xc00293fee0, CONNECTING" +"2019-09-24 01:04:31.775 UTC [grpc] HandleSubConnStateChange -> DEBU 3e2 pickfirstBalancer: HandleSubConnStateChange: 0xc00293fee0, READY" +"2019-09-24 01:04:31.775 UTC [ConnProducer] NewConnection -> DEBU 3e3 Connected to {orderer0.example.com:7050 [OrdererMSP]}" +"2019-09-24 01:04:31.775 UTC [deliveryClient] connect -> DEBU 3e4 Connected to orderer0.example.com:7050" +"2019-09-24 01:04:31.776 UTC [deliveryClient] connect -> DEBU 3e5 Establishing gRPC stream with orderer0.example.com:7050 ..." +"2019-09-24 01:04:31.776 UTC [deliveryClient] afterConnect -> DEBU 3e6 Entering" +"2019-09-24 01:04:31.776 UTC [deliveryClient] RequestBlocks -> DEBU 3e7 Starting deliver with block [1] for channel businesschannel" +"2019-09-24 01:04:31.776 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e8 Obtaining default signing identity" +"2019-09-24 01:04:31.776 UTC [msp] GetDefaultSigningIdentity -> DEBU 3e9 Obtaining default signing identity" +"2019-09-24 01:04:31.777 UTC [msp.identity] Sign -> DEBU 3ea Sign: plaintext: 0A91070A3D08051A06089FD7A5EC0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 " +"2019-09-24 01:04:31.777 UTC [msp.identity] Sign -> DEBU 3eb Sign: digest: C4F9503E5301D3D23927882C3353751138F3AB2BF634639FCFE2F8D0FD14F5CC " +"2019-09-24 01:04:31.777 UTC [deliveryClient] afterConnect -> DEBU 3ec Exiting" +"2019-09-24 01:04:31.785 UTC [gossip.comm] Send -> DEBU 3ed Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:31.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:04:31.786 UTC [gossip.comm] sendToEndpoint -> DEBU 3ef Exiting" +"2019-09-24 01:04:31.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:31.799 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3f1 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:31.800 UTC [policies] Evaluate -> DEBU 3f4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:31.801 UTC [msp] DeserializeIdentity -> DEBU 3f5 Obtaining identity" +"2019-09-24 01:04:31.801 UTC [msp.identity] newIdentity -> DEBU 3f6 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.802 UTC [cauthdsl] func1 -> DEBU 3f7 0xc00278dcf0 gate 1569287071802348800 evaluation starts" +"2019-09-24 01:04:31.802 UTC [cauthdsl] func2 -> DEBU 3f8 0xc00278dcf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:31.803 UTC [cauthdsl] func2 -> DEBU 3f9 0xc00278dcf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:31.803 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3fa Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:04:31.804 UTC [msp] Validate -> DEBU 3fb MSP OrdererMSP validating identity" +"2019-09-24 01:04:31.805 UTC [cauthdsl] func2 -> DEBU 3fc 0xc00278dcf0 principal matched by identity 0" +"2019-09-24 01:04:31.805 UTC [msp.identity] Verify -> DEBU 3fd Verify: digest = 00000000 77 dd b6 d7 72 80 8a d1 f8 5a de 4c 70 a6 68 f5 |w...r....Z.Lp.h.| +00000010 ad 49 05 05 64 ca bd b4 ac 1d 58 51 69 e0 b2 26 |.I..d.....XQi..&|" +"2019-09-24 01:04:31.805 UTC [msp.identity] Verify -> DEBU 3fe Verify: sig = 00000000 30 45 02 21 00 e3 64 df 09 3e 72 bb 2d cb d0 c5 |0E.!..d..>r.-...| +00000010 b7 ec aa d5 28 ed 2d 8f 36 1a 6a ba 0e 58 0e a0 |....(.-.6.j..X..| +00000020 7c d5 38 95 99 02 20 40 98 33 47 f8 c6 7b 0f 05 ||.8... @.3G..{..| +00000030 bd 0b 82 87 31 b0 8a 6a 42 ee ef 0a 44 ca 27 14 |....1..jB...D.'.| +00000040 63 3e 0b 89 f9 6e ac |c>...n.|" +"2019-09-24 01:04:31.806 UTC [cauthdsl] func2 -> DEBU 3ff 0xc00278dcf0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:31.806 UTC [cauthdsl] func1 -> DEBU 400 0xc00278dcf0 gate 1569287071802348800 evaluation succeeds" +"2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 401 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 402 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 403 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:31.807 UTC [policies] Evaluate -> DEBU 404 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:31.808 UTC [blocksProvider] DeliverBlocks -> DEBU 405 [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-09-24 01:04:31.808 UTC [gossip.state] addPayload -> DEBU 406 [businesschannel] Adding payload to local buffer, blockNum = [1]" +"2019-09-24 01:04:31.808 UTC [gossip.state] addPayload -> DEBU 407 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:04:31.808 UTC [blocksProvider] DeliverBlocks -> DEBU 408 [businesschannel] Gossiping block [1], peers number [1]" +"2019-09-24 01:04:31.809 UTC [gossip.state] deliverPayloads -> DEBU 409 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1]" +"2019-09-24 01:04:31.809 UTC [gossip.state] deliverPayloads -> DEBU 40a [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger" +"2019-09-24 01:04:31.809 UTC [gossip.privdata] StoreBlock -> INFO 40b [businesschannel] Received block [1] from buffer" +"2019-09-24 01:04:31.809 UTC [gossip.privdata] StoreBlock -> DEBU 40c [businesschannel] Validating block [1]" +"2019-09-24 01:04:31.809 UTC [committer.txvalidator] Validate -> DEBU 40d [businesschannel] START Block Validation for block [1]" +"2019-09-24 01:04:31.809 UTC [committer.txvalidator] Validate -> DEBU 40e expecting 1 block validation responses" +"2019-09-24 01:04:31.809 UTC [committer.txvalidator] validateTx -> DEBU 40f [businesschannel] validateTx starts for block 0xc00274b380 env 0xc00266f770 txn 0" +"2019-09-24 01:04:31.809 UTC [protoutils] ValidateTransaction -> DEBU 410 ValidateTransactionEnvelope starts for envelope 0xc00266f770" +"2019-09-24 01:04:31.809 UTC [protoutils] ValidateTransaction -> DEBU 411 Header is channel_header:"\010\001\032\006\010\236\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\273\243\202\352\224\302P0\022\312\244\020\033\371un\321\321\312S\240\207\334\217" " +"2019-09-24 01:04:31.809 UTC [protoutils] validateChannelHeader -> DEBU 412 validateChannelHeader info: header type 1" +"2019-09-24 01:04:31.809 UTC [protoutils] checkSignatureFromCreator -> DEBU 413 begin" +"2019-09-24 01:04:31.810 UTC [msp] GetManagerForChain -> DEBU 414 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 415 creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +"2019-09-24 01:04:31.810 UTC [msp] Validate -> DEBU 416 MSP OrdererMSP validating identity" +"2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 417 creator is valid" +"2019-09-24 01:04:31.810 UTC [msp.identity] Verify -> DEBU 418 Verify: digest = 00000000 3a 3b a8 fa 19 47 c6 4f 70 72 3b 87 eb a8 a9 3a |:;...G.Opr;....:| +00000010 cc 79 a8 f3 d8 cd 6e 6d 4b a9 0a 08 86 60 29 5f |.y....nmK....`)_|" +"2019-09-24 01:04:31.810 UTC [msp.identity] Verify -> DEBU 419 Verify: sig = 00000000 30 44 02 20 3a b0 a4 59 8c 0d d1 93 63 37 ae 85 |0D. :..Y....c7..| +00000010 3c d5 31 b6 01 9c 7d 0e 86 9f fd b5 ba 94 55 e6 |<.1...}.......U.| +00000020 2d 17 bd 56 02 20 63 81 1a 3b 99 93 cf 7e 2f fe |-..V. c..;...~/.| +00000030 d4 28 43 f3 2d 43 fb 57 79 ee b6 15 b0 f5 fc aa |.(C.-C.Wy.......| +00000040 1a b2 84 1a bc 27 |.....'|" +"2019-09-24 01:04:31.810 UTC [protoutils] checkSignatureFromCreator -> DEBU 41a exits successfully" +"2019-09-24 01:04:31.810 UTC [protoutils] validateConfigTransaction -> DEBU 41b validateConfigTransaction starts for data 0xc002542000, header channel_header:"\010\001\032\006\010\236\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\273\243\202\352\224\302P0\022\312\244\020\033\371un\321\321\312S\240\207\334\217" " +"2019-09-24 01:04:31.810 UTC [committer.txvalidator] validateTx -> DEBU 41c Transaction is for channel businesschannel" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Group] /Channel" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:31.811 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.811 UTC [common.configtx] verifyDeltaSet -> DEBU 42c Processing change to key: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:31.811 UTC [common.configtx] policyForItem -> DEBU 42d Getting policy for item Org1MSP with mod_policy Admins" +"2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 42e Manager Channel looking up path [Application]" +"2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 42f Manager Channel has managers Application" +"2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 430 Manager Channel has managers Orderer" +"2019-09-24 01:04:31.811 UTC [policies] Manager -> DEBU 431 Manager Channel/Application looking up path []" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 432 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 433 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 434 Manager Channel/Application looking up path [Org1MSP]" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 435 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 436 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:31.812 UTC [policies] Manager -> DEBU 437 Manager Channel/Application/Org1MSP looking up path []" +"2019-09-24 01:04:31.812 UTC [policies] Evaluate -> DEBU 438 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:04:31.812 UTC [cauthdsl] func1 -> DEBU 439 0xc002b40cd0 gate 1569287071812951600 evaluation starts" +"2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 43a 0xc002b40cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 43b 0xc002b40cd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:31.813 UTC [gossip.channel] AddToMsgStore -> DEBU 43c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:04:31.813 UTC [gossip.pull] Add -> DEBU 43d Added 1, total items: 1" +"2019-09-24 01:04:31.813 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 43e Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:31.813 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 43f Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:31.813 UTC [msp] Validate -> DEBU 440 MSP Org1MSP validating identity" +"2019-09-24 01:04:31.813 UTC [msp] getCertificationChain -> DEBU 441 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:31.813 UTC [msp] hasOURole -> DEBU 442 MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:31.813 UTC [msp] getCertificationChain -> DEBU 443 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:31.813 UTC [cauthdsl] func2 -> DEBU 444 0xc002b40cd0 principal matched by identity 0" +"2019-09-24 01:04:31.813 UTC [msp.identity] Verify -> DEBU 445 Verify: digest = 00000000 c3 41 4e f0 0a 37 18 32 bc 33 55 41 45 93 c4 11 |.AN..7.2.3UAE...| +00000010 8e 51 b8 4c 00 c2 8a 54 98 f9 28 0e 7e 5f b7 a3 |.Q.L...T..(.~_..|" +"2019-09-24 01:04:31.814 UTC [msp.identity] Verify -> DEBU 446 Verify: sig = 00000000 30 44 02 20 4e ad a9 47 d7 a7 eb f5 52 d2 74 d8 |0D. N..G....R.t.| +00000010 8c f1 c1 ca 7f 51 71 76 b5 77 ff 0a 32 fe ca 6e |.....Qqv.w..2..n| +00000020 19 67 38 4f 02 20 1a 75 bb f0 f0 39 25 db dd 91 |.g8O. .u...9%...| +00000030 bb 44 6b c1 bf 2e 09 21 e6 15 35 a2 9d 9d 47 94 |.Dk....!..5...G.| +00000040 0a 8e 87 e4 30 41 |....0A|" +"2019-09-24 01:04:31.814 UTC [cauthdsl] func2 -> DEBU 447 0xc002b40cd0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:31.814 UTC [cauthdsl] func1 -> DEBU 448 0xc002b40cd0 gate 1569287071812951600 evaluation succeeds" +"2019-09-24 01:04:31.814 UTC [policies] Evaluate -> DEBU 449 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:31.814 UTC [policies] Evaluate -> DEBU 44a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:31.814 UTC [common.configtx] verifyDeltaSet -> DEBU 44b Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44c Setting policy for key Readers to " +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44d Setting policy for key Writers to " +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44e Setting policy for key Admins to " +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 44f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 450 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.815 UTC [common.configtx] recurseConfigMap -> DEBU 451 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 452 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 453 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 454 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 455 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 456 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 457 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 458 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 459 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.816 UTC [common.configtx] recurseConfigMap -> DEBU 45d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 45e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 45f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 460 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.817 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:31.817 UTC [common.channelconfig] NewStandardValues -> DEBU 462 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 463 Processing field: HashingAlgorithm" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 464 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 465 Processing field: OrdererAddresses" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 466 Processing field: Consortium" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] initializeProtosStruct -> DEBU 467 Processing field: Capabilities" +"2019-09-24 01:04:31.817 UTC [common.channelconfig] NewStandardValues -> DEBU 468 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 469 Processing field: ACLs" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46a Processing field: Capabilities" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] NewStandardValues -> DEBU 46b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46c Processing field: AnchorPeers" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] NewStandardValues -> DEBU 46d Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 46e Processing field: MSP" +"2019-09-24 01:04:31.818 UTC [common.channelconfig] Validate -> DEBU 46f Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:31.818 UTC [common.channelconfig] validateMSP -> DEBU 470 Setting up MSP for org Org1MSP" +"2019-09-24 01:04:31.818 UTC [msp] newBccspMsp -> DEBU 471 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:31.818 UTC [msp] New -> DEBU 472 Creating Cache-MSP instance" +"2019-09-24 01:04:31.818 UTC [msp] Setup -> DEBU 473 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:31.819 UTC [msp.identity] newIdentity -> DEBU 474 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.819 UTC [gossip.comm] Send -> DEBU 475 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:31.819 UTC [gossip.comm] sendToEndpoint -> DEBU 476 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25491 bytes, seq: 1}, Envelope: 25524 bytes, Signature: 0 bytes" +"2019-09-24 01:04:31.819 UTC [gossip.comm] sendToEndpoint -> DEBU 477 Exiting" +"2019-09-24 01:04:31.819 UTC [common.channelconfig] NewStandardValues -> DEBU 478 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:31.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 479 Processing field: AnchorPeers" +"2019-09-24 01:04:31.819 UTC [common.channelconfig] NewStandardValues -> DEBU 47a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:31.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 47b Processing field: MSP" +"2019-09-24 01:04:31.819 UTC [common.channelconfig] Validate -> DEBU 47c Anchor peers for org Org2MSP are " +"2019-09-24 01:04:31.820 UTC [common.channelconfig] validateMSP -> DEBU 47d Setting up MSP for org Org2MSP" +"2019-09-24 01:04:31.820 UTC [msp] newBccspMsp -> DEBU 47e Creating BCCSP-based MSP instance" +"2019-09-24 01:04:31.820 UTC [msp] New -> DEBU 47f Creating Cache-MSP instance" +"2019-09-24 01:04:31.820 UTC [msp] Setup -> DEBU 480 Setting up MSP instance Org2MSP" +"2019-09-24 01:04:31.820 UTC [msp.identity] newIdentity -> DEBU 481 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.820 UTC [common.channelconfig] NewStandardValues -> DEBU 482 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 483 Processing field: ConsensusType" +"2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 484 Processing field: BatchSize" +"2019-09-24 01:04:31.820 UTC [common.channelconfig] initializeProtosStruct -> DEBU 485 Processing field: BatchTimeout" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 486 Processing field: KafkaBrokers" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 487 Processing field: ChannelRestrictions" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 488 Processing field: Capabilities" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] NewStandardValues -> DEBU 489 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48a Processing field: Endpoints" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] NewStandardValues -> DEBU 48b Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] initializeProtosStruct -> DEBU 48c Processing field: MSP" +"2019-09-24 01:04:31.821 UTC [common.channelconfig] validateMSP -> DEBU 48d Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:31.821 UTC [msp] newBccspMsp -> DEBU 48e Creating BCCSP-based MSP instance" +"2019-09-24 01:04:31.821 UTC [msp] New -> DEBU 48f Creating Cache-MSP instance" +"2019-09-24 01:04:31.821 UTC [msp] Setup -> DEBU 490 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:31.821 UTC [msp.identity] newIdentity -> DEBU 491 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.822 UTC [msp.identity] newIdentity -> DEBU 492 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:31.822 UTC [msp] Validate -> DEBU 493 MSP OrdererMSP validating identity" +"2019-09-24 01:04:31.822 UTC [msp] Setup -> DEBU 494 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:31.822 UTC [msp] Setup -> DEBU 495 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 496 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 497 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 498 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 499 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49a Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49b Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49c Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49d Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:31.822 UTC [policies] GetPolicy -> DEBU 49e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 49f Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:31.822 UTC [policies] GetPolicy -> DEBU 4a0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a1 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a2 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a3 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:31.822 UTC [policies] NewManagerImpl -> DEBU 4a4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a5 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a7 Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a8 Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4a9 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4aa Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ab Proposed new policy Admins for Channel" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ac Proposed new policy Readers for Channel" +"2019-09-24 01:04:31.823 UTC [policies] NewManagerImpl -> DEBU 4ad Proposed new policy Writers for Channel" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4ae Adding to config map: [Group] /Channel" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4af Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b1 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b2 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.823 UTC [common.configtx] addToMap -> DEBU 4b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4b9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4ba Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bc Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bd Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4be Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4bf Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c0 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c2 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c3 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4c9 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4ca Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cb Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:31.824 UTC [common.configtx] addToMap -> DEBU 4cd Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4ce Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4cf Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d0 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d1 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d2 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d3 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d7 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d8 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:31.825 UTC [common.configtx] addToMap -> DEBU 4d9 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4da As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4db As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4dc Manager Channel looking up path [Application]" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4dd Manager Channel has managers Application" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4de Manager Channel has managers Orderer" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4df Manager Channel/Application looking up path []" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e0 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e1 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e2 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e3 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:31.825 UTC [common.channelconfig] LogSanityChecks -> DEBU 4e4 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e5 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e6 Manager Channel has managers Application" +"2019-09-24 01:04:31.825 UTC [policies] Manager -> DEBU 4e7 Manager Channel has managers Orderer" +"2019-09-24 01:04:31.826 UTC [policies] Manager -> DEBU 4e8 Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:31.826 UTC [policies] Manager -> DEBU 4e9 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ea As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4eb As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ec As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:31.826 UTC [common.channelconfig] LogSanityChecks -> DEBU 4ed As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:31.826 UTC [common.capabilities] Supported -> DEBU 4ee Application capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:31.826 UTC [common.capabilities] Supported -> DEBU 4ef Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:31.826 UTC [gossip.service] ProcessConfigUpdate -> DEBU 4f0 Processing new config for channel businesschannel" +"2019-09-24 01:04:31.827 UTC [gossip.service] ProcessConfigUpdate -> DEBU 4f1 Calling out because config was updated for channel businesschannel" +"2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f2 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f3 Org2MSP anchor peers: []" +"2019-09-24 01:04:31.827 UTC [gossip.service] updateAnchors -> DEBU 4f4 Creating state provider for chainID businesschannel" +"2019-09-24 01:04:31.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:31.827 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4f6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:31.827 UTC [policies] Evaluate -> DEBU 4f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:31.827 UTC [policies] Evaluate -> DEBU 4f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:31.828 UTC [policies] Evaluate -> DEBU 4f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:31.828 UTC [cauthdsl] func1 -> DEBU 4fa 0xc0024ae260 gate 1569287071828149900 evaluation starts" +"2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fb 0xc0024ae260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fc 0xc0024ae260 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:31.828 UTC [cauthdsl] func2 -> DEBU 4fd 0xc0024ae260 principal matched by identity 0" +"2019-09-24 01:04:31.828 UTC [msp.identity] Verify -> DEBU 4fe Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +"2019-09-24 01:04:31.828 UTC [msp.identity] Verify -> DEBU 4ff Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +"2019-09-24 01:04:31.829 UTC [cauthdsl] func2 -> DEBU 500 0xc0024ae260 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:31.829 UTC [cauthdsl] func1 -> DEBU 501 0xc0024ae260 gate 1569287071828149900 evaluation succeeds" +"2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 502 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 503 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 504 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:31.829 UTC [policies] Evaluate -> DEBU 505 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:31.829 UTC [gossip.gossip] JoinChan -> INFO 506 Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 507 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 508 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 01:04:31.829 UTC [gossip.gossip] learnAnchorPeers -> INFO 509 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-09-24 01:04:31.829 UTC [gossip.service] updateEndpoints -> DEBU 50a Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 01:04:31.830 UTC [peer] updateTrustedRoots -> DEBU 50b Updating trusted root authorities for channel businesschannel" +"2019-09-24 01:04:31.847 UTC [comm.grpc.server] 1 -> INFO 50c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:33.847Z grpc.peer_address=172.18.0.6:43990 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.9µs +"2019-09-24 01:04:31.849 UTC [msp] GetDefaultSigningIdentity -> DEBU 50d Obtaining default signing identity" +"2019-09-24 01:04:31.850 UTC [msp.identity] Sign -> DEBU 50e Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:31.851 UTC [msp.identity] Sign -> DEBU 50f Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:31.851 UTC [gossip.comm] authenticateRemotePeer -> DEBU 510 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:43990" +"2019-09-24 01:04:31.853 UTC [gossip.comm] authenticateRemotePeer -> DEBU 511 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:43990" +"2019-09-24 01:04:31.854 UTC [msp.identity] Verify -> DEBU 512 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:31.854 UTC [msp.identity] Verify -> DEBU 513 Verify: sig = 00000000 30 45 02 21 00 c3 24 bf b4 3e e6 76 c5 c3 58 a7 |0E.!..$..>.v..X.| +00000010 e2 70 9a 4d 9b 29 f4 27 67 6a 4f ea 1c 96 45 50 |.p.M.).'gjO...EP| +00000020 98 79 63 d4 52 02 20 1f 0c 66 49 e7 53 5a 23 d1 |.yc.R. ..fI.SZ#.| +00000030 d3 ca d6 76 fc 12 1a 5c be 1a 18 f8 64 e7 29 83 |...v...\....d.).| +00000040 a3 a6 15 0a 16 af 21 |......!|" +"2019-09-24 01:04:31.855 UTC [gossip.comm] authenticateRemotePeer -> DEBU 514 Authenticated 172.18.0.6:43990" +"2019-09-24 01:04:31.855 UTC [gossip.comm] GossipStream -> DEBU 515 Servicing 172.18.0.6:43990" +"2019-09-24 01:04:31.855 UTC [peer] buildTrustedRootsForChain -> DEBU 516 updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:31.856 UTC [peer] buildTrustedRootsForChain -> DEBU 517 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:31.856 UTC [gossip.comm] serviceConnection -> DEBU 518 Closing reading from stream" +"2019-09-24 01:04:31.856 UTC [gossip.comm] func2 -> DEBU 51a Client 172.18.0.6:43944 disconnected" +"2019-09-24 01:04:31.857 UTC [comm.grpc.server] 1 -> INFO 51c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:43944 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.2960769s +"2019-09-24 01:04:31.856 UTC [peer] buildTrustedRootsForChain -> DEBU 519 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:31.857 UTC [gossip.comm] writeToStream -> DEBU 51b Closing writing to stream" +"2019-09-24 01:04:31.857 UTC [gossip.comm] serviceConnection -> DEBU 51d Closing reading from stream" +"2019-09-24 01:04:31.858 UTC [gossip.comm] func2 -> DEBU 51f Client 172.18.0.6:43990 disconnected" +"2019-09-24 01:04:31.859 UTC [comm.grpc.server] 1 -> INFO 520 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:41.849Z grpc.peer_address=172.18.0.6:43990 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=9.7062ms +"2019-09-24 01:04:31.858 UTC [peer] buildTrustedRootsForChain -> DEBU 51e adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:31.860 UTC [committer.txvalidator] validateTx -> DEBU 521 config transaction received for chain businesschannel" +"2019-09-24 01:04:31.860 UTC [committer.txvalidator] validateTx -> DEBU 522 [businesschannel] validateTx completes for block 0xc00274b380 env 0xc00266f770 txn 0" +"2019-09-24 01:04:31.861 UTC [committer.txvalidator] Validate -> DEBU 523 got result for idx 0, code 0" +"2019-09-24 01:04:31.861 UTC [committer.txvalidator] Validate -> INFO 524 [businesschannel] Validated block [1] in 51ms" +"2019-09-24 01:04:31.862 UTC [gossip.privdata] listMissingPrivateData -> DEBU 525 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:04:31.862 UTC [gossip.privdata] StoreBlock -> DEBU 526 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:04:31.863 UTC [committer] preCommit -> DEBU 527 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 01:04:31.863 UTC [kvledger] CommitWithPvtData -> DEBU 528 [businesschannel] Validating state for block [1]" +"2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 529 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 52a lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:04:31.864 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 52b Validating new block with num trans = [1]" +"2019-09-24 01:04:31.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 52c ValidateAndPrepareBatch() for block number = [1]" +"2019-09-24 01:04:31.864 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 52d preprocessing ProtoBlock..." +"2019-09-24 01:04:31.864 UTC [valimpl] preprocessProtoBlock -> DEBU 52e txType=CONFIG" +"2019-09-24 01:04:31.865 UTC [valimpl] processNonEndorserTx -> DEBU 52f Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 01:04:31.865 UTC [valimpl] processNonEndorserTx -> DEBU 530 Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 01:04:31.865 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 531 constructing new tx simulator" +"2019-09-24 01:04:31.865 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 532 constructing new tx simulator txid = []" +"2019-09-24 01:04:31.865 UTC [peer] GenerateSimulationResults -> DEBU 533 Processing CONFIG" +"2019-09-24 01:04:31.866 UTC [peer] processChannelConfigTx -> DEBU 534 channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 01:04:31.866 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 535 Simulation completed, getting simulation results" +"2019-09-24 01:04:31.866 UTC [lockbasedtxmgr] Done -> DEBU 536 Done with transaction simulation / query execution []" +"2019-09-24 01:04:31.867 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 537 Block [1] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 01:04:31.867 UTC [valinternal] ApplyWriteSet -> DEBU 538 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002aeca40)}" +"2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 539 validating rwset..." +"2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 53a postprocessing ProtoBlock..." +"2019-09-24 01:04:31.867 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 53b ValidateAndPrepareBatch() complete" +"2019-09-24 01:04:31.867 UTC [kvledger] CommitWithPvtData -> DEBU 53c [businesschannel] Adding CommitHash to the block [1]" +"2019-09-24 01:04:31.867 UTC [kvledger] CommitWithPvtData -> DEBU 53d [businesschannel] Committing block [1] to storage" +"2019-09-24 01:04:31.867 UTC [ledgerstorage] CommitWithPvtData -> DEBU 53e Writing block [1] to pvt block store" +"2019-09-24 01:04:31.868 UTC [gossip.comm] readFromStream -> DEBU 53f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +"2019-09-24 01:04:31.868 UTC [grpc] infof -> DEBU 540 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:31.869 UTC [gossip.comm] writeToStream -> DEBU 541 Closing writing to stream" +"2019-09-24 01:04:31.870 UTC [gossip.comm] readFromStream -> DEBU 542 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +"2019-09-24 01:04:31.871 UTC [pvtdatastorage] Prepare -> DEBU 543 Saved 0 private data write sets for block [1]" +"2019-09-24 01:04:31.874 UTC [fsblkstorage] indexBlock -> DEBU 544 Indexing block [blockNum=1, blockHash=[]byte{0x2d, 0x35, 0x2, 0xb4, 0xa1, 0xf4, 0x55, 0x5, 0x99, 0x27, 0xd1, 0x6d, 0xe6, 0x7c, 0x19, 0xc, 0x5f, 0x50, 0x26, 0x8f, 0x7a, 0x87, 0x5a, 0xb8, 0xa2, 0xc9, 0x82, 0xeb, 0xf2, 0x57, 0xa0, 0x33} txOffsets= +txId=33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636 locPointer=offset=71, bytesLength=24469 +]" +"2019-09-24 01:04:31.874 UTC [fsblkstorage] indexBlock -> DEBU 545 Adding txLoc [fileSuffixNum=0, offset=25879, bytesLength=24469] for tx ID: [33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636] to txid-index" +"2019-09-24 01:04:31.875 UTC [fsblkstorage] indexBlock -> DEBU 546 Adding txLoc [fileSuffixNum=0, offset=25879, bytesLength=24469] for tx number:[0] ID: [33d026c647e0e4f5ccffdb7a4b18c1937ae56a61e64fafcec0c70c8c507e5636] to blockNumTranNum index" +"2019-09-24 01:04:31.876 UTC [fsblkstorage] updateCheckpoint -> DEBU 547 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[51321], isChainEmpty=[false], lastBlockNumber=[1]" +"2019-09-24 01:04:31.876 UTC [pvtdatastorage] Commit -> DEBU 548 Committing private data for block [1]" +"2019-09-24 01:04:31.878 UTC [pvtdatastorage] Commit -> DEBU 549 Committed private data for block [1]" +"2019-09-24 01:04:31.878 UTC [kvledger] CommitWithPvtData -> DEBU 54a [businesschannel] Committing block [1] transactions to state database" +"2019-09-24 01:04:31.878 UTC [lockbasedtxmgr] Commit -> DEBU 54b lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:04:31.879 UTC [lockbasedtxmgr] Commit -> DEBU 54c Committing updates to state database" +"2019-09-24 01:04:31.879 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 54d Building the expiry schedules based on the update batch" +"2019-09-24 01:04:31.879 UTC [lockbasedtxmgr] Commit -> DEBU 54e Write lock acquired for committing updates to state database" +"2019-09-24 01:04:31.879 UTC [stateleveldb] ApplyUpdates -> DEBU 54f Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 01:04:31.881 UTC [lockbasedtxmgr] Commit -> DEBU 550 Updates committed to state database and the write lock is released" +"2019-09-24 01:04:31.881 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 551 Preparing potential purge list working-set for expiringAtBlk [2]" +"2019-09-24 01:04:31.881 UTC [leveldbhelper] GetIterator -> DEBU 552 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}]" +"2019-09-24 01:04:31.882 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 553 No expiry entry found for expiringAtBlk [2]" +"2019-09-24 01:04:31.882 UTC [lockbasedtxmgr] func1 -> DEBU 554 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:04:31.882 UTC [kvledger] CommitWithPvtData -> DEBU 555 [businesschannel] Committing block [1] transactions to history database" +"2019-09-24 01:04:31.883 UTC [historyleveldb] Commit -> DEBU 556 Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions" +"2019-09-24 01:04:31.883 UTC [historyleveldb] Commit -> DEBU 557 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 01:04:31.885 UTC [historyleveldb] Commit -> DEBU 558 Channel [businesschannel]: Updates committed to history database for blockNo [1]" +"2019-09-24 01:04:31.885 UTC [kvledger] CommitWithPvtData -> INFO 559 [businesschannel] Committed block [1] with 1 transaction(s) in 21ms (state_validation=3ms block_and_pvtdata_commit=11ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254]" +"2019-09-24 01:04:31.886 UTC [msp] GetDefaultSigningIdentity -> DEBU 55a Obtaining default signing identity" +"2019-09-24 01:04:31.886 UTC [msp.identity] Sign -> DEBU 55b Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020802 " +"2019-09-24 01:04:31.887 UTC [msp.identity] Sign -> DEBU 55c Sign: digest: 289BEBC9C4C7E4FBAD661C0B1C8ED00872608B07E9B2EF58134D31304C87B0DE " +"2019-09-24 01:04:31.887 UTC [gossip.state] commitBlock -> DEBU 55d [businesschannel] Committed block [1] with 1 transaction(s)" +"2019-09-24 01:04:32.179 UTC [comm.grpc.server] 1 -> INFO 55e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.178Z grpc.peer_address=172.18.0.9:51370 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=191.6µs +"2019-09-24 01:04:32.183 UTC [msp] GetDefaultSigningIdentity -> DEBU 55f Obtaining default signing identity" +"2019-09-24 01:04:32.183 UTC [msp.identity] Sign -> DEBU 560 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:32.184 UTC [msp.identity] Sign -> DEBU 561 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:32.184 UTC [gossip.comm] authenticateRemotePeer -> DEBU 562 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:51370" +"2019-09-24 01:04:32.185 UTC [gossip.comm] authenticateRemotePeer -> DEBU 563 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51370" +"2019-09-24 01:04:32.185 UTC [msp] DeserializeIdentity -> DEBU 564 Obtaining identity" +"2019-09-24 01:04:32.185 UTC [msp] DeserializeIdentity -> DEBU 565 Obtaining identity" +"2019-09-24 01:04:32.187 UTC [msp.identity] newIdentity -> DEBU 566 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:04:32.188 UTC [msp] Validate -> DEBU 567 MSP Org2MSP validating identity" +"2019-09-24 01:04:32.188 UTC [msp] getCertificationChain -> DEBU 568 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 569 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.189 UTC [msp] DeserializeIdentity -> DEBU 56a Obtaining identity" +"2019-09-24 01:04:32.189 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.189 UTC [msp] DeserializeIdentity -> DEBU 56c Obtaining identity" +"2019-09-24 01:04:32.190 UTC [msp] DeserializeIdentity -> DEBU 56d Obtaining identity" +"2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 56e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 56f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 570 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 571 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 572 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.192 UTC [policies] Evaluate -> DEBU 573 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.192 UTC [cauthdsl] func1 -> DEBU 574 0xc00303a690 gate 1569287072192565100 evaluation starts" +"2019-09-24 01:04:32.192 UTC [cauthdsl] func2 -> DEBU 575 0xc00303a690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.192 UTC [cauthdsl] func2 -> DEBU 576 0xc00303a690 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.193 UTC [cauthdsl] func2 -> DEBU 577 0xc00303a690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.193 UTC [cauthdsl] func2 -> DEBU 578 0xc00303a690 principal evaluation fails" +"2019-09-24 01:04:32.193 UTC [cauthdsl] func1 -> DEBU 579 0xc00303a690 gate 1569287072192565100 evaluation fails" +"2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.193 UTC [policies] Evaluate -> DEBU 57c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.193 UTC [cauthdsl] func1 -> DEBU 57d 0xc00303aef0 gate 1569287072193874300 evaluation starts" +"2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 57e 0xc00303aef0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 57f 0xc00303aef0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.194 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 580 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:32.194 UTC [msp] Validate -> DEBU 581 MSP Org2MSP validating identity" +"2019-09-24 01:04:32.194 UTC [msp] getCertificationChain -> DEBU 582 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:32.194 UTC [cauthdsl] func2 -> DEBU 583 0xc00303aef0 principal matched by identity 0" +"2019-09-24 01:04:32.195 UTC [msp.identity] Verify -> DEBU 584 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 586 Verify: sig = 00000000 30 44 02 20 27 f3 cc 00 48 3d 94 c6 4c 60 f1 0a |0D. '...H=..L`..| +00000010 d6 69 d3 70 80 b5 00 68 50 7e b7 d0 ab 4b b9 67 |.i.p...hP~...K.g| +00000020 42 90 29 00 02 20 39 6c 76 d0 68 d4 4e 67 3b 3e |B.).. 9lv.h.Ng;>| +00000030 55 26 88 ad 32 8b 24 30 b1 ed ba 8f 2d 4a f3 7c |U&..2.$0....-J.|| +00000040 c9 56 d4 f1 4b ac |.V..K.|" +"2019-09-24 01:04:32.196 UTC [cauthdsl] func2 -> DEBU 587 0xc00303aef0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.196 UTC [cauthdsl] func1 -> DEBU 588 0xc00303aef0 gate 1569287072193874300 evaluation succeeds" +"2019-09-24 01:04:32.195 UTC [grpc] infof -> DEBU 585 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 589 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 58a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.196 UTC [policies] Evaluate -> DEBU 58b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.197 UTC [policies] Evaluate -> DEBU 58c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.197 UTC [gossip.comm] authenticateRemotePeer -> DEBU 58d Authenticated 172.18.0.9:51370" +"2019-09-24 01:04:32.197 UTC [gossip.comm] GossipStream -> DEBU 58e Servicing 172.18.0.9:51370" +"2019-09-24 01:04:32.197 UTC [gossip.comm] readFromStream -> DEBU 58f Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:32.197 UTC [gossip.comm] func2 -> DEBU 590 Client 172.18.0.9:51370 disconnected" +"2019-09-24 01:04:32.197 UTC [comm.grpc.server] 1 -> INFO 591 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:42.182Z grpc.peer_address=172.18.0.9:51370 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.6099ms +"2019-09-24 01:04:32.198 UTC [gossip.comm] writeToStream -> DEBU 592 Closing writing to stream" +"2019-09-24 01:04:32.212 UTC [comm.grpc.server] 1 -> INFO 593 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.21Z grpc.peer_address=172.18.0.9:51372 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=785.3µs +"2019-09-24 01:04:32.214 UTC [msp] GetDefaultSigningIdentity -> DEBU 594 Obtaining default signing identity" +"2019-09-24 01:04:32.214 UTC [msp.identity] Sign -> DEBU 595 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:32.214 UTC [msp.identity] Sign -> DEBU 596 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:32.214 UTC [gossip.comm] authenticateRemotePeer -> DEBU 597 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:51372" +"2019-09-24 01:04:32.215 UTC [gossip.comm] authenticateRemotePeer -> DEBU 598 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+\nVWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i\nAJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E\nAwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51372" +"2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 599 Obtaining identity" +"2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 59b Obtaining identity" +"2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.215 UTC [msp] DeserializeIdentity -> DEBU 59d Obtaining identity" +"2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 59e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 59f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.215 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5a0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.215 UTC [policies] Evaluate -> DEBU 5a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.215 UTC [policies] Evaluate -> DEBU 5a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5a4 0xc003096150 gate 1569287072216078000 evaluation starts" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a5 0xc003096150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a6 0xc003096150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a7 0xc003096150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5a8 0xc003096150 principal evaluation fails" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5a9 0xc003096150 gate 1569287072216078000 evaluation fails" +"2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.216 UTC [policies] Evaluate -> DEBU 5ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func1 -> DEBU 5ad 0xc003096990 gate 1569287072216555200 evaluation starts" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5ae 0xc003096990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5af 0xc003096990 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.216 UTC [cauthdsl] func2 -> DEBU 5b0 0xc003096990 principal matched by identity 0" +"2019-09-24 01:04:32.216 UTC [msp.identity] Verify -> DEBU 5b1 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 5b2 Verify: sig = 00000000 30 44 02 20 7f 2c 1e 6c 98 3d c0 b3 1e ef e4 93 |0D. .,.l.=......| +00000010 50 79 fc 83 71 90 65 c2 4b 18 08 d7 c1 d2 eb cc |Py..q.e.K.......| +00000020 0e 36 45 24 02 20 5c 24 21 6f b9 c9 be 36 5b 33 |.6E$. \$!o...6[3| +00000030 51 8f a6 b0 2d 28 ac 68 21 97 90 25 cd 19 92 dc |Q...-(.h!..%....| +00000040 c9 29 18 cc fe 3f |.)...?|" +"2019-09-24 01:04:32.217 UTC [cauthdsl] func2 -> DEBU 5b3 0xc003096990 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.217 UTC [cauthdsl] func1 -> DEBU 5b4 0xc003096990 gate 1569287072216555200 evaluation succeeds" +"2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.217 UTC [policies] Evaluate -> DEBU 5b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.217 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5b9 Authenticated 172.18.0.9:51372" +"2019-09-24 01:04:32.217 UTC [gossip.comm] GossipStream -> DEBU 5ba Servicing 172.18.0.9:51372" +"2019-09-24 01:04:32.220 UTC [gossip.gossip] handleMessage -> DEBU 5bb Entering, 172.18.0.9:51372 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:15137377372724668305 tag:EMPTY mem_req:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.220 UTC [gossip.gossip] handleMessage -> DEBU 5bc Exiting" +"2019-09-24 01:04:32.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5bd Got message: GossipMessage: nonce:15137377372724668305 tag:EMPTY mem_req:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.221 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 5be Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:32.221 UTC [msp] DeserializeIdentity -> DEBU 5bf Obtaining identity" +"2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5c0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.221 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5c2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.221 UTC [policies] Evaluate -> DEBU 5c5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.221 UTC [cauthdsl] func1 -> DEBU 5c6 0xc00304dc50 gate 1569287072221682500 evaluation starts" +"2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c7 0xc00304dc50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c8 0xc00304dc50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5c9 0xc00304dc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.221 UTC [cauthdsl] func2 -> DEBU 5ca 0xc00304dc50 principal evaluation fails" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5cb 0xc00304dc50 gate 1569287072221682500 evaluation fails" +"2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5cc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5cd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.222 UTC [policies] Evaluate -> DEBU 5ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5cf 0xc0030b8490 gate 1569287072222293500 evaluation starts" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d0 0xc0030b8490 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d1 0xc0030b8490 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d2 0xc0030b8490 principal matched by identity 0" +"2019-09-24 01:04:32.222 UTC [msp.identity] Verify -> DEBU 5d3 Verify: digest = 00000000 3b 50 4b 8e e1 8e 8c 67 5b 27 88 fe b2 22 01 22 |;PK....g['..."."| +00000010 83 ae b3 5b 80 f7 15 8a ff 05 72 72 59 f3 71 1f |...[......rrY.q.|" +"2019-09-24 01:04:32.222 UTC [msp.identity] Verify -> DEBU 5d4 Verify: sig = 00000000 30 44 02 20 3c 03 aa c1 61 96 1d 65 ac 22 c2 d8 |0D. <...a..e."..| +00000010 90 c4 2f 39 43 04 17 e2 1d 21 6b 90 3e 9c 88 54 |../9C....!k.>..T| +00000020 ef 5b 35 da 02 20 30 1c 51 d3 6f 81 05 c1 b8 df |.[5.. 0.Q.o.....| +00000030 f3 60 1d 75 39 c2 b5 58 b6 03 b9 c2 21 dc c9 e4 |.`.u9..X....!...| +00000040 ac 4b d7 2b 9f 94 |.K.+..|" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func2 -> DEBU 5d5 0xc0030b8490 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.222 UTC [cauthdsl] func1 -> DEBU 5d6 0xc0030b8490 gate 1569287072222293500 evaluation succeeds" +"2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5d9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.223 UTC [policies] Evaluate -> DEBU 5da == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] handleAliveMessage -> DEBU 5db Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5dc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5dd Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] learnNewMembers -> DEBU 5de Exiting" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] handleAliveMessage -> DEBU 5df Exiting" +"2019-09-24 01:04:32.226 UTC [gossip.discovery] handleMsgFromComm -> DEBU 5e0 Exiting" +"2019-09-24 01:04:32.227 UTC [gossip.discovery] sendMemResponse -> DEBU 5e1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:32.227 UTC [msp] DeserializeIdentity -> DEBU 5e2 Obtaining identity" +"2019-09-24 01:04:32.227 UTC [msp] DeserializeIdentity -> DEBU 5e3 Obtaining identity" +"2019-09-24 01:04:32.227 UTC [gossip.comm] Send -> DEBU 5e4 Entering, sending GossipMessage: Channel: , nonce: 15137377372724668305, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:32.227 UTC [gossip.discovery] sendMemResponse -> DEBU 5e5 Exiting, replying with alive: alive:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > alive: " +"2019-09-24 01:04:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 5e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15137377372724668305, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.227 UTC [gossip.comm] sendToEndpoint -> DEBU 5e7 Exiting" +"2019-09-24 01:04:32.370 UTC [comm.grpc.server] 1 -> INFO 5e8 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.368Z grpc.peer_address=172.18.0.8:35314 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=136.3µs +"2019-09-24 01:04:32.372 UTC [msp] GetDefaultSigningIdentity -> DEBU 5e9 Obtaining default signing identity" +"2019-09-24 01:04:32.373 UTC [msp.identity] Sign -> DEBU 5ea Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:32.373 UTC [msp.identity] Sign -> DEBU 5eb Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:32.374 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ec Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35314" +"2019-09-24 01:04:32.375 UTC [gossip.comm] authenticateRemotePeer -> DEBU 5ed Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35314" +"2019-09-24 01:04:32.375 UTC [msp] DeserializeIdentity -> DEBU 5ee Obtaining identity" +"2019-09-24 01:04:32.375 UTC [msp] DeserializeIdentity -> DEBU 5ef Obtaining identity" +"2019-09-24 01:04:32.376 UTC [msp.identity] newIdentity -> DEBU 5f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE-----" +"2019-09-24 01:04:32.377 UTC [msp] Validate -> DEBU 5f1 MSP Org2MSP validating identity" +"2019-09-24 01:04:32.377 UTC [msp] getCertificationChain -> DEBU 5f2 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:32.378 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.378 UTC [msp] DeserializeIdentity -> DEBU 5f4 Obtaining identity" +"2019-09-24 01:04:32.379 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.379 UTC [msp] DeserializeIdentity -> DEBU 5f6 Obtaining identity" +"2019-09-24 01:04:32.380 UTC [msp] DeserializeIdentity -> DEBU 5f7 Obtaining identity" +"2019-09-24 01:04:32.380 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 5f8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.381 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5f9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.381 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 5fa Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.382 UTC [policies] Evaluate -> DEBU 5fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.383 UTC [cauthdsl] func1 -> DEBU 5fe 0xc0031143e0 gate 1569287072383081800 evaluation starts" +"2019-09-24 01:04:32.383 UTC [cauthdsl] func2 -> DEBU 5ff 0xc0031143e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 600 0xc0031143e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 601 0xc0031143e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.384 UTC [cauthdsl] func2 -> DEBU 602 0xc0031143e0 principal evaluation fails" +"2019-09-24 01:04:32.385 UTC [cauthdsl] func1 -> DEBU 603 0xc0031143e0 gate 1569287072383081800 evaluation fails" +"2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 604 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 605 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.385 UTC [policies] Evaluate -> DEBU 606 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.385 UTC [cauthdsl] func1 -> DEBU 607 0xc003114c40 gate 1569287072385457000 evaluation starts" +"2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 608 0xc003114c40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 609 0xc003114c40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.385 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 60a Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:32.385 UTC [msp] Validate -> DEBU 60b MSP Org2MSP validating identity" +"2019-09-24 01:04:32.385 UTC [msp] getCertificationChain -> DEBU 60c MSP Org2MSP getting certification chain" +"2019-09-24 01:04:32.385 UTC [cauthdsl] func2 -> DEBU 60d 0xc003114c40 principal matched by identity 0" +"2019-09-24 01:04:32.385 UTC [msp.identity] Verify -> DEBU 60e Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:04:32.385 UTC [msp.identity] Verify -> DEBU 60f Verify: sig = 00000000 30 45 02 21 00 e4 05 55 96 ba 37 1f 23 62 19 6f |0E.!...U..7.#b.o| +00000010 c9 5b c0 b3 27 3a 06 d1 69 73 31 e0 9a 88 ef b2 |.[..':..is1.....| +00000020 06 80 31 d7 d5 02 20 57 a1 b5 72 fb 3b 3d ce cd |..1... W..r.;=..| +00000030 8d 42 7c 9b 58 8d 76 1d 84 29 d8 77 79 c0 0e 62 |.B|.X.v..).wy..b| +00000040 f7 36 77 8e 02 55 f2 |.6w..U.|" +"2019-09-24 01:04:32.386 UTC [cauthdsl] func2 -> DEBU 610 0xc003114c40 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.386 UTC [cauthdsl] func1 -> DEBU 611 0xc003114c40 gate 1569287072385457000 evaluation succeeds" +"2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 612 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 613 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 614 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.386 UTC [policies] Evaluate -> DEBU 615 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.386 UTC [gossip.comm] authenticateRemotePeer -> DEBU 616 Authenticated 172.18.0.8:35314" +"2019-09-24 01:04:32.386 UTC [gossip.comm] GossipStream -> DEBU 617 Servicing 172.18.0.8:35314" +"2019-09-24 01:04:32.390 UTC [gossip.comm] readFromStream -> DEBU 618 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:32.391 UTC [gossip.comm] func2 -> DEBU 619 Client 172.18.0.8:35314 disconnected" +"2019-09-24 01:04:32.391 UTC [comm.grpc.server] 1 -> INFO 61a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:42.372Z grpc.peer_address=172.18.0.8:35314 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.4572ms +"2019-09-24 01:04:32.391 UTC [grpc] infof -> DEBU 61b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:32.391 UTC [gossip.comm] writeToStream -> DEBU 61c Closing writing to stream" +"2019-09-24 01:04:32.402 UTC [comm.grpc.server] 1 -> INFO 61d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:34.401Z grpc.peer_address=172.18.0.8:35316 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=117.7µs +"2019-09-24 01:04:32.404 UTC [msp] GetDefaultSigningIdentity -> DEBU 61e Obtaining default signing identity" +"2019-09-24 01:04:32.404 UTC [msp.identity] Sign -> DEBU 61f Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:32.405 UTC [msp.identity] Sign -> DEBU 620 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:32.405 UTC [gossip.comm] authenticateRemotePeer -> DEBU 621 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35316" +"2019-09-24 01:04:32.406 UTC [gossip.comm] authenticateRemotePeer -> DEBU 622 Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35316" +"2019-09-24 01:04:32.406 UTC [msp] DeserializeIdentity -> DEBU 623 Obtaining identity" +"2019-09-24 01:04:32.406 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 624 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.407 UTC [msp] DeserializeIdentity -> DEBU 625 Obtaining identity" +"2019-09-24 01:04:32.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 626 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.407 UTC [msp] DeserializeIdentity -> DEBU 627 Obtaining identity" +"2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 628 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 629 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.408 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 62a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.408 UTC [policies] Evaluate -> DEBU 62b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.409 UTC [policies] Evaluate -> DEBU 62c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.409 UTC [policies] Evaluate -> DEBU 62d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.409 UTC [cauthdsl] func1 -> DEBU 62e 0xc003155fe0 gate 1569287072409691900 evaluation starts" +"2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 62f 0xc003155fe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 630 0xc003155fe0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 631 0xc003155fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.410 UTC [cauthdsl] func2 -> DEBU 632 0xc003155fe0 principal evaluation fails" +"2019-09-24 01:04:32.411 UTC [cauthdsl] func1 -> DEBU 633 0xc003155fe0 gate 1569287072409691900 evaluation fails" +"2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 634 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 635 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.411 UTC [policies] Evaluate -> DEBU 636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.412 UTC [cauthdsl] func1 -> DEBU 637 0xc003176820 gate 1569287072412188700 evaluation starts" +"2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 638 0xc003176820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 639 0xc003176820 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.412 UTC [cauthdsl] func2 -> DEBU 63a 0xc003176820 principal matched by identity 0" +"2019-09-24 01:04:32.413 UTC [msp.identity] Verify -> DEBU 63b Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:04:32.413 UTC [msp.identity] Verify -> DEBU 63c Verify: sig = 00000000 30 44 02 20 67 e6 a2 12 d0 bc 15 3a f1 2a a6 40 |0D. g......:.*.@| +00000010 68 09 63 c9 75 20 fc f7 b4 6d 6f 62 3b 6a 6d 8c |h.c.u ...mob;jm.| +00000020 cb 37 28 02 02 20 3a ab d1 d5 06 84 59 ce 25 75 |.7(.. :.....Y.%u| +00000030 45 a2 e9 80 f3 85 e7 52 53 d5 01 ab 31 e6 d7 dd |E......RS...1...| +00000040 13 11 5a 88 e8 d6 |..Z...|" +"2019-09-24 01:04:32.414 UTC [cauthdsl] func2 -> DEBU 63d 0xc003176820 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.414 UTC [cauthdsl] func1 -> DEBU 63e 0xc003176820 gate 1569287072412188700 evaluation succeeds" +"2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 63f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 641 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.414 UTC [policies] Evaluate -> DEBU 642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.414 UTC [gossip.comm] authenticateRemotePeer -> DEBU 643 Authenticated 172.18.0.8:35316" +"2019-09-24 01:04:32.414 UTC [gossip.comm] GossipStream -> DEBU 644 Servicing 172.18.0.8:35316" +"2019-09-24 01:04:32.418 UTC [gossip.gossip] handleMessage -> DEBU 645 Entering, 172.18.0.8:35316 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:15252018863320230344 tag:EMPTY mem_req:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.418 UTC [gossip.gossip] handleMessage -> DEBU 646 Exiting" +"2019-09-24 01:04:32.419 UTC [gossip.discovery] handleMsgFromComm -> DEBU 647 Got message: GossipMessage: nonce:15252018863320230344 tag:EMPTY mem_req:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.420 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 648 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:32.420 UTC [msp] DeserializeIdentity -> DEBU 649 Obtaining identity" +"2019-09-24 01:04:32.423 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 64a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:32.423 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.427 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 64c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:32.428 UTC [policies] Evaluate -> DEBU 64f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:32.429 UTC [cauthdsl] func1 -> DEBU 650 0xc0030d3f70 gate 1569287072429233700 evaluation starts" +"2019-09-24 01:04:32.429 UTC [cauthdsl] func2 -> DEBU 651 0xc0030d3f70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.430 UTC [cauthdsl] func2 -> DEBU 652 0xc0030d3f70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.430 UTC [cauthdsl] func2 -> DEBU 653 0xc0030d3f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:32.431 UTC [cauthdsl] func2 -> DEBU 654 0xc0030d3f70 principal evaluation fails" +"2019-09-24 01:04:32.431 UTC [cauthdsl] func1 -> DEBU 655 0xc0030d3f70 gate 1569287072429233700 evaluation fails" +"2019-09-24 01:04:32.431 UTC [policies] Evaluate -> DEBU 656 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.432 UTC [policies] Evaluate -> DEBU 657 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:32.432 UTC [policies] Evaluate -> DEBU 658 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:32.432 UTC [cauthdsl] func1 -> DEBU 659 0xc0031927b0 gate 1569287072432623900 evaluation starts" +"2019-09-24 01:04:32.432 UTC [cauthdsl] func2 -> DEBU 65a 0xc0031927b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:32.433 UTC [cauthdsl] func2 -> DEBU 65b 0xc0031927b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:32.433 UTC [cauthdsl] func2 -> DEBU 65c 0xc0031927b0 principal matched by identity 0" +"2019-09-24 01:04:32.434 UTC [msp.identity] Verify -> DEBU 65d Verify: digest = 00000000 e0 08 3f bc 33 88 48 6f 3a e5 70 7f 4b 8c 3c c1 |..?.3.Ho:.p.K.<.| +00000010 6c 1e ab c0 9d 22 21 1b 00 4c 41 eb 96 94 1b e9 |l...."!..LA.....|" +"2019-09-24 01:04:32.434 UTC [msp.identity] Verify -> DEBU 65e Verify: sig = 00000000 30 44 02 20 6b e0 9d 7e b5 f3 f5 f8 90 59 c0 94 |0D. k..~.....Y..| +00000010 4c 49 94 6a 2d 84 3e 29 83 2c 6d ba c4 93 75 8c |LI.j-.>).,m...u.| +00000020 fd 84 3a 31 02 20 01 21 27 c4 a7 85 f0 d0 6e 08 |..:1. .!'.....n.| +00000030 25 92 65 d6 e8 c6 c3 5d 03 1e 47 b8 26 84 b3 ea |%.e....]..G.&...| +00000040 86 79 03 00 69 3a |.y..i:|" +"2019-09-24 01:04:32.435 UTC [cauthdsl] func2 -> DEBU 65f 0xc0031927b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:32.435 UTC [cauthdsl] func1 -> DEBU 660 0xc0031927b0 gate 1569287072432623900 evaluation succeeds" +"2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 661 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 662 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:32.435 UTC [policies] Evaluate -> DEBU 663 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:32.436 UTC [policies] Evaluate -> DEBU 664 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 665 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 666 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]}" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 667 Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] learnNewMembers -> DEBU 668 Exiting" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] handleAliveMessage -> DEBU 669 Exiting" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] handleMsgFromComm -> DEBU 66a Exiting" +"2019-09-24 01:04:32.436 UTC [gossip.discovery] sendMemResponse -> DEBU 66b Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:32.436 UTC [msp] DeserializeIdentity -> DEBU 66c Obtaining identity" +"2019-09-24 01:04:32.437 UTC [msp] DeserializeIdentity -> DEBU 66d Obtaining identity" +"2019-09-24 01:04:32.437 UTC [msp] DeserializeIdentity -> DEBU 66e Obtaining identity" +"2019-09-24 01:04:32.438 UTC [gossip.comm] Send -> DEBU 66f Entering, sending GossipMessage: Channel: , nonce: 15252018863320230344, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:32.438 UTC [gossip.comm] sendToEndpoint -> DEBU 670 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 15252018863320230344, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +"2019-09-24 01:04:32.438 UTC [gossip.comm] sendToEndpoint -> DEBU 671 Exiting" +"2019-09-24 01:04:32.441 UTC [gossip.discovery] sendMemResponse -> DEBU 672 Exiting, replying with alive: alive:\234\210T\357[5\332\002 0\034Q\323o\201\005\301\270\337\363`\035u9\302\265X\266\003\271\302!\334\311\344\254K\327+\237\224" > alive:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > alive: " +"2019-09-24 01:04:33.389 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 673 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.389 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 674 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.389 UTC [policies] Evaluate -> DEBU 675 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:04:33.390 UTC [policies] Evaluate -> DEBU 676 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.390 UTC [policies] Evaluate -> DEBU 677 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:04:33.390 UTC [msp] DeserializeIdentity -> DEBU 678 Obtaining identity" +"2019-09-24 01:04:33.391 UTC [msp.identity] newIdentity -> DEBU 679 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.391 UTC [cauthdsl] func1 -> DEBU 67a 0xc003177ca0 gate 1569287073391770800 evaluation starts" +"2019-09-24 01:04:33.391 UTC [cauthdsl] func2 -> DEBU 67b 0xc003177ca0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.391 UTC [cauthdsl] func2 -> DEBU 67c 0xc003177ca0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.392 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 67d Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:04:33.392 UTC [msp] Validate -> DEBU 67e MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.392 UTC [cauthdsl] func2 -> DEBU 67f 0xc003177ca0 principal matched by identity 0" +"2019-09-24 01:04:33.392 UTC [msp.identity] Verify -> DEBU 680 Verify: digest = 00000000 37 d4 5c c2 90 fe c3 96 91 55 87 14 16 48 72 4a |7.\......U...HrJ| +00000010 86 b6 2c da 34 a4 85 2f 58 9f 09 90 a6 23 6d e8 |..,.4../X....#m.|" +"2019-09-24 01:04:33.392 UTC [msp.identity] Verify -> DEBU 681 Verify: sig = 00000000 30 45 02 21 00 87 3a a5 77 e1 56 48 06 f4 a8 f1 |0E.!..:.w.VH....| +00000010 a7 25 e4 8e de e7 b8 fd d4 67 7c f9 ed 26 5e 8f |.%.......g|..&^.| +00000020 06 c6 ce 4d bb 02 20 09 a2 01 0d 9f cd a3 fa 23 |...M.. ........#| +00000030 a2 d1 08 b0 94 19 f3 b4 39 7a 7a b0 f0 b9 01 c9 |........9zz.....| +00000040 51 01 49 73 c7 85 86 |Q.Is...|" +"2019-09-24 01:04:33.393 UTC [cauthdsl] func2 -> DEBU 682 0xc003177ca0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.393 UTC [cauthdsl] func1 -> DEBU 683 0xc003177ca0 gate 1569287073391770800 evaluation succeeds" +"2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 684 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 685 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 686 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.393 UTC [policies] Evaluate -> DEBU 687 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.394 UTC [blocksProvider] DeliverBlocks -> DEBU 688 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-09-24 01:04:33.394 UTC [gossip.state] addPayload -> DEBU 689 [businesschannel] Adding payload to local buffer, blockNum = [2]" +"2019-09-24 01:04:33.394 UTC [gossip.state] addPayload -> DEBU 68a Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:04:33.394 UTC [blocksProvider] DeliverBlocks -> DEBU 68b [businesschannel] Gossiping block [2], peers number [1]" +"2019-09-24 01:04:33.394 UTC [gossip.channel] AddToMsgStore -> DEBU 68c Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:04:33.395 UTC [gossip.pull] Add -> DEBU 68d Added 2, total items: 2" +"2019-09-24 01:04:33.395 UTC [gossip.state] deliverPayloads -> DEBU 68e [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [2]" +"2019-09-24 01:04:33.395 UTC [gossip.state] deliverPayloads -> DEBU 68f [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger" +"2019-09-24 01:04:33.395 UTC [gossip.privdata] StoreBlock -> INFO 690 [businesschannel] Received block [2] from buffer" +"2019-09-24 01:04:33.395 UTC [gossip.privdata] StoreBlock -> DEBU 691 [businesschannel] Validating block [2]" +"2019-09-24 01:04:33.396 UTC [committer.txvalidator] Validate -> DEBU 692 [businesschannel] START Block Validation for block [2]" +"2019-09-24 01:04:33.396 UTC [committer.txvalidator] Validate -> DEBU 693 expecting 1 block validation responses" +"2019-09-24 01:04:33.396 UTC [committer.txvalidator] validateTx -> DEBU 694 [businesschannel] validateTx starts for block 0xc003156940 env 0xc003161450 txn 0" +"2019-09-24 01:04:33.397 UTC [protoutils] ValidateTransaction -> DEBU 695 ValidateTransactionEnvelope starts for envelope 0xc003161450" +"2019-09-24 01:04:33.397 UTC [protoutils] ValidateTransaction -> DEBU 696 Header is channel_header:"\010\001\032\006\010\241\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\204\003\200\326F*\227KJ]\304\004S\311\313\030\245o\272\343/\366\3427" " +"2019-09-24 01:04:33.397 UTC [protoutils] validateChannelHeader -> DEBU 697 validateChannelHeader info: header type 1" +"2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 698 begin" +"2019-09-24 01:04:33.397 UTC [msp] GetManagerForChain -> DEBU 699 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69a creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +"2019-09-24 01:04:33.397 UTC [msp] Validate -> DEBU 69b MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69c creator is valid" +"2019-09-24 01:04:33.397 UTC [msp.identity] Verify -> DEBU 69d Verify: digest = 00000000 28 96 ca 3d 3c a0 fc 64 a9 39 d7 14 f3 d4 02 6a |(..=<..d.9.....j| +00000010 9b 34 f0 5e 8e 28 88 4f e0 e7 72 82 c6 de 2f 91 |.4.^.(.O..r.../.|" +"2019-09-24 01:04:33.397 UTC [msp.identity] Verify -> DEBU 69e Verify: sig = 00000000 30 44 02 20 06 57 d2 e6 fa fb 14 eb ac bb 01 32 |0D. .W.........2| +00000010 48 8c ba 3a 9d 7f cf ef 14 a1 79 36 35 a5 6d 68 |H..:......y65.mh| +00000020 e1 c0 da 62 02 20 17 4a cf 02 a0 12 2a 69 1d 56 |...b. .J....*i.V| +00000030 75 3a 9f de b0 ec 1d 08 95 54 c8 6d 3b 37 99 49 |u:.......T.m;7.I| +00000040 20 87 e3 8c 71 39 | ...q9|" +"2019-09-24 01:04:33.397 UTC [protoutils] checkSignatureFromCreator -> DEBU 69f exits successfully" +"2019-09-24 01:04:33.397 UTC [protoutils] validateConfigTransaction -> DEBU 6a0 validateConfigTransaction starts for data 0xc00320c000, header channel_header:"\010\001\032\006\010\241\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030\204\003\200\326F*\227KJ]\304\004S\311\313\030\245o\272\343/\366\3427" " +"2019-09-24 01:04:33.397 UTC [committer.txvalidator] validateTx -> DEBU 6a1 Transaction is for channel businesschannel" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a2 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a3 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a4 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.397 UTC [common.configtx] addToMap -> DEBU 6a8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6a9 Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6aa Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ab Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ad Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6af Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.398 UTC [common.configtx] addToMap -> DEBU 6b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.398 UTC [common.configtx] verifyDeltaSet -> DEBU 6b1 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.398 UTC [common.configtx] policyForItem -> DEBU 6b2 Getting policy for item Org2MSP with mod_policy Admins" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b3 Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b4 Manager Channel has managers Application" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b5 Manager Channel has managers Orderer" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b6 Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b7 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b8 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6b9 Manager Channel/Application looking up path [Org2MSP]" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6ba Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6bb Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.398 UTC [policies] Manager -> DEBU 6bc Manager Channel/Application/Org2MSP looking up path []" +"2019-09-24 01:04:33.398 UTC [policies] Evaluate -> DEBU 6bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:04:33.398 UTC [msp] DeserializeIdentity -> DEBU 6be Obtaining identity" +"2019-09-24 01:04:33.398 UTC [msp.identity] newIdentity -> DEBU 6bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.398 UTC [cauthdsl] func1 -> DEBU 6c0 0xc00322ac10 gate 1569287073398978100 evaluation starts" +"2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c1 0xc00322ac10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c2 0xc00322ac10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.399 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 6c3 Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-09-24 01:04:33.399 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 6c4 Checking if identity carries the admin ou for Org2MSP" +"2019-09-24 01:04:33.399 UTC [msp] Validate -> DEBU 6c5 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.399 UTC [msp] getCertificationChain -> DEBU 6c6 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.399 UTC [msp] hasOURole -> DEBU 6c7 MSP Org2MSP checking if the identity is a client" +"2019-09-24 01:04:33.399 UTC [msp] getCertificationChain -> DEBU 6c8 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.399 UTC [cauthdsl] func2 -> DEBU 6c9 0xc00322ac10 principal matched by identity 0" +"2019-09-24 01:04:33.399 UTC [msp.identity] Verify -> DEBU 6ca Verify: digest = 00000000 70 29 ff 39 47 7d 03 e0 fb 70 fc 11 eb df 5a 5c |p).9G}...p....Z\| +00000010 7b a6 95 64 40 b2 b2 dd e7 1a 88 a0 ea 1d b5 03 |{..d@...........|" +"2019-09-24 01:04:33.399 UTC [msp.identity] Verify -> DEBU 6cb Verify: sig = 00000000 30 45 02 21 00 f9 a1 b9 f8 72 b8 06 0a b2 76 fb |0E.!.....r....v.| +00000010 f0 35 3c 07 5d 8f c8 fc ab 86 32 9f 30 d9 ad 28 |.5<.].....2.0..(| +00000020 f7 2d 7b 08 65 02 20 78 b0 89 f2 ef 9f fe 46 43 |.-{.e. x......FC| +00000030 fb b8 4d a7 c8 82 1a 65 da 6a ca 09 4e be e4 fa |..M....e.j..N...| +00000040 d5 a6 56 21 7a a6 80 |..V!z..|" +"2019-09-24 01:04:33.410 UTC [cauthdsl] func2 -> DEBU 6cc 0xc00322ac10 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.410 UTC [cauthdsl] func1 -> DEBU 6cd 0xc00322ac10 gate 1569287073398978100 evaluation succeeds" +"2019-09-24 01:04:33.410 UTC [policies] Evaluate -> DEBU 6ce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.410 UTC [policies] Evaluate -> DEBU 6cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.411 UTC [gossip.comm] Send -> DEBU 6d0 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:33.412 UTC [msp] DeserializeIdentity -> DEBU 6d1 Obtaining identity" +"2019-09-24 01:04:33.412 UTC [gossip.comm] sendToEndpoint -> DEBU 6d3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 25496 bytes, seq: 2}, Envelope: 25529 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.412 UTC [gossip.comm] createConnection -> DEBU 6d5 Entering peer1.org1.example.com:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:33.412 UTC [msp] DeserializeIdentity -> DEBU 6d4 Obtaining identity" +"2019-09-24 01:04:33.412 UTC [common.configtx] verifyDeltaSet -> DEBU 6d2 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.413 UTC [common.configtx] recurseConfigMap -> DEBU 6d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.414 UTC [common.configtx] recurseConfigMap -> DEBU 6d7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.414 UTC [common.configtx] recurseConfigMap -> DEBU 6d8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6d9 Setting policy for key Writers to " +"2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6da Setting policy for key Admins to " +"2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6db Setting policy for key Readers to " +"2019-09-24 01:04:33.415 UTC [common.configtx] recurseConfigMap -> DEBU 6dc Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6dd Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6de Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6df Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.416 UTC [common.configtx] recurseConfigMap -> DEBU 6e0 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.417 UTC [common.configtx] recurseConfigMap -> DEBU 6e1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.417 UTC [common.configtx] recurseConfigMap -> DEBU 6e2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.418 UTC [common.configtx] recurseConfigMap -> DEBU 6e3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.419 UTC [common.configtx] recurseConfigMap -> DEBU 6e4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.419 UTC [common.configtx] recurseConfigMap -> DEBU 6e5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.421 UTC [common.configtx] recurseConfigMap -> DEBU 6e6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.421 UTC [common.configtx] recurseConfigMap -> DEBU 6e8 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.422 UTC [common.configtx] recurseConfigMap -> DEBU 6e9 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.419 UTC [grpc] DialContext -> DEBU 6e7 parsed scheme: """ +"2019-09-24 01:04:33.422 UTC [grpc] DialContext -> DEBU 6ea scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:33.422 UTC [grpc] watcher -> DEBU 6eb ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }]" +"2019-09-24 01:04:33.422 UTC [common.configtx] recurseConfigMap -> DEBU 6ec Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.423 UTC [common.configtx] recurseConfigMap -> DEBU 6ee Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:04:33.422 UTC [grpc] switchBalancer -> DEBU 6ed ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:33.425 UTC [common.channelconfig] NewStandardValues -> DEBU 6ef Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:04:33.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f0 Processing field: HashingAlgorithm" +"2019-09-24 01:04:33.426 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f1 Processing field: BlockDataHashingStructure" +"2019-09-24 01:04:33.427 UTC [grpc] HandleSubConnStateChange -> DEBU 6f2 pickfirstBalancer: HandleSubConnStateChange: 0xc003295ef0, CONNECTING" +"2019-09-24 01:04:33.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f3 Processing field: OrdererAddresses" +"2019-09-24 01:04:33.428 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f4 Processing field: Consortium" +"2019-09-24 01:04:33.429 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f5 Processing field: Capabilities" +"2019-09-24 01:04:33.431 UTC [common.channelconfig] NewStandardValues -> DEBU 6f6 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:04:33.431 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f7 Processing field: ACLs" +"2019-09-24 01:04:33.433 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6f8 Processing field: Capabilities" +"2019-09-24 01:04:33.434 UTC [common.channelconfig] NewStandardValues -> DEBU 6f9 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6fa Processing field: AnchorPeers" +"2019-09-24 01:04:33.436 UTC [common.channelconfig] NewStandardValues -> DEBU 6fb Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.437 UTC [common.channelconfig] initializeProtosStruct -> DEBU 6fc Processing field: MSP" +"2019-09-24 01:04:33.438 UTC [common.channelconfig] Validate -> DEBU 6fd Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:04:33.439 UTC [common.channelconfig] validateMSP -> DEBU 6fe Setting up MSP for org Org1MSP" +"2019-09-24 01:04:33.440 UTC [msp] newBccspMsp -> DEBU 6ff Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.440 UTC [msp] New -> DEBU 700 Creating Cache-MSP instance" +"2019-09-24 01:04:33.441 UTC [msp] Setup -> DEBU 701 Setting up MSP instance Org1MSP" +"2019-09-24 01:04:33.443 UTC [msp.identity] newIdentity -> DEBU 702 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.446 UTC [grpc] HandleSubConnStateChange -> DEBU 703 pickfirstBalancer: HandleSubConnStateChange: 0xc003295ef0, READY" +"2019-09-24 01:04:33.447 UTC [common.channelconfig] NewStandardValues -> DEBU 704 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:04:33.447 UTC [common.channelconfig] initializeProtosStruct -> DEBU 705 Processing field: AnchorPeers" +"2019-09-24 01:04:33.448 UTC [common.channelconfig] NewStandardValues -> DEBU 706 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.448 UTC [comm.grpc.server] 1 -> INFO 707 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.447Z grpc.peer_address=172.18.0.8:35324 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=106.7µs +"2019-09-24 01:04:33.448 UTC [common.channelconfig] initializeProtosStruct -> DEBU 708 Processing field: MSP" +"2019-09-24 01:04:33.450 UTC [common.channelconfig] Validate -> DEBU 709 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:04:33.450 UTC [common.channelconfig] validateMSP -> DEBU 70a Setting up MSP for org Org2MSP" +"2019-09-24 01:04:33.450 UTC [msp] newBccspMsp -> DEBU 70b Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.450 UTC [msp] New -> DEBU 70c Creating Cache-MSP instance" +"2019-09-24 01:04:33.450 UTC [msp] Setup -> DEBU 70d Setting up MSP instance Org2MSP" +"2019-09-24 01:04:33.451 UTC [msp.identity] newIdentity -> DEBU 70e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.451 UTC [msp] GetDefaultSigningIdentity -> DEBU 70f Obtaining default signing identity" +"2019-09-24 01:04:33.458 UTC [msp.identity] Sign -> DEBU 710 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.458 UTC [msp.identity] Sign -> DEBU 711 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.459 UTC [gossip.comm] authenticateRemotePeer -> DEBU 712 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051" +"2019-09-24 01:04:33.459 UTC [gossip.comm] authenticateRemotePeer -> DEBU 713 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:7051" +"2019-09-24 01:04:33.460 UTC [msp.identity] Verify -> DEBU 714 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:33.460 UTC [msp.identity] Verify -> DEBU 716 Verify: sig = 00000000 30 45 02 21 00 ba eb 39 7a 17 cc 2c 86 ac 88 12 |0E.!...9z..,....| +00000010 eb 44 a1 d3 82 26 e9 5d 4d 45 5e bc f1 8d dd 2e |.D...&.]ME^.....| +00000020 d2 b2 bf bd 14 02 20 4e a7 72 f2 50 b7 a8 67 1d |...... N.r.P..g.| +00000030 d7 d1 86 b9 3e 36 fd f1 48 e3 45 c4 eb e1 dc 3a |....>6..H.E....:| +00000040 c3 d2 31 3e bb 71 93 |..1>.q.|" +"2019-09-24 01:04:33.460 UTC [gossip.comm] authenticateRemotePeer -> DEBU 717 Authenticated 172.18.0.6:7051" +"2019-09-24 01:04:33.460 UTC [gossip.comm] createConnection -> DEBU 718 Exiting" +"2019-09-24 01:04:33.460 UTC [gossip.comm] sendToEndpoint -> DEBU 719 Exiting" +"2019-09-24 01:04:33.460 UTC [common.channelconfig] NewStandardValues -> DEBU 715 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:04:33.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71a Processing field: ConsensusType" +"2019-09-24 01:04:33.461 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71b Processing field: BatchSize" +"2019-09-24 01:04:33.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71c Processing field: BatchTimeout" +"2019-09-24 01:04:33.462 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71d Processing field: KafkaBrokers" +"2019-09-24 01:04:33.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71e Processing field: ChannelRestrictions" +"2019-09-24 01:04:33.463 UTC [common.channelconfig] initializeProtosStruct -> DEBU 71f Processing field: Capabilities" +"2019-09-24 01:04:33.464 UTC [common.channelconfig] NewStandardValues -> DEBU 720 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:04:33.470 UTC [common.channelconfig] initializeProtosStruct -> DEBU 721 Processing field: Endpoints" +"2019-09-24 01:04:33.475 UTC [common.channelconfig] NewStandardValues -> DEBU 722 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:04:33.475 UTC [common.channelconfig] initializeProtosStruct -> DEBU 723 Processing field: MSP" +"2019-09-24 01:04:33.476 UTC [common.channelconfig] validateMSP -> DEBU 724 Setting up MSP for org OrdererOrg" +"2019-09-24 01:04:33.477 UTC [msp] newBccspMsp -> DEBU 725 Creating BCCSP-based MSP instance" +"2019-09-24 01:04:33.477 UTC [msp] New -> DEBU 726 Creating Cache-MSP instance" +"2019-09-24 01:04:33.477 UTC [msp] Setup -> DEBU 727 Setting up MSP instance OrdererMSP" +"2019-09-24 01:04:33.477 UTC [msp] GetDefaultSigningIdentity -> DEBU 728 Obtaining default signing identity" +"2019-09-24 01:04:33.481 UTC [msp.identity] Sign -> DEBU 729 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.481 UTC [msp.identity] Sign -> DEBU 72a Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:35324" +"2019-09-24 01:04:33.486 UTC [gossip.comm] authenticateRemotePeer -> DEBU 72c Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35324" +"2019-09-24 01:04:33.486 UTC [msp] DeserializeIdentity -> DEBU 72d Obtaining identity" +"2019-09-24 01:04:33.487 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 72e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.487 UTC [msp] DeserializeIdentity -> DEBU 72f Obtaining identity" +"2019-09-24 01:04:33.488 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 730 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.488 UTC [msp] DeserializeIdentity -> DEBU 731 Obtaining identity" +"2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 732 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 733 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 734 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.489 UTC [policies] Evaluate -> DEBU 735 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.490 UTC [policies] Evaluate -> DEBU 736 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.490 UTC [policies] Evaluate -> DEBU 737 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.490 UTC [cauthdsl] func1 -> DEBU 738 0xc0033e1620 gate 1569287073490152400 evaluation starts" +"2019-09-24 01:04:33.490 UTC [msp.identity] newIdentity -> DEBU 739 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.493 UTC [grpc] infof -> DEBU 73b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.490 UTC [cauthdsl] func2 -> DEBU 73a 0xc0033e1620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.498 UTC [cauthdsl] func2 -> DEBU 73d 0xc0033e1620 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.499 UTC [cauthdsl] func2 -> DEBU 73e 0xc0033e1620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.499 UTC [cauthdsl] func2 -> DEBU 73f 0xc0033e1620 principal evaluation fails" +"2019-09-24 01:04:33.499 UTC [cauthdsl] func1 -> DEBU 740 0xc0033e1620 gate 1569287073490152400 evaluation fails" +"2019-09-24 01:04:33.499 UTC [policies] Evaluate -> DEBU 741 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.500 UTC [policies] Evaluate -> DEBU 742 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.500 UTC [policies] Evaluate -> DEBU 743 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.501 UTC [cauthdsl] func1 -> DEBU 744 0xc0033c7300 gate 1569287073501006500 evaluation starts" +"2019-09-24 01:04:33.501 UTC [cauthdsl] func2 -> DEBU 745 0xc0033c7300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.502 UTC [cauthdsl] func2 -> DEBU 746 0xc0033c7300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.504 UTC [cauthdsl] func2 -> DEBU 747 0xc0033c7300 principal matched by identity 0" +"2019-09-24 01:04:33.504 UTC [msp.identity] Verify -> DEBU 748 Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:04:33.505 UTC [msp.identity] Verify -> DEBU 74a Verify: sig = 00000000 30 45 02 21 00 86 a1 f8 ee 12 3d 69 2b 7b d1 8d |0E.!......=i+{..| +00000010 02 78 ea 54 87 be c6 0b b1 e0 0e 72 6e d9 67 00 |.x.T.......rn.g.| +00000020 5d 9a 17 42 7e 02 20 0a 74 d2 81 fa 76 65 51 87 |]..B~. .t...veQ.| +00000030 6e 7d 40 bb 33 a5 2a e5 df 33 a6 03 97 f0 1f 17 |n}@.3.*..3......| +00000040 e0 a3 c1 2a b8 22 50 |...*."P|" +"2019-09-24 01:04:33.505 UTC [msp.identity] newIdentity -> DEBU 749 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.495 UTC [comm.grpc.server] 1 -> INFO 73c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.495Z grpc.peer_address=172.18.0.9:51390 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.1678ms +"2019-09-24 01:04:33.510 UTC [grpc] infof -> DEBU 74b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.510 UTC [cauthdsl] func2 -> DEBU 74c 0xc0033c7300 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.511 UTC [msp] Validate -> DEBU 74d MSP OrdererMSP validating identity" +"2019-09-24 01:04:33.512 UTC [comm.grpc.server] 1 -> INFO 74e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:35.511Z grpc.peer_address=172.18.0.6:44018 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.9µs +"2019-09-24 01:04:33.512 UTC [cauthdsl] func1 -> DEBU 74f 0xc0033c7300 gate 1569287073501006500 evaluation succeeds" +"2019-09-24 01:04:33.513 UTC [policies] Evaluate -> DEBU 750 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.514 UTC [msp] Setup -> DEBU 751 Setting up the MSP manager (3 msps)" +"2019-09-24 01:04:33.514 UTC [msp] Setup -> DEBU 752 MSP manager setup complete, setup 3 msps" +"2019-09-24 01:04:33.514 UTC [policies] NewManagerImpl -> DEBU 753 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.514 UTC [policies] Evaluate -> DEBU 754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.515 UTC [policies] Evaluate -> DEBU 755 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.515 UTC [policies] Evaluate -> DEBU 756 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.515 UTC [gossip.comm] authenticateRemotePeer -> DEBU 757 Authenticated 172.18.0.8:35324" +"2019-09-24 01:04:33.516 UTC [gossip.comm] GossipStream -> DEBU 758 Servicing 172.18.0.8:35324" +"2019-09-24 01:04:33.516 UTC [gossip.comm] serviceConnection -> DEBU 759 Closing reading from stream" +"2019-09-24 01:04:33.516 UTC [gossip.comm] func2 -> DEBU 75b Client 172.18.0.8:35316 disconnected" +"2019-09-24 01:04:33.517 UTC [comm.grpc.server] 1 -> INFO 75f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:35316 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.1132031s +"2019-09-24 01:04:33.517 UTC [msp] GetDefaultSigningIdentity -> DEBU 760 Obtaining default signing identity" +"2019-09-24 01:04:33.517 UTC [msp.identity] Sign -> DEBU 761 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.517 UTC [msp.identity] Sign -> DEBU 762 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.517 UTC [gossip.comm] authenticateRemotePeer -> DEBU 763 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:44018" +"2019-09-24 01:04:33.517 UTC [gossip.comm] authenticateRemotePeer -> DEBU 764 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44018" +"2019-09-24 01:04:33.517 UTC [gossip.comm] writeToStream -> DEBU 765 Closing writing to stream" +"2019-09-24 01:04:33.517 UTC [msp] GetDefaultSigningIdentity -> DEBU 75c Obtaining default signing identity" +"2019-09-24 01:04:33.518 UTC [msp.identity] Sign -> DEBU 766 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.518 UTC [msp.identity] Sign -> DEBU 768 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.519 UTC [gossip.comm] authenticateRemotePeer -> DEBU 76b Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51390" +"2019-09-24 01:04:33.520 UTC [gossip.comm] authenticateRemotePeer -> DEBU 76c Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51390" +"2019-09-24 01:04:33.521 UTC [msp] DeserializeIdentity -> DEBU 76d Obtaining identity" +"2019-09-24 01:04:33.518 UTC [msp.identity] Verify -> DEBU 767 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:33.521 UTC [msp.identity] Verify -> DEBU 76e Verify: sig = 00000000 30 44 02 20 70 42 ee ef 1e 63 b5 5a 62 d6 0f 38 |0D. pB...c.Zb..8| +00000010 b8 94 b0 30 a2 9d fd b1 8e e8 99 63 f8 b3 ce 44 |...0.......c...D| +00000020 52 f6 e9 f1 02 20 17 37 92 69 d5 57 55 be f7 7c |R.... .7.i.WU..|| +00000030 6f e6 21 88 16 31 9e 66 3f 30 e1 db 76 67 53 2c |o.!..1.f?0..vgS,| +00000040 57 34 95 c0 eb d1 |W4....|" +"2019-09-24 01:04:33.522 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 76f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.522 UTC [msp] DeserializeIdentity -> DEBU 774 Obtaining identity" +"2019-09-24 01:04:33.518 UTC [gossip.comm] readFromStream -> DEBU 769 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing" +"2019-09-24 01:04:33.522 UTC [gossip.comm] authenticateRemotePeer -> DEBU 770 Authenticated 172.18.0.6:44018" +"2019-09-24 01:04:33.517 UTC [gossip.comm] func2 -> DEBU 75e Client 172.18.0.8:35324 disconnected" +"2019-09-24 01:04:33.516 UTC [policies] NewManagerImpl -> DEBU 75a Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:04:33.518 UTC [gossip.comm] writeToStream -> DEBU 76a Closing writing to stream" +"2019-09-24 01:04:33.517 UTC [gossip.comm] readFromStream -> DEBU 75d Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:33.522 UTC [grpc] infof -> DEBU 771 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.522 UTC [gossip.comm] func1 -> DEBU 772 Got message: GossipMessage: nonce:5554066734959271297 tag:EMPTY mem_req:0\323\027\241\257\375\tq\201(\352\263S" secret_envelope: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 78a Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:33.533 UTC [msp.identity] Verify -> DEBU 78d Verify: digest = 00000000 78 9d d6 67 f6 9a ce dd 0f f1 ae bc 64 5e 70 9e |x..g........d^p.| +00000010 65 13 da f5 8e fb 61 e8 17 cb b1 99 f4 c5 57 18 |e.....a.......W.|" +"2019-09-24 01:04:33.533 UTC [msp.identity] Verify -> DEBU 78e Verify: sig = 00000000 30 44 02 20 03 9f 2c 74 d3 e4 70 08 f0 3c bd 41 |0D. ..,t..p..<.A| +00000010 4c 52 ee a3 e8 95 be 0f cf cc e7 ef c3 a9 11 b0 |LR..............| +00000020 36 84 c4 ff 02 20 5b 96 ed ad 01 f7 f7 69 b3 0a |6.... [......i..| +00000030 f8 0e 50 a6 14 bf d1 10 3e 30 d3 17 a1 af fd 09 |..P.....>0......| +00000040 71 81 28 ea b3 53 |q.(..S|" +"2019-09-24 01:04:33.532 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 78b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.534 UTC [msp.identity] Verify -> DEBU 78f Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:33.534 UTC [msp.identity] Verify -> DEBU 790 Verify: sig = 00000000 30 44 02 20 4a c1 c4 0b 19 92 60 f6 67 b6 32 27 |0D. J.....`.g.2'| +00000010 87 04 a6 9c a7 4c 41 65 cc 68 1f 3a c0 82 47 a9 |.....LAe.h.:..G.| +00000020 ac 3d 27 ed 02 20 4c 11 68 e9 1d b4 fb c8 05 18 |.='.. L.h.......| +00000030 17 ef 5d 3c fa 30 ac 47 85 43 dd 80 1b 9d 04 be |..]<.0.G.C......| +00000040 c6 5c f0 e6 12 b2 |.\....|" +"2019-09-24 01:04:33.534 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 791 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 792 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 793 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.535 UTC [policies] Evaluate -> DEBU 794 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.535 UTC [cauthdsl] func1 -> DEBU 795 0xc003451c50 gate 1569287073535490500 evaluation starts" +"2019-09-24 01:04:33.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 796 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 798 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:04:33.532 UTC [policies] NewManagerImpl -> DEBU 78c Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:04:33.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 799 updating membership: timestamp: " +"2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79b Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:33.537 UTC [gossip.discovery] learnExistingMembers -> DEBU 79d Exiting" +"2019-09-24 01:04:33.536 UTC [policies] NewManagerImpl -> DEBU 79a Proposed new policy Readers for Channel/Application" +"2019-09-24 01:04:33.537 UTC [gossip.discovery] handleAliveMessage -> DEBU 79e Exiting" +"2019-09-24 01:04:33.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 79f Exiting" +"2019-09-24 01:04:33.537 UTC [policies] NewManagerImpl -> DEBU 7a0 Proposed new policy Writers for Channel/Application" +"2019-09-24 01:04:33.537 UTC [policies] NewManagerImpl -> DEBU 7a1 Proposed new policy Admins for Channel/Application" +"2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7a5 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a6 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:04:33.538 UTC [policies] GetPolicy -> DEBU 7a7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7a8 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:04:33.538 UTC [gossip.gossip] handleMessage -> DEBU 7a9 Exiting" +"2019-09-24 01:04:33.538 UTC [gossip.discovery] sendMemResponse -> DEBU 7aa Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:33.539 UTC [msp] DeserializeIdentity -> DEBU 7ac Obtaining identity" +"2019-09-24 01:04:33.539 UTC [msp] DeserializeIdentity -> DEBU 7ad Obtaining identity" +"2019-09-24 01:04:33.539 UTC [gossip.comm] Send -> DEBU 7ae Entering, sending GossipMessage: Channel: , nonce: 5554066734959271297, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 545 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:33.538 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7a2 Got message: GossipMessage: nonce:7851733216047407521 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.538 UTC [policies] NewManagerImpl -> DEBU 7ab Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.535 UTC [cauthdsl] func2 -> DEBU 797 0xc003451c50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.539 UTC [gossip.discovery] sendMemResponse -> DEBU 7af Exiting, replying with alive:0\323\027\241\257\375\tq\201(\352\263S" secret_envelope: DEBU 7cf Verify: sig = 00000000 30 44 02 20 64 18 ca b8 b4 57 16 8e 14 45 fd 3c |0D. d....W...E.<| +00000010 63 55 5f ae 27 d2 7f 01 7b 71 d5 c2 35 6c 00 98 |cU_.'...{q..5l..| +00000020 af ff 3f d8 02 20 07 80 28 db d9 c9 d0 e8 fc b2 |..?.. ..(.......| +00000030 a3 f0 34 cc 65 d8 34 73 82 a0 71 f8 a3 0f 5c d3 |..4.e.4s..q...\.| +00000040 d6 38 c0 28 b0 78 |.8.(.x|" +"2019-09-24 01:04:33.545 UTC [cauthdsl] func2 -> DEBU 7d0 0xc0034e03a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.546 UTC [cauthdsl] func1 -> DEBU 7d1 0xc0034e03a0 gate 1569287073544081900 evaluation succeeds" +"2019-09-24 01:04:33.546 UTC [policies] Evaluate -> DEBU 7d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.547 UTC [policies] Evaluate -> DEBU 7d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.545 UTC [grpc] HandleSubConnStateChange -> DEBU 7ce pickfirstBalancer: HandleSubConnStateChange: 0xc0034da300, CONNECTING" +"2019-09-24 01:04:33.540 UTC [policies] NewManagerImpl -> DEBU 7b2 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.540 UTC [cauthdsl] func2 -> DEBU 7b3 0xc003451c50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 7d6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7d9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7da updating membership: timestamp: " +"2019-09-24 01:04:33.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 7db Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:33.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 7dc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:33.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 7dd Exiting" +"2019-09-24 01:04:33.550 UTC [gossip.discovery] handleAliveMessage -> DEBU 7de Exiting" +"2019-09-24 01:04:33.550 UTC [gossip.discovery] handleMsgFromComm -> DEBU 7df Exiting" +"2019-09-24 01:04:33.550 UTC [gossip.discovery] sendMemResponse -> DEBU 7e0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e1 Obtaining identity" +"2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e2 Obtaining identity" +"2019-09-24 01:04:33.550 UTC [msp] DeserializeIdentity -> DEBU 7e3 Obtaining identity" +"2019-09-24 01:04:33.550 UTC [gossip.comm] Send -> DEBU 7e4 Entering, sending GossipMessage: Channel: , nonce: 7851733216047407521, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:33.551 UTC [gossip.discovery] sendMemResponse -> DEBU 7e5 Exiting, replying with alive:0\323\027\241\257\375\tq\201(\352\263S" > alive: alive:)\203,m\272\304\223u\214\375\204:1\002 \001!'\304\247\205\360\320n\010%\222e\326\350\306\303]\003\036G\270&\204\263\352\206y\003\000i:" > alive: " +"2019-09-24 01:04:33.551 UTC [gossip.comm] sendToEndpoint -> DEBU 7e6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7851733216047407521, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 655 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.551 UTC [gossip.comm] sendToEndpoint -> DEBU 7e7 Exiting" +"2019-09-24 01:04:33.548 UTC [policies] NewManagerImpl -> DEBU 7d7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7e8 Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7e9 Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7ea Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:04:33.551 UTC [policies] NewManagerImpl -> DEBU 7eb Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ec Proposed new policy Readers for Channel" +"2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ed Proposed new policy Writers for Channel" +"2019-09-24 01:04:33.552 UTC [policies] NewManagerImpl -> DEBU 7ee Proposed new policy Admins for Channel" +"2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7ef Adding to config map: [Group] /Channel" +"2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f0 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:04:33.552 UTC [common.configtx] addToMap -> DEBU 7f3 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:04:33.553 UTC [common.configtx] addToMap -> DEBU 7f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:04:33.554 UTC [common.configtx] addToMap -> DEBU 7f7 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7f8 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7fa Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:04:33.555 UTC [common.configtx] addToMap -> DEBU 7fb Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:04:33.556 UTC [common.configtx] addToMap -> DEBU 7fc Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:04:33.556 UTC [common.configtx] addToMap -> DEBU 7fd Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 7fe Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 7ff Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:04:33.555 UTC [grpc] HandleSubConnStateChange -> DEBU 7f9 pickfirstBalancer: HandleSubConnStateChange: 0xc0034da300, READY" +"2019-09-24 01:04:33.549 UTC [cauthdsl] func2 -> DEBU 7d8 0xc003451c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.557 UTC [common.configtx] addToMap -> DEBU 800 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 802 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 803 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 804 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 805 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 806 Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:04:33.558 UTC [common.configtx] addToMap -> DEBU 807 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:04:33.558 UTC [cauthdsl] func2 -> DEBU 801 0xc003451c50 principal evaluation fails" +"2019-09-24 01:04:33.559 UTC [cauthdsl] func1 -> DEBU 808 0xc003451c50 gate 1569287073535490500 evaluation fails" +"2019-09-24 01:04:33.559 UTC [policies] Evaluate -> DEBU 809 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.559 UTC [policies] Evaluate -> DEBU 80a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.560 UTC [policies] Evaluate -> DEBU 80b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.560 UTC [cauthdsl] func1 -> DEBU 80c 0xc00350fda0 gate 1569287073560188200 evaluation starts" +"2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80d 0xc00350fda0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80e 0xc00350fda0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.560 UTC [cauthdsl] func2 -> DEBU 80f 0xc00350fda0 principal matched by identity 0" +"2019-09-24 01:04:33.560 UTC [msp.identity] Verify -> DEBU 811 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 812 Verify: sig = 00000000 30 45 02 21 00 b7 4c c7 a4 7a 1f b9 69 55 f2 2a |0E.!..L..z..iU.*| +00000010 39 85 dd 89 47 8f 5a 6d e3 2c b7 57 90 5a aa 1c |9...G.Zm.,.W.Z..| +00000020 c3 d9 04 2a 45 02 20 6e 89 f9 a0 bc 85 76 0a f2 |...*E. n.....v..| +00000030 6a 3a 47 7a b2 26 0b af b1 a5 bf 67 fe f1 20 dc |j:Gz.&.....g.. .| +00000040 e6 85 35 18 37 26 dc |..5.7&.|" +"2019-09-24 01:04:33.560 UTC [msp] GetDefaultSigningIdentity -> DEBU 813 Obtaining default signing identity" +"2019-09-24 01:04:33.561 UTC [msp.identity] Sign -> DEBU 814 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.561 UTC [msp.identity] Sign -> DEBU 815 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.561 UTC [cauthdsl] func2 -> DEBU 816 0xc00350fda0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.561 UTC [cauthdsl] func1 -> DEBU 818 0xc00350fda0 gate 1569287073560188200 evaluation succeeds" +"2019-09-24 01:04:33.559 UTC [common.configtx] addToMap -> DEBU 810 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 819 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81b Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81c Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81d Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:04:33.561 UTC [common.configtx] addToMap -> DEBU 81e Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:04:33.562 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:04:33.562 UTC [common.channelconfig] LogSanityChecks -> DEBU 82d As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:04:33.562 UTC [common.channelconfig] LogSanityChecks -> DEBU 82e As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 82f Manager Channel looking up path [Application]" +"2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 830 Manager Channel has managers Application" +"2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 831 Manager Channel has managers Orderer" +"2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 832 Manager Channel/Application looking up path []" +"2019-09-24 01:04:33.562 UTC [policies] Manager -> DEBU 833 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 834 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 835 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 836 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:04:33.563 UTC [common.channelconfig] LogSanityChecks -> DEBU 837 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 838 Manager Channel looking up path [Orderer]" +"2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 839 Manager Channel has managers Application" +"2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 83a Manager Channel has managers Orderer" +"2019-09-24 01:04:33.563 UTC [policies] Manager -> DEBU 83b Manager Channel/Orderer looking up path []" +"2019-09-24 01:04:33.564 UTC [policies] Manager -> DEBU 83c Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83d As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83e As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 83f As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:04:33.564 UTC [common.channelconfig] LogSanityChecks -> DEBU 841 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:04:33.564 UTC [common.capabilities] Supported -> DEBU 842 Application capability V1_4_2 is supported and is enabled" +"2019-09-24 01:04:33.564 UTC [common.capabilities] Supported -> DEBU 843 Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:04:33.561 UTC [gossip.comm] authenticateRemotePeer -> DEBU 817 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051" +"2019-09-24 01:04:33.564 UTC [gossip.service] ProcessConfigUpdate -> DEBU 844 Processing new config for channel businesschannel" +"2019-09-24 01:04:33.564 UTC [gossip.service] ProcessConfigUpdate -> DEBU 846 Calling out because config was updated for channel businesschannel" +"2019-09-24 01:04:33.564 UTC [gossip.service] updateAnchors -> DEBU 847 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 01:04:33.561 UTC [policies] Evaluate -> DEBU 840 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 848 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 849 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.565 UTC [policies] Evaluate -> DEBU 84a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.565 UTC [gossip.comm] authenticateRemotePeer -> DEBU 84b Authenticated 172.18.0.9:51390" +"2019-09-24 01:04:33.565 UTC [gossip.comm] GossipStream -> DEBU 84c Servicing 172.18.0.9:51390" +"2019-09-24 01:04:33.564 UTC [gossip.comm] authenticateRemotePeer -> DEBU 845 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq\n3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw\niqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E\nAwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:7051" +"2019-09-24 01:04:33.564 UTC [gossip.service] updateAnchors -> DEBU 84d Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-09-24 01:04:33.566 UTC [gossip.service] updateAnchors -> DEBU 84e Creating state provider for chainID businesschannel" +"2019-09-24 01:04:33.566 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 84f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.566 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 850 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 851 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 852 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.566 UTC [msp.identity] Verify -> DEBU 853 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:04:33.566 UTC [msp.identity] Verify -> DEBU 855 Verify: sig = 00000000 30 44 02 20 61 d4 8f c5 1c 68 25 7a 75 e1 5e 70 |0D. a....h%zu.^p| +00000010 6a d2 02 18 67 35 3f 78 d3 75 cd 6c d5 c3 7f 47 |j...g5?x.u.l...G| +00000020 df 70 db 2f 02 20 63 14 a2 ef ed fd 46 f4 77 a3 |.p./. c.....F.w.| +00000030 a6 41 44 56 60 50 d5 cd f3 49 92 ae e5 60 b5 9d |.ADV`P...I...`..| +00000040 db 79 b6 88 ba 9a |.y....|" +"2019-09-24 01:04:33.566 UTC [gossip.comm] authenticateRemotePeer -> DEBU 856 Authenticated 172.18.0.6:7051" +"2019-09-24 01:04:33.567 UTC [gossip.comm] createConnection -> DEBU 858 Exiting" +"2019-09-24 01:04:33.567 UTC [gossip.comm] sendToEndpoint -> DEBU 85a Exiting" +"2019-09-24 01:04:33.567 UTC [gossip.comm] readFromStream -> DEBU 859 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:33.566 UTC [gossip.comm] serviceConnection -> DEBU 857 Closing reading from stream" +"2019-09-24 01:04:33.567 UTC [gossip.comm] func2 -> DEBU 85c Client 172.18.0.9:51372 disconnected" +"2019-09-24 01:04:33.567 UTC [comm.grpc.server] 1 -> INFO 85d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51372 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.3533542s +"2019-09-24 01:04:33.567 UTC [gossip.comm] func2 -> DEBU 85b Client 172.18.0.9:51390 disconnected" +"2019-09-24 01:04:33.568 UTC [comm.grpc.server] 1 -> INFO 85e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:04:43.516Z grpc.peer_address=172.18.0.9:51390 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=51.474ms +"2019-09-24 01:04:33.569 UTC [gossip.comm] writeToStream -> DEBU 85f Closing writing to stream" +"2019-09-24 01:04:33.569 UTC [gossip.comm] writeToStream -> DEBU 860 Closing writing to stream" +"2019-09-24 01:04:33.569 UTC [gossip.comm] readFromStream -> DEBU 861 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing" +"2019-09-24 01:04:33.566 UTC [policies] Evaluate -> DEBU 854 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.569 UTC [msp] DeserializeIdentity -> DEBU 862 Obtaining identity" +"2019-09-24 01:04:33.570 UTC [msp.identity] newIdentity -> DEBU 863 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.571 UTC [cauthdsl] func1 -> DEBU 864 0xc00358e610 gate 1569287073571149500 evaluation starts" +"2019-09-24 01:04:33.571 UTC [cauthdsl] func2 -> DEBU 865 0xc00358e610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.571 UTC [cauthdsl] func2 -> DEBU 866 0xc00358e610 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.571 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 867 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:33.572 UTC [msp] Validate -> DEBU 868 MSP Org1MSP validating identity" +"2019-09-24 01:04:33.573 UTC [msp] getCertificationChain -> DEBU 869 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:33.573 UTC [cauthdsl] func2 -> DEBU 86a 0xc00358e610 principal matched by identity 0" +"2019-09-24 01:04:33.573 UTC [msp.identity] Verify -> DEBU 86b Verify: digest = 00000000 4d 5a f0 c1 42 c0 f1 28 4f 4d fd 88 b3 42 62 27 |MZ..B..(OM...Bb'| +00000010 84 72 dd 7b 26 29 a9 54 e1 97 93 51 be db 3c e9 |.r.{&).T...Q..<.|" +"2019-09-24 01:04:33.574 UTC [msp.identity] Verify -> DEBU 86c Verify: sig = 00000000 30 45 02 21 00 9d cc a8 fc 9e 32 6e cb 1f 5a 76 |0E.!......2n..Zv| +00000010 74 9f ac 12 7c 94 71 6d ef 9b 85 b3 a6 95 df e6 |t...|.qm........| +00000020 2c 39 c9 57 d8 02 20 50 af c5 93 82 13 eb 9b 4e |,9.W.. P.......N| +00000030 ca bd e1 47 9e 90 d2 5f 8e c4 12 c0 e0 27 6a 0c |...G..._.....'j.| +00000040 49 ba 7f 3c 1d 77 e6 |I..<.w.|" +"2019-09-24 01:04:33.575 UTC [cauthdsl] func2 -> DEBU 86d 0xc00358e610 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.575 UTC [cauthdsl] func1 -> DEBU 86e 0xc00358e610 gate 1569287073571149500 evaluation succeeds" +"2019-09-24 01:04:33.575 UTC [policies] Evaluate -> DEBU 86f Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.575 UTC [policies] Evaluate -> DEBU 870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.576 UTC [policies] Evaluate -> DEBU 871 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.576 UTC [policies] Evaluate -> DEBU 872 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.576 UTC [gossip.gossip] JoinChan -> INFO 873 Joining gossip network of channel businesschannel with 2 organizations" +"2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 874 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 875 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 01:04:33.577 UTC [gossip.gossip] learnAnchorPeers -> INFO 876 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-09-24 01:04:33.577 UTC [gossip.discovery] Connect -> DEBU 877 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-09-24 01:04:33.578 UTC [gossip.discovery] Connect -> DEBU 878 Exiting" +"2019-09-24 01:04:33.578 UTC [gossip.service] updateEndpoints -> DEBU 879 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 01:04:33.578 UTC [msp] DeserializeIdentity -> DEBU 87a Obtaining identity" +"2019-09-24 01:04:33.579 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 87b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.580 UTC [msp] DeserializeIdentity -> DEBU 87c Obtaining identity" +"2019-09-24 01:04:33.581 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 87d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.581 UTC [peer] updateTrustedRoots -> DEBU 87e Updating trusted root authorities for channel businesschannel" +"2019-09-24 01:04:33.582 UTC [grpc] DialContext -> DEBU 87f parsed scheme: """ +"2019-09-24 01:04:33.582 UTC [grpc] DialContext -> DEBU 880 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:33.582 UTC [grpc] watcher -> DEBU 881 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 01:04:33.582 UTC [grpc] switchBalancer -> DEBU 882 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:33.582 UTC [grpc] HandleSubConnStateChange -> DEBU 883 pickfirstBalancer: HandleSubConnStateChange: 0xc0035d4ac0, CONNECTING" +"2019-09-24 01:04:33.583 UTC [gossip.comm] func1 -> DEBU 884 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.583 UTC [gossip.gossip] handleMessage -> DEBU 885 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.583 UTC [gossip.gossip] handleMessage -> DEBU 886 Exiting" +"2019-09-24 01:04:33.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU 887 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 888 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:33.584 UTC [msp.identity] Verify -> DEBU 889 Verify: digest = 00000000 38 fa 0b 0b bc 13 ed 75 a9 b4 d2 eb 4f 5a d2 82 |8......u....OZ..| +00000010 98 4e 35 12 8b b9 af e0 85 c1 ac ad 6d bf 00 98 |.N5.........m...|" +"2019-09-24 01:04:33.584 UTC [msp.identity] Verify -> DEBU 88a Verify: sig = 00000000 30 44 02 20 5d 4e f3 a9 af a7 3a c1 89 63 27 d0 |0D. ]N....:..c'.| +00000010 90 7c c9 d0 5d c0 70 8b 43 7f 65 81 0f 25 f0 6a |.|..].p.C.e..%.j| +00000020 0c 8a fc aa 02 20 3c db 4d b4 e7 7e df 07 1a 4e |..... <.M..~...N| +00000030 5a 16 68 97 36 2c 67 a6 92 5a e2 73 1b 93 8a 93 |Z.h.6,g..Z.s....| +00000040 a8 c4 4d 11 05 34 |..M..4|" +"2019-09-24 01:04:33.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 88b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 88c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88d updating membership: timestamp: " +"2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88e Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:33.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 88f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:33.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 890 Exiting" +"2019-09-24 01:04:33.592 UTC [gossip.discovery] handleAliveMessage -> DEBU 891 Exiting" +"2019-09-24 01:04:33.592 UTC [gossip.discovery] handleMsgFromComm -> DEBU 892 Exiting" +"2019-09-24 01:04:33.594 UTC [msp] DeserializeIdentity -> DEBU 893 Obtaining identity" +"2019-09-24 01:04:33.595 UTC [msp] DeserializeIdentity -> DEBU 894 Obtaining identity" +"2019-09-24 01:04:33.595 UTC [msp] DeserializeIdentity -> DEBU 895 Obtaining identity" +"2019-09-24 01:04:33.596 UTC [gossip.comm] Send -> DEBU 896 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:33.596 UTC [msp] DeserializeIdentity -> DEBU 897 Obtaining identity" +"2019-09-24 01:04:33.596 UTC [gossip.comm] Send -> DEBU 898 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:33.596 UTC [gossip.comm] sendToEndpoint -> DEBU 899 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.597 UTC [gossip.comm] createConnection -> DEBU 89a Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:33.599 UTC [grpc] DialContext -> DEBU 89b parsed scheme: """ +"2019-09-24 01:04:33.599 UTC [grpc] DialContext -> DEBU 89c scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:33.599 UTC [grpc] watcher -> DEBU 89d ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-09-24 01:04:33.599 UTC [grpc] switchBalancer -> DEBU 89e ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:33.599 UTC [grpc] HandleSubConnStateChange -> DEBU 89f pickfirstBalancer: HandleSubConnStateChange: 0xc003605ed0, CONNECTING" +"2019-09-24 01:04:33.600 UTC [gossip.comm] sendToEndpoint -> DEBU 8a0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.601 UTC [gossip.comm] createConnection -> DEBU 8a1 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:33.603 UTC [grpc] DialContext -> DEBU 8a2 parsed scheme: """ +"2019-09-24 01:04:33.603 UTC [grpc] DialContext -> DEBU 8a3 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:33.603 UTC [grpc] watcher -> DEBU 8a4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 01:04:33.603 UTC [grpc] switchBalancer -> DEBU 8a5 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:33.603 UTC [grpc] HandleSubConnStateChange -> DEBU 8a6 pickfirstBalancer: HandleSubConnStateChange: 0xc00362b820, CONNECTING" +"2019-09-24 01:04:33.607 UTC [grpc] infof -> DEBU 8a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8a8 updating root CAs for channel [businesschannel]" +"2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8a9 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:04:33.609 UTC [peer] buildTrustedRootsForChain -> DEBU 8aa adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:04:33.610 UTC [peer] buildTrustedRootsForChain -> DEBU 8ab adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:04:33.610 UTC [committer.txvalidator] validateTx -> DEBU 8ac config transaction received for chain businesschannel" +"2019-09-24 01:04:33.611 UTC [committer.txvalidator] validateTx -> DEBU 8ad [businesschannel] validateTx completes for block 0xc003156940 env 0xc003161450 txn 0" +"2019-09-24 01:04:33.612 UTC [committer.txvalidator] Validate -> DEBU 8ae got result for idx 0, code 0" +"2019-09-24 01:04:33.612 UTC [committer.txvalidator] Validate -> INFO 8b0 [businesschannel] Validated block [2] in 216ms" +"2019-09-24 01:04:33.613 UTC [gossip.privdata] listMissingPrivateData -> DEBU 8b1 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:04:33.613 UTC [gossip.privdata] StoreBlock -> DEBU 8b2 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:04:33.613 UTC [committer] preCommit -> DEBU 8b3 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 01:04:33.614 UTC [grpc] HandleSubConnStateChange -> DEBU 8b4 pickfirstBalancer: HandleSubConnStateChange: 0xc0035d4ac0, READY" +"2019-09-24 01:04:33.613 UTC [kvledger] CommitWithPvtData -> DEBU 8b5 [businesschannel] Validating state for block [2]" +"2019-09-24 01:04:33.614 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b6 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:04:33.614 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b7 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:04:33.615 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 8b8 Validating new block with num trans = [1]" +"2019-09-24 01:04:33.615 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8b9 ValidateAndPrepareBatch() for block number = [2]" +"2019-09-24 01:04:33.615 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8ba preprocessing ProtoBlock..." +"2019-09-24 01:04:33.615 UTC [valimpl] preprocessProtoBlock -> DEBU 8bb txType=CONFIG" +"2019-09-24 01:04:33.615 UTC [valimpl] processNonEndorserTx -> DEBU 8bc Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 01:04:33.615 UTC [valimpl] processNonEndorserTx -> DEBU 8bd Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 01:04:33.615 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 8be constructing new tx simulator" +"2019-09-24 01:04:33.616 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 8bf constructing new tx simulator txid = []" +"2019-09-24 01:04:33.616 UTC [peer] GenerateSimulationResults -> DEBU 8c0 Processing CONFIG" +"2019-09-24 01:04:33.617 UTC [peer] processChannelConfigTx -> DEBU 8c1 channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 01:04:33.617 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 8c2 Simulation completed, getting simulation results" +"2019-09-24 01:04:33.617 UTC [lockbasedtxmgr] Done -> DEBU 8c3 Done with transaction simulation / query execution []" +"2019-09-24 01:04:33.618 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 8c4 Block [2] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 01:04:33.618 UTC [valinternal] ApplyWriteSet -> DEBU 8c5 txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00353f5c0)}" +"2019-09-24 01:04:33.618 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c6 validating rwset..." +"2019-09-24 01:04:33.618 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c7 postprocessing ProtoBlock..." +"2019-09-24 01:04:33.619 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 8c9 ValidateAndPrepareBatch() complete" +"2019-09-24 01:04:33.619 UTC [grpc] HandleSubConnStateChange -> DEBU 8ca pickfirstBalancer: HandleSubConnStateChange: 0xc00362b820, READY" +"2019-09-24 01:04:33.620 UTC [kvledger] CommitWithPvtData -> DEBU 8cb [businesschannel] Adding CommitHash to the block [2]" +"2019-09-24 01:04:33.620 UTC [kvledger] CommitWithPvtData -> DEBU 8cc [businesschannel] Committing block [2] to storage" +"2019-09-24 01:04:33.620 UTC [ledgerstorage] CommitWithPvtData -> DEBU 8cd Writing block [2] to pvt block store" +"2019-09-24 01:04:33.612 UTC [grpc] HandleSubConnStateChange -> DEBU 8af pickfirstBalancer: HandleSubConnStateChange: 0xc003605ed0, READY" +"2019-09-24 01:04:33.624 UTC [pvtdatastorage] Prepare -> DEBU 8ce Saved 0 private data write sets for block [2]" +"2019-09-24 01:04:33.624 UTC [msp] GetDefaultSigningIdentity -> DEBU 8cf Obtaining default signing identity" +"2019-09-24 01:04:33.624 UTC [msp.identity] Sign -> DEBU 8d0 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.624 UTC [msp.identity] Sign -> DEBU 8d1 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.625 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8d2 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-09-24 01:04:33.626 UTC [fsblkstorage] indexBlock -> DEBU 8d3 Indexing block [blockNum=2, blockHash=[]byte{0xba, 0xc0, 0xcb, 0xf4, 0x59, 0xfa, 0xb5, 0xea, 0x84, 0x86, 0x4a, 0x57, 0xcd, 0xad, 0xb5, 0xc7, 0xd0, 0x5a, 0x7c, 0x6a, 0x8b, 0x61, 0x16, 0xcf, 0x6f, 0x9c, 0x46, 0xa0, 0xe3, 0x2b, 0x77, 0xe0} txOffsets= +txId=b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e locPointer=offset=71, bytesLength=24474 +]" +"2019-09-24 01:04:33.627 UTC [fsblkstorage] indexBlock -> DEBU 8d4 Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx ID: [b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e] to txid-index" +"2019-09-24 01:04:33.627 UTC [fsblkstorage] indexBlock -> DEBU 8d5 Adding txLoc [fileSuffixNum=0, offset=51392, bytesLength=24474] for tx number:[0] ID: [b3a95292ae0a64bded74febd62d4ef030c8f16405f655dce8aadaa99edadf54e] to blockNumTranNum index" +"2019-09-24 01:04:33.629 UTC [fsblkstorage] updateCheckpoint -> DEBU 8d6 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[76839], isChainEmpty=[false], lastBlockNumber=[2]" +"2019-09-24 01:04:33.629 UTC [pvtdatastorage] Commit -> DEBU 8d7 Committing private data for block [2]" +"2019-09-24 01:04:33.630 UTC [msp] GetDefaultSigningIdentity -> DEBU 8d8 Obtaining default signing identity" +"2019-09-24 01:04:33.630 UTC [msp.identity] Sign -> DEBU 8d9 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.630 UTC [msp.identity] Sign -> DEBU 8da Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.630 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8db Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.8:7051" +"2019-09-24 01:04:33.631 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8dc Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +"2019-09-24 01:04:33.631 UTC [msp] DeserializeIdentity -> DEBU 8dd Obtaining identity" +"2019-09-24 01:04:33.632 UTC [msp] DeserializeIdentity -> DEBU 8de Obtaining identity" +"2019-09-24 01:04:33.633 UTC [msp.identity] newIdentity -> DEBU 8df Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.634 UTC [msp] Validate -> DEBU 8e0 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.634 UTC [msp] getCertificationChain -> DEBU 8e1 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.635 UTC [pvtdatastorage] Commit -> DEBU 8e2 Committed private data for block [2]" +"2019-09-24 01:04:33.635 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.635 UTC [kvledger] CommitWithPvtData -> DEBU 8e4 [businesschannel] Committing block [2] transactions to state database" +"2019-09-24 01:04:33.635 UTC [lockbasedtxmgr] Commit -> DEBU 8e6 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:04:33.635 UTC [lockbasedtxmgr] Commit -> DEBU 8e7 Committing updates to state database" +"2019-09-24 01:04:33.636 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 8e8 Building the expiry schedules based on the update batch" +"2019-09-24 01:04:33.636 UTC [lockbasedtxmgr] Commit -> DEBU 8e9 Write lock acquired for committing updates to state database" +"2019-09-24 01:04:33.636 UTC [stateleveldb] ApplyUpdates -> DEBU 8ea Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 01:04:33.636 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8eb Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:7051" +"2019-09-24 01:04:33.636 UTC [msp] DeserializeIdentity -> DEBU 8ec Obtaining identity" +"2019-09-24 01:04:33.636 UTC [msp] DeserializeIdentity -> DEBU 8ed Obtaining identity" +"2019-09-24 01:04:33.637 UTC [msp.identity] newIdentity -> DEBU 8ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.638 UTC [lockbasedtxmgr] Commit -> DEBU 8ef Updates committed to state database and the write lock is released" +"2019-09-24 01:04:33.638 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8f0 Preparing potential purge list working-set for expiringAtBlk [3]" +"2019-09-24 01:04:33.638 UTC [leveldbhelper] GetIterator -> DEBU 8f1 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}]" +"2019-09-24 01:04:33.638 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 8f2 No expiry entry found for expiringAtBlk [3]" +"2019-09-24 01:04:33.639 UTC [lockbasedtxmgr] func1 -> DEBU 8f3 launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:04:33.639 UTC [kvledger] CommitWithPvtData -> DEBU 8f4 [businesschannel] Committing block [2] transactions to history database" +"2019-09-24 01:04:33.639 UTC [historyleveldb] Commit -> DEBU 8f6 Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions" +"2019-09-24 01:04:33.640 UTC [historyleveldb] Commit -> DEBU 8f7 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 01:04:33.618 UTC [msp] GetDefaultSigningIdentity -> DEBU 8c8 Obtaining default signing identity" +"2019-09-24 01:04:33.640 UTC [msp.identity] Sign -> DEBU 8f8 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:33.640 UTC [msp.identity] Sign -> DEBU 8f9 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:33.641 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8fa Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-09-24 01:04:33.641 UTC [gossip.comm] authenticateRemotePeer -> DEBU 8fb Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +"2019-09-24 01:04:33.641 UTC [msp] DeserializeIdentity -> DEBU 8fc Obtaining identity" +"2019-09-24 01:04:33.641 UTC [historyleveldb] Commit -> DEBU 8fd Channel [businesschannel]: Updates committed to history database for blockNo [2]" +"2019-09-24 01:04:33.642 UTC [kvledger] CommitWithPvtData -> INFO 8ff [businesschannel] Committed block [2] with 1 transaction(s) in 28ms (state_validation=6ms block_and_pvtdata_commit=15ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e]" +"2019-09-24 01:04:33.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 900 Obtaining default signing identity" +"2019-09-24 01:04:33.642 UTC [msp.identity] Sign -> DEBU 901 Sign: plaintext: 18057A5E121408C8CBFBB7D9C8CEE315...EA55014EA68C22F9710D59632A020803 " +"2019-09-24 01:04:33.643 UTC [msp.identity] Sign -> DEBU 902 Sign: digest: 05862C91303EF1F3FEAEA3C4B65204B4CC6494816FBF71117F024F546F20B174 " +"2019-09-24 01:04:33.643 UTC [gossip.state] commitBlock -> DEBU 903 [businesschannel] Committed block [2] with 1 transaction(s)" +"2019-09-24 01:04:33.642 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 8fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.644 UTC [msp] DeserializeIdentity -> DEBU 904 Obtaining identity" +"2019-09-24 01:04:33.635 UTC [msp] DeserializeIdentity -> DEBU 8e5 Obtaining identity" +"2019-09-24 01:04:33.645 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 905 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.645 UTC [msp] DeserializeIdentity -> DEBU 906 Obtaining identity" +"2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 907 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 909 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 90a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.639 UTC [msp] Validate -> DEBU 8f5 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.646 UTC [policies] Evaluate -> DEBU 90b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.647 UTC [policies] Evaluate -> DEBU 90c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.647 UTC [policies] Evaluate -> DEBU 90d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.647 UTC [cauthdsl] func1 -> DEBU 90e 0xc003829810 gate 1569287073647333400 evaluation starts" +"2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 910 0xc003829810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 911 0xc003829810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.647 UTC [cauthdsl] func2 -> DEBU 912 0xc003829810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.646 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 908 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.647 UTC [msp] getCertificationChain -> DEBU 90f MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.648 UTC [cauthdsl] func2 -> DEBU 913 0xc003829810 principal evaluation fails" +"2019-09-24 01:04:33.649 UTC [cauthdsl] func1 -> DEBU 916 0xc003829810 gate 1569287073647333400 evaluation fails" +"2019-09-24 01:04:33.649 UTC [policies] Evaluate -> DEBU 917 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.650 UTC [policies] Evaluate -> DEBU 918 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.648 UTC [msp] DeserializeIdentity -> DEBU 914 Obtaining identity" +"2019-09-24 01:04:33.649 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 915 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.650 UTC [policies] Evaluate -> DEBU 919 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.651 UTC [cauthdsl] func1 -> DEBU 91b 0xc0038406b0 gate 1569287073651118400 evaluation starts" +"2019-09-24 01:04:33.651 UTC [cauthdsl] func2 -> DEBU 91c 0xc0038406b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 91d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.651 UTC [cauthdsl] func2 -> DEBU 91e 0xc0038406b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.651 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 91f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:33.651 UTC [msp] Validate -> DEBU 920 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 921 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.651 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 922 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 923 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 924 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.652 UTC [policies] Evaluate -> DEBU 925 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.652 UTC [cauthdsl] func1 -> DEBU 926 0xc00384cc00 gate 1569287073652366100 evaluation starts" +"2019-09-24 01:04:33.652 UTC [msp] getCertificationChain -> DEBU 927 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.652 UTC [cauthdsl] func2 -> DEBU 928 0xc00384cc00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 92a 0xc00384cc00 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 92b 0xc00384cc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.650 UTC [msp] DeserializeIdentity -> DEBU 91a Obtaining identity" +"2019-09-24 01:04:33.653 UTC [cauthdsl] func2 -> DEBU 929 0xc0038406b0 principal matched by identity 0" +"2019-09-24 01:04:33.654 UTC [cauthdsl] func2 -> DEBU 92c 0xc00384cc00 principal evaluation fails" +"2019-09-24 01:04:33.655 UTC [cauthdsl] func1 -> DEBU 92e 0xc00384cc00 gate 1569287073652366100 evaluation fails" +"2019-09-24 01:04:33.655 UTC [policies] Evaluate -> DEBU 92f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.655 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 930 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.656 UTC [msp] DeserializeIdentity -> DEBU 932 Obtaining identity" +"2019-09-24 01:04:33.655 UTC [policies] Evaluate -> DEBU 931 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.656 UTC [policies] Evaluate -> DEBU 933 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.656 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 934 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 936 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 937 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.657 UTC [policies] Evaluate -> DEBU 938 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.657 UTC [policies] Evaluate -> DEBU 939 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.656 UTC [cauthdsl] func1 -> DEBU 935 0xc003841290 gate 1569287073656677800 evaluation starts" +"2019-09-24 01:04:33.655 UTC [msp.identity] Verify -> DEBU 92d Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 93a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.659 UTC [cauthdsl] func1 -> DEBU 93d 0xc00386a3e0 gate 1569287073659339200 evaluation starts" +"2019-09-24 01:04:33.659 UTC [cauthdsl] func2 -> DEBU 93e 0xc00386a3e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.659 UTC [cauthdsl] func2 -> DEBU 93f 0xc00386a3e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.658 UTC [cauthdsl] func2 -> DEBU 93b 0xc003841290 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.660 UTC [cauthdsl] func2 -> DEBU 940 0xc003841290 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.660 UTC [cauthdsl] func2 -> DEBU 941 0xc003841290 principal matched by identity 0" +"2019-09-24 01:04:33.660 UTC [msp.identity] Verify -> DEBU 943 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 942 0xc00386a3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.661 UTC [cauthdsl] func2 -> DEBU 945 0xc00386a3e0 principal evaluation fails" +"2019-09-24 01:04:33.661 UTC [cauthdsl] func1 -> DEBU 946 0xc00386a3e0 gate 1569287073659339200 evaluation fails" +"2019-09-24 01:04:33.661 UTC [policies] Evaluate -> DEBU 947 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.662 UTC [policies] Evaluate -> DEBU 948 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.662 UTC [policies] Evaluate -> DEBU 949 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.662 UTC [cauthdsl] func1 -> DEBU 94a 0xc00386ac40 gate 1569287073662559400 evaluation starts" +"2019-09-24 01:04:33.660 UTC [msp.identity] Verify -> DEBU 944 Verify: sig = 00000000 30 45 02 21 00 ed 5d d1 b0 f3 a7 27 55 3c fb 0b |0E.!..]....'U<..| +00000010 d6 87 3c 4e aa 58 3a 77 b6 bb 80 f3 ef d4 d1 6d |.. DEBU 93c Verify: sig = 00000000 30 44 02 20 4e ec 0f c7 ca b3 6f 39 bb 03 ca a3 |0D. N.....o9....| +00000010 79 a3 f2 41 33 83 f5 b0 cd de 50 24 25 15 41 73 |y..A3.....P$%.As| +00000020 01 d6 7b c4 02 20 30 c8 b8 76 53 93 cd 42 00 d4 |..{.. 0..vS..B..| +00000030 eb d5 cd 74 61 fe 19 26 77 28 40 aa 5f 7f b3 04 |...ta..&w(@._...| +00000040 f8 e8 37 e6 89 e6 |..7...|" +"2019-09-24 01:04:33.662 UTC [cauthdsl] func2 -> DEBU 94b 0xc00386ac40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94e 0xc00386ac40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.663 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 94f Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:04:33.663 UTC [msp] Validate -> DEBU 950 MSP Org2MSP validating identity" +"2019-09-24 01:04:33.664 UTC [msp] getCertificationChain -> DEBU 951 MSP Org2MSP getting certification chain" +"2019-09-24 01:04:33.664 UTC [cauthdsl] func2 -> DEBU 952 0xc00386ac40 principal matched by identity 0" +"2019-09-24 01:04:33.664 UTC [msp.identity] Verify -> DEBU 953 Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:04:33.664 UTC [msp.identity] Verify -> DEBU 954 Verify: sig = 00000000 30 44 02 20 3a fb 36 b2 13 68 85 40 04 3d b7 13 |0D. :.6..h.@.=..| +00000010 6f 8f fa 2f 06 f8 5a 4e b1 29 b7 2b 46 e2 1a a4 |o../..ZN.).+F...| +00000020 9e 7a 11 b6 02 20 23 40 78 1a e9 68 15 9c 2c 1d |.z... #@x..h..,.| +00000030 c5 70 6b 00 9d 74 75 1f 03 81 34 8e 8f 53 3d d2 |.pk..tu...4..S=.| +00000040 6b cf 84 64 c0 4a |k..d.J|" +"2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94c 0xc003841290 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.665 UTC [cauthdsl] func1 -> DEBU 955 0xc003841290 gate 1569287073656677800 evaluation succeeds" +"2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 957 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 958 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 959 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.665 UTC [policies] Evaluate -> DEBU 95a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.665 UTC [gossip.comm] authenticateRemotePeer -> DEBU 95b Authenticated 172.18.0.9:7051" +"2019-09-24 01:04:33.666 UTC [msp] DeserializeIdentity -> DEBU 95c Obtaining identity" +"2019-09-24 01:04:33.666 UTC [msp] GetDefaultSigningIdentity -> DEBU 95d Obtaining default signing identity" +"2019-09-24 01:04:33.666 UTC [msp.identity] Sign -> DEBU 95e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315100F " +"2019-09-24 01:04:33.666 UTC [msp.identity] Sign -> DEBU 960 Sign: digest: 37D60EED559B3C3939B1ED7F6C251BAB37D85B1256FF5BEA2D98F034854867D6 " +"2019-09-24 01:04:33.666 UTC [grpc] infof -> DEBU 95f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.666 UTC [msp] GetDefaultSigningIdentity -> DEBU 961 Obtaining default signing identity" +"2019-09-24 01:04:33.667 UTC [msp.identity] Sign -> DEBU 962 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:33.667 UTC [msp.identity] Sign -> DEBU 963 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:33.663 UTC [cauthdsl] func2 -> DEBU 94d 0xc0038406b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.667 UTC [cauthdsl] func1 -> DEBU 964 0xc0038406b0 gate 1569287073651118400 evaluation succeeds" +"2019-09-24 01:04:33.667 UTC [msp] DeserializeIdentity -> DEBU 965 Obtaining identity" +"2019-09-24 01:04:33.667 UTC [policies] Evaluate -> DEBU 966 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 967 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 968 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.668 UTC [gossip.comm] Send -> DEBU 969 Entering, sending GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:33.665 UTC [cauthdsl] func2 -> DEBU 956 0xc00386ac40 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.668 UTC [cauthdsl] func1 -> DEBU 96c 0xc00386ac40 gate 1569287073662559400 evaluation succeeds" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.668 UTC [gossip.comm] sendToEndpoint -> DEBU 96b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 96a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.669 UTC [gossip.comm] authenticateRemotePeer -> DEBU 971 Authenticated 172.18.0.9:7051" +"2019-09-24 01:04:33.669 UTC [gossip.comm] createConnection -> DEBU 972 Exiting" +"2019-09-24 01:04:33.669 UTC [gossip.comm] sendToEndpoint -> DEBU 973 Exiting" +"2019-09-24 01:04:33.668 UTC [policies] Evaluate -> DEBU 970 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 974 Authenticated 172.18.0.8:7051" +"2019-09-24 01:04:33.670 UTC [gossip.comm] createConnection -> DEBU 975 Exiting" +"2019-09-24 01:04:33.670 UTC [gossip.comm] sendToEndpoint -> DEBU 976 Exiting" +"2019-09-24 01:04:33.670 UTC [gossip.comm] func1 -> WARN 977 peer0.org2.example.com:7051, PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 isn't responsive: EOF" +"2019-09-24 01:04:33.670 UTC [gossip.comm] sendToEndpoint -> DEBU 978 Exiting" +"2019-09-24 01:04:33.671 UTC [gossip.discovery] expireDeadMembers -> WARN 979 Entering [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2]" +"2019-09-24 01:04:33.671 UTC [gossip.discovery] expireDeadMembers -> WARN 97a Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2, Metadata: " +"2019-09-24 01:04:33.672 UTC [gossip.comm] serviceConnection -> DEBU 97c Closing reading from stream" +"2019-09-24 01:04:33.671 UTC [grpc] infof -> DEBU 97b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:33.671 UTC [gossip.comm] CloseConn -> DEBU 97d Closing connection for , PKIid:2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:33.672 UTC [gossip.discovery] expireDeadMembers -> WARN 97e Exiting" +"2019-09-24 01:04:33.724 UTC [msp] DeserializeIdentity -> DEBU 97f Obtaining identity" +"2019-09-24 01:04:33.725 UTC [gossip.comm] Send -> DEBU 980 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers" +"2019-09-24 01:04:33.725 UTC [gossip.comm] sendToEndpoint -> DEBU 981 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.725 UTC [gossip.comm] sendToEndpoint -> DEBU 982 Exiting" +"2019-09-24 01:04:33.728 UTC [gossip.comm] sendToEndpoint -> DEBU 983 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.728 UTC [gossip.comm] sendToEndpoint -> DEBU 984 Exiting" +"2019-09-24 01:04:33.731 UTC [msp] DeserializeIdentity -> DEBU 985 Obtaining identity" +"2019-09-24 01:04:33.731 UTC [gossip.comm] Send -> DEBU 986 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers" +"2019-09-24 01:04:33.731 UTC [msp] DeserializeIdentity -> DEBU 987 Obtaining identity" +"2019-09-24 01:04:33.732 UTC [gossip.comm] sendToEndpoint -> DEBU 988 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 01:04:33.732 UTC [gossip.comm] sendToEndpoint -> DEBU 989 Exiting" +"2019-09-24 01:04:33.735 UTC [gossip.pull] Hello -> DEBU 98a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:33.735 UTC [gossip.comm] Send -> DEBU 98b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:33.735 UTC [gossip.comm] sendToEndpoint -> DEBU 98c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.735 UTC [gossip.comm] sendToEndpoint -> DEBU 98d Exiting" +"2019-09-24 01:04:33.736 UTC [gossip.comm] sendToEndpoint -> DEBU 98e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > , Envelope: 98 bytes, Signature: 71 bytes" +"2019-09-24 01:04:33.736 UTC [gossip.comm] sendToEndpoint -> DEBU 98f Exiting" +"2019-09-24 01:04:33.740 UTC [gossip.comm] func1 -> DEBU 990 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.740 UTC [gossip.gossip] handleMessage -> DEBU 991 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.740 UTC [gossip.comm] func1 -> DEBU 992 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.743 UTC [gossip.comm] func1 -> DEBU 993 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 994 Verify: digest = 00000000 e1 31 f7 e7 88 8d cc c2 72 f6 31 44 34 c9 52 4a |.1......r.1D4.RJ| +00000010 c7 07 4b 63 c2 a5 ee 0f 25 04 86 1e 52 2c 4a 2d |..Kc....%...R,J-|" +"2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 995 Verify: sig = 00000000 30 45 02 21 00 cd 65 94 88 ad e5 0a 22 fd 68 7f |0E.!..e.....".h.| +00000010 bb e9 5c db d9 8c 2e ed ae b3 54 90 7a ca 69 41 |..\.......T.z.iA| +00000020 3c cc 29 40 8c 02 20 63 d6 34 dc e1 8a 87 b1 a8 |<.)@.. c.4......| +00000030 13 df 9d d3 bd c3 e7 b5 d4 2d 72 cd d6 5a f1 89 |.........-r..Z..| +00000040 d8 50 85 64 1e ce 1f |.P.d...|" +"2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 996 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:33.745 UTC [msp.identity] Verify -> DEBU 997 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:33.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 998 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 999 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.746 UTC [policies] Evaluate -> DEBU 99a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.747 UTC [policies] Evaluate -> DEBU 99b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.747 UTC [policies] Evaluate -> DEBU 99c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.747 UTC [msp] DeserializeIdentity -> DEBU 99d Obtaining identity" +"2019-09-24 01:04:33.747 UTC [msp.identity] newIdentity -> DEBU 99e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE-----" +"2019-09-24 01:04:33.748 UTC [cauthdsl] func1 -> DEBU 99f 0xc003895d80 gate 1569287073747885500 evaluation starts" +"2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a0 0xc003895d80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a1 0xc003895d80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.749 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 9a2 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:04:33.749 UTC [msp] Validate -> DEBU 9a3 MSP Org1MSP validating identity" +"2019-09-24 01:04:33.749 UTC [msp] getCertificationChain -> DEBU 9a4 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:33.749 UTC [cauthdsl] func2 -> DEBU 9a5 0xc003895d80 principal matched by identity 0" +"2019-09-24 01:04:33.749 UTC [msp.identity] Verify -> DEBU 9a6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:33.750 UTC [msp.identity] Verify -> DEBU 9a7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:33.750 UTC [cauthdsl] func2 -> DEBU 9a8 0xc003895d80 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.750 UTC [cauthdsl] func1 -> DEBU 9a9 0xc003895d80 gate 1569287073747885500 evaluation succeeds" +"2019-09-24 01:04:33.750 UTC [policies] Evaluate -> DEBU 9aa Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.750 UTC [policies] Evaluate -> DEBU 9ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.751 UTC [policies] Evaluate -> DEBU 9ac Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.751 UTC [policies] Evaluate -> DEBU 9ad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.751 UTC [gossip.gossip] handleMessage -> DEBU 9ae Exiting" +"2019-09-24 01:04:33.751 UTC [gossip.gossip] handleMessage -> DEBU 9af Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.752 UTC [msp] DeserializeIdentity -> DEBU 9b0 Obtaining identity" +"2019-09-24 01:04:33.752 UTC [msp] DeserializeIdentity -> DEBU 9b1 Obtaining identity" +"2019-09-24 01:04:33.755 UTC [msp] DeserializeIdentity -> DEBU 9b2 Obtaining identity" +"2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 9b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9b5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.756 UTC [policies] Evaluate -> DEBU 9b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.756 UTC [cauthdsl] func1 -> DEBU 9b9 0xc0038d8530 gate 1569287073756777100 evaluation starts" +"2019-09-24 01:04:33.756 UTC [cauthdsl] func2 -> DEBU 9ba 0xc0038d8530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bb 0xc0038d8530 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bc 0xc0038d8530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.757 UTC [cauthdsl] func2 -> DEBU 9bd 0xc0038d8530 principal evaluation fails" +"2019-09-24 01:04:33.757 UTC [cauthdsl] func1 -> DEBU 9be 0xc0038d8530 gate 1569287073756777100 evaluation fails" +"2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9bf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.757 UTC [policies] Evaluate -> DEBU 9c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.758 UTC [cauthdsl] func1 -> DEBU 9c2 0xc0038d8d70 gate 1569287073758301300 evaluation starts" +"2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c3 0xc0038d8d70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c4 0xc0038d8d70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.758 UTC [cauthdsl] func2 -> DEBU 9c5 0xc0038d8d70 principal matched by identity 0" +"2019-09-24 01:04:33.761 UTC [msp.identity] Verify -> DEBU 9c6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:33.761 UTC [msp.identity] Verify -> DEBU 9c7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:33.761 UTC [cauthdsl] func2 -> DEBU 9c8 0xc0038d8d70 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.761 UTC [cauthdsl] func1 -> DEBU 9c9 0xc0038d8d70 gate 1569287073758301300 evaluation succeeds" +"2019-09-24 01:04:33.761 UTC [policies] Evaluate -> DEBU 9ca Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.761 UTC [policies] Evaluate -> DEBU 9cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.762 UTC [policies] Evaluate -> DEBU 9cc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.762 UTC [policies] Evaluate -> DEBU 9cd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.762 UTC [msp] DeserializeIdentity -> DEBU 9ce Obtaining identity" +"2019-09-24 01:04:33.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9cf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.764 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 9d0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:33.764 UTC [policies] Evaluate -> DEBU 9d1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:33.764 UTC [policies] Evaluate -> DEBU 9d2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:33.765 UTC [policies] Evaluate -> DEBU 9d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:33.765 UTC [cauthdsl] func1 -> DEBU 9d4 0xc0038d9e50 gate 1569287073765565400 evaluation starts" +"2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d5 0xc0038d9e50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d6 0xc0038d9e50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d7 0xc0038d9e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:33.766 UTC [cauthdsl] func2 -> DEBU 9d8 0xc0038d9e50 principal evaluation fails" +"2019-09-24 01:04:33.767 UTC [cauthdsl] func1 -> DEBU 9d9 0xc0038d9e50 gate 1569287073765565400 evaluation fails" +"2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9da Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:33.767 UTC [policies] Evaluate -> DEBU 9dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:33.767 UTC [cauthdsl] func1 -> DEBU 9dd 0xc0038e8690 gate 1569287073767736100 evaluation starts" +"2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9de 0xc0038e8690 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9df 0xc0038e8690 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:33.768 UTC [cauthdsl] func2 -> DEBU 9e0 0xc0038e8690 principal matched by identity 0" +"2019-09-24 01:04:33.768 UTC [msp.identity] Verify -> DEBU 9e1 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:33.768 UTC [msp.identity] Verify -> DEBU 9e2 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:33.769 UTC [cauthdsl] func2 -> DEBU 9e3 0xc0038e8690 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:33.769 UTC [cauthdsl] func1 -> DEBU 9e4 0xc0038e8690 gate 1569287073767736100 evaluation succeeds" +"2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:33.769 UTC [policies] Evaluate -> DEBU 9e8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:33.769 UTC [gossip.gossip] handleMessage -> DEBU 9e9 Exiting" +"2019-09-24 01:04:33.769 UTC [gossip.gossip] handleMessage -> DEBU 9ea Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.770 UTC [gossip.pull] HandleMessage -> DEBU 9eb GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.770 UTC [gossip.gossip] handleMessage -> DEBU 9ec Exiting" +"2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ed Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ee Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.912 UTC [gossip.comm] func1 -> DEBU 9ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.913 UTC [gossip.gossip] handleMessage -> DEBU 9f0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.913 UTC [gossip.pull] HandleMessage -> DEBU 9f1 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.913 UTC [gossip.pull] SendDigest -> DEBU 9f2 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:33.913 UTC [gossip.gossip] handleMessage -> DEBU 9f3 Exiting" +"2019-09-24 01:04:33.914 UTC [gossip.gossip] handleMessage -> DEBU 9f4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:33.914 UTC [msp] DeserializeIdentity -> DEBU 9f5 Obtaining identity" +"2019-09-24 01:04:33.914 UTC [gossip.gossip] handleMessage -> DEBU 9f6 Exiting" +"2019-09-24 01:04:33.915 UTC [gossip.gossip] handleMessage -> DEBU 9f7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 01:04:33.915 UTC [msp.identity] Verify -> DEBU 9f8 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:33.915 UTC [msp.identity] Verify -> DEBU 9f9 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:33.916 UTC [gossip.gossip] handleMessage -> DEBU 9fa Exiting" +"2019-09-24 01:04:34.208 UTC [gossip.comm] func1 -> DEBU 9fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.208 UTC [gossip.gossip] handleMessage -> DEBU 9fc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.208 UTC [gossip.gossip] handleMessage -> DEBU 9fd Exiting" +"2019-09-24 01:04:34.208 UTC [gossip.discovery] handleMsgFromComm -> DEBU 9fe Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.208 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 9ff Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:34.208 UTC [msp] DeserializeIdentity -> DEBU a00 Obtaining identity" +"2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a01 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a02 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.209 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a03 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a04 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a05 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.209 UTC [policies] Evaluate -> DEBU a06 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.210 UTC [cauthdsl] func1 -> DEBU a07 0xc00390c670 gate 1569287074210418900 evaluation starts" +"2019-09-24 01:04:34.210 UTC [cauthdsl] func2 -> DEBU a08 0xc00390c670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.210 UTC [cauthdsl] func2 -> DEBU a09 0xc00390c670 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.211 UTC [cauthdsl] func2 -> DEBU a0a 0xc00390c670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.211 UTC [cauthdsl] func2 -> DEBU a0b 0xc00390c670 principal evaluation fails" +"2019-09-24 01:04:34.211 UTC [cauthdsl] func1 -> DEBU a0c 0xc00390c670 gate 1569287074210418900 evaluation fails" +"2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.211 UTC [policies] Evaluate -> DEBU a0f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.212 UTC [cauthdsl] func1 -> DEBU a10 0xc00390ceb0 gate 1569287074212022100 evaluation starts" +"2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a11 0xc00390ceb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a12 0xc00390ceb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.212 UTC [cauthdsl] func2 -> DEBU a13 0xc00390ceb0 principal matched by identity 0" +"2019-09-24 01:04:34.212 UTC [msp.identity] Verify -> DEBU a14 Verify: digest = 00000000 30 0d e2 1c 6f 82 b4 ca 58 54 ea 0b 23 f2 00 28 |0...o...XT..#..(| +00000010 b4 3e 73 c8 86 7a 37 d7 bf f2 b4 0e c8 5f c6 75 |.>s..z7......_.u|" +"2019-09-24 01:04:34.213 UTC [msp.identity] Verify -> DEBU a15 Verify: sig = 00000000 30 44 02 20 03 0b ec ec 39 c1 28 2e 81 26 b5 99 |0D. ....9.(..&..| +00000010 38 0a 27 d2 af 55 50 11 b1 16 6f 52 0b b2 e8 46 |8.'..UP...oR...F| +00000020 02 06 c0 f1 02 20 4e 75 12 1c 08 00 a4 62 15 0f |..... Nu.....b..| +00000030 10 5c 07 eb ad 0f 92 99 00 31 90 1a c1 6c e7 a8 |.\.......1...l..| +00000040 24 43 1c 48 1f 96 |$C.H..|" +"2019-09-24 01:04:34.214 UTC [cauthdsl] func2 -> DEBU a16 0xc00390ceb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.214 UTC [cauthdsl] func1 -> DEBU a17 0xc00390ceb0 gate 1569287074212022100 evaluation succeeds" +"2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a18 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a19 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a1a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.214 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.215 UTC [gossip.discovery] handleAliveMessage -> DEBU a1c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.215 UTC [gossip.discovery] resurrectMember -> DEBU a1d Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1569287058898689100 17 {} [] 0}" +"2019-09-24 01:04:34.216 UTC [gossip.discovery] resurrectMember -> DEBU a1e Exiting" +"2019-09-24 01:04:34.216 UTC [gossip.discovery] handleAliveMessage -> DEBU a1f Exiting" +"2019-09-24 01:04:34.216 UTC [gossip.discovery] handleMsgFromComm -> DEBU a20 Exiting" +"2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a21 Obtaining identity" +"2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a22 Obtaining identity" +"2019-09-24 01:04:34.216 UTC [msp] DeserializeIdentity -> DEBU a23 Obtaining identity" +"2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a24 Obtaining identity" +"2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a25 Obtaining identity" +"2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a26 Obtaining identity" +"2019-09-24 01:04:34.217 UTC [msp] DeserializeIdentity -> DEBU a27 Obtaining identity" +"2019-09-24 01:04:34.218 UTC [gossip.comm] Send -> DEBU a28 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:34.218 UTC [msp] DeserializeIdentity -> DEBU a29 Obtaining identity" +"2019-09-24 01:04:34.218 UTC [msp] DeserializeIdentity -> DEBU a2a Obtaining identity" +"2019-09-24 01:04:34.219 UTC [gossip.comm] Send -> DEBU a2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:34.219 UTC [gossip.comm] sendToEndpoint -> DEBU a2c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.220 UTC [gossip.comm] sendToEndpoint -> DEBU a2d Exiting" +"2019-09-24 01:04:34.220 UTC [msp] GetDefaultSigningIdentity -> DEBU a2e Obtaining default signing identity" +"2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a2f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151010 " +"2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a30 Sign: digest: 8FBC380E3FFCDC37EB191EBDDF58384B7C17A16E43EAFE3B31332CC1B6AA640D " +"2019-09-24 01:04:34.220 UTC [msp] GetDefaultSigningIdentity -> DEBU a31 Obtaining default signing identity" +"2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a32 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:34.220 UTC [msp.identity] Sign -> DEBU a33 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:34.221 UTC [gossip.discovery] periodicalSendAlive -> DEBU a34 Sleeping 5s" +"2019-09-24 01:04:34.225 UTC [gossip.comm] sendToEndpoint -> DEBU a35 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.225 UTC [gossip.comm] createConnection -> DEBU a36 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:34.227 UTC [grpc] DialContext -> DEBU a37 parsed scheme: """ +"2019-09-24 01:04:34.227 UTC [grpc] DialContext -> DEBU a38 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:04:34.227 UTC [grpc] watcher -> DEBU a39 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 01:04:34.227 UTC [grpc] switchBalancer -> DEBU a3a ClientConn switching balancer to "pick_first"" +"2019-09-24 01:04:34.228 UTC [grpc] HandleSubConnStateChange -> DEBU a3b pickfirstBalancer: HandleSubConnStateChange: 0xc0038a7b90, CONNECTING" +"2019-09-24 01:04:34.231 UTC [msp] DeserializeIdentity -> DEBU a3c Obtaining identity" +"2019-09-24 01:04:34.231 UTC [msp] DeserializeIdentity -> DEBU a3d Obtaining identity" +"2019-09-24 01:04:34.232 UTC [gossip.comm] Send -> DEBU a3e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:34.232 UTC [msp] DeserializeIdentity -> DEBU a3f Obtaining identity" +"2019-09-24 01:04:34.232 UTC [gossip.comm] Send -> DEBU a40 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:34.233 UTC [msp] DeserializeIdentity -> DEBU a41 Obtaining identity" +"2019-09-24 01:04:34.233 UTC [gossip.comm] Send -> DEBU a42 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:34.233 UTC [gossip.comm] sendToEndpoint -> DEBU a43 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.233 UTC [gossip.comm] sendToEndpoint -> DEBU a44 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.234 UTC [gossip.comm] sendToEndpoint -> DEBU a45 Exiting" +"2019-09-24 01:04:34.234 UTC [gossip.comm] sendToEndpoint -> DEBU a46 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.235 UTC [gossip.comm] sendToEndpoint -> DEBU a47 Exiting" +"2019-09-24 01:04:34.253 UTC [comm.grpc.server] 1 -> INFO a48 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:04:36.252Z grpc.peer_address=172.18.0.9:51410 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=100µs +"2019-09-24 01:04:34.254 UTC [grpc] HandleSubConnStateChange -> DEBU a49 pickfirstBalancer: HandleSubConnStateChange: 0xc0038a7b90, READY" +"2019-09-24 01:04:34.255 UTC [msp] GetDefaultSigningIdentity -> DEBU a4a Obtaining default signing identity" +"2019-09-24 01:04:34.255 UTC [msp.identity] Sign -> DEBU a4b Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:34.255 UTC [msp.identity] Sign -> DEBU a4c Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:34.255 UTC [gossip.comm] authenticateRemotePeer -> DEBU a4d Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51410" +"2019-09-24 01:04:34.256 UTC [gossip.comm] authenticateRemotePeer -> DEBU a4e Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51410" +"2019-09-24 01:04:34.256 UTC [msp] DeserializeIdentity -> DEBU a4f Obtaining identity" +"2019-09-24 01:04:34.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.257 UTC [msp] DeserializeIdentity -> DEBU a51 Obtaining identity" +"2019-09-24 01:04:34.257 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a52 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.257 UTC [msp] DeserializeIdentity -> DEBU a53 Obtaining identity" +"2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a54 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a55 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.258 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a56 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.258 UTC [policies] Evaluate -> DEBU a57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.258 UTC [policies] Evaluate -> DEBU a58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.259 UTC [policies] Evaluate -> DEBU a59 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.259 UTC [cauthdsl] func1 -> DEBU a5a 0xc0039c5ee0 gate 1569287074259636100 evaluation starts" +"2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5b 0xc0039c5ee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5c 0xc0039c5ee0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.259 UTC [cauthdsl] func2 -> DEBU a5d 0xc0039c5ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.262 UTC [msp] GetDefaultSigningIdentity -> DEBU a5e Obtaining default signing identity" +"2019-09-24 01:04:34.262 UTC [msp.identity] Sign -> DEBU a5f Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:04:34.262 UTC [msp.identity] Sign -> DEBU a60 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:04:34.263 UTC [gossip.comm] authenticateRemotePeer -> DEBU a61 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.9:7051" +"2019-09-24 01:04:34.265 UTC [gossip.comm] authenticateRemotePeer -> DEBU a62 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +"2019-09-24 01:04:34.265 UTC [msp] DeserializeIdentity -> DEBU a63 Obtaining identity" +"2019-09-24 01:04:34.265 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a64 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.265 UTC [msp] DeserializeIdentity -> DEBU a65 Obtaining identity" +"2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.266 UTC [msp] DeserializeIdentity -> DEBU a67 Obtaining identity" +"2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU a68 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a69 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.266 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU a6a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.266 UTC [policies] Evaluate -> DEBU a6d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func1 -> DEBU a6e 0xc003a02910 gate 1569287074267321800 evaluation starts" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a6f 0xc003a02910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a70 0xc003a02910 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a71 0xc003a02910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func2 -> DEBU a72 0xc003a02910 principal evaluation fails" +"2019-09-24 01:04:34.267 UTC [cauthdsl] func1 -> DEBU a73 0xc003a02910 gate 1569287074267321800 evaluation fails" +"2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a74 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a75 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.268 UTC [policies] Evaluate -> DEBU a76 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.268 UTC [cauthdsl] func1 -> DEBU a77 0xc003a03150 gate 1569287074268880300 evaluation starts" +"2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a78 0xc003a03150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a79 0xc003a03150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.269 UTC [cauthdsl] func2 -> DEBU a7a 0xc003a03150 principal matched by identity 0" +"2019-09-24 01:04:34.269 UTC [msp.identity] Verify -> DEBU a7b Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU a7c Verify: sig = 00000000 30 44 02 20 44 b8 af 4e 09 5c 83 dc 2a 8f 60 40 |0D. D..N.\..*.`@| +00000010 3b 36 f9 28 77 5e 0b d4 05 6a e4 78 94 3c 4d 72 |;6.(w^...j.x. DEBU a7d 0xc0039c5ee0 principal evaluation fails" +"2019-09-24 01:04:34.271 UTC [cauthdsl] func1 -> DEBU a80 0xc0039c5ee0 gate 1569287074259636100 evaluation fails" +"2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a81 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.271 UTC [policies] Evaluate -> DEBU a83 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.271 UTC [cauthdsl] func1 -> DEBU a84 0xc0039da810 gate 1569287074271633200 evaluation starts" +"2019-09-24 01:04:34.271 UTC [cauthdsl] func2 -> DEBU a85 0xc0039da810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.271 UTC [cauthdsl] func2 -> DEBU a86 0xc0039da810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.272 UTC [cauthdsl] func2 -> DEBU a87 0xc0039da810 principal matched by identity 0" +"2019-09-24 01:04:34.272 UTC [msp.identity] Verify -> DEBU a88 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU a89 Verify: sig = 00000000 30 45 02 21 00 ca bf 06 84 fb 8f 58 62 ac 71 bd |0E.!.......Xb.q.| +00000010 8b 3e d7 c2 fd 3b 6d 00 00 31 80 e7 e3 78 b7 15 |.>...;m..1...x..| +00000020 b6 23 94 18 a5 02 20 5b f6 98 20 b6 80 76 77 69 |.#.... [.. ..vwi| +00000030 2e b2 fb 83 8e 23 14 b1 5c 53 01 35 bb 67 45 fd |.....#..\S.5.gE.| +00000040 08 91 4a 05 88 42 b7 |..J..B.|" +"2019-09-24 01:04:34.270 UTC [cauthdsl] func2 -> DEBU a7e 0xc003a03150 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.270 UTC [grpc] infof -> DEBU a7f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:34.272 UTC [cauthdsl] func2 -> DEBU a8a 0xc0039da810 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.273 UTC [cauthdsl] func1 -> DEBU a8c 0xc0039da810 gate 1569287074271633200 evaluation succeeds" +"2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.272 UTC [cauthdsl] func1 -> DEBU a8b 0xc003a03150 gate 1569287074268880300 evaluation succeeds" +"2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a8f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.273 UTC [gossip.comm] authenticateRemotePeer -> DEBU a91 Authenticated 172.18.0.9:51410" +"2019-09-24 01:04:34.273 UTC [gossip.comm] GossipStream -> DEBU a93 Servicing 172.18.0.9:51410" +"2019-09-24 01:04:34.273 UTC [policies] Evaluate -> DEBU a92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.274 UTC [gossip.comm] readFromStream -> DEBU a94 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a96 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.274 UTC [gossip.comm] func2 -> DEBU a97 Client 172.18.0.9:51410 disconnected" +"2019-09-24 01:04:34.274 UTC [policies] Evaluate -> DEBU a98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.274 UTC [comm.grpc.server] 1 -> INFO a9a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51410 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.8732ms +"2019-09-24 01:04:34.275 UTC [gossip.comm] authenticateRemotePeer -> DEBU a9b Authenticated 172.18.0.9:7051" +"2019-09-24 01:04:34.275 UTC [gossip.comm] createConnection -> DEBU a9c Exiting" +"2019-09-24 01:04:34.275 UTC [gossip.comm] sendToEndpoint -> DEBU a9d Exiting" +"2019-09-24 01:04:34.274 UTC [gossip.gossip] handleMessage -> DEBU a99 Entering, 172.18.0.9:51410 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.275 UTC [gossip.gossip] handleMessage -> DEBU a9e Exiting" +"2019-09-24 01:04:34.275 UTC [gossip.discovery] handleMsgFromComm -> DEBU a9f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.275 UTC [gossip.gossip] ValidateAliveMsg -> DEBU aa0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:34.276 UTC [msp.identity] Verify -> DEBU aa1 Verify: digest = 00000000 8f bc 38 0e 3f fc dc 37 eb 19 1e bd df 58 38 4b |..8.?..7.....X8K| +00000010 7c 17 a1 6e 43 ea fe 3b 31 33 2c c1 b6 aa 64 0d ||..nC..;13,...d.|" +"2019-09-24 01:04:34.276 UTC [msp.identity] Verify -> DEBU aa2 Verify: sig = 00000000 30 45 02 21 00 d8 80 58 15 10 77 d3 02 32 00 be |0E.!...X..w..2..| +00000010 7c c7 a5 a0 3e 28 77 03 6a c4 ec 68 38 90 1b 95 ||...>(w.j..h8...| +00000020 83 59 57 ee 19 02 20 62 81 fa 4f 9b e0 ed bc f9 |.YW... b..O.....| +00000030 f3 1a 9c 4e a0 ef df 70 11 db 4d 08 ae 9f 33 0d |...N...p..M...3.| +00000040 1c 38 fa 29 04 01 5b |.8.)..[|" +"2019-09-24 01:04:34.276 UTC [gossip.discovery] isSentByMe -> DEBU aa3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.276 UTC [gossip.discovery] handleMsgFromComm -> DEBU aa4 Exiting" +"2019-09-24 01:04:34.277 UTC [gossip.comm] sendToEndpoint -> DEBU aa5 Exiting" +"2019-09-24 01:04:34.277 UTC [gossip.comm] writeToStream -> DEBU aa6 Closing writing to stream" +"2019-09-24 01:04:34.311 UTC [gossip.comm] func1 -> DEBU aa7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.311 UTC [gossip.gossip] handleMessage -> DEBU aa8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.311 UTC [msp] DeserializeIdentity -> DEBU aa9 Obtaining identity" +"2019-09-24 01:04:34.312 UTC [msp] DeserializeIdentity -> DEBU aaa Obtaining identity" +"2019-09-24 01:04:34.312 UTC [gossip.gossip] handleMessage -> DEBU aab Exiting" +"2019-09-24 01:04:34.317 UTC [gossip.comm] func1 -> DEBU aac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.317 UTC [gossip.gossip] handleMessage -> DEBU aad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > , Envelope: 98 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.318 UTC [msp] DeserializeIdentity -> DEBU aae Obtaining identity" +"2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU aaf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.318 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ab1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.318 UTC [policies] Evaluate -> DEBU ab2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.318 UTC [policies] Evaluate -> DEBU ab3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.319 UTC [policies] Evaluate -> DEBU ab4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func1 -> DEBU ab5 0xc003a1de20 gate 1569287074319183400 evaluation starts" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab6 0xc003a1de20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab7 0xc003a1de20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab8 0xc003a1de20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func2 -> DEBU ab9 0xc003a1de20 principal evaluation fails" +"2019-09-24 01:04:34.319 UTC [cauthdsl] func1 -> DEBU aba 0xc003a1de20 gate 1569287074319183400 evaluation fails" +"2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.320 UTC [policies] Evaluate -> DEBU abd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.320 UTC [cauthdsl] func1 -> DEBU abe 0xc003a3a660 gate 1569287074320484000 evaluation starts" +"2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU abf 0xc003a3a660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU ac0 0xc003a3a660 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.320 UTC [cauthdsl] func2 -> DEBU ac1 0xc003a3a660 principal matched by identity 0" +"2019-09-24 01:04:34.320 UTC [msp.identity] Verify -> DEBU ac2 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:34.321 UTC [msp.identity] Verify -> DEBU ac3 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:34.321 UTC [cauthdsl] func2 -> DEBU ac4 0xc003a3a660 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.321 UTC [cauthdsl] func1 -> DEBU ac5 0xc003a3a660 gate 1569287074320484000 evaluation succeeds" +"2019-09-24 01:04:34.321 UTC [policies] Evaluate -> DEBU ac6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.322 UTC [policies] Evaluate -> DEBU ac9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.322 UTC [msp] DeserializeIdentity -> DEBU aca Obtaining identity" +"2019-09-24 01:04:34.323 UTC [gossip.gossip] handleMessage -> DEBU acb Exiting" +"2019-09-24 01:04:34.527 UTC [gossip.comm] func1 -> DEBU acc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.527 UTC [gossip.gossip] handleMessage -> DEBU acd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.527 UTC [gossip.pull] HandleMessage -> DEBU ace GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.528 UTC [gossip.pull] SendDigest -> DEBU acf Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:34.528 UTC [gossip.gossip] handleMessage -> DEBU ad0 Exiting" +"2019-09-24 01:04:34.531 UTC [gossip.comm] func1 -> DEBU ad1 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.531 UTC [gossip.gossip] handleMessage -> DEBU ad2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.531 UTC [gossip.gossip] handleMessage -> DEBU ad3 Exiting" +"2019-09-24 01:04:34.532 UTC [gossip.discovery] handleMsgFromComm -> DEBU ad4 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.532 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ad5 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:34.533 UTC [msp.identity] Verify -> DEBU ad6 Verify: digest = 00000000 66 b7 d1 2a ca 9e d0 48 4a f7 41 09 ac cd 33 4b |f..*...HJ.A...3K| +00000010 93 28 83 9d 7e f1 a4 4e 18 20 12 19 b4 a7 c4 74 |.(..~..N. .....t|" +"2019-09-24 01:04:34.533 UTC [msp.identity] Verify -> DEBU ad7 Verify: sig = 00000000 30 44 02 20 1b e1 e8 46 f8 d0 8d 07 57 e9 21 44 |0D. ...F....W.!D| +00000010 a4 05 a7 df 5b de 36 61 55 3f 2e c0 a4 4f f2 11 |....[.6aU?...O..| +00000020 c5 f1 e1 cb 02 20 47 7c b6 1f 71 e5 a7 a2 7d 6f |..... G|..q...}o| +00000030 9a a2 28 85 d1 7d b1 d8 04 12 87 a8 8c 72 14 ce |..(..}.......r..| +00000040 13 c1 2c 2a 34 f1 |..,*4.|" +"2019-09-24 01:04:34.534 UTC [msp.identity] Verify -> DEBU ad8 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:34.534 UTC [msp.identity] Verify -> DEBU ad9 Verify: sig = 00000000 30 45 02 21 00 fb eb 28 ef 2e 61 02 9c ea 45 24 |0E.!...(..a...E$| +00000010 4a ba 21 d2 23 fa 60 99 55 69 ff 11 1b cb 1a bb |J.!.#.`.Ui......| +00000020 a9 de cc d3 67 02 20 3f 0e 95 ae 80 a0 75 d9 06 |....g. ?.....u..| +00000030 74 b7 05 6e c5 2a 24 c7 0c f9 d2 2a 30 26 ed d9 |t..n.*$....*0&..| +00000040 c8 9d 9e 0f 67 bf 09 |....g..|" +"2019-09-24 01:04:34.534 UTC [gossip.discovery] handleAliveMessage -> DEBU ada Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:34.534 UTC [gossip.discovery] learnExistingMembers -> DEBU adb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU adc updating membership: timestamp: " +"2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU add Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU ade Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU adf Exiting" +"2019-09-24 01:04:34.536 UTC [gossip.discovery] handleAliveMessage -> DEBU ae0 Exiting" +"2019-09-24 01:04:34.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU ae1 Exiting" +"2019-09-24 01:04:34.536 UTC [gossip.discovery] sendMemResponse -> DEBU ae2 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:34.536 UTC [msp] DeserializeIdentity -> DEBU ae3 Obtaining identity" +"2019-09-24 01:04:34.537 UTC [msp] DeserializeIdentity -> DEBU ae4 Obtaining identity" +"2019-09-24 01:04:34.537 UTC [gossip.comm] Send -> DEBU ae5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.537 UTC [gossip.discovery] sendMemResponse -> DEBU ae6 Exiting, replying with alive: > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:34.537 UTC [gossip.comm] sendToEndpoint -> DEBU ae7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.538 UTC [gossip.comm] sendToEndpoint -> DEBU ae8 Exiting" +"2019-09-24 01:04:34.839 UTC [gossip.comm] func1 -> DEBU ae9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.839 UTC [gossip.gossip] handleMessage -> DEBU aea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.840 UTC [gossip.pull] HandleMessage -> DEBU aeb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.841 UTC [msp] DeserializeIdentity -> DEBU aec Obtaining identity" +"2019-09-24 01:04:34.842 UTC [msp] DeserializeIdentity -> DEBU aed Obtaining identity" +"2019-09-24 01:04:34.842 UTC [gossip.pull] SendDigest -> DEBU aee Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:34.844 UTC [gossip.comm] func1 -> DEBU af0 Got message: GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.844 UTC [gossip.gossip] handleMessage -> DEBU aef Exiting" +"2019-09-24 01:04:34.844 UTC [gossip.gossip] handleMessage -> DEBU af1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.845 UTC [gossip.gossip] handleMessage -> DEBU af2 Exiting" +"2019-09-24 01:04:34.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU af3 Got message: GossipMessage: tag:EMPTY mem_req:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.845 UTC [gossip.gossip] ValidateAliveMsg -> DEBU af4 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:34.845 UTC [msp] DeserializeIdentity -> DEBU af5 Obtaining identity" +"2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU af6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU af7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.846 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU af8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.846 UTC [policies] Evaluate -> DEBU af9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.846 UTC [policies] Evaluate -> DEBU afa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU afb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func1 -> DEBU afc 0xc003a70450 gate 1569287074847136300 evaluation starts" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU afd 0xc003a70450 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU afe 0xc003a70450 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU aff 0xc003a70450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func2 -> DEBU b00 0xc003a70450 principal evaluation fails" +"2019-09-24 01:04:34.847 UTC [cauthdsl] func1 -> DEBU b01 0xc003a70450 gate 1569287074847136300 evaluation fails" +"2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU b02 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.847 UTC [policies] Evaluate -> DEBU b03 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.848 UTC [policies] Evaluate -> DEBU b04 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.848 UTC [cauthdsl] func1 -> DEBU b05 0xc003a70c90 gate 1569287074848168700 evaluation starts" +"2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b06 0xc003a70c90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b07 0xc003a70c90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.848 UTC [cauthdsl] func2 -> DEBU b08 0xc003a70c90 principal matched by identity 0" +"2019-09-24 01:04:34.848 UTC [msp.identity] Verify -> DEBU b09 Verify: digest = 00000000 51 23 76 90 e1 af 05 0b 8c df ec b8 0e 58 12 37 |Q#v..........X.7| +00000010 b3 03 8f 9b ef da 31 e9 83 17 da 4f c2 2f a0 14 |......1....O./..|" +"2019-09-24 01:04:34.848 UTC [msp.identity] Verify -> DEBU b0a Verify: sig = 00000000 30 45 02 21 00 df 80 f5 b1 49 64 5a d7 37 6f 12 |0E.!.....IdZ.7o.| +00000010 7e 77 bf 10 49 19 cc 4f 1e 5c da dc 5e 23 37 9c |~w..I..O.\..^#7.| +00000020 57 af 03 b3 d4 02 20 01 7b 84 25 8a ff 66 10 d6 |W..... .{.%..f..| +00000030 7a c1 3e ea 7b ef 0c bc 0e bf 03 0c d8 71 ac 2a |z.>.{........q.*| +00000040 da 7f 0c bd ed 58 08 |.....X.|" +"2019-09-24 01:04:34.849 UTC [cauthdsl] func2 -> DEBU b0b 0xc003a70c90 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.849 UTC [cauthdsl] func1 -> DEBU b0c 0xc003a70c90 gate 1569287074848168700 evaluation succeeds" +"2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b0f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.849 UTC [policies] Evaluate -> DEBU b10 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.849 UTC [gossip.discovery] handleAliveMessage -> DEBU b11 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.849 UTC [gossip.discovery] learnExistingMembers -> DEBU b12 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b13 updating membership: timestamp: " +"2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b14 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b15 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:34.850 UTC [gossip.discovery] learnExistingMembers -> DEBU b16 Exiting" +"2019-09-24 01:04:34.850 UTC [gossip.discovery] handleAliveMessage -> DEBU b17 Exiting" +"2019-09-24 01:04:34.850 UTC [gossip.discovery] handleMsgFromComm -> DEBU b18 Exiting" +"2019-09-24 01:04:34.850 UTC [gossip.discovery] sendMemResponse -> DEBU b19 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1a Obtaining identity" +"2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1b Obtaining identity" +"2019-09-24 01:04:34.851 UTC [msp] DeserializeIdentity -> DEBU b1c Obtaining identity" +"2019-09-24 01:04:34.851 UTC [gossip.comm] Send -> DEBU b1d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.851 UTC [gossip.discovery] sendMemResponse -> DEBU b1e Exiting, replying with alive:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > alive: alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:34.852 UTC [gossip.comm] sendToEndpoint -> DEBU b1f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.852 UTC [gossip.comm] sendToEndpoint -> DEBU b20 Exiting" +"2019-09-24 01:04:34.871 UTC [gossip.pull] Hello -> DEBU b21 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:34.871 UTC [gossip.comm] Send -> DEBU b22 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.872 UTC [gossip.pull] Hello -> DEBU b23 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:34.872 UTC [gossip.comm] Send -> DEBU b24 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.872 UTC [gossip.comm] sendToEndpoint -> DEBU b25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.872 UTC [gossip.comm] sendToEndpoint -> DEBU b26 Exiting" +"2019-09-24 01:04:34.873 UTC [gossip.comm] sendToEndpoint -> DEBU b27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.874 UTC [gossip.comm] sendToEndpoint -> DEBU b28 Exiting" +"2019-09-24 01:04:34.872 UTC [gossip.pull] Hello -> DEBU b29 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:34.875 UTC [gossip.comm] Send -> DEBU b2a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.876 UTC [gossip.comm] sendToEndpoint -> DEBU b2b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.876 UTC [gossip.comm] sendToEndpoint -> DEBU b2c Exiting" +"2019-09-24 01:04:34.877 UTC [gossip.comm] func1 -> DEBU b2d Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.877 UTC [gossip.gossip] handleMessage -> DEBU b2e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.878 UTC [gossip.comm] func1 -> DEBU b2f Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.878 UTC [gossip.comm] func1 -> DEBU b30 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.880 UTC [gossip.pull] HandleMessage -> DEBU b31 GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.880 UTC [gossip.gossip] handleMessage -> DEBU b32 Exiting" +"2019-09-24 01:04:34.880 UTC [gossip.gossip] handleMessage -> DEBU b33 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.881 UTC [gossip.pull] HandleMessage -> DEBU b34 GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.881 UTC [gossip.gossip] handleMessage -> DEBU b35 Exiting" +"2019-09-24 01:04:34.881 UTC [gossip.gossip] handleMessage -> DEBU b36 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.881 UTC [gossip.pull] HandleMessage -> DEBU b37 GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.882 UTC [gossip.gossip] handleMessage -> DEBU b38 Exiting" +"2019-09-24 01:04:34.882 UTC [msp] GetDefaultSigningIdentity -> DEBU b39 Obtaining default signing identity" +"2019-09-24 01:04:34.882 UTC [msp.identity] Sign -> DEBU b3a Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151011 " +"2019-09-24 01:04:34.882 UTC [msp.identity] Sign -> DEBU b3b Sign: digest: B3FFD4E2B95573784AD87593565880A1809FD04AC8D5D140F1DF75C4D4FD9CB5 " +"2019-09-24 01:04:34.882 UTC [msp] GetDefaultSigningIdentity -> DEBU b3c Obtaining default signing identity" +"2019-09-24 01:04:34.883 UTC [msp.identity] Sign -> DEBU b3d Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:34.883 UTC [msp.identity] Sign -> DEBU b3e Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:34.883 UTC [gossip.comm] Send -> DEBU b3f Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.883 UTC [msp] DeserializeIdentity -> DEBU b40 Obtaining identity" +"2019-09-24 01:04:34.883 UTC [gossip.comm] Send -> DEBU b41 Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.883 UTC [gossip.comm] sendToEndpoint -> DEBU b42 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.884 UTC [gossip.comm] sendToEndpoint -> DEBU b43 Exiting" +"2019-09-24 01:04:34.883 UTC [msp] DeserializeIdentity -> DEBU b44 Obtaining identity" +"2019-09-24 01:04:34.887 UTC [gossip.comm] func1 -> DEBU b45 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.887 UTC [gossip.comm] Send -> DEBU b47 Entering, sending GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.887 UTC [gossip.gossip] handleMessage -> DEBU b46 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.888 UTC [gossip.gossip] handleMessage -> DEBU b4a Exiting" +"2019-09-24 01:04:34.888 UTC [gossip.discovery] handleMsgFromComm -> DEBU b4b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b4c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:34.888 UTC [gossip.comm] sendToEndpoint -> DEBU b48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU b4d Exiting" +"2019-09-24 01:04:34.889 UTC [msp.identity] Verify -> DEBU b4e Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +"2019-09-24 01:04:34.888 UTC [gossip.comm] sendToEndpoint -> DEBU b49 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:;K\263\301v\344\257\376\375\224\262\013u\251w\221\306\036\221\004\327\361\002 \037\327;k\242\022\317\370}\355\273T\274\267226|\235j,yK',\306y\303\007\366\363F" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.891 UTC [gossip.comm] func1 -> DEBU b50 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.892 UTC [gossip.gossip] handleMessage -> DEBU b52 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.890 UTC [msp.identity] Verify -> DEBU b4f Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +00000040 79 c3 07 f6 f3 46 |y....F|" +"2019-09-24 01:04:34.891 UTC [gossip.comm] sendToEndpoint -> DEBU b51 Exiting" +"2019-09-24 01:04:34.893 UTC [gossip.comm] func1 -> DEBU b53 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.894 UTC [msp.identity] Verify -> DEBU b54 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:34.894 UTC [msp.identity] Verify -> DEBU b55 Verify: sig = 00000000 30 44 02 20 3a 4c 8d ce 8d ad 89 3a 42 b3 cf 1d |0D. :L.....:B...| +00000010 de 91 82 ec 95 2b 37 88 9b 11 6f f3 52 f0 e1 04 |.....+7...o.R...| +00000020 0f 4c 2d 46 02 20 6c 64 59 e5 79 d4 c0 5e 83 ba |.L-F. ldY.y..^..| +00000030 5b 70 d5 c9 88 fe d0 af a3 07 fa ef 7b 9e ab 94 |[p..........{...| +00000040 38 d3 07 8a 9a c4 |8.....|" +"2019-09-24 01:04:34.895 UTC [gossip.discovery] handleAliveMessage -> DEBU b56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:34.895 UTC [gossip.discovery] isSentByMe -> DEBU b57 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:34.895 UTC [gossip.discovery] handleAliveMessage -> DEBU b58 Exiting" +"2019-09-24 01:04:34.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU b59 Exiting" +"2019-09-24 01:04:34.895 UTC [gossip.gossip] handleMessage -> DEBU b5a Exiting" +"2019-09-24 01:04:34.896 UTC [gossip.gossip] handleMessage -> DEBU b5b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU b5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b5d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:34.897 UTC [msp.identity] Verify -> DEBU b5e Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +"2019-09-24 01:04:34.897 UTC [msp.identity] Verify -> DEBU b5f Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +00000040 79 c3 07 f6 f3 46 |y....F|" +"2019-09-24 01:04:34.898 UTC [gossip.discovery] handleAliveMessage -> DEBU b60 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.898 UTC [gossip.discovery] isSentByMe -> DEBU b61 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.898 UTC [gossip.discovery] handleAliveMessage -> DEBU b62 Exiting" +"2019-09-24 01:04:34.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b63 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:34.898 UTC [msp] DeserializeIdentity -> DEBU b64 Obtaining identity" +"2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b65 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b66 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b67 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.899 UTC [policies] Evaluate -> DEBU b68 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.899 UTC [policies] Evaluate -> DEBU b69 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.900 UTC [policies] Evaluate -> DEBU b6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.900 UTC [cauthdsl] func1 -> DEBU b6b 0xc003ac5130 gate 1569287074900296200 evaluation starts" +"2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6c 0xc003ac5130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6d 0xc003ac5130 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.900 UTC [cauthdsl] func2 -> DEBU b6e 0xc003ac5130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.901 UTC [cauthdsl] func2 -> DEBU b6f 0xc003ac5130 principal evaluation fails" +"2019-09-24 01:04:34.902 UTC [gossip.comm] func1 -> DEBU b70 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.903 UTC [gossip.comm] func1 -> DEBU b71 Got message: GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.901 UTC [cauthdsl] func1 -> DEBU b72 0xc003ac5130 gate 1569287074900296200 evaluation fails" +"2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.907 UTC [policies] Evaluate -> DEBU b75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.908 UTC [cauthdsl] func1 -> DEBU b76 0xc003ac5970 gate 1569287074907552800 evaluation starts" +"2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b77 0xc003ac5970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b78 0xc003ac5970 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.908 UTC [cauthdsl] func2 -> DEBU b79 0xc003ac5970 principal matched by identity 0" +"2019-09-24 01:04:34.908 UTC [msp.identity] Verify -> DEBU b7a Verify: digest = 00000000 06 7a 2f 87 d3 95 25 58 95 75 e3 3f 05 d8 f7 a3 |.z/...%X.u.?....| +00000010 33 ed b5 73 92 b8 ad 8c fe 5a 7b bf 65 f3 0f cb |3..s.....Z{.e...|" +"2019-09-24 01:04:34.909 UTC [msp.identity] Verify -> DEBU b7b Verify: sig = 00000000 30 44 02 20 47 fd 9a b8 ed fd 59 09 74 b4 cf 67 |0D. G.....Y.t..g| +00000010 1a 0d 18 01 e2 7d 37 aa 04 a0 9e 73 31 3a 26 d9 |.....}7....s1:&.| +00000020 03 3f 37 33 02 20 58 cd 7a 0e ee f4 41 ef 51 54 |.?73. X.z...A.QT| +00000030 41 69 7e e2 74 be 4a b1 e2 55 48 5b 7a db eb a8 |Ai~.t.J..UH[z...| +00000040 e6 a2 0f e1 5c 24 |....\$|" +"2019-09-24 01:04:34.909 UTC [cauthdsl] func2 -> DEBU b7c 0xc003ac5970 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.909 UTC [cauthdsl] func1 -> DEBU b7d 0xc003ac5970 gate 1569287074907552800 evaluation succeeds" +"2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b80 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.910 UTC [policies] Evaluate -> DEBU b81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.911 UTC [gossip.discovery] handleAliveMessage -> DEBU b82 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.911 UTC [gossip.discovery] handleAliveMessage -> DEBU b83 endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1569287058832472100, 20 but got ts: inc_num:1569287058832472100 seq_num:19 " +"2019-09-24 01:04:34.912 UTC [gossip.discovery] handleAliveMessage -> DEBU b84 Exiting" +"2019-09-24 01:04:34.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU b85 Exiting" +"2019-09-24 01:04:34.912 UTC [gossip.gossip] handleMessage -> DEBU b86 Exiting" +"2019-09-24 01:04:34.912 UTC [gossip.gossip] handleMessage -> DEBU b87 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.912 UTC [gossip.pull] HandleMessage -> DEBU b88 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.913 UTC [msp] DeserializeIdentity -> DEBU b89 Obtaining identity" +"2019-09-24 01:04:34.913 UTC [msp] DeserializeIdentity -> DEBU b8a Obtaining identity" +"2019-09-24 01:04:34.913 UTC [gossip.pull] SendDigest -> DEBU b8b Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:34.913 UTC [gossip.gossip] handleMessage -> DEBU b8c Exiting" +"2019-09-24 01:04:34.913 UTC [gossip.gossip] handleMessage -> DEBU b8d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU b8e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b8f Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:34.915 UTC [msp.identity] Verify -> DEBU b90 Verify: digest = 00000000 b3 ff d4 e2 b9 55 73 78 4a d8 75 93 56 58 80 a1 |.....UsxJ.u.VX..| +00000010 80 9f d0 4a c8 d5 d1 40 f1 df 75 c4 d4 fd 9c b5 |...J...@..u.....|" +"2019-09-24 01:04:34.915 UTC [msp.identity] Verify -> DEBU b91 Verify: sig = 00000000 30 44 02 20 06 6c 3a 1c 6b b5 2e 84 77 3e 3b 4b |0D. .l:.k...w>;K| +00000010 b3 c1 76 e4 af fe fd 94 b2 0b 75 a9 77 91 c6 1e |..v.......u.w...| +00000020 91 04 d7 f1 02 20 1f d7 3b 6b a2 12 cf f8 7d ed |..... ..;k....}.| +00000030 bb 54 bc b7 32 32 36 7c 9d 6a 2c 79 4b 27 2c c6 |.T..226|.j,yK',.| +00000040 79 c3 07 f6 f3 46 |y....F|" +"2019-09-24 01:04:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU b92 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.916 UTC [gossip.discovery] isSentByMe -> DEBU b93 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU b94 Exiting" +"2019-09-24 01:04:34.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU b95 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:34.916 UTC [msp] DeserializeIdentity -> DEBU b96 Obtaining identity" +"2019-09-24 01:04:34.916 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU b97 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b98 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU b99 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.918 UTC [policies] Evaluate -> DEBU b9c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.918 UTC [cauthdsl] func1 -> DEBU b9d 0xc003afe100 gate 1569287074918653100 evaluation starts" +"2019-09-24 01:04:34.918 UTC [cauthdsl] func2 -> DEBU b9e 0xc003afe100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.918 UTC [cauthdsl] func2 -> DEBU b9f 0xc003afe100 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.919 UTC [cauthdsl] func2 -> DEBU ba0 0xc003afe100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.919 UTC [cauthdsl] func2 -> DEBU ba1 0xc003afe100 principal evaluation fails" +"2019-09-24 01:04:34.919 UTC [cauthdsl] func1 -> DEBU ba2 0xc003afe100 gate 1569287074918653100 evaluation fails" +"2019-09-24 01:04:34.919 UTC [policies] Evaluate -> DEBU ba3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.920 UTC [policies] Evaluate -> DEBU ba4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.920 UTC [policies] Evaluate -> DEBU ba5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.920 UTC [cauthdsl] func1 -> DEBU ba6 0xc003afe940 gate 1569287074920736900 evaluation starts" +"2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba7 0xc003afe940 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba8 0xc003afe940 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.921 UTC [cauthdsl] func2 -> DEBU ba9 0xc003afe940 principal matched by identity 0" +"2019-09-24 01:04:34.921 UTC [msp.identity] Verify -> DEBU baa Verify: digest = 00000000 51 23 76 90 e1 af 05 0b 8c df ec b8 0e 58 12 37 |Q#v..........X.7| +00000010 b3 03 8f 9b ef da 31 e9 83 17 da 4f c2 2f a0 14 |......1....O./..|" +"2019-09-24 01:04:34.922 UTC [msp.identity] Verify -> DEBU bab Verify: sig = 00000000 30 45 02 21 00 df 80 f5 b1 49 64 5a d7 37 6f 12 |0E.!.....IdZ.7o.| +00000010 7e 77 bf 10 49 19 cc 4f 1e 5c da dc 5e 23 37 9c |~w..I..O.\..^#7.| +00000020 57 af 03 b3 d4 02 20 01 7b 84 25 8a ff 66 10 d6 |W..... .{.%..f..| +00000030 7a c1 3e ea 7b ef 0c bc 0e bf 03 0c d8 71 ac 2a |z.>.{........q.*| +00000040 da 7f 0c bd ed 58 08 |.....X.|" +"2019-09-24 01:04:34.922 UTC [cauthdsl] func2 -> DEBU bac 0xc003afe940 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.923 UTC [cauthdsl] func1 -> DEBU bad 0xc003afe940 gate 1569287074920736900 evaluation succeeds" +"2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bae Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU baf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bb0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.923 UTC [policies] Evaluate -> DEBU bb1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.924 UTC [gossip.discovery] handleAliveMessage -> DEBU bb2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.924 UTC [gossip.discovery] handleAliveMessage -> DEBU bb3 Exiting" +"2019-09-24 01:04:34.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bb4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:34.924 UTC [msp.identity] Verify -> DEBU bb5 Verify: digest = 00000000 66 b7 d1 2a ca 9e d0 48 4a f7 41 09 ac cd 33 4b |f..*...HJ.A...3K| +00000010 93 28 83 9d 7e f1 a4 4e 18 20 12 19 b4 a7 c4 74 |.(..~..N. .....t|" +"2019-09-24 01:04:34.925 UTC [msp.identity] Verify -> DEBU bb6 Verify: sig = 00000000 30 44 02 20 1b e1 e8 46 f8 d0 8d 07 57 e9 21 44 |0D. ...F....W.!D| +00000010 a4 05 a7 df 5b de 36 61 55 3f 2e c0 a4 4f f2 11 |....[.6aU?...O..| +00000020 c5 f1 e1 cb 02 20 47 7c b6 1f 71 e5 a7 a2 7d 6f |..... G|..q...}o| +00000030 9a a2 28 85 d1 7d b1 d8 04 12 87 a8 8c 72 14 ce |..(..}.......r..| +00000040 13 c1 2c 2a 34 f1 |..,*4.|" +"2019-09-24 01:04:34.925 UTC [gossip.discovery] handleAliveMessage -> DEBU bb7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:34.925 UTC [gossip.discovery] handleAliveMessage -> DEBU bb8 Exiting" +"2019-09-24 01:04:34.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU bb9 Exiting" +"2019-09-24 01:04:34.925 UTC [gossip.gossip] handleMessage -> DEBU bba Exiting" +"2019-09-24 01:04:34.926 UTC [gossip.discovery] handleMsgFromComm -> DEBU bbb Got message: GossipMessage: tag:EMPTY mem_req:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU bbc Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:34.926 UTC [msp] DeserializeIdentity -> DEBU bbd Obtaining identity" +"2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bbe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bbf Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.926 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bc0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:34.926 UTC [policies] Evaluate -> DEBU bc1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:34.927 UTC [policies] Evaluate -> DEBU bc2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:34.928 UTC [policies] Evaluate -> DEBU bc3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:34.928 UTC [cauthdsl] func1 -> DEBU bc4 0xc003b12ed0 gate 1569287074928085400 evaluation starts" +"2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc5 0xc003b12ed0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc6 0xc003b12ed0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc7 0xc003b12ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:34.928 UTC [cauthdsl] func2 -> DEBU bc8 0xc003b12ed0 principal evaluation fails" +"2019-09-24 01:04:34.929 UTC [cauthdsl] func1 -> DEBU bc9 0xc003b12ed0 gate 1569287074928085400 evaluation fails" +"2019-09-24 01:04:34.929 UTC [policies] Evaluate -> DEBU bca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.929 UTC [policies] Evaluate -> DEBU bcb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:34.930 UTC [policies] Evaluate -> DEBU bcc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:34.930 UTC [cauthdsl] func1 -> DEBU bcd 0xc003b13710 gate 1569287074930536500 evaluation starts" +"2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bce 0xc003b13710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bcf 0xc003b13710 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:34.930 UTC [cauthdsl] func2 -> DEBU bd0 0xc003b13710 principal matched by identity 0" +"2019-09-24 01:04:34.930 UTC [msp.identity] Verify -> DEBU bd1 Verify: digest = 00000000 fd 3e 8c 90 dc df 7e c8 5c 9d 06 db 15 ff 9c 5d |.>....~.\......]| +00000010 44 03 81 05 ef 82 91 79 72 df 45 b8 ab c2 0a 0c |D......yr.E.....|" +"2019-09-24 01:04:34.931 UTC [msp.identity] Verify -> DEBU bd2 Verify: sig = 00000000 30 45 02 21 00 de e4 df c5 fe d3 80 6e a5 19 e5 |0E.!........n...| +00000010 d4 db 09 b5 6b 31 ea 77 d1 af fc 9f 0a 60 d9 e5 |....k1.w.....`..| +00000020 92 ba e1 e5 22 02 20 72 a8 3e a2 b7 1a 09 97 96 |....". r.>......| +00000030 dc b1 83 96 78 5e 80 45 7b 32 ba a1 78 75 e2 d4 |....x^.E{2..xu..| +00000040 15 e8 af 3d fe 72 3e |...=.r>|" +"2019-09-24 01:04:34.931 UTC [cauthdsl] func2 -> DEBU bd3 0xc003b13710 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:34.931 UTC [cauthdsl] func1 -> DEBU bd4 0xc003b13710 gate 1569287074930536500 evaluation succeeds" +"2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:34.931 UTC [policies] Evaluate -> DEBU bd8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU bd9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bda Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bdb updating membership: timestamp: " +"2019-09-24 01:04:34.932 UTC [gossip.discovery] learnExistingMembers -> DEBU bdc Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:34.933 UTC [gossip.discovery] learnExistingMembers -> DEBU bdd Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:34.933 UTC [gossip.discovery] learnExistingMembers -> DEBU bde Exiting" +"2019-09-24 01:04:34.933 UTC [gossip.discovery] handleAliveMessage -> DEBU bdf Exiting" +"2019-09-24 01:04:34.933 UTC [gossip.discovery] sendMemResponse -> DEBU be0 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:34.933 UTC [msp] DeserializeIdentity -> DEBU be1 Obtaining identity" +"2019-09-24 01:04:34.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU be2 Exiting" +"2019-09-24 01:04:34.934 UTC [msp] DeserializeIdentity -> DEBU be3 Obtaining identity" +"2019-09-24 01:04:34.935 UTC [msp] DeserializeIdentity -> DEBU be4 Obtaining identity" +"2019-09-24 01:04:34.935 UTC [gossip.comm] Send -> DEBU be5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:34.935 UTC [gossip.comm] sendToEndpoint -> DEBU be6 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:34.935 UTC [gossip.comm] sendToEndpoint -> DEBU be7 Exiting" +"2019-09-24 01:04:34.935 UTC [gossip.discovery] sendMemResponse -> DEBU be8 Exiting, replying with alive: alive:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > alive:\352{\357\014\274\016\277\003\014\330q\254*\332\177\014\275\355X\010" > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:35.724 UTC [gossip.channel] reportMembershipChanges -> INFO be9 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +"2019-09-24 01:04:35.841 UTC [gossip.comm] func1 -> DEBU bea Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.842 UTC [gossip.gossip] handleMessage -> DEBU beb Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.843 UTC [gossip.pull] HandleMessage -> DEBU bec GossipMessage: tag:EMPTY data_req: , Envelope: 84 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.843 UTC [msp] DeserializeIdentity -> DEBU bed Obtaining identity" +"2019-09-24 01:04:35.844 UTC [msp] DeserializeIdentity -> DEBU bee Obtaining identity" +"2019-09-24 01:04:35.844 UTC [gossip.gossip] handleMessage -> DEBU bef Exiting" +"2019-09-24 01:04:35.845 UTC [gossip.pull] SendRes -> DEBU bf0 Sending 2 IDENTITY_MSG items to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:35.877 UTC [gossip.pull] SendReq -> DEBU bf1 Sending [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to peer0.org2.example.com:7051" +"2019-09-24 01:04:35.877 UTC [gossip.comm] Send -> DEBU bf2 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:35.877 UTC [gossip.pull] SendReq -> DEBU bf3 Sending [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to peer1.org2.example.com:7051" +"2019-09-24 01:04:35.877 UTC [gossip.comm] Send -> DEBU bf4 Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU bf5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.879 UTC [gossip.comm] sendToEndpoint -> DEBU bf6 Exiting" +"2019-09-24 01:04:35.878 UTC [gossip.comm] sendToEndpoint -> DEBU bf7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.881 UTC [gossip.comm] func1 -> DEBU bf9 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.881 UTC [gossip.gossip] handleMessage -> DEBU bfa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.882 UTC [msp] DeserializeIdentity -> DEBU bfb Obtaining identity" +"2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU bfc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:35.883 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU bfe Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:35.883 UTC [policies] Evaluate -> DEBU bff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:35.883 UTC [policies] Evaluate -> DEBU c00 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:35.884 UTC [policies] Evaluate -> DEBU c01 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:35.884 UTC [cauthdsl] func1 -> DEBU c02 0xc003b8ca30 gate 1569287075884618300 evaluation starts" +"2019-09-24 01:04:35.885 UTC [cauthdsl] func2 -> DEBU c03 0xc003b8ca30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:35.885 UTC [cauthdsl] func2 -> DEBU c04 0xc003b8ca30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:35.886 UTC [cauthdsl] func2 -> DEBU c05 0xc003b8ca30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:35.886 UTC [cauthdsl] func2 -> DEBU c06 0xc003b8ca30 principal evaluation fails" +"2019-09-24 01:04:35.886 UTC [cauthdsl] func1 -> DEBU c07 0xc003b8ca30 gate 1569287075884618300 evaluation fails" +"2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c08 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c09 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:35.887 UTC [policies] Evaluate -> DEBU c0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:35.887 UTC [cauthdsl] func1 -> DEBU c0b 0xc003b8d270 gate 1569287075887439700 evaluation starts" +"2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0c 0xc003b8d270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0d 0xc003b8d270 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:35.887 UTC [cauthdsl] func2 -> DEBU c0e 0xc003b8d270 principal matched by identity 0" +"2019-09-24 01:04:35.888 UTC [msp.identity] Verify -> DEBU c0f Verify: digest = 00000000 85 10 04 b5 a3 2a 10 1a 4d 56 66 c4 f3 70 0f 31 |.....*..MVf..p.1| +00000010 c8 d0 a3 ab a5 ba 00 36 67 eb 56 a7 61 c6 4b ea |.......6g.V.a.K.|" +"2019-09-24 01:04:35.888 UTC [msp.identity] Verify -> DEBU c10 Verify: sig = 00000000 30 45 02 21 00 fc 8e 7e bf 44 ff a8 33 57 cb 99 |0E.!...~.D..3W..| +00000010 77 90 d1 e2 9b 7f ae a7 d6 0e fc f7 6a 1c 7d 8e |w...........j.}.| +00000020 3f 8c cd 2c 4c 02 20 29 b0 0a bb 5c 0f bb ed 5b |?..,L. )...\...[| +00000030 92 15 a2 82 b9 c9 88 9c 81 60 5c 25 da 4f 3d 3d |.........`\%.O==| +00000040 75 2f bb 98 61 05 0e |u/..a..|" +"2019-09-24 01:04:35.889 UTC [cauthdsl] func2 -> DEBU c11 0xc003b8d270 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:35.889 UTC [cauthdsl] func1 -> DEBU c12 0xc003b8d270 gate 1569287075887439700 evaluation succeeds" +"2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c13 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c15 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:35.889 UTC [policies] Evaluate -> DEBU c16 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:35.889 UTC [msp] DeserializeIdentity -> DEBU c17 Obtaining identity" +"2019-09-24 01:04:35.890 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.890 UTC [gossip.pull] HandleMessage -> DEBU c19 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 4185021296583882768, Envelope: 961 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.891 UTC [msp] DeserializeIdentity -> DEBU c1a Obtaining identity" +"2019-09-24 01:04:35.891 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c1b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.891 UTC [msp] DeserializeIdentity -> DEBU c1c Obtaining identity" +"2019-09-24 01:04:35.879 UTC [gossip.comm] sendToEndpoint -> DEBU bf8 Exiting" +"2019-09-24 01:04:35.893 UTC [gossip.comm] func1 -> DEBU c1d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.894 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.894 UTC [gossip.gossip] func2 -> DEBU c1f Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 102 105 102 67 76 119 72 51 110 66 114 75 72 80 115 121 82 75 78 70 68 122 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 68 114 77 122 71 105 79 121 106 104 83 43 10 86 87 101 43 84 47 56 79 89 105 102 75 110 75 84 118 102 73 102 51 105 119 75 89 106 75 104 108 49 103 67 101 87 86 90 110 72 89 75 79 80 98 85 117 73 80 116 55 97 77 54 120 76 57 51 121 117 118 120 111 77 100 51 105 10 65 74 107 80 83 55 111 100 50 54 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 106 109 117 86 48 72 47 102 89 48 51 75 88 52 104 118 122 110 110 104 81 90 85 73 78 119 100 100 52 48 48 105 100 73 71 100 100 99 76 77 116 78 81 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 78 99 113 85 43 110 112 50 85 104 57 119 109 103 79 55 54 88 69 50 107 121 71 49 110 56 111 112 114 102 82 106 68 51 66 119 53 49 103 87 74 118 116 65 105 66 114 85 71 57 103 10 70 114 97 73 49 57 49 78 114 113 122 53 108 98 99 65 98 112 107 84 43 74 83 116 84 80 113 55 54 79 120 69 111 43 81 56 110 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 01:04:35.894 UTC [gossip.pull] HandleMessage -> DEBU c20 Added *g��kҚ�-���$6��[�@p�@�NP3�� to the in memory item map, total items: 3" +"2019-09-24 01:04:35.895 UTC [gossip.gossip] handleMessage -> DEBU c21 Exiting" +"2019-09-24 01:04:35.895 UTC [gossip.gossip] handleMessage -> DEBU c22 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.896 UTC [msp] DeserializeIdentity -> DEBU c23 Obtaining identity" +"2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c25 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:35.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c26 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:35.896 UTC [policies] Evaluate -> DEBU c27 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:35.897 UTC [policies] Evaluate -> DEBU c28 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:35.897 UTC [policies] Evaluate -> DEBU c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:35.897 UTC [cauthdsl] func1 -> DEBU c2a 0xc003bbc370 gate 1569287075897223600 evaluation starts" +"2019-09-24 01:04:35.897 UTC [cauthdsl] func2 -> DEBU c2b 0xc003bbc370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:35.897 UTC [cauthdsl] func2 -> DEBU c2c 0xc003bbc370 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:35.899 UTC [cauthdsl] func2 -> DEBU c2d 0xc003bbc370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:35.899 UTC [cauthdsl] func2 -> DEBU c2e 0xc003bbc370 principal evaluation fails" +"2019-09-24 01:04:35.899 UTC [cauthdsl] func1 -> DEBU c2f 0xc003bbc370 gate 1569287075897223600 evaluation fails" +"2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:35.900 UTC [policies] Evaluate -> DEBU c32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:35.900 UTC [cauthdsl] func1 -> DEBU c33 0xc003bbcbb0 gate 1569287075900660500 evaluation starts" +"2019-09-24 01:04:35.901 UTC [cauthdsl] func2 -> DEBU c34 0xc003bbcbb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:35.901 UTC [cauthdsl] func2 -> DEBU c35 0xc003bbcbb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:35.904 UTC [gossip.comm] func1 -> DEBU c36 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.905 UTC [cauthdsl] func2 -> DEBU c37 0xc003bbcbb0 principal matched by identity 0" +"2019-09-24 01:04:35.905 UTC [msp.identity] Verify -> DEBU c38 Verify: digest = 00000000 1a c7 07 b8 a6 e2 3f 6d 3f 52 f9 11 5e c4 ac a3 |......?m?R..^...| +00000010 86 a0 13 5c 24 43 f8 af dc db 79 58 90 84 d9 fe |...\$C....yX....|" +"2019-09-24 01:04:35.905 UTC [msp.identity] Verify -> DEBU c39 Verify: sig = 00000000 30 45 02 21 00 e4 04 6b 40 f6 68 d3 10 64 6b c5 |0E.!...k@.h..dk.| +00000010 08 f1 62 89 36 6d 5b 06 a5 03 37 61 43 ab 11 4a |..b.6m[...7aC..J| +00000020 53 a2 ed 9b 42 02 20 6f 4b 06 f8 80 ee 24 4c 61 |S...B. oK....$La| +00000030 52 d0 71 e0 43 47 2f 2f 92 86 90 1e 65 74 63 4e |R.q.CG//....etcN| +00000040 7f b9 72 2c 11 b2 76 |..r,..v|" +"2019-09-24 01:04:35.906 UTC [cauthdsl] func2 -> DEBU c3a 0xc003bbcbb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:35.907 UTC [cauthdsl] func1 -> DEBU c3b 0xc003bbcbb0 gate 1569287075900660500 evaluation succeeds" +"2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:35.907 UTC [policies] Evaluate -> DEBU c3e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:35.908 UTC [policies] Evaluate -> DEBU c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:35.908 UTC [msp] DeserializeIdentity -> DEBU c40 Obtaining identity" +"2019-09-24 01:04:35.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c41 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.909 UTC [gossip.pull] HandleMessage -> DEBU c42 GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 12949700336474127650, Envelope: 962 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.909 UTC [msp] DeserializeIdentity -> DEBU c43 Obtaining identity" +"2019-09-24 01:04:35.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c44 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.910 UTC [msp] DeserializeIdentity -> DEBU c45 Obtaining identity" +"2019-09-24 01:04:35.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c46 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:35.911 UTC [gossip.gossip] func2 -> DEBU c47 Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 78 102 48 116 47 73 97 110 78 52 83 84 110 47 74 99 90 52 75 86 99 56 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 84 107 119 79 84 73 48 77 68 65 49 79 84 65 119 87 104 99 78 77 106 107 119 79 84 73 120 77 68 65 49 79 84 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 69 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 65 116 51 73 56 50 72 52 50 66 114 10 83 47 52 109 68 69 103 111 73 71 49 115 86 86 97 73 72 82 48 116 47 99 110 53 113 106 50 115 57 116 72 70 108 88 49 88 114 103 112 53 121 72 119 55 110 90 107 73 103 66 105 70 114 50 87 110 87 119 49 83 84 73 106 56 10 100 118 106 105 53 101 122 47 100 98 43 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 73 53 114 108 100 66 47 51 50 78 78 121 108 43 73 98 56 53 53 52 85 71 86 67 68 99 72 88 101 78 78 73 110 83 66 110 88 88 67 122 76 84 85 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 70 50 121 56 69 87 104 49 79 118 69 99 101 121 84 68 71 71 70 114 100 78 119 47 118 106 49 65 86 51 52 105 82 76 57 102 66 57 78 80 72 57 55 65 105 65 52 70 89 114 81 10 115 122 57 106 106 56 74 50 69 111 118 79 121 111 49 113 118 84 73 107 97 113 82 109 89 116 67 120 86 114 101 105 52 73 87 43 105 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10]" +"2019-09-24 01:04:35.911 UTC [gossip.pull] HandleMessage -> DEBU c48 Added A^���g�� +����U���ʒ�:+��aSpq� to the in memory item map, total items: 4" +"2019-09-24 01:04:35.911 UTC [gossip.gossip] handleMessage -> DEBU c49 Exiting" +"2019-09-24 01:04:35.912 UTC [gossip.gossip] handleMessage -> DEBU c4a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.912 UTC [gossip.pull] HandleMessage -> DEBU c4b GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:04:35.912 UTC [msp] DeserializeIdentity -> DEBU c4c Obtaining identity" +"2019-09-24 01:04:35.913 UTC [gossip.gossip] handleMessage -> DEBU c4d Exiting" +"2019-09-24 01:04:35.913 UTC [gossip.pull] SendRes -> DEBU c4e Sending 1 IDENTITY_MSG items to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:36.764 UTC [gossip.election] waitForInterrupt -> DEBU c4f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:36.764 UTC [gossip.election] IsLeader -> DEBU c50 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:36.764 UTC [msp] GetDefaultSigningIdentity -> DEBU c51 Obtaining default signing identity" +"2019-09-24 01:04:36.765 UTC [msp.identity] Sign -> DEBU c52 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510031801 " +"2019-09-24 01:04:36.766 UTC [msp.identity] Sign -> DEBU c53 Sign: digest: B3E6CFE82E06216C9C29B448C5AFB300A6718DDA59234FD65C4647954F4C8B5E " +"2019-09-24 01:04:36.767 UTC [gossip.election] waitForInterrupt -> DEBU c54 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:36.774 UTC [msp] DeserializeIdentity -> DEBU c55 Obtaining identity" +"2019-09-24 01:04:36.774 UTC [msp] DeserializeIdentity -> DEBU c56 Obtaining identity" +"2019-09-24 01:04:36.775 UTC [gossip.comm] Send -> DEBU c57 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:36.775 UTC [msp] DeserializeIdentity -> DEBU c58 Obtaining identity" +"2019-09-24 01:04:36.775 UTC [msp] DeserializeIdentity -> DEBU c59 Obtaining identity" +"2019-09-24 01:04:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU c5a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:04:36.776 UTC [gossip.comm] sendToEndpoint -> DEBU c5b Exiting" +"2019-09-24 01:04:37.724 UTC [msp] DeserializeIdentity -> DEBU c5c Obtaining identity" +"2019-09-24 01:04:37.725 UTC [msp] DeserializeIdentity -> DEBU c5d Obtaining identity" +"2019-09-24 01:04:37.725 UTC [gossip.comm] Send -> DEBU c5e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c5f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c61 Exiting" +"2019-09-24 01:04:37.727 UTC [gossip.comm] sendToEndpoint -> DEBU c62 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.727 UTC [gossip.comm] sendToEndpoint -> DEBU c63 Exiting" +"2019-09-24 01:04:37.728 UTC [gossip.comm] func1 -> DEBU c64 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.728 UTC [gossip.gossip] handleMessage -> DEBU c65 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.728 UTC [msp] DeserializeIdentity -> DEBU c66 Obtaining identity" +"2019-09-24 01:04:37.729 UTC [msp] DeserializeIdentity -> DEBU c67 Obtaining identity" +"2019-09-24 01:04:37.729 UTC [msp] DeserializeIdentity -> DEBU c68 Obtaining identity" +"2019-09-24 01:04:37.726 UTC [gossip.comm] sendToEndpoint -> DEBU c60 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.731 UTC [gossip.comm] sendToEndpoint -> DEBU c6a Exiting" +"2019-09-24 01:04:37.730 UTC [gossip.comm] func1 -> DEBU c69 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c6b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:37.733 UTC [gossip.comm] func1 -> DEBU c6d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.732 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c6e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.734 UTC [policies] Evaluate -> DEBU c6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.734 UTC [policies] Evaluate -> DEBU c70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.735 UTC [policies] Evaluate -> DEBU c71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.735 UTC [cauthdsl] func1 -> DEBU c72 0xc003bf7070 gate 1569287077735338400 evaluation starts" +"2019-09-24 01:04:37.735 UTC [cauthdsl] func2 -> DEBU c73 0xc003bf7070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.735 UTC [cauthdsl] func2 -> DEBU c74 0xc003bf7070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.736 UTC [cauthdsl] func2 -> DEBU c75 0xc003bf7070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.736 UTC [cauthdsl] func2 -> DEBU c76 0xc003bf7070 principal evaluation fails" +"2019-09-24 01:04:37.737 UTC [cauthdsl] func1 -> DEBU c77 0xc003bf7070 gate 1569287077735338400 evaluation fails" +"2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.737 UTC [policies] Evaluate -> DEBU c7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.738 UTC [cauthdsl] func1 -> DEBU c7b 0xc003bf78b0 gate 1569287077738153600 evaluation starts" +"2019-09-24 01:04:37.738 UTC [cauthdsl] func2 -> DEBU c7c 0xc003bf78b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.738 UTC [cauthdsl] func2 -> DEBU c7d 0xc003bf78b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.739 UTC [cauthdsl] func2 -> DEBU c7e 0xc003bf78b0 principal matched by identity 0" +"2019-09-24 01:04:37.739 UTC [msp.identity] Verify -> DEBU c7f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:37.740 UTC [msp.identity] Verify -> DEBU c80 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:37.741 UTC [cauthdsl] func2 -> DEBU c81 0xc003bf78b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.741 UTC [cauthdsl] func1 -> DEBU c82 0xc003bf78b0 gate 1569287077738153600 evaluation succeeds" +"2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c85 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.742 UTC [policies] Evaluate -> DEBU c86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.743 UTC [msp.identity] Verify -> DEBU c87 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:37.743 UTC [msp.identity] Verify -> DEBU c88 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:37.743 UTC [msp] DeserializeIdentity -> DEBU c89 Obtaining identity" +"2019-09-24 01:04:37.743 UTC [msp] DeserializeIdentity -> DEBU c8a Obtaining identity" +"2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU c8b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c8c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU c8d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.745 UTC [policies] Evaluate -> DEBU c8e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.745 UTC [policies] Evaluate -> DEBU c8f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.749 UTC [policies] Evaluate -> DEBU c90 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.750 UTC [cauthdsl] func1 -> DEBU c91 0xc003c117a0 gate 1569287077750443800 evaluation starts" +"2019-09-24 01:04:37.750 UTC [cauthdsl] func2 -> DEBU c92 0xc003c117a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.750 UTC [cauthdsl] func2 -> DEBU c93 0xc003c117a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.751 UTC [cauthdsl] func2 -> DEBU c94 0xc003c117a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.751 UTC [cauthdsl] func2 -> DEBU c95 0xc003c117a0 principal evaluation fails" +"2019-09-24 01:04:37.751 UTC [cauthdsl] func1 -> DEBU c96 0xc003c117a0 gate 1569287077750443800 evaluation fails" +"2019-09-24 01:04:37.751 UTC [policies] Evaluate -> DEBU c97 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.751 UTC [policies] Evaluate -> DEBU c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.752 UTC [policies] Evaluate -> DEBU c99 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.752 UTC [cauthdsl] func1 -> DEBU c9a 0xc003c11fe0 gate 1569287077752773200 evaluation starts" +"2019-09-24 01:04:37.753 UTC [msp] DeserializeIdentity -> DEBU c9c Obtaining identity" +"2019-09-24 01:04:37.753 UTC [gossip.pull] Hello -> DEBU c9d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:37.753 UTC [cauthdsl] func2 -> DEBU c9b 0xc003c11fe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.753 UTC [cauthdsl] func2 -> DEBU c9f 0xc003c11fe0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.753 UTC [msp] DeserializeIdentity -> DEBU c9e Obtaining identity" +"2019-09-24 01:04:37.754 UTC [gossip.comm] Send -> DEBU ca0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:37.755 UTC [gossip.comm] sendToEndpoint -> DEBU ca1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.755 UTC [gossip.comm] sendToEndpoint -> DEBU ca2 Exiting" +"2019-09-24 01:04:37.756 UTC [gossip.comm] func1 -> DEBU ca3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.754 UTC [cauthdsl] func2 -> DEBU ca4 0xc003c11fe0 principal matched by identity 0" +"2019-09-24 01:04:37.757 UTC [msp.identity] Verify -> DEBU ca5 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:37.758 UTC [msp.identity] Verify -> DEBU ca6 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:37.758 UTC [cauthdsl] func2 -> DEBU ca7 0xc003c11fe0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.758 UTC [cauthdsl] func1 -> DEBU ca8 0xc003c11fe0 gate 1569287077752773200 evaluation succeeds" +"2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU ca9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.759 UTC [policies] Evaluate -> DEBU cab Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.760 UTC [policies] Evaluate -> DEBU cac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.760 UTC [msp] DeserializeIdentity -> DEBU cad Obtaining identity" +"2019-09-24 01:04:37.760 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cae Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.761 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU caf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.761 UTC [policies] Evaluate -> DEBU cb0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.762 UTC [policies] Evaluate -> DEBU cb1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.762 UTC [policies] Evaluate -> DEBU cb2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.764 UTC [cauthdsl] func1 -> DEBU cb3 0xc003c270c0 gate 1569287077764958000 evaluation starts" +"2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb4 0xc003c270c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb5 0xc003c270c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb6 0xc003c270c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.765 UTC [cauthdsl] func2 -> DEBU cb7 0xc003c270c0 principal evaluation fails" +"2019-09-24 01:04:37.765 UTC [cauthdsl] func1 -> DEBU cb8 0xc003c270c0 gate 1569287077764958000 evaluation fails" +"2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cb9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.766 UTC [policies] Evaluate -> DEBU cbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.766 UTC [cauthdsl] func1 -> DEBU cbc 0xc003c27900 gate 1569287077766575400 evaluation starts" +"2019-09-24 01:04:37.766 UTC [cauthdsl] func2 -> DEBU cbd 0xc003c27900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.766 UTC [cauthdsl] func2 -> DEBU cbe 0xc003c27900 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.767 UTC [cauthdsl] func2 -> DEBU cbf 0xc003c27900 principal matched by identity 0" +"2019-09-24 01:04:37.767 UTC [msp.identity] Verify -> DEBU cc0 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:37.767 UTC [msp.identity] Verify -> DEBU cc1 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:37.767 UTC [cauthdsl] func2 -> DEBU cc2 0xc003c27900 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.768 UTC [cauthdsl] func1 -> DEBU cc3 0xc003c27900 gate 1569287077766575400 evaluation succeeds" +"2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.768 UTC [policies] Evaluate -> DEBU cc7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.768 UTC [gossip.gossip] handleMessage -> DEBU cc8 Exiting" +"2019-09-24 01:04:37.769 UTC [gossip.gossip] handleMessage -> DEBU cc9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU cca Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU ccb Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:37.769 UTC [msp.identity] Verify -> DEBU ccc Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:37.770 UTC [msp.identity] Verify -> DEBU ccd Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:37.770 UTC [msp] DeserializeIdentity -> DEBU cce Obtaining identity" +"2019-09-24 01:04:37.770 UTC [msp] DeserializeIdentity -> DEBU ccf Obtaining identity" +"2019-09-24 01:04:37.770 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cd0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:37.770 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.771 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cd2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.771 UTC [policies] Evaluate -> DEBU cd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func1 -> DEBU cd6 0xc003c56150 gate 1569287077771458800 evaluation starts" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd7 0xc003c56150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd8 0xc003c56150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cd9 0xc003c56150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func2 -> DEBU cda 0xc003c56150 principal evaluation fails" +"2019-09-24 01:04:37.771 UTC [cauthdsl] func1 -> DEBU cdb 0xc003c56150 gate 1569287077771458800 evaluation fails" +"2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cdc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cdd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.772 UTC [policies] Evaluate -> DEBU cde == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func1 -> DEBU cdf 0xc003c56990 gate 1569287077772241200 evaluation starts" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce0 0xc003c56990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce1 0xc003c56990 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce2 0xc003c56990 principal matched by identity 0" +"2019-09-24 01:04:37.772 UTC [msp.identity] Verify -> DEBU ce3 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:37.772 UTC [msp.identity] Verify -> DEBU ce4 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func2 -> DEBU ce5 0xc003c56990 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.772 UTC [cauthdsl] func1 -> DEBU ce6 0xc003c56990 gate 1569287077772241200 evaluation succeeds" +"2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU ce9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.773 UTC [policies] Evaluate -> DEBU cea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.773 UTC [gossip.gossip] handleMessage -> DEBU ceb Exiting" +"2019-09-24 01:04:37.773 UTC [gossip.gossip] handleMessage -> DEBU cec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU ced Obtaining identity" +"2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU cee Obtaining identity" +"2019-09-24 01:04:37.773 UTC [msp] DeserializeIdentity -> DEBU cef Obtaining identity" +"2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU cf0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.774 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU cf2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.774 UTC [policies] Evaluate -> DEBU cf5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func1 -> DEBU cf6 0xc003c704a0 gate 1569287077774564200 evaluation starts" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf7 0xc003c704a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf8 0xc003c704a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cf9 0xc003c704a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func2 -> DEBU cfa 0xc003c704a0 principal evaluation fails" +"2019-09-24 01:04:37.774 UTC [cauthdsl] func1 -> DEBU cfb 0xc003c704a0 gate 1569287077774564200 evaluation fails" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU cfe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func1 -> DEBU cff 0xc003c70ce0 gate 1569287077775197900 evaluation starts" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d00 0xc003c70ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d01 0xc003c70ce0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d02 0xc003c70ce0 principal matched by identity 0" +"2019-09-24 01:04:37.775 UTC [msp.identity] Verify -> DEBU d03 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:37.775 UTC [msp.identity] Verify -> DEBU d04 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func2 -> DEBU d05 0xc003c70ce0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.775 UTC [cauthdsl] func1 -> DEBU d06 0xc003c70ce0 gate 1569287077775197900 evaluation succeeds" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d09 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.775 UTC [policies] Evaluate -> DEBU d0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0d Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:37.776 UTC [msp.identity] Verify -> DEBU d0e Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:37.778 UTC [msp] DeserializeIdentity -> DEBU d0f Obtaining identity" +"2019-09-24 01:04:37.778 UTC [msp] DeserializeIdentity -> DEBU d10 Obtaining identity" +"2019-09-24 01:04:37.778 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU d11 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:37.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d12 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.779 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU d13 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d14 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d15 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:37.781 UTC [policies] Evaluate -> DEBU d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:37.781 UTC [cauthdsl] func1 -> DEBU d17 0xc003c8b2f0 gate 1569287077781763000 evaluation starts" +"2019-09-24 01:04:37.781 UTC [cauthdsl] func2 -> DEBU d18 0xc003c8b2f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.781 UTC [cauthdsl] func2 -> DEBU d19 0xc003c8b2f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d1a 0xc003c8b2f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d1b 0xc003c8b2f0 principal evaluation fails" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func1 -> DEBU d1c 0xc003c8b2f0 gate 1569287077781763000 evaluation fails" +"2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:37.782 UTC [policies] Evaluate -> DEBU d1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func1 -> DEBU d20 0xc003c8bb30 gate 1569287077782660200 evaluation starts" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d21 0xc003c8bb30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:37.782 UTC [cauthdsl] func2 -> DEBU d22 0xc003c8bb30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:37.783 UTC [cauthdsl] func2 -> DEBU d23 0xc003c8bb30 principal matched by identity 0" +"2019-09-24 01:04:37.783 UTC [msp.identity] Verify -> DEBU d24 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:37.783 UTC [msp.identity] Verify -> DEBU d25 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:37.783 UTC [cauthdsl] func2 -> DEBU d26 0xc003c8bb30 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:37.783 UTC [cauthdsl] func1 -> DEBU d27 0xc003c8bb30 gate 1569287077782660200 evaluation succeeds" +"2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d28 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d29 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d2a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:37.783 UTC [policies] Evaluate -> DEBU d2b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:37.783 UTC [gossip.gossip] handleMessage -> DEBU d2c Exiting" +"2019-09-24 01:04:37.784 UTC [gossip.gossip] handleMessage -> DEBU d2d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.784 UTC [gossip.pull] HandleMessage -> DEBU d2e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.784 UTC [gossip.gossip] handleMessage -> DEBU d2f Exiting" +"2019-09-24 01:04:37.908 UTC [gossip.comm] func1 -> DEBU d30 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.908 UTC [gossip.gossip] handleMessage -> DEBU d31 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.908 UTC [msp] DeserializeIdentity -> DEBU d32 Obtaining identity" +"2019-09-24 01:04:37.908 UTC [msp] DeserializeIdentity -> DEBU d33 Obtaining identity" +"2019-09-24 01:04:37.912 UTC [gossip.gossip] handleMessage -> DEBU d34 Exiting" +"2019-09-24 01:04:37.911 UTC [gossip.comm] func1 -> DEBU d35 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.912 UTC [gossip.gossip] handleMessage -> DEBU d36 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.912 UTC [gossip.pull] HandleMessage -> DEBU d37 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:37.913 UTC [gossip.pull] SendDigest -> DEBU d38 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:37.913 UTC [gossip.gossip] handleMessage -> DEBU d39 Exiting" +"2019-09-24 01:04:37.939 UTC [endorser] ProcessProposal -> DEBU d3a Entering: request from 172.18.0.5:49880" +"2019-09-24 01:04:37.940 UTC [protoutils] ValidateProposalMessage -> DEBU d3b ValidateProposalMessage starts for signed proposal 0xc003bd8fa0" +"2019-09-24 01:04:37.940 UTC [protoutils] validateChannelHeader -> DEBU d3c validateChannelHeader info: header type 3" +"2019-09-24 01:04:37.940 UTC [protoutils] checkSignatureFromCreator -> DEBU d3d begin" +"2019-09-24 01:04:37.940 UTC [protoutils] checkSignatureFromCreator -> DEBU d3e creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:04:37.941 UTC [protoutils] checkSignatureFromCreator -> DEBU d3f creator is valid" +"2019-09-24 01:04:37.941 UTC [msp.identity] Verify -> DEBU d40 Verify: digest = 00000000 b0 46 97 e2 65 cc 46 d3 04 af 46 68 c7 c6 e0 6f |.F..e.F...Fh...o| +00000010 30 08 9c 46 80 96 08 c4 49 77 99 45 21 aa bd a7 |0..F....Iw.E!...|" +"2019-09-24 01:04:37.941 UTC [msp.identity] Verify -> DEBU d41 Verify: sig = 00000000 30 45 02 21 00 ff 0f 01 b7 ee ca cd 1b a5 51 79 |0E.!..........Qy| +00000010 99 1a a7 1b 01 99 df 8b 32 8a 2b 44 c4 24 7b 97 |........2.+D.${.| +00000020 88 fa 86 5d 2b 02 20 4a b1 cd 65 8a 51 49 a7 b2 |...]+. J..e.QI..| +00000030 28 ba f6 9f c7 53 92 bf 3d c5 fc 16 b9 5c 7e 53 |(....S..=....\~S| +00000040 fd 92 39 0a c1 69 4b |..9..iK|" +"2019-09-24 01:04:37.942 UTC [protoutils] checkSignatureFromCreator -> DEBU d42 exits successfully" +"2019-09-24 01:04:37.942 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d43 validateChaincodeProposalMessage starts for proposal 0xc003bcc700, header 0xc003bd93b0" +"2019-09-24 01:04:37.942 UTC [protoutils] validateChaincodeProposalMessage -> DEBU d44 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:04:37.943 UTC [endorser] preProcess -> DEBU d45 [][14f7764f] processing txid: 14f7764f7f26cd3d980daaa9a6de4a1c189c1979344ba5ae869ac07971004d20" +"2019-09-24 01:04:37.943 UTC [endorser] SimulateProposal -> DEBU d46 [][14f7764f] Entry chaincode: name:"lscc" " +"2019-09-24 01:04:37.944 UTC [endorser] callChaincode -> INFO d47 [][14f7764f] Entry chaincode: name:"lscc" " +"2019-09-24 01:04:37.945 UTC [chaincode] Execute -> DEBU d48 Entry" +"2019-09-24 01:04:37.946 UTC [msp.identity] Verify -> DEBU d49 Verify: digest = 00000000 b0 46 97 e2 65 cc 46 d3 04 af 46 68 c7 c6 e0 6f |.F..e.F...Fh...o| +00000010 30 08 9c 46 80 96 08 c4 49 77 99 45 21 aa bd a7 |0..F....Iw.E!...|" +"2019-09-24 01:04:37.946 UTC [msp.identity] Verify -> DEBU d4a Verify: sig = 00000000 30 45 02 21 00 ff 0f 01 b7 ee ca cd 1b a5 51 79 |0E.!..........Qy| +00000010 99 1a a7 1b 01 99 df 8b 32 8a 2b 44 c4 24 7b 97 |........2.+D.${.| +00000020 88 fa 86 5d 2b 02 20 4a b1 cd 65 8a 51 49 a7 b2 |...]+. J..e.QI..| +00000030 28 ba f6 9f c7 53 92 bf 3d c5 fc 16 b9 5c 7e 53 |(....S..=....\~S| +00000040 fd 92 39 0a c1 69 4b |..9..iK|" +"2019-09-24 01:04:37.947 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU d4b Created metadata tar" +"2019-09-24 01:04:37.947 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d4c HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)}" +"2019-09-24 01:04:37.947 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d4d Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]" +"2019-09-24 01:04:37.947 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU d4e constructing new query executor txid = [150c43ed-76f4-45f2-bb0e-6e30f5b2029a]" +"2019-09-24 01:04:37.947 UTC [stateleveldb] GetState -> DEBU d4f GetState(). ns=lscc, key=exp02" +"2019-09-24 01:04:37.948 UTC [lockbasedtxmgr] Done -> DEBU d50 Done with transaction simulation / query execution [150c43ed-76f4-45f2-bb0e-6e30f5b2029a]" +"2019-09-24 01:04:37.948 UTC [cceventmgmt] HandleChaincodeInstall -> DEBU d51 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts." +"2019-09-24 01:04:37.948 UTC [lscc] executeInstall -> INFO d52 Installed Chaincode [exp02] Version [1.0] to peer" +"2019-09-24 01:04:37.948 UTC [chaincode] handleMessage -> DEBU d53 [14f7764f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:37.948 UTC [chaincode] Notify -> DEBU d54 [14f7764f] notifying Txid:14f7764f7f26cd3d980daaa9a6de4a1c189c1979344ba5ae869ac07971004d20, channelID:" +"2019-09-24 01:04:37.948 UTC [chaincode] Execute -> DEBU d55 Exit" +"2019-09-24 01:04:37.948 UTC [endorser] callChaincode -> INFO d56 [][14f7764f] Exit chaincode: name:"lscc" (4ms)" +"2019-09-24 01:04:37.948 UTC [endorser] SimulateProposal -> DEBU d57 [][14f7764f] Exit" +"2019-09-24 01:04:37.949 UTC [endorser] func1 -> DEBU d58 Exit: request from 172.18.0.5:49880" +"2019-09-24 01:04:37.949 UTC [comm.grpc.server] 1 -> INFO d59 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49880 grpc.code=OK grpc.call_duration=9.6897ms +"2019-09-24 01:04:37.953 UTC [grpc] infof -> DEBU d5a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:37.953 UTC [grpc] infof -> DEBU d5b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:04:38.110 UTC [gossip.comm] func1 -> DEBU d5c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.111 UTC [gossip.gossip] handleMessage -> DEBU d5d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d5e Obtaining identity" +"2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d5f Obtaining identity" +"2019-09-24 01:04:38.111 UTC [msp] DeserializeIdentity -> DEBU d60 Obtaining identity" +"2019-09-24 01:04:38.112 UTC [gossip.gossip] handleMessage -> DEBU d61 Exiting" +"2019-09-24 01:04:38.309 UTC [gossip.comm] func1 -> DEBU d62 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.309 UTC [gossip.gossip] handleMessage -> DEBU d63 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.309 UTC [msp] DeserializeIdentity -> DEBU d64 Obtaining identity" +"2019-09-24 01:04:38.310 UTC [msp] DeserializeIdentity -> DEBU d65 Obtaining identity" +"2019-09-24 01:04:38.310 UTC [msp] DeserializeIdentity -> DEBU d66 Obtaining identity" +"2019-09-24 01:04:38.310 UTC [gossip.gossip] handleMessage -> DEBU d67 Exiting" +"2019-09-24 01:04:38.527 UTC [gossip.comm] func1 -> DEBU d68 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.527 UTC [gossip.gossip] handleMessage -> DEBU d69 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.527 UTC [gossip.pull] HandleMessage -> DEBU d6a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.528 UTC [gossip.pull] SendDigest -> DEBU d6b Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:38.528 UTC [gossip.gossip] handleMessage -> DEBU d6c Exiting" +"2019-09-24 01:04:38.533 UTC [gossip.comm] func1 -> DEBU d6d Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.533 UTC [gossip.gossip] handleMessage -> DEBU d6e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.533 UTC [gossip.gossip] handleMessage -> DEBU d6f Exiting" +"2019-09-24 01:04:38.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU d70 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.534 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d71 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:38.534 UTC [msp.identity] Verify -> DEBU d72 Verify: digest = 00000000 ea fd 83 71 96 fe 7d 48 cd 92 1b bc bc 53 0b 44 |...q..}H.....S.D| +00000010 fd 0d 30 ee 82 2d f1 75 b4 b5 35 4d e0 12 c3 4f |..0..-.u..5M...O|" +"2019-09-24 01:04:38.534 UTC [msp.identity] Verify -> DEBU d73 Verify: sig = 00000000 30 45 02 21 00 d6 b9 3d d1 fc df bf 9b 25 d7 2e |0E.!...=.....%..| +00000010 89 40 34 a2 cf e8 7d 63 8d 42 4a 6c 4d cd b3 a5 |.@4...}c.BJlM...| +00000020 c1 52 55 7a bf 02 20 0d 1e 8c f5 e0 4f b3 cf 53 |.RUz.. .....O..S| +00000030 98 e0 9f 4b 6a c7 1f a2 84 59 5c 1d 3a 0a 48 3f |...Kj....Y\.:.H?| +00000040 73 82 75 95 bf ef 4e |s.u...N|" +"2019-09-24 01:04:38.535 UTC [msp.identity] Verify -> DEBU d74 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:38.535 UTC [msp.identity] Verify -> DEBU d75 Verify: sig = 00000000 30 44 02 20 02 75 a8 28 9b 16 c2 6c 0f 01 3a 98 |0D. .u.(...l..:.| +00000010 06 37 1e 67 2e 4e 6e 4a 3d 02 98 4b 5b d3 a9 bc |.7.g.NnJ=..K[...| +00000020 7e 75 cd 1f 02 20 60 12 d0 bd eb 8e 82 86 ed 66 |~u... `........f| +00000030 d6 1b 57 81 75 54 41 e6 30 f4 24 0c 74 bb 8e a7 |..W.uTA.0.$.t...| +00000040 c2 4c f3 b0 2f e1 |.L../.|" +"2019-09-24 01:04:38.536 UTC [gossip.discovery] handleAliveMessage -> DEBU d76 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d77 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d78 updating membership: timestamp: " +"2019-09-24 01:04:38.536 UTC [gossip.discovery] learnExistingMembers -> DEBU d79 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:38.537 UTC [gossip.discovery] learnExistingMembers -> DEBU d7a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:38.537 UTC [gossip.discovery] learnExistingMembers -> DEBU d7b Exiting" +"2019-09-24 01:04:38.537 UTC [gossip.discovery] handleAliveMessage -> DEBU d7c Exiting" +"2019-09-24 01:04:38.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU d7d Exiting" +"2019-09-24 01:04:38.537 UTC [gossip.discovery] sendMemResponse -> DEBU d7e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:38.538 UTC [msp] DeserializeIdentity -> DEBU d7f Obtaining identity" +"2019-09-24 01:04:38.538 UTC [msp] DeserializeIdentity -> DEBU d80 Obtaining identity" +"2019-09-24 01:04:38.538 UTC [gossip.comm] Send -> DEBU d81 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.538 UTC [gossip.discovery] sendMemResponse -> DEBU d82 Exiting, replying with alive: > alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:38.538 UTC [gossip.comm] sendToEndpoint -> DEBU d83 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.538 UTC [gossip.comm] sendToEndpoint -> DEBU d84 Exiting" +"2019-09-24 01:04:38.584 UTC [gossip.comm] func1 -> DEBU d85 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.584 UTC [gossip.gossip] handleMessage -> DEBU d86 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.584 UTC [gossip.gossip] handleMessage -> DEBU d87 Exiting" +"2019-09-24 01:04:38.584 UTC [gossip.discovery] handleMsgFromComm -> DEBU d88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.584 UTC [gossip.gossip] ValidateAliveMsg -> DEBU d89 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:38.585 UTC [msp.identity] Verify -> DEBU d8a Verify: digest = 00000000 57 57 9a 8d 89 30 22 bb 5d bb de d2 cb 0d 0e eb |WW...0".].......| +00000010 05 73 33 11 79 cb 1a 5e ad 42 ce 01 c7 21 db cc |.s3.y..^.B...!..|" +"2019-09-24 01:04:38.585 UTC [msp.identity] Verify -> DEBU d8b Verify: sig = 00000000 30 45 02 21 00 ec 89 b0 dc df 28 55 d3 85 48 70 |0E.!......(U..Hp| +00000010 db 91 ea 38 49 cc 3c 63 75 e6 32 ba fc fd 87 05 |...8I. DEBU d8c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.585 UTC [gossip.discovery] learnExistingMembers -> DEBU d8d Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d8e updating membership: timestamp: " +"2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d8f Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d90 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:38.586 UTC [gossip.discovery] learnExistingMembers -> DEBU d91 Exiting" +"2019-09-24 01:04:38.587 UTC [gossip.discovery] handleAliveMessage -> DEBU d92 Exiting" +"2019-09-24 01:04:38.587 UTC [gossip.discovery] handleMsgFromComm -> DEBU d93 Exiting" +"2019-09-24 01:04:38.593 UTC [msp] DeserializeIdentity -> DEBU d94 Obtaining identity" +"2019-09-24 01:04:38.594 UTC [msp] DeserializeIdentity -> DEBU d95 Obtaining identity" +"2019-09-24 01:04:38.595 UTC [msp] DeserializeIdentity -> DEBU d96 Obtaining identity" +"2019-09-24 01:04:38.595 UTC [gossip.comm] Send -> DEBU d97 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:38.596 UTC [msp] DeserializeIdentity -> DEBU d98 Obtaining identity" +"2019-09-24 01:04:38.596 UTC [gossip.comm] Send -> DEBU d99 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:38.596 UTC [gossip.comm] sendToEndpoint -> DEBU d9a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9b Exiting" +"2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.597 UTC [gossip.comm] sendToEndpoint -> DEBU d9d Exiting" +"2019-09-24 01:04:38.599 UTC [gossip.comm] func1 -> DEBU d9e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.600 UTC [gossip.gossip] handleMessage -> DEBU d9f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.600 UTC [gossip.gossip] handleMessage -> DEBU da0 Exiting" +"2019-09-24 01:04:38.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU da1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.600 UTC [gossip.discovery] handleMsgFromComm -> DEBU da2 Exiting" +"2019-09-24 01:04:38.839 UTC [gossip.comm] func1 -> DEBU da3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.840 UTC [gossip.gossip] handleMessage -> DEBU da4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.840 UTC [gossip.pull] HandleMessage -> DEBU da5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da6 Obtaining identity" +"2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da7 Obtaining identity" +"2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da8 Obtaining identity" +"2019-09-24 01:04:38.840 UTC [msp] DeserializeIdentity -> DEBU da9 Obtaining identity" +"2019-09-24 01:04:38.841 UTC [msp] DeserializeIdentity -> DEBU daa Obtaining identity" +"2019-09-24 01:04:38.841 UTC [msp] DeserializeIdentity -> DEBU dab Obtaining identity" +"2019-09-24 01:04:38.841 UTC [gossip.pull] SendDigest -> DEBU dac Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:38.841 UTC [gossip.gossip] handleMessage -> DEBU dad Exiting" +"2019-09-24 01:04:38.848 UTC [gossip.comm] func1 -> DEBU dae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.848 UTC [gossip.gossip] handleMessage -> DEBU daf Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.848 UTC [gossip.gossip] handleMessage -> DEBU db0 Exiting" +"2019-09-24 01:04:38.848 UTC [gossip.discovery] handleMsgFromComm -> DEBU db1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU db2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:38.849 UTC [msp] DeserializeIdentity -> DEBU db3 Obtaining identity" +"2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU db4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU db6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.849 UTC [policies] Evaluate -> DEBU db7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:38.849 UTC [policies] Evaluate -> DEBU db8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU db9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func1 -> DEBU dba 0xc003d527f0 gate 1569287078850125300 evaluation starts" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbb 0xc003d527f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbc 0xc003d527f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbd 0xc003d527f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func2 -> DEBU dbe 0xc003d527f0 principal evaluation fails" +"2019-09-24 01:04:38.850 UTC [cauthdsl] func1 -> DEBU dbf 0xc003d527f0 gate 1569287078850125300 evaluation fails" +"2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU dc0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.850 UTC [policies] Evaluate -> DEBU dc1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.851 UTC [policies] Evaluate -> DEBU dc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:38.851 UTC [cauthdsl] func1 -> DEBU dc3 0xc003d53030 gate 1569287078851317100 evaluation starts" +"2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc4 0xc003d53030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc5 0xc003d53030 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.851 UTC [cauthdsl] func2 -> DEBU dc6 0xc003d53030 principal matched by identity 0" +"2019-09-24 01:04:38.851 UTC [msp.identity] Verify -> DEBU dc7 Verify: digest = 00000000 cc 16 0e fb bf fd 8f 0f 57 d3 13 25 b3 cc 5f c6 |........W..%.._.| +00000010 70 20 a3 78 5b dc f8 49 ce a5 d5 fb d7 9e c9 34 |p .x[..I.......4|" +"2019-09-24 01:04:38.852 UTC [msp.identity] Verify -> DEBU dc8 Verify: sig = 00000000 30 44 02 20 33 0e d1 75 da 4a 51 8f 70 d1 c2 be |0D. 3..u.JQ.p...| +00000010 e9 95 cc b1 d5 ac f6 72 a5 7f c6 11 52 f1 69 e2 |.......r....R.i.| +00000020 2f 70 a6 94 02 20 36 06 28 8f 8b c0 40 1d f7 e1 |/p... 6.(...@...| +00000030 54 50 6f c9 31 5b 39 f9 f3 5d 64 2c 97 43 0e d3 |TPo.1[9..]d,.C..| +00000040 9c 87 37 ca a4 2a |..7..*|" +"2019-09-24 01:04:38.852 UTC [cauthdsl] func2 -> DEBU dc9 0xc003d53030 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:38.852 UTC [cauthdsl] func1 -> DEBU dca 0xc003d53030 gate 1569287078851317100 evaluation succeeds" +"2019-09-24 01:04:38.852 UTC [policies] Evaluate -> DEBU dcb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dcc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dcd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:38.853 UTC [policies] Evaluate -> DEBU dce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:38.853 UTC [gossip.discovery] handleAliveMessage -> DEBU dcf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:38.853 UTC [gossip.discovery] learnExistingMembers -> DEBU dd0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd1 updating membership: timestamp: " +"2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd2 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:38.854 UTC [gossip.discovery] learnExistingMembers -> DEBU dd4 Exiting" +"2019-09-24 01:04:38.854 UTC [gossip.discovery] handleAliveMessage -> DEBU dd5 Exiting" +"2019-09-24 01:04:38.855 UTC [gossip.discovery] handleMsgFromComm -> DEBU dd6 Exiting" +"2019-09-24 01:04:38.855 UTC [gossip.discovery] sendMemResponse -> DEBU dd7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:38.855 UTC [msp] DeserializeIdentity -> DEBU dd8 Obtaining identity" +"2019-09-24 01:04:38.855 UTC [msp] DeserializeIdentity -> DEBU dd9 Obtaining identity" +"2019-09-24 01:04:38.856 UTC [msp] DeserializeIdentity -> DEBU dda Obtaining identity" +"2019-09-24 01:04:38.856 UTC [gossip.comm] Send -> DEBU ddb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.856 UTC [gossip.comm] sendToEndpoint -> DEBU ddc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.856 UTC [gossip.comm] sendToEndpoint -> DEBU ddd Exiting" +"2019-09-24 01:04:38.856 UTC [gossip.discovery] sendMemResponse -> DEBU dde Exiting, replying with alive: alive:\242\267\032\t\227\226\334\261\203\226x^\200E{2\272\241xu\342\324\025\350\257=\376r>" > alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:38.877 UTC [gossip.pull] Hello -> DEBU ddf Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:38.877 UTC [gossip.comm] Send -> DEBU de0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.877 UTC [gossip.pull] Hello -> DEBU de1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:38.877 UTC [gossip.comm] Send -> DEBU de2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.878 UTC [gossip.pull] Hello -> DEBU de3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:38.878 UTC [gossip.comm] Send -> DEBU de6 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de7 Exiting" +"2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de8 Exiting" +"2019-09-24 01:04:38.878 UTC [gossip.comm] sendToEndpoint -> DEBU de9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.879 UTC [gossip.comm] func1 -> DEBU deb Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.879 UTC [gossip.gossip] handleMessage -> DEBU dec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.880 UTC [gossip.pull] HandleMessage -> DEBU ded GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.880 UTC [gossip.gossip] handleMessage -> DEBU dee Exiting" +"2019-09-24 01:04:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU dea Exiting" +"2019-09-24 01:04:38.880 UTC [gossip.comm] func1 -> DEBU def Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.881 UTC [gossip.gossip] handleMessage -> DEBU df0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.881 UTC [gossip.pull] HandleMessage -> DEBU df1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.881 UTC [gossip.gossip] handleMessage -> DEBU df2 Exiting" +"2019-09-24 01:04:38.882 UTC [gossip.comm] func1 -> DEBU df3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.883 UTC [gossip.gossip] handleMessage -> DEBU df4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.883 UTC [gossip.pull] HandleMessage -> DEBU df5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.883 UTC [gossip.gossip] handleMessage -> DEBU df6 Exiting" +"2019-09-24 01:04:38.887 UTC [msp] GetDefaultSigningIdentity -> DEBU df7 Obtaining default signing identity" +"2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU df8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151012 " +"2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU df9 Sign: digest: 32A86A9DA00543804FEA6003853AA13DDCBE775B70AEAC61BC9B0706E62B55D2 " +"2019-09-24 01:04:38.888 UTC [msp] GetDefaultSigningIdentity -> DEBU dfa Obtaining default signing identity" +"2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU dfb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:38.888 UTC [msp.identity] Sign -> DEBU dfc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:38.889 UTC [msp] DeserializeIdentity -> DEBU dfd Obtaining identity" +"2019-09-24 01:04:38.889 UTC [gossip.comm] Send -> DEBU dfe Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.889 UTC [msp] DeserializeIdentity -> DEBU dff Obtaining identity" +"2019-09-24 01:04:38.889 UTC [gossip.comm] Send -> DEBU e00 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.889 UTC [gossip.comm] sendToEndpoint -> DEBU e01 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.890 UTC [gossip.comm] Send -> DEBU e02 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e04 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e05 Exiting" +"2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e06 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e07 Exiting" +"2019-09-24 01:04:38.890 UTC [gossip.comm] sendToEndpoint -> DEBU e03 Exiting" +"2019-09-24 01:04:38.892 UTC [gossip.comm] func1 -> DEBU e08 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.893 UTC [gossip.gossip] handleMessage -> DEBU e09 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.893 UTC [gossip.gossip] handleMessage -> DEBU e0a Exiting" +"2019-09-24 01:04:38.893 UTC [gossip.discovery] handleMsgFromComm -> DEBU e0b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e0c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:38.895 UTC [msp.identity] Verify -> DEBU e0d Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +"2019-09-24 01:04:38.895 UTC [msp.identity] Verify -> DEBU e0e Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +"2019-09-24 01:04:38.896 UTC [gossip.discovery] handleAliveMessage -> DEBU e0f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.896 UTC [gossip.discovery] isSentByMe -> DEBU e10 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.896 UTC [gossip.discovery] handleAliveMessage -> DEBU e11 Exiting" +"2019-09-24 01:04:38.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e12 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:38.897 UTC [msp] DeserializeIdentity -> DEBU e13 Obtaining identity" +"2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e14 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e15 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.897 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e16 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.897 UTC [policies] Evaluate -> DEBU e17 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:38.898 UTC [policies] Evaluate -> DEBU e18 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:38.898 UTC [policies] Evaluate -> DEBU e19 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:38.898 UTC [cauthdsl] func1 -> DEBU e1a 0xc003da2a60 gate 1569287078898504400 evaluation starts" +"2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1b 0xc003da2a60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1c 0xc003da2a60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.898 UTC [cauthdsl] func2 -> DEBU e1d 0xc003da2a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:38.899 UTC [cauthdsl] func2 -> DEBU e1e 0xc003da2a60 principal evaluation fails" +"2019-09-24 01:04:38.899 UTC [cauthdsl] func1 -> DEBU e1f 0xc003da2a60 gate 1569287078898504400 evaluation fails" +"2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e20 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.899 UTC [policies] Evaluate -> DEBU e22 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:38.900 UTC [cauthdsl] func1 -> DEBU e23 0xc003da32a0 gate 1569287078900096500 evaluation starts" +"2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e24 0xc003da32a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e25 0xc003da32a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.900 UTC [cauthdsl] func2 -> DEBU e26 0xc003da32a0 principal matched by identity 0" +"2019-09-24 01:04:38.901 UTC [msp.identity] Verify -> DEBU e28 Verify: digest = 00000000 fd 3e 8c 90 dc df 7e c8 5c 9d 06 db 15 ff 9c 5d |.>....~.\......]| +00000010 44 03 81 05 ef 82 91 79 72 df 45 b8 ab c2 0a 0c |D......yr.E.....|" +"2019-09-24 01:04:38.901 UTC [msp.identity] Verify -> DEBU e29 Verify: sig = 00000000 30 45 02 21 00 de e4 df c5 fe d3 80 6e a5 19 e5 |0E.!........n...| +00000010 d4 db 09 b5 6b 31 ea 77 d1 af fc 9f 0a 60 d9 e5 |....k1.w.....`..| +00000020 92 ba e1 e5 22 02 20 72 a8 3e a2 b7 1a 09 97 96 |....". r.>......| +00000030 dc b1 83 96 78 5e 80 45 7b 32 ba a1 78 75 e2 d4 |....x^.E{2..xu..| +00000040 15 e8 af 3d fe 72 3e |...=.r>|" +"2019-09-24 01:04:38.901 UTC [gossip.comm] func1 -> DEBU e2a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.903 UTC [gossip.gossip] handleMessage -> DEBU e2c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.903 UTC [gossip.comm] func1 -> DEBU e2d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.901 UTC [cauthdsl] func2 -> DEBU e2b 0xc003da32a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:38.904 UTC [cauthdsl] func1 -> DEBU e2e 0xc003da32a0 gate 1569287078900096500 evaluation succeeds" +"2019-09-24 01:04:38.900 UTC [gossip.comm] func1 -> DEBU e27 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.904 UTC [policies] Evaluate -> DEBU e2f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e30 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.906 UTC [gossip.comm] func1 -> DEBU e31 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e32 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:38.906 UTC [policies] Evaluate -> DEBU e33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:38.906 UTC [gossip.discovery] handleAliveMessage -> DEBU e34 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.907 UTC [gossip.discovery] handleAliveMessage -> DEBU e35 Exiting" +"2019-09-24 01:04:38.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e36 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:38.907 UTC [msp] DeserializeIdentity -> DEBU e37 Obtaining identity" +"2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e38 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e39 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.908 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e3a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.908 UTC [policies] Evaluate -> DEBU e3b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:38.908 UTC [policies] Evaluate -> DEBU e3c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:38.909 UTC [policies] Evaluate -> DEBU e3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:38.909 UTC [cauthdsl] func1 -> DEBU e3e 0xc003d95840 gate 1569287078909426700 evaluation starts" +"2019-09-24 01:04:38.909 UTC [cauthdsl] func2 -> DEBU e3f 0xc003d95840 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.909 UTC [cauthdsl] func2 -> DEBU e40 0xc003d95840 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.910 UTC [cauthdsl] func2 -> DEBU e41 0xc003d95840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:38.910 UTC [cauthdsl] func2 -> DEBU e42 0xc003d95840 principal evaluation fails" +"2019-09-24 01:04:38.910 UTC [cauthdsl] func1 -> DEBU e43 0xc003d95840 gate 1569287078909426700 evaluation fails" +"2019-09-24 01:04:38.910 UTC [policies] Evaluate -> DEBU e44 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.910 UTC [policies] Evaluate -> DEBU e45 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.911 UTC [policies] Evaluate -> DEBU e46 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:38.911 UTC [cauthdsl] func1 -> DEBU e47 0xc003dc6080 gate 1569287078911295300 evaluation starts" +"2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e48 0xc003dc6080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e49 0xc003dc6080 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.911 UTC [cauthdsl] func2 -> DEBU e4a 0xc003dc6080 principal matched by identity 0" +"2019-09-24 01:04:38.912 UTC [msp.identity] Verify -> DEBU e4b Verify: digest = 00000000 06 7a 2f 87 d3 95 25 58 95 75 e3 3f 05 d8 f7 a3 |.z/...%X.u.?....| +00000010 33 ed b5 73 92 b8 ad 8c fe 5a 7b bf 65 f3 0f cb |3..s.....Z{.e...|" +"2019-09-24 01:04:38.912 UTC [msp.identity] Verify -> DEBU e4c Verify: sig = 00000000 30 44 02 20 47 fd 9a b8 ed fd 59 09 74 b4 cf 67 |0D. G.....Y.t..g| +00000010 1a 0d 18 01 e2 7d 37 aa 04 a0 9e 73 31 3a 26 d9 |.....}7....s1:&.| +00000020 03 3f 37 33 02 20 58 cd 7a 0e ee f4 41 ef 51 54 |.?73. X.z...A.QT| +00000030 41 69 7e e2 74 be 4a b1 e2 55 48 5b 7a db eb a8 |Ai~.t.J..UH[z...| +00000040 e6 a2 0f e1 5c 24 |....\$|" +"2019-09-24 01:04:38.912 UTC [cauthdsl] func2 -> DEBU e4d 0xc003dc6080 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:38.912 UTC [cauthdsl] func1 -> DEBU e4e 0xc003dc6080 gate 1569287078911295300 evaluation succeeds" +"2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e4f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e51 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:38.913 UTC [policies] Evaluate -> DEBU e52 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:38.913 UTC [gossip.discovery] handleAliveMessage -> DEBU e53 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:38.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e54 endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" lastAliveTS: 1569287058832472100, 21 but got ts: inc_num:1569287058832472100 seq_num:19 " +"2019-09-24 01:04:38.914 UTC [gossip.discovery] handleAliveMessage -> DEBU e55 Exiting" +"2019-09-24 01:04:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e56 Exiting" +"2019-09-24 01:04:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.914 UTC [gossip.gossip] handleMessage -> DEBU e58 Exiting" +"2019-09-24 01:04:38.915 UTC [gossip.gossip] handleMessage -> DEBU e59 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.915 UTC [gossip.pull] HandleMessage -> DEBU e5a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5b Obtaining identity" +"2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5c Obtaining identity" +"2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5d Obtaining identity" +"2019-09-24 01:04:38.915 UTC [msp] DeserializeIdentity -> DEBU e5e Obtaining identity" +"2019-09-24 01:04:38.916 UTC [msp] DeserializeIdentity -> DEBU e5f Obtaining identity" +"2019-09-24 01:04:38.916 UTC [msp] DeserializeIdentity -> DEBU e60 Obtaining identity" +"2019-09-24 01:04:38.916 UTC [gossip.pull] SendDigest -> DEBU e61 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:38.916 UTC [gossip.gossip] handleMessage -> DEBU e62 Exiting" +"2019-09-24 01:04:38.916 UTC [gossip.gossip] handleMessage -> DEBU e63 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e64 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:38.917 UTC [msp.identity] Verify -> DEBU e65 Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +"2019-09-24 01:04:38.917 UTC [msp.identity] Verify -> DEBU e66 Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +"2019-09-24 01:04:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU e67 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.917 UTC [gossip.discovery] isSentByMe -> DEBU e68 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU e69 Exiting" +"2019-09-24 01:04:38.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e6a Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:38.917 UTC [msp] DeserializeIdentity -> DEBU e6b Obtaining identity" +"2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e6c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e6e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e6f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e70 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:38.918 UTC [policies] Evaluate -> DEBU e71 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:38.918 UTC [cauthdsl] func1 -> DEBU e72 0xc003dec820 gate 1569287078918950000 evaluation starts" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e73 0xc003dec820 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e74 0xc003dec820 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e75 0xc003dec820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func2 -> DEBU e76 0xc003dec820 principal evaluation fails" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func1 -> DEBU e77 0xc003dec820 gate 1569287078918950000 evaluation fails" +"2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.919 UTC [policies] Evaluate -> DEBU e7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:38.919 UTC [cauthdsl] func1 -> DEBU e7b 0xc003ded060 gate 1569287078919947100 evaluation starts" +"2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7c 0xc003ded060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7d 0xc003ded060 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e7e 0xc003ded060 principal matched by identity 0" +"2019-09-24 01:04:38.920 UTC [msp.identity] Verify -> DEBU e7f Verify: digest = 00000000 cc 16 0e fb bf fd 8f 0f 57 d3 13 25 b3 cc 5f c6 |........W..%.._.| +00000010 70 20 a3 78 5b dc f8 49 ce a5 d5 fb d7 9e c9 34 |p .x[..I.......4|" +"2019-09-24 01:04:38.920 UTC [msp.identity] Verify -> DEBU e80 Verify: sig = 00000000 30 44 02 20 33 0e d1 75 da 4a 51 8f 70 d1 c2 be |0D. 3..u.JQ.p...| +00000010 e9 95 cc b1 d5 ac f6 72 a5 7f c6 11 52 f1 69 e2 |.......r....R.i.| +00000020 2f 70 a6 94 02 20 36 06 28 8f 8b c0 40 1d f7 e1 |/p... 6.(...@...| +00000030 54 50 6f c9 31 5b 39 f9 f3 5d 64 2c 97 43 0e d3 |TPo.1[9..]d,.C..| +00000040 9c 87 37 ca a4 2a |..7..*|" +"2019-09-24 01:04:38.920 UTC [cauthdsl] func2 -> DEBU e81 0xc003ded060 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:38.921 UTC [cauthdsl] func1 -> DEBU e82 0xc003ded060 gate 1569287078919947100 evaluation succeeds" +"2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e83 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e84 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e85 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:38.921 UTC [policies] Evaluate -> DEBU e86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:38.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e87 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:38.921 UTC [gossip.discovery] handleAliveMessage -> DEBU e88 Exiting" +"2019-09-24 01:04:38.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU e89 Exiting" +"2019-09-24 01:04:38.922 UTC [gossip.discovery] handleMsgFromComm -> DEBU e8a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e8c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:38.922 UTC [gossip.gossip] handleMessage -> DEBU e8b Exiting" +"2019-09-24 01:04:38.922 UTC [gossip.gossip] handleMessage -> DEBU e8d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.922 UTC [msp.identity] Verify -> DEBU e8e Verify: digest = 00000000 32 a8 6a 9d a0 05 43 80 4f ea 60 03 85 3a a1 3d |2.j...C.O.`..:.=| +00000010 dc be 77 5b 70 ae ac 61 bc 9b 07 06 e6 2b 55 d2 |..w[p..a.....+U.|" +"2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e8f Verify: sig = 00000000 30 45 02 21 00 c7 27 67 89 59 2c a4 f9 7e d5 d8 |0E.!..'g.Y,..~..| +00000010 f9 1b f5 79 04 7e f3 a3 51 46 b5 6b 95 d6 00 af |...y.~..QF.k....| +00000020 be 4f 67 19 c0 02 20 30 e6 b0 07 80 6e f1 00 2f |.Og... 0....n../| +00000030 71 8a 98 b6 2b 1b 88 4e a0 f9 64 13 bd 63 ba 8b |q...+..N..d..c..| +00000040 c3 3f a5 62 6a 48 5b |.?.bjH[|" +"2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e90 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:38.923 UTC [msp.identity] Verify -> DEBU e91 Verify: sig = 00000000 30 44 02 20 5a d3 92 08 c9 03 34 b4 e5 e8 2a a9 |0D. Z.....4...*.| +00000010 a4 59 e4 c6 ec f6 e7 cd ca 08 f9 d7 76 1e 8f b5 |.Y..........v...| +00000020 4a c8 83 ec 02 20 60 46 21 65 50 c2 e8 37 80 1e |J.... `F!eP..7..| +00000030 d0 1b 5f ce b1 f1 bb 5b d7 9f 6d aa 69 b4 e5 fe |.._....[..m.i...| +00000040 37 6e c2 57 6a 14 |7n.Wj.|" +"2019-09-24 01:04:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU e92 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:38.923 UTC [gossip.discovery] isSentByMe -> DEBU e93 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU e94 Exiting" +"2019-09-24 01:04:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU e95 Exiting" +"2019-09-24 01:04:38.924 UTC [gossip.gossip] handleMessage -> DEBU e96 Exiting" +"2019-09-24 01:04:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU e97 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU e98 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:38.925 UTC [msp] DeserializeIdentity -> DEBU e99 Obtaining identity" +"2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU e9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU e9c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:38.925 UTC [policies] Evaluate -> DEBU e9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:38.925 UTC [policies] Evaluate -> DEBU e9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU e9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func1 -> DEBU ea0 0xc003e10060 gate 1569287078926170200 evaluation starts" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea1 0xc003e10060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea2 0xc003e10060 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea3 0xc003e10060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func2 -> DEBU ea4 0xc003e10060 principal evaluation fails" +"2019-09-24 01:04:38.926 UTC [cauthdsl] func1 -> DEBU ea5 0xc003e10060 gate 1569287078926170200 evaluation fails" +"2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU ea6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.926 UTC [policies] Evaluate -> DEBU ea7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:38.927 UTC [policies] Evaluate -> DEBU ea8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func1 -> DEBU ea9 0xc003e108a0 gate 1569287078927125300 evaluation starts" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eaa 0xc003e108a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eab 0xc003e108a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eac 0xc003e108a0 principal matched by identity 0" +"2019-09-24 01:04:38.927 UTC [msp.identity] Verify -> DEBU ead Verify: digest = 00000000 f4 cb 4a 94 8b 08 20 82 12 5e 8a b7 7b 68 e3 85 |..J... ..^..{h..| +00000010 67 e7 ab f8 4d 8f 6e 26 ac ff d9 1d cb 96 1e a2 |g...M.n&........|" +"2019-09-24 01:04:38.927 UTC [msp.identity] Verify -> DEBU eae Verify: sig = 00000000 30 45 02 21 00 b4 4b 4d f9 93 0f 42 20 e3 51 e7 |0E.!..KM...B .Q.| +00000010 66 c6 c9 d9 a0 af 39 a8 19 f5 c3 43 d5 0a d7 a1 |f.....9....C....| +00000020 73 22 98 3a a0 02 20 2b 15 42 9f b0 73 7c ca e5 |s".:.. +.B..s|..| +00000030 4a d2 6a 0c 80 c1 9e 74 8b 7e 45 e4 d3 53 27 8b |J.j....t.~E..S'.| +00000040 19 b9 29 54 5d 85 ca |..)T]..|" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func2 -> DEBU eaf 0xc003e108a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:38.927 UTC [cauthdsl] func1 -> DEBU eb0 0xc003e108a0 gate 1569287078927125300 evaluation succeeds" +"2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:38.928 UTC [policies] Evaluate -> DEBU eb4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:38.928 UTC [gossip.discovery] handleAliveMessage -> DEBU eb5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb7 updating membership: timestamp: " +"2019-09-24 01:04:38.928 UTC [gossip.discovery] learnExistingMembers -> DEBU eb8 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:38.929 UTC [gossip.discovery] learnExistingMembers -> DEBU eb9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:38.929 UTC [gossip.discovery] learnExistingMembers -> DEBU eba Exiting" +"2019-09-24 01:04:38.929 UTC [gossip.discovery] handleAliveMessage -> DEBU ebb Exiting" +"2019-09-24 01:04:38.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU ebc Exiting" +"2019-09-24 01:04:38.929 UTC [gossip.discovery] sendMemResponse -> DEBU ebd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:38.929 UTC [msp] DeserializeIdentity -> DEBU ebe Obtaining identity" +"2019-09-24 01:04:38.930 UTC [msp] DeserializeIdentity -> DEBU ebf Obtaining identity" +"2019-09-24 01:04:38.930 UTC [msp] DeserializeIdentity -> DEBU ec0 Obtaining identity" +"2019-09-24 01:04:38.930 UTC [gossip.comm] Send -> DEBU ec1 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:38.930 UTC [gossip.comm] sendToEndpoint -> DEBU ec2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:38.930 UTC [gossip.comm] sendToEndpoint -> DEBU ec3 Exiting" +"2019-09-24 01:04:38.930 UTC [gossip.discovery] sendMemResponse -> DEBU ec4 Exiting, replying with alive: alive: alive: alive:(w\003j\304\354h8\220\033\225\203YW\356\031\002 b\201\372O\233\340\355\274\371\363\032\234N\240\357\337p\021\333M\010\256\2373\r\0348\372)\004\001[" > " +"2019-09-24 01:04:39.205 UTC [gossip.comm] func1 -> DEBU ec5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.206 UTC [gossip.gossip] handleMessage -> DEBU ec6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.206 UTC [gossip.gossip] handleMessage -> DEBU ec7 Exiting" +"2019-09-24 01:04:39.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU ec8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.207 UTC [gossip.gossip] ValidateAliveMsg -> DEBU ec9 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:39.207 UTC [msp] DeserializeIdentity -> DEBU eca Obtaining identity" +"2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU ecb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ecc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:39.207 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU ecd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ece == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ecf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:39.208 UTC [policies] Evaluate -> DEBU ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:39.208 UTC [cauthdsl] func1 -> DEBU ed1 0xc003e29130 gate 1569287079208782300 evaluation starts" +"2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed2 0xc003e29130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed3 0xc003e29130 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed4 0xc003e29130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:39.209 UTC [cauthdsl] func2 -> DEBU ed5 0xc003e29130 principal evaluation fails" +"2019-09-24 01:04:39.209 UTC [cauthdsl] func1 -> DEBU ed6 0xc003e29130 gate 1569287079208782300 evaluation fails" +"2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:39.210 UTC [policies] Evaluate -> DEBU ed9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:39.211 UTC [cauthdsl] func1 -> DEBU eda 0xc003e29970 gate 1569287079211003400 evaluation starts" +"2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edb 0xc003e29970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edc 0xc003e29970 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:39.211 UTC [cauthdsl] func2 -> DEBU edd 0xc003e29970 principal matched by identity 0" +"2019-09-24 01:04:39.212 UTC [msp.identity] Verify -> DEBU ede Verify: digest = 00000000 8e ec 8f e7 1a b5 53 25 b1 d3 8e e7 44 a4 b1 22 |......S%....D.."| +00000010 10 44 4c 04 f3 9b 83 2a 3f f3 c6 5f c8 9c 8b 03 |.DL....*?.._....|" +"2019-09-24 01:04:39.212 UTC [msp.identity] Verify -> DEBU edf Verify: sig = 00000000 30 45 02 21 00 82 68 e0 9d c1 21 6b cf 69 70 fe |0E.!..h...!k.ip.| +00000010 91 7d b0 17 7c b2 fb 64 08 7a 05 a9 e7 15 8c a5 |.}..|..d.z......| +00000020 be f8 c3 8f 85 02 20 0d 04 e4 eb 24 14 a0 00 1e |...... ....$....| +00000030 d2 22 93 c0 97 40 a7 88 4e ae ac c9 13 96 d9 36 |."...@..N......6| +00000040 45 48 b2 07 4a f5 82 |EH..J..|" +"2019-09-24 01:04:39.214 UTC [gossip.comm] func1 -> DEBU ee1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.214 UTC [cauthdsl] func2 -> DEBU ee2 0xc003e29970 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:39.215 UTC [cauthdsl] func1 -> DEBU ee3 0xc003e29970 gate 1569287079211003400 evaluation succeeds" +"2019-09-24 01:04:39.215 UTC [gossip.gossip] handleMessage -> DEBU ee4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.215 UTC [policies] Evaluate -> DEBU ee5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:39.216 UTC [policies] Evaluate -> DEBU ee8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:39.213 UTC [gossip.comm] func1 -> DEBU ee0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.216 UTC [gossip.comm] func1 -> DEBU ee9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.216 UTC [gossip.discovery] handleAliveMessage -> DEBU eea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eeb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eec updating membership: timestamp: " +"2019-09-24 01:04:39.217 UTC [gossip.discovery] learnExistingMembers -> DEBU eed Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:39.218 UTC [gossip.discovery] learnExistingMembers -> DEBU eee Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:39.219 UTC [gossip.discovery] learnExistingMembers -> DEBU eef Exiting" +"2019-09-24 01:04:39.219 UTC [gossip.discovery] handleAliveMessage -> DEBU ef0 Exiting" +"2019-09-24 01:04:39.219 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef1 Exiting" +"2019-09-24 01:04:39.220 UTC [gossip.gossip] handleMessage -> DEBU ef2 Exiting" +"2019-09-24 01:04:39.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.221 UTC [gossip.discovery] handleMsgFromComm -> DEBU ef4 Exiting" +"2019-09-24 01:04:39.221 UTC [gossip.gossip] handleMessage -> DEBU ef5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.229 UTC [gossip.gossip] handleMessage -> DEBU ef7 Exiting" +"2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU ef8 Obtaining identity" +"2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU ef9 Obtaining identity" +"2019-09-24 01:04:39.229 UTC [msp] DeserializeIdentity -> DEBU efa Obtaining identity" +"2019-09-24 01:04:39.230 UTC [gossip.gossip] handleMessage -> DEBU efb Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.234 UTC [gossip.discovery] handleMsgFromComm -> DEBU efc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.234 UTC [gossip.discovery] handleMsgFromComm -> DEBU efd Exiting" +"2019-09-24 01:04:39.235 UTC [msp] DeserializeIdentity -> DEBU efe Obtaining identity" +"2019-09-24 01:04:39.237 UTC [gossip.comm] func1 -> DEBU f01 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.238 UTC [gossip.comm] func1 -> DEBU f02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.235 UTC [gossip.discovery] handleMsgFromComm -> DEBU eff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.240 UTC [gossip.gossip] ValidateAliveMsg -> DEBU f03 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:39.241 UTC [msp] DeserializeIdentity -> DEBU f04 Obtaining identity" +"2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU f05 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f06 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:39.241 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU f07 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:39.242 UTC [policies] Evaluate -> DEBU f0a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:39.242 UTC [cauthdsl] func1 -> DEBU f0b 0xc003e623c0 gate 1569287079242801800 evaluation starts" +"2019-09-24 01:04:39.243 UTC [cauthdsl] func2 -> DEBU f0d 0xc003e623c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:39.243 UTC [msp] DeserializeIdentity -> DEBU f0c Obtaining identity" +"2019-09-24 01:04:39.229 UTC [msp] GetDefaultSigningIdentity -> DEBU ef6 Obtaining default signing identity" +"2019-09-24 01:04:39.244 UTC [msp.identity] Sign -> DEBU f10 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151013 " +"2019-09-24 01:04:39.235 UTC [gossip.gossip] handleMessage -> DEBU f00 Exiting" +"2019-09-24 01:04:39.243 UTC [cauthdsl] func2 -> DEBU f0e 0xc003e623c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:39.243 UTC [msp] DeserializeIdentity -> DEBU f0f Obtaining identity" +"2019-09-24 01:04:39.244 UTC [msp.identity] Sign -> DEBU f11 Sign: digest: 51E0825872CE3CCEB622F03C4F6E9935E2296FE02ED366996F9D7FD2AEF15CE2 " +"2019-09-24 01:04:39.251 UTC [gossip.gossip] handleMessage -> DEBU f12 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.252 UTC [cauthdsl] func2 -> DEBU f13 0xc003e623c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:39.252 UTC [msp] DeserializeIdentity -> DEBU f14 Obtaining identity" +"2019-09-24 01:04:39.253 UTC [msp] GetDefaultSigningIdentity -> DEBU f15 Obtaining default signing identity" +"2019-09-24 01:04:39.253 UTC [cauthdsl] func2 -> DEBU f16 0xc003e623c0 principal evaluation fails" +"2019-09-24 01:04:39.254 UTC [cauthdsl] func1 -> DEBU f19 0xc003e623c0 gate 1569287079242801800 evaluation fails" +"2019-09-24 01:04:39.254 UTC [policies] Evaluate -> DEBU f1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:39.255 UTC [policies] Evaluate -> DEBU f1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:39.255 UTC [policies] Evaluate -> DEBU f1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:39.254 UTC [gossip.comm] Send -> DEBU f17 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.254 UTC [msp.identity] Sign -> DEBU f18 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:39.255 UTC [cauthdsl] func1 -> DEBU f1d 0xc003e63320 gate 1569287079255675000 evaluation starts" +"2019-09-24 01:04:39.256 UTC [cauthdsl] func2 -> DEBU f21 0xc003e63320 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:39.256 UTC [gossip.comm] sendToEndpoint -> DEBU f20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.256 UTC [gossip.comm] sendToEndpoint -> DEBU f23 Exiting" +"2019-09-24 01:04:39.256 UTC [msp.identity] Sign -> DEBU f1f Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:39.256 UTC [cauthdsl] func2 -> DEBU f22 0xc003e63320 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:39.257 UTC [cauthdsl] func2 -> DEBU f24 0xc003e63320 principal matched by identity 0" +"2019-09-24 01:04:39.258 UTC [msp.identity] Verify -> DEBU f25 Verify: digest = 00000000 cd 08 77 81 7d 9b 55 4a b2 c7 d7 28 f9 81 08 1e |..w.}.UJ...(....| +00000010 0f 85 1d 5f 8e 66 c9 b5 40 4d 3f 19 9a a1 72 2b |..._.f..@M?...r+|" +"2019-09-24 01:04:39.258 UTC [msp.identity] Verify -> DEBU f26 Verify: sig = 00000000 30 45 02 21 00 f7 1d 9d bb 4e a3 9c a5 94 45 5e |0E.!.....N....E^| +00000010 8e f0 7f d6 7e 45 40 13 23 95 38 a2 a6 c9 95 b5 |....~E@.#.8.....| +00000020 02 e3 09 ed 25 02 20 0c af 9a d8 b4 70 1e 44 65 |....%. .....p.De| +00000030 fc ec b7 e5 84 84 30 f2 c8 b6 df 3e a7 2a a9 ed |......0....>.*..| +00000040 70 85 dd 19 bd b5 75 |p.....u|" +"2019-09-24 01:04:39.255 UTC [msp] DeserializeIdentity -> DEBU f1e Obtaining identity" +"2019-09-24 01:04:39.260 UTC [gossip.comm] Send -> DEBU f27 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.260 UTC [gossip.discovery] periodicalSendAlive -> DEBU f28 Sleeping 5s" +"2019-09-24 01:04:39.261 UTC [gossip.comm] sendToEndpoint -> DEBU f29 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.261 UTC [gossip.comm] sendToEndpoint -> DEBU f2a Exiting" +"2019-09-24 01:04:39.262 UTC [cauthdsl] func2 -> DEBU f2b 0xc003e63320 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:39.262 UTC [cauthdsl] func1 -> DEBU f2c 0xc003e63320 gate 1569287079255675000 evaluation succeeds" +"2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:39.262 UTC [policies] Evaluate -> DEBU f2f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:39.263 UTC [policies] Evaluate -> DEBU f30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:39.263 UTC [gossip.discovery] handleAliveMessage -> DEBU f31 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.263 UTC [gossip.discovery] learnExistingMembers -> DEBU f32 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f33 updating membership: timestamp: " +"2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f34 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:39.264 UTC [gossip.discovery] learnExistingMembers -> DEBU f35 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:39.265 UTC [gossip.discovery] learnExistingMembers -> DEBU f36 Exiting" +"2019-09-24 01:04:39.265 UTC [gossip.discovery] handleAliveMessage -> DEBU f37 Exiting" +"2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f38 Exiting" +"2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f39 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.265 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3a Exiting" +"2019-09-24 01:04:39.265 UTC [gossip.gossip] handleMessage -> DEBU f3b Exiting" +"2019-09-24 01:04:39.266 UTC [gossip.gossip] handleMessage -> DEBU f3c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.266 UTC [gossip.gossip] handleMessage -> DEBU f3d Exiting" +"2019-09-24 01:04:39.266 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.266 UTC [gossip.discovery] handleMsgFromComm -> DEBU f3f Exiting" +"2019-09-24 01:04:39.271 UTC [msp] DeserializeIdentity -> DEBU f40 Obtaining identity" +"2019-09-24 01:04:39.272 UTC [msp] DeserializeIdentity -> DEBU f41 Obtaining identity" +"2019-09-24 01:04:39.273 UTC [msp] DeserializeIdentity -> DEBU f42 Obtaining identity" +"2019-09-24 01:04:39.273 UTC [gossip.comm] Send -> DEBU f43 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.274 UTC [msp] DeserializeIdentity -> DEBU f44 Obtaining identity" +"2019-09-24 01:04:39.274 UTC [gossip.comm] sendToEndpoint -> DEBU f45 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.275 UTC [gossip.comm] sendToEndpoint -> DEBU f46 Exiting" +"2019-09-24 01:04:39.275 UTC [gossip.comm] Send -> DEBU f47 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.275 UTC [gossip.comm] sendToEndpoint -> DEBU f48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.276 UTC [gossip.comm] sendToEndpoint -> DEBU f49 Exiting" +"2019-09-24 01:04:39.275 UTC [gossip.comm] Send -> DEBU f4a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.277 UTC [gossip.comm] sendToEndpoint -> DEBU f4b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.277 UTC [gossip.comm] sendToEndpoint -> DEBU f4c Exiting" +"2019-09-24 01:04:39.277 UTC [msp] DeserializeIdentity -> DEBU f4d Obtaining identity" +"2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f4e Obtaining identity" +"2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f4f Obtaining identity" +"2019-09-24 01:04:39.280 UTC [msp] DeserializeIdentity -> DEBU f50 Obtaining identity" +"2019-09-24 01:04:39.281 UTC [gossip.comm] Send -> DEBU f51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.281 UTC [msp] DeserializeIdentity -> DEBU f52 Obtaining identity" +"2019-09-24 01:04:39.282 UTC [msp] DeserializeIdentity -> DEBU f53 Obtaining identity" +"2019-09-24 01:04:39.282 UTC [gossip.comm] sendToEndpoint -> DEBU f54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.282 UTC [gossip.comm] sendToEndpoint -> DEBU f55 Exiting" +"2019-09-24 01:04:39.282 UTC [gossip.comm] Send -> DEBU f56 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:39.283 UTC [gossip.comm] sendToEndpoint -> DEBU f57 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:39.283 UTC [gossip.comm] sendToEndpoint -> DEBU f58 Exiting" +"2019-09-24 01:04:39.527 UTC [gossip.comm] func1 -> DEBU f59 Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:39.527 UTC [gossip.gossip] handleMessage -> DEBU f5a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:39.528 UTC [gossip.pull] HandleMessage -> DEBU f5b GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes" +"2019-09-24 01:04:39.528 UTC [gossip.gossip] handleMessage -> DEBU f5c Exiting" +"2019-09-24 01:04:39.528 UTC [gossip.pull] SendRes -> DEBU f5d Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:40.372 UTC [endorser] ProcessProposal -> DEBU f5e Entering: request from 172.18.0.5:49898" +"2019-09-24 01:04:40.372 UTC [protoutils] ValidateProposalMessage -> DEBU f5f ValidateProposalMessage starts for signed proposal 0xc003ee6050" +"2019-09-24 01:04:40.372 UTC [protoutils] validateChannelHeader -> DEBU f60 validateChannelHeader info: header type 3" +"2019-09-24 01:04:40.373 UTC [protoutils] checkSignatureFromCreator -> DEBU f61 begin" +"2019-09-24 01:04:40.373 UTC [msp] GetManagerForChain -> DEBU f62 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:04:40.373 UTC [msp] DeserializeIdentity -> DEBU f63 Obtaining identity" +"2019-09-24 01:04:40.374 UTC [msp.identity] newIdentity -> DEBU f64 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:04:40.374 UTC [protoutils] checkSignatureFromCreator -> DEBU f65 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:04:40.374 UTC [msp] Validate -> DEBU f66 MSP Org1MSP validating identity" +"2019-09-24 01:04:40.376 UTC [msp] getCertificationChain -> DEBU f67 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:40.376 UTC [protoutils] checkSignatureFromCreator -> DEBU f68 creator is valid" +"2019-09-24 01:04:40.377 UTC [msp.identity] Verify -> DEBU f69 Verify: digest = 00000000 c0 b3 7c 74 d5 e9 fe 9f 45 73 79 6c 54 9c 2c 3a |..|t....EsylT.,:| +00000010 79 73 4f 83 74 4a de 9b 5e 8d 5b 43 93 34 1e bd |ysO.tJ..^.[C.4..|" +"2019-09-24 01:04:40.377 UTC [msp.identity] Verify -> DEBU f6a Verify: sig = 00000000 30 44 02 20 3f cf b9 b9 81 c7 4a 0a c3 d7 ac 83 |0D. ?.....J.....| +00000010 b2 93 66 91 59 89 86 a7 35 54 13 ef 24 f8 e8 c5 |..f.Y...5T..$...| +00000020 46 a3 a8 fc 02 20 55 bb 67 1d c6 fa a0 3e 70 69 |F.... U.g....>pi| +00000030 75 30 73 82 ec 69 e1 33 86 c7 5e 31 19 75 71 30 |u0s..i.3..^1.uq0| +00000040 83 13 f8 c5 6e 25 |....n%|" +"2019-09-24 01:04:40.378 UTC [protoutils] checkSignatureFromCreator -> DEBU f6b exits successfully" +"2019-09-24 01:04:40.378 UTC [protoutils] validateChaincodeProposalMessage -> DEBU f6c validateChaincodeProposalMessage starts for proposal 0xc003bcd880, header 0xc003ee6460" +"2019-09-24 01:04:40.378 UTC [protoutils] validateChaincodeProposalMessage -> DEBU f6d validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:04:40.378 UTC [endorser] preProcess -> DEBU f6e [businesschannel][920b3a8e] processing txid: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640" +"2019-09-24 01:04:40.378 UTC [fsblkstorage] retrieveTransactionByID -> DEBU f6f retrieveTransactionByID() - txId = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +"2019-09-24 01:04:40.379 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU f70 constructing new tx simulator" +"2019-09-24 01:04:40.379 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU f71 constructing new tx simulator txid = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +"2019-09-24 01:04:40.380 UTC [endorser] SimulateProposal -> DEBU f72 [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +"2019-09-24 01:04:40.380 UTC [endorser] callChaincode -> INFO f73 [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +"2019-09-24 01:04:40.381 UTC [chaincode] Execute -> DEBU f74 Entry" +"2019-09-24 01:04:40.382 UTC [chaincode] handleMessage -> DEBU f75 [920b3a8e] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:04:40.382 UTC [chaincode] HandleTransaction -> DEBU f76 [920b3a8e] handling GET_STATE from chaincode" +"2019-09-24 01:04:40.383 UTC [chaincode] HandleGetState -> DEBU f77 [920b3a8e] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 01:04:40.383 UTC [stateleveldb] GetState -> DEBU f78 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:04:40.383 UTC [chaincode] HandleGetState -> DEBU f79 [920b3a8e] No state associated with key: exp02. Sending RESPONSE with an empty payload" +"2019-09-24 01:04:40.384 UTC [chaincode] HandleTransaction -> DEBU f7a [920b3a8e] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:04:40.384 UTC [msp] GetManagerForChain -> DEBU f7b Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:04:40.385 UTC [cauthdsl] func1 -> DEBU f7c 0xc003ef7d60 gate 1569287080385217000 evaluation starts" +"2019-09-24 01:04:40.385 UTC [cauthdsl] func2 -> DEBU f7d 0xc003ef7d60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:40.385 UTC [cauthdsl] func2 -> DEBU f7e 0xc003ef7d60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:40.386 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU f7f Checking if identity has been named explicitly as an admin for Org1MSP" +"2019-09-24 01:04:40.386 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU f80 Checking if identity carries the admin ou for Org1MSP" +"2019-09-24 01:04:40.386 UTC [msp] Validate -> DEBU f81 MSP Org1MSP validating identity" +"2019-09-24 01:04:40.387 UTC [msp] getCertificationChain -> DEBU f82 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:40.388 UTC [msp] hasOURole -> DEBU f83 MSP Org1MSP checking if the identity is a client" +"2019-09-24 01:04:40.388 UTC [msp] getCertificationChain -> DEBU f84 MSP Org1MSP getting certification chain" +"2019-09-24 01:04:40.388 UTC [cauthdsl] func2 -> DEBU f85 0xc003ef7d60 principal matched by identity 0" +"2019-09-24 01:04:40.388 UTC [msp.identity] Verify -> DEBU f86 Verify: digest = 00000000 c0 b3 7c 74 d5 e9 fe 9f 45 73 79 6c 54 9c 2c 3a |..|t....EsylT.,:| +00000010 79 73 4f 83 74 4a de 9b 5e 8d 5b 43 93 34 1e bd |ysO.tJ..^.[C.4..|" +"2019-09-24 01:04:40.388 UTC [msp.identity] Verify -> DEBU f87 Verify: sig = 00000000 30 44 02 20 3f cf b9 b9 81 c7 4a 0a c3 d7 ac 83 |0D. ?.....J.....| +00000010 b2 93 66 91 59 89 86 a7 35 54 13 ef 24 f8 e8 c5 |..f.Y...5T..$...| +00000020 46 a3 a8 fc 02 20 55 bb 67 1d c6 fa a0 3e 70 69 |F.... U.g....>pi| +00000030 75 30 73 82 ec 69 e1 33 86 c7 5e 31 19 75 71 30 |u0s..i.3..^1.uq0| +00000040 83 13 f8 c5 6e 25 |....n%|" +"2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f88 0xc003ef7d60 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f89 0xc003ef7d60 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f8a 0xc003ef7d60 skipping identity 0 because it has already been used" +"2019-09-24 01:04:40.389 UTC [cauthdsl] func2 -> DEBU f8b 0xc003ef7d60 principal evaluation fails" +"2019-09-24 01:04:40.390 UTC [cauthdsl] func1 -> DEBU f8c 0xc003ef7d60 gate 1569287080385217000 evaluation succeeds" +"2019-09-24 01:04:40.391 UTC [chaincode] handleMessage -> DEBU f8d [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:04:40.391 UTC [chaincode] HandleTransaction -> DEBU f8e [920b3a8e] handling PUT_STATE from chaincode" +"2019-09-24 01:04:40.391 UTC [chaincode] HandleTransaction -> DEBU f8f [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:04:40.391 UTC [lscc] putChaincodeCollectionData -> DEBU f90 No collection configuration specified" +"2019-09-24 01:04:40.391 UTC [chaincode] handleMessage -> DEBU f91 [920b3a8e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:04:40.391 UTC [chaincode] Notify -> DEBU f92 [920b3a8e] notifying Txid:920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, channelID:businesschannel" +"2019-09-24 01:04:40.391 UTC [chaincode] Execute -> DEBU f93 Exit" +"2019-09-24 01:04:40.392 UTC [chaincode] LaunchConfig -> DEBU f94 launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt]" +"2019-09-24 01:04:40.392 UTC [chaincode] Start -> DEBU f95 start container: exp02:1.0" +"2019-09-24 01:04:40.392 UTC [chaincode] Start -> DEBU f96 start container with args: chaincode -peer.address=peer0.org1.example.com:7052" +"2019-09-24 01:04:40.393 UTC [chaincode] Start -> DEBU f97 start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt" +"2019-09-24 01:04:40.393 UTC [container] lockContainer -> DEBU f98 waiting for container(exp02-1.0) lock" +"2019-09-24 01:04:40.393 UTC [container] lockContainer -> DEBU f99 got container (exp02-1.0) lock" +"2019-09-24 01:04:40.394 UTC [dockercontroller] stopInternal -> DEBU f9a stopping container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:04:40.397 UTC [dockercontroller] stopInternal -> DEBU f9b stop container result" error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 01:04:40.397 UTC [dockercontroller] stopInternal -> DEBU f9c killing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:04:40.400 UTC [dockercontroller] stopInternal -> DEBU f9d kill container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 01:04:40.400 UTC [dockercontroller] stopInternal -> DEBU f9e removing container" id=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:04:40.401 UTC [dockercontroller] stopInternal -> DEBU f9f remove container result" id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 01:04:40.402 UTC [dockercontroller] createContainer -> DEBU fa0 create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:04:40.403 UTC [dockercontroller] getDockerHostConfig -> DEBU fa1 docker container hostconfig NetworkMode: hlf_net" +"2019-09-24 01:04:40.409 UTC [chaincode.platform] GenerateDockerfile -> DEBU fa2 +FROM hyperledger/fabric-baseos:amd64-0.4.15 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.3" \ + org.hyperledger.fabric.base.version="0.4.15" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.3" +"2019-09-24 01:04:40.417 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO fa3 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-09-24 01:04:40.418 UTC [chaincode.platform.util] DockerBuild -> DEBU fa4 Attempting build with image hyperledger/fabric-ccenv:latest" +"2019-09-24 01:04:40.724 UTC [gossip.channel] reportMembershipChanges -> INFO fa5 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051 ] [peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ]]" +"2019-09-24 01:04:41.723 UTC [msp] DeserializeIdentity -> DEBU fa6 Obtaining identity" +"2019-09-24 01:04:41.723 UTC [msp] DeserializeIdentity -> DEBU fa7 Obtaining identity" +"2019-09-24 01:04:41.724 UTC [gossip.comm] Send -> DEBU fa8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:41.726 UTC [gossip.comm] sendToEndpoint -> DEBU fa9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.726 UTC [gossip.comm] sendToEndpoint -> DEBU faa Exiting" +"2019-09-24 01:04:41.727 UTC [gossip.comm] sendToEndpoint -> DEBU fab Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.727 UTC [gossip.comm] sendToEndpoint -> DEBU fac Exiting" +"2019-09-24 01:04:41.728 UTC [gossip.comm] sendToEndpoint -> DEBU fad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.729 UTC [gossip.comm] func1 -> DEBU fae Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.729 UTC [gossip.gossip] handleMessage -> DEBU faf Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.728 UTC [gossip.comm] sendToEndpoint -> DEBU fb0 Exiting" +"2019-09-24 01:04:41.730 UTC [gossip.comm] func1 -> DEBU fb1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.730 UTC [msp] DeserializeIdentity -> DEBU fb2 Obtaining identity" +"2019-09-24 01:04:41.731 UTC [msp] DeserializeIdentity -> DEBU fb3 Obtaining identity" +"2019-09-24 01:04:41.732 UTC [msp] DeserializeIdentity -> DEBU fb4 Obtaining identity" +"2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fb5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fb7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.733 UTC [gossip.comm] func1 -> DEBU fb8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.733 UTC [policies] Evaluate -> DEBU fb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:41.734 UTC [policies] Evaluate -> DEBU fba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:41.734 UTC [policies] Evaluate -> DEBU fbb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:41.734 UTC [cauthdsl] func1 -> DEBU fbc 0xc0040e2bf0 gate 1569287081734548800 evaluation starts" +"2019-09-24 01:04:41.734 UTC [cauthdsl] func2 -> DEBU fbd 0xc0040e2bf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.734 UTC [cauthdsl] func2 -> DEBU fbe 0xc0040e2bf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.735 UTC [cauthdsl] func2 -> DEBU fbf 0xc0040e2bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:41.735 UTC [cauthdsl] func2 -> DEBU fc0 0xc0040e2bf0 principal evaluation fails" +"2019-09-24 01:04:41.735 UTC [cauthdsl] func1 -> DEBU fc1 0xc0040e2bf0 gate 1569287081734548800 evaluation fails" +"2019-09-24 01:04:41.735 UTC [policies] Evaluate -> DEBU fc2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.735 UTC [policies] Evaluate -> DEBU fc3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fc4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func1 -> DEBU fc5 0xc0040e3430 gate 1569287081736056100 evaluation starts" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc6 0xc0040e3430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc7 0xc0040e3430 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fc8 0xc0040e3430 principal matched by identity 0" +"2019-09-24 01:04:41.736 UTC [msp.identity] Verify -> DEBU fc9 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:41.736 UTC [msp.identity] Verify -> DEBU fca Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func2 -> DEBU fcb 0xc0040e3430 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:41.736 UTC [cauthdsl] func1 -> DEBU fcc 0xc0040e3430 gate 1569287081736056100 evaluation succeeds" +"2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fcd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.736 UTC [policies] Evaluate -> DEBU fce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.737 UTC [policies] Evaluate -> DEBU fcf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:41.737 UTC [policies] Evaluate -> DEBU fd0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:41.738 UTC [msp.identity] Verify -> DEBU fd1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:41.738 UTC [msp.identity] Verify -> DEBU fd2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:41.740 UTC [msp.identity] Verify -> DEBU fd3 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:41.740 UTC [msp.identity] Verify -> DEBU fd4 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:41.741 UTC [msp] DeserializeIdentity -> DEBU fd5 Obtaining identity" +"2019-09-24 01:04:41.742 UTC [msp] DeserializeIdentity -> DEBU fd6 Obtaining identity" +"2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU fd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fd8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU fd9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.748 UTC [policies] Evaluate -> DEBU fda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:41.749 UTC [policies] Evaluate -> DEBU fdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:41.749 UTC [policies] Evaluate -> DEBU fdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:41.750 UTC [cauthdsl] func1 -> DEBU fdd 0xc0040fda40 gate 1569287081750491400 evaluation starts" +"2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fde 0xc0040fda40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fdf 0xc0040fda40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fe0 0xc0040fda40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:41.750 UTC [cauthdsl] func2 -> DEBU fe1 0xc0040fda40 principal evaluation fails" +"2019-09-24 01:04:41.751 UTC [cauthdsl] func1 -> DEBU fe2 0xc0040fda40 gate 1569287081750491400 evaluation fails" +"2019-09-24 01:04:41.751 UTC [policies] Evaluate -> DEBU fe3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.752 UTC [policies] Evaluate -> DEBU fe4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.752 UTC [policies] Evaluate -> DEBU fe5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:41.752 UTC [cauthdsl] func1 -> DEBU fe6 0xc004114280 gate 1569287081752186000 evaluation starts" +"2019-09-24 01:04:41.753 UTC [cauthdsl] func2 -> DEBU fe7 0xc004114280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.754 UTC [cauthdsl] func2 -> DEBU fe8 0xc004114280 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.754 UTC [cauthdsl] func2 -> DEBU fe9 0xc004114280 principal matched by identity 0" +"2019-09-24 01:04:41.754 UTC [msp.identity] Verify -> DEBU fea Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:41.755 UTC [msp] DeserializeIdentity -> DEBU feb Obtaining identity" +"2019-09-24 01:04:41.756 UTC [msp] DeserializeIdentity -> DEBU fec Obtaining identity" +"2019-09-24 01:04:41.757 UTC [gossip.pull] Hello -> DEBU fed Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:41.757 UTC [msp] DeserializeIdentity -> DEBU fee Obtaining identity" +"2019-09-24 01:04:41.758 UTC [msp] DeserializeIdentity -> DEBU fef Obtaining identity" +"2019-09-24 01:04:41.758 UTC [gossip.comm] Send -> DEBU ff0 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:41.759 UTC [gossip.comm] sendToEndpoint -> DEBU ff1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.759 UTC [gossip.comm] sendToEndpoint -> DEBU ff2 Exiting" +"2019-09-24 01:04:41.761 UTC [gossip.comm] func1 -> DEBU ff3 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.755 UTC [msp.identity] Verify -> DEBU ff4 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:41.763 UTC [cauthdsl] func2 -> DEBU ff5 0xc004114280 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:41.763 UTC [cauthdsl] func1 -> DEBU ff6 0xc004114280 gate 1569287081752186000 evaluation succeeds" +"2019-09-24 01:04:41.764 UTC [policies] Evaluate -> DEBU ff7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.765 UTC [policies] Evaluate -> DEBU ff8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.766 UTC [policies] Evaluate -> DEBU ff9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:41.767 UTC [policies] Evaluate -> DEBU ffa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:41.768 UTC [gossip.election] waitForInterrupt -> DEBU ffb d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:41.768 UTC [gossip.election] IsLeader -> DEBU ffc d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:41.768 UTC [msp] GetDefaultSigningIdentity -> DEBU ffd Obtaining default signing identity" +"2019-09-24 01:04:41.768 UTC [msp.identity] Sign -> DEBU ffe Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510041801 " +"2019-09-24 01:04:41.769 UTC [msp.identity] Sign -> DEBU fff Sign: digest: 08A084D966F01604E67A7E9EF85F0142651267FE7FDB4C1DD055FE1349B1A37F " +"2019-09-24 01:04:41.769 UTC [gossip.election] waitForInterrupt -> DEBU 1000 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:41.767 UTC [gossip.gossip] handleMessage -> DEBU 1001 Exiting" +"2019-09-24 01:04:41.770 UTC [msp] DeserializeIdentity -> DEBU 1002 Obtaining identity" +"2019-09-24 01:04:41.771 UTC [msp] DeserializeIdentity -> DEBU 1003 Obtaining identity" +"2019-09-24 01:04:41.771 UTC [msp] DeserializeIdentity -> DEBU 1004 Obtaining identity" +"2019-09-24 01:04:41.772 UTC [msp] DeserializeIdentity -> DEBU 1005 Obtaining identity" +"2019-09-24 01:04:41.772 UTC [gossip.comm] Send -> DEBU 1006 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:41.774 UTC [msp] DeserializeIdentity -> DEBU 1007 Obtaining identity" +"2019-09-24 01:04:41.774 UTC [msp] DeserializeIdentity -> DEBU 1008 Obtaining identity" +"2019-09-24 01:04:41.775 UTC [gossip.comm] sendToEndpoint -> DEBU 1009 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:04:41.775 UTC [gossip.comm] sendToEndpoint -> DEBU 100a Exiting" +"2019-09-24 01:04:41.777 UTC [gossip.gossip] handleMessage -> DEBU 100b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.778 UTC [msp.identity] Verify -> DEBU 100c Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:41.778 UTC [msp.identity] Verify -> DEBU 100d Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:41.780 UTC [msp.identity] Verify -> DEBU 100e Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:41.781 UTC [msp.identity] Verify -> DEBU 100f Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:41.781 UTC [msp] DeserializeIdentity -> DEBU 1010 Obtaining identity" +"2019-09-24 01:04:41.782 UTC [msp] DeserializeIdentity -> DEBU 1011 Obtaining identity" +"2019-09-24 01:04:41.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1012 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:41.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1013 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.784 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1014 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.784 UTC [policies] Evaluate -> DEBU 1015 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:41.784 UTC [policies] Evaluate -> DEBU 1016 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:41.785 UTC [policies] Evaluate -> DEBU 1017 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:41.786 UTC [cauthdsl] func1 -> DEBU 1018 0xc004142ad0 gate 1569287081786102600 evaluation starts" +"2019-09-24 01:04:41.786 UTC [cauthdsl] func2 -> DEBU 1019 0xc004142ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.786 UTC [cauthdsl] func2 -> DEBU 101a 0xc004142ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.787 UTC [cauthdsl] func2 -> DEBU 101b 0xc004142ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:41.787 UTC [cauthdsl] func2 -> DEBU 101c 0xc004142ad0 principal evaluation fails" +"2019-09-24 01:04:41.787 UTC [cauthdsl] func1 -> DEBU 101d 0xc004142ad0 gate 1569287081786102600 evaluation fails" +"2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 101e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 101f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.787 UTC [policies] Evaluate -> DEBU 1020 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:41.788 UTC [cauthdsl] func1 -> DEBU 1021 0xc004143310 gate 1569287081788503000 evaluation starts" +"2019-09-24 01:04:41.788 UTC [cauthdsl] func2 -> DEBU 1022 0xc004143310 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.789 UTC [cauthdsl] func2 -> DEBU 1023 0xc004143310 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.789 UTC [cauthdsl] func2 -> DEBU 1024 0xc004143310 principal matched by identity 0" +"2019-09-24 01:04:41.790 UTC [msp.identity] Verify -> DEBU 1025 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:41.790 UTC [msp.identity] Verify -> DEBU 1026 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:41.792 UTC [cauthdsl] func2 -> DEBU 1027 0xc004143310 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:41.793 UTC [cauthdsl] func1 -> DEBU 1028 0xc004143310 gate 1569287081788503000 evaluation succeeds" +"2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 1029 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:41.793 UTC [policies] Evaluate -> DEBU 102c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:41.794 UTC [gossip.gossip] handleMessage -> DEBU 102d Exiting" +"2019-09-24 01:04:41.794 UTC [gossip.gossip] handleMessage -> DEBU 102e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.795 UTC [msp] DeserializeIdentity -> DEBU 102f Obtaining identity" +"2019-09-24 01:04:41.796 UTC [msp] DeserializeIdentity -> DEBU 1030 Obtaining identity" +"2019-09-24 01:04:41.796 UTC [msp] DeserializeIdentity -> DEBU 1031 Obtaining identity" +"2019-09-24 01:04:41.808 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1032 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:41.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1033 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1034 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.809 UTC [policies] Evaluate -> DEBU 1035 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:41.810 UTC [policies] Evaluate -> DEBU 1036 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:41.810 UTC [policies] Evaluate -> DEBU 1037 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:41.811 UTC [cauthdsl] func1 -> DEBU 1038 0xc004154250 gate 1569287081811192100 evaluation starts" +"2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 1039 0xc004154250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103a 0xc004154250 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103b 0xc004154250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:41.813 UTC [cauthdsl] func2 -> DEBU 103c 0xc004154250 principal evaluation fails" +"2019-09-24 01:04:41.814 UTC [cauthdsl] func1 -> DEBU 103d 0xc004154250 gate 1569287081811192100 evaluation fails" +"2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 103e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 103f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.815 UTC [policies] Evaluate -> DEBU 1040 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:41.815 UTC [cauthdsl] func1 -> DEBU 1041 0xc004155380 gate 1569287081815752200 evaluation starts" +"2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1042 0xc004155380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1043 0xc004155380 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.816 UTC [cauthdsl] func2 -> DEBU 1044 0xc004155380 principal matched by identity 0" +"2019-09-24 01:04:41.817 UTC [msp.identity] Verify -> DEBU 1045 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:41.818 UTC [msp.identity] Verify -> DEBU 1046 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:41.818 UTC [cauthdsl] func2 -> DEBU 1047 0xc004155380 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:41.824 UTC [cauthdsl] func1 -> DEBU 1048 0xc004155380 gate 1569287081815752200 evaluation succeeds" +"2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 1049 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:41.824 UTC [policies] Evaluate -> DEBU 104c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:41.825 UTC [msp.identity] Verify -> DEBU 104d Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:41.825 UTC [msp.identity] Verify -> DEBU 104e Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:41.825 UTC [msp] DeserializeIdentity -> DEBU 104f Obtaining identity" +"2019-09-24 01:04:41.825 UTC [msp] DeserializeIdentity -> DEBU 1050 Obtaining identity" +"2019-09-24 01:04:41.825 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1051 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:41.826 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1052 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.826 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1053 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1054 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1055 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 1056 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 1057 0xc003ba1280 gate 1569287081826431400 evaluation starts" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1058 0xc003ba1280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1059 0xc003ba1280 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 105a 0xc003ba1280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 105b 0xc003ba1280 principal evaluation fails" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 105c 0xc003ba1280 gate 1569287081826431400 evaluation fails" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:41.826 UTC [policies] Evaluate -> DEBU 105f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func1 -> DEBU 1060 0xc003ba1ad0 gate 1569287081826924600 evaluation starts" +"2019-09-24 01:04:41.826 UTC [cauthdsl] func2 -> DEBU 1061 0xc003ba1ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1062 0xc003ba1ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1063 0xc003ba1ad0 principal matched by identity 0" +"2019-09-24 01:04:41.827 UTC [msp.identity] Verify -> DEBU 1064 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:41.827 UTC [msp.identity] Verify -> DEBU 1065 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:41.827 UTC [cauthdsl] func2 -> DEBU 1066 0xc003ba1ad0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:41.827 UTC [cauthdsl] func1 -> DEBU 1067 0xc003ba1ad0 gate 1569287081826924600 evaluation succeeds" +"2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 1068 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 1069 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 106a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:41.827 UTC [policies] Evaluate -> DEBU 106b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:41.827 UTC [gossip.gossip] handleMessage -> DEBU 106c Exiting" +"2019-09-24 01:04:41.827 UTC [gossip.gossip] handleMessage -> DEBU 106d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.828 UTC [gossip.pull] HandleMessage -> DEBU 106e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.828 UTC [gossip.gossip] handleMessage -> DEBU 106f Exiting" +"2019-09-24 01:04:41.913 UTC [gossip.comm] func1 -> DEBU 1070 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.913 UTC [gossip.comm] func1 -> DEBU 1071 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.914 UTC [gossip.gossip] handleMessage -> DEBU 1072 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.915 UTC [msp] DeserializeIdentity -> DEBU 1073 Obtaining identity" +"2019-09-24 01:04:41.915 UTC [msp] DeserializeIdentity -> DEBU 1074 Obtaining identity" +"2019-09-24 01:04:41.916 UTC [gossip.gossip] handleMessage -> DEBU 1075 Exiting" +"2019-09-24 01:04:41.916 UTC [gossip.gossip] handleMessage -> DEBU 1076 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.917 UTC [gossip.pull] HandleMessage -> DEBU 1077 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:41.917 UTC [gossip.pull] SendDigest -> DEBU 1078 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:41.917 UTC [gossip.gossip] handleMessage -> DEBU 1079 Exiting" +"2019-09-24 01:04:42.112 UTC [gossip.comm] func1 -> DEBU 107a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.112 UTC [gossip.gossip] handleMessage -> DEBU 107b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.112 UTC [msp] DeserializeIdentity -> DEBU 107c Obtaining identity" +"2019-09-24 01:04:42.113 UTC [msp] DeserializeIdentity -> DEBU 107d Obtaining identity" +"2019-09-24 01:04:42.113 UTC [msp] DeserializeIdentity -> DEBU 107e Obtaining identity" +"2019-09-24 01:04:42.113 UTC [gossip.gossip] handleMessage -> DEBU 107f Exiting" +"2019-09-24 01:04:42.309 UTC [gossip.comm] func1 -> DEBU 1080 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.309 UTC [gossip.gossip] handleMessage -> DEBU 1081 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1082 Obtaining identity" +"2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1083 Obtaining identity" +"2019-09-24 01:04:42.310 UTC [msp] DeserializeIdentity -> DEBU 1084 Obtaining identity" +"2019-09-24 01:04:42.310 UTC [gossip.gossip] handleMessage -> DEBU 1085 Exiting" +"2019-09-24 01:04:42.527 UTC [gossip.comm] func1 -> DEBU 1086 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.527 UTC [gossip.gossip] handleMessage -> DEBU 1087 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.528 UTC [gossip.pull] HandleMessage -> DEBU 1088 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.530 UTC [gossip.pull] SendDigest -> DEBU 1089 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:42.530 UTC [gossip.gossip] handleMessage -> DEBU 108a Exiting" +"2019-09-24 01:04:42.534 UTC [gossip.comm] func1 -> DEBU 108b Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.534 UTC [gossip.gossip] handleMessage -> DEBU 108c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.534 UTC [gossip.gossip] handleMessage -> DEBU 108d Exiting" +"2019-09-24 01:04:42.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 108e Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.534 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 108f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1090 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +"2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1091 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +"2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1092 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:42.535 UTC [msp.identity] Verify -> DEBU 1093 Verify: sig = 00000000 30 45 02 21 00 f4 80 68 84 6e 8c 48 71 ac 3d 62 |0E.!...h.n.Hq.=b| +00000010 df 9f 13 bd 5a 17 d3 cf f6 b6 42 c8 2e f4 5d 09 |....Z.....B...].| +00000020 4c ff 2e f6 b7 02 20 3b 1b a6 76 be f4 0d cb 4f |L..... ;..v....O| +00000030 41 b6 8b 62 5c 79 ca 2b 7c d4 df a8 f9 42 47 90 |A..b\y.+|....BG.| +00000040 1c d2 42 b8 ee b1 98 |..B....|" +"2019-09-24 01:04:42.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 1094 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:42.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 1095 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1096 updating membership: timestamp: " +"2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1097 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1098 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:42.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 1099 Exiting" +"2019-09-24 01:04:42.536 UTC [gossip.discovery] handleAliveMessage -> DEBU 109a Exiting" +"2019-09-24 01:04:42.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 109b Exiting" +"2019-09-24 01:04:42.536 UTC [gossip.discovery] sendMemResponse -> DEBU 109c Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:42.537 UTC [msp] DeserializeIdentity -> DEBU 109d Obtaining identity" +"2019-09-24 01:04:42.537 UTC [msp] DeserializeIdentity -> DEBU 109e Obtaining identity" +"2019-09-24 01:04:42.537 UTC [gossip.comm] Send -> DEBU 109f Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.537 UTC [gossip.discovery] sendMemResponse -> DEBU 10a0 Exiting, replying with alive: > alive: " +"2019-09-24 01:04:42.538 UTC [gossip.comm] sendToEndpoint -> DEBU 10a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.538 UTC [gossip.comm] sendToEndpoint -> DEBU 10a2 Exiting" +"2019-09-24 01:04:42.840 UTC [gossip.comm] func1 -> DEBU 10a3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.840 UTC [gossip.gossip] handleMessage -> DEBU 10a4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.840 UTC [gossip.pull] HandleMessage -> DEBU 10a5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.840 UTC [msp] DeserializeIdentity -> DEBU 10a6 Obtaining identity" +"2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a7 Obtaining identity" +"2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a8 Obtaining identity" +"2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10a9 Obtaining identity" +"2019-09-24 01:04:42.841 UTC [msp] DeserializeIdentity -> DEBU 10aa Obtaining identity" +"2019-09-24 01:04:42.842 UTC [msp] DeserializeIdentity -> DEBU 10ab Obtaining identity" +"2019-09-24 01:04:42.842 UTC [gossip.pull] SendDigest -> DEBU 10ac Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:42.842 UTC [gossip.gossip] handleMessage -> DEBU 10ad Exiting" +"2019-09-24 01:04:42.846 UTC [gossip.comm] func1 -> DEBU 10ae Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.846 UTC [gossip.gossip] handleMessage -> DEBU 10af Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.846 UTC [gossip.gossip] handleMessage -> DEBU 10b0 Exiting" +"2019-09-24 01:04:42.846 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10b1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.846 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 10b2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:42.846 UTC [msp] DeserializeIdentity -> DEBU 10b3 Obtaining identity" +"2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 10b4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.847 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 10b6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.847 UTC [policies] Evaluate -> DEBU 10b7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:42.847 UTC [policies] Evaluate -> DEBU 10b8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:42.848 UTC [policies] Evaluate -> DEBU 10b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func1 -> DEBU 10ba 0xc0029f30b0 gate 1569287082848236800 evaluation starts" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bb 0xc0029f30b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bc 0xc0029f30b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10bd 0xc0029f30b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func2 -> DEBU 10be 0xc0029f30b0 principal evaluation fails" +"2019-09-24 01:04:42.848 UTC [cauthdsl] func1 -> DEBU 10bf 0xc0029f30b0 gate 1569287082848236800 evaluation fails" +"2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.849 UTC [policies] Evaluate -> DEBU 10c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:42.849 UTC [cauthdsl] func1 -> DEBU 10c3 0xc0029f3950 gate 1569287082849415400 evaluation starts" +"2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c4 0xc0029f3950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c5 0xc0029f3950 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.849 UTC [cauthdsl] func2 -> DEBU 10c6 0xc0029f3950 principal matched by identity 0" +"2019-09-24 01:04:42.849 UTC [msp.identity] Verify -> DEBU 10c7 Verify: digest = 00000000 91 d6 5e cb 4a 9f 34 25 b9 bf 7c 1a 02 f7 89 62 |..^.J.4%..|....b| +00000010 31 f8 7a 1a 35 35 95 84 46 50 fb d1 66 97 61 2c |1.z.55..FP..f.a,|" +"2019-09-24 01:04:42.850 UTC [msp.identity] Verify -> DEBU 10c8 Verify: sig = 00000000 30 45 02 21 00 87 57 ae 0d 02 5f 43 29 46 c6 f9 |0E.!..W..._C)F..| +00000010 c2 8a 9a 19 ed 7d 5b cc a7 a4 e8 cc ed 44 5b c4 |.....}[......D[.| +00000020 d3 c4 9d 21 d8 02 20 02 97 76 37 27 51 03 fb 02 |...!.. ..v7'Q...| +00000030 36 e8 c7 9c 4d 44 f0 75 2a 7c 2e 7f 7d e4 ea 38 |6...MD.u*|..}..8| +00000040 90 57 bf cb c4 b7 75 |.W....u|" +"2019-09-24 01:04:42.850 UTC [cauthdsl] func2 -> DEBU 10c9 0xc0029f3950 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:42.850 UTC [cauthdsl] func1 -> DEBU 10ca 0xc0029f3950 gate 1569287082849415400 evaluation succeeds" +"2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.850 UTC [policies] Evaluate -> DEBU 10cd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:42.851 UTC [policies] Evaluate -> DEBU 10ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:42.851 UTC [gossip.discovery] handleAliveMessage -> DEBU 10cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d1 updating membership: timestamp: " +"2019-09-24 01:04:42.851 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d2 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:42.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:42.852 UTC [gossip.discovery] learnExistingMembers -> DEBU 10d4 Exiting" +"2019-09-24 01:04:42.852 UTC [gossip.discovery] handleAliveMessage -> DEBU 10d5 Exiting" +"2019-09-24 01:04:42.852 UTC [gossip.discovery] handleMsgFromComm -> DEBU 10d6 Exiting" +"2019-09-24 01:04:42.852 UTC [gossip.discovery] sendMemResponse -> DEBU 10d7 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10d8 Obtaining identity" +"2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10d9 Obtaining identity" +"2019-09-24 01:04:42.852 UTC [msp] DeserializeIdentity -> DEBU 10da Obtaining identity" +"2019-09-24 01:04:42.853 UTC [gossip.comm] Send -> DEBU 10db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.853 UTC [gossip.discovery] sendMemResponse -> DEBU 10dc Exiting, replying with alive: alive:\247*\251\355p\205\335\031\275\265u" > alive: alive: " +"2019-09-24 01:04:42.853 UTC [gossip.comm] sendToEndpoint -> DEBU 10dd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.853 UTC [gossip.comm] sendToEndpoint -> DEBU 10de Exiting" +"2019-09-24 01:04:42.878 UTC [gossip.pull] Hello -> DEBU 10df Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:42.878 UTC [gossip.comm] Send -> DEBU 10e0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.879 UTC [gossip.pull] Hello -> DEBU 10e1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:42.879 UTC [gossip.comm] Send -> DEBU 10e2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.879 UTC [gossip.pull] Hello -> DEBU 10e3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e6 Exiting" +"2019-09-24 01:04:42.879 UTC [gossip.comm] Send -> DEBU 10e5 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10e9 Exiting" +"2019-09-24 01:04:42.879 UTC [gossip.comm] sendToEndpoint -> DEBU 10ea Exiting" +"2019-09-24 01:04:42.880 UTC [gossip.comm] func1 -> DEBU 10eb Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.880 UTC [gossip.gossip] handleMessage -> DEBU 10ec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.880 UTC [gossip.pull] HandleMessage -> DEBU 10ed GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.880 UTC [gossip.gossip] handleMessage -> DEBU 10ee Exiting" +"2019-09-24 01:04:42.881 UTC [gossip.comm] func1 -> DEBU 10ef Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.881 UTC [gossip.gossip] handleMessage -> DEBU 10f0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.881 UTC [gossip.pull] HandleMessage -> DEBU 10f1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.881 UTC [gossip.gossip] handleMessage -> DEBU 10f2 Exiting" +"2019-09-24 01:04:42.883 UTC [gossip.comm] func1 -> DEBU 10f3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.883 UTC [gossip.gossip] handleMessage -> DEBU 10f4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.884 UTC [gossip.pull] HandleMessage -> DEBU 10f5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.884 UTC [gossip.gossip] handleMessage -> DEBU 10f6 Exiting" +"2019-09-24 01:04:42.890 UTC [msp] GetDefaultSigningIdentity -> DEBU 10f7 Obtaining default signing identity" +"2019-09-24 01:04:42.890 UTC [msp.identity] Sign -> DEBU 10f8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151014 " +"2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10f9 Sign: digest: 7CDC33BF059C1B26C908E49DA1828635F92D04856F2AFA1A12D4F9938B1C97A4 " +"2019-09-24 01:04:42.891 UTC [msp] GetDefaultSigningIdentity -> DEBU 10fa Obtaining default signing identity" +"2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10fb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:42.891 UTC [msp.identity] Sign -> DEBU 10fc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:42.892 UTC [gossip.comm] Send -> DEBU 10fd Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.892 UTC [msp] DeserializeIdentity -> DEBU 10fe Obtaining identity" +"2019-09-24 01:04:42.892 UTC [gossip.comm] Send -> DEBU 10ff Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.892 UTC [msp] DeserializeIdentity -> DEBU 1100 Obtaining identity" +"2019-09-24 01:04:42.893 UTC [gossip.comm] Send -> DEBU 1101 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1102 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.893 UTC [gossip.comm] sendToEndpoint -> DEBU 1103 Exiting" +"2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1104 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1106 Exiting" +"2019-09-24 01:04:42.896 UTC [gossip.comm] sendToEndpoint -> DEBU 1105 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.901 UTC [gossip.comm] sendToEndpoint -> DEBU 1107 Exiting" +"2019-09-24 01:04:42.914 UTC [gossip.comm] func1 -> DEBU 1108 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.914 UTC [gossip.gossip] handleMessage -> DEBU 1109 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.914 UTC [gossip.gossip] handleMessage -> DEBU 110a Exiting" +"2019-09-24 01:04:42.915 UTC [gossip.discovery] handleMsgFromComm -> DEBU 110b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 110c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:42.915 UTC [msp.identity] Verify -> DEBU 110d Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +"2019-09-24 01:04:42.915 UTC [msp.identity] Verify -> DEBU 110e Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +00000040 98 8c 58 2b 40 8a |..X+@.|" +"2019-09-24 01:04:42.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 110f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:42.916 UTC [gossip.discovery] isSentByMe -> DEBU 1110 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:42.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 1111 Exiting" +"2019-09-24 01:04:42.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1112 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:42.916 UTC [msp.identity] Verify -> DEBU 1113 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +"2019-09-24 01:04:42.916 UTC [msp.identity] Verify -> DEBU 1114 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +"2019-09-24 01:04:42.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 1115 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:42.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 1116 Exiting" +"2019-09-24 01:04:42.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1117 Exiting" +"2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 1118 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 1119 Got message: GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.917 UTC [gossip.comm] func1 -> DEBU 111a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.918 UTC [gossip.gossip] handleMessage -> DEBU 111b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.918 UTC [gossip.pull] HandleMessage -> DEBU 111c GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.918 UTC [msp] DeserializeIdentity -> DEBU 111d Obtaining identity" +"2019-09-24 01:04:42.918 UTC [msp] DeserializeIdentity -> DEBU 111e Obtaining identity" +"2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 111f Obtaining identity" +"2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1120 Obtaining identity" +"2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1121 Obtaining identity" +"2019-09-24 01:04:42.919 UTC [msp] DeserializeIdentity -> DEBU 1122 Obtaining identity" +"2019-09-24 01:04:42.919 UTC [gossip.pull] SendDigest -> DEBU 1123 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:42.919 UTC [gossip.gossip] handleMessage -> DEBU 1124 Exiting" +"2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1125 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1126 Exiting" +"2019-09-24 01:04:42.920 UTC [gossip.gossip] handleMessage -> DEBU 1127 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1128 Got message: GossipMessage: tag:EMPTY mem_req:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1129 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:42.920 UTC [msp] DeserializeIdentity -> DEBU 112a Obtaining identity" +"2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 112b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 112c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.921 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 112d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 112e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 112f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:42.921 UTC [policies] Evaluate -> DEBU 1130 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:42.922 UTC [cauthdsl] func1 -> DEBU 1131 0xc002854230 gate 1569287082922082300 evaluation starts" +"2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1132 0xc002854230 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1133 0xc002854230 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1134 0xc002854230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:42.922 UTC [cauthdsl] func2 -> DEBU 1135 0xc002854230 principal evaluation fails" +"2019-09-24 01:04:42.923 UTC [cauthdsl] func1 -> DEBU 1136 0xc002854230 gate 1569287082922082300 evaluation fails" +"2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1137 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1138 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.923 UTC [policies] Evaluate -> DEBU 1139 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:42.923 UTC [cauthdsl] func1 -> DEBU 113a 0xc002854ad0 gate 1569287082923534100 evaluation starts" +"2019-09-24 01:04:42.923 UTC [cauthdsl] func2 -> DEBU 113b 0xc002854ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.924 UTC [cauthdsl] func2 -> DEBU 113c 0xc002854ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.924 UTC [cauthdsl] func2 -> DEBU 113d 0xc002854ad0 principal matched by identity 0" +"2019-09-24 01:04:42.925 UTC [msp.identity] Verify -> DEBU 113e Verify: digest = 00000000 1a db 6a d3 41 62 be a5 56 75 3e c6 44 3e 12 a2 |..j.Ab..Vu>.D>..| +00000010 fb 08 a9 9c 4f d9 c3 7f f0 f8 fc a0 7f 17 42 9c |....O.........B.|" +"2019-09-24 01:04:42.925 UTC [msp.identity] Verify -> DEBU 113f Verify: sig = 00000000 30 44 02 20 75 04 e8 d9 12 04 bf 2b 43 f1 8e 45 |0D. u......+C..E| +00000010 52 db 3e 9e f2 99 70 5d e7 d7 32 d2 4e 73 b7 42 |R.>...p]..2.Ns.B| +00000020 15 24 e9 8f 02 20 5c 04 8e 49 18 d8 9d bc 29 e1 |.$... \..I....).| +00000030 66 0c 71 b1 fe de 9c 91 e0 a1 a3 6e c6 a8 fb 26 |f.q........n...&| +00000040 3d 22 56 b6 df ad |="V...|" +"2019-09-24 01:04:42.925 UTC [cauthdsl] func2 -> DEBU 1140 0xc002854ad0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:42.925 UTC [cauthdsl] func1 -> DEBU 1141 0xc002854ad0 gate 1569287082923534100 evaluation succeeds" +"2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1143 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1144 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1145 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:42.926 UTC [policies] Evaluate -> DEBU 1146 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:42.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 1147 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 1148 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 1149 updating membership: timestamp: " +"2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 114a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:42.926 UTC [gossip.discovery] learnExistingMembers -> DEBU 114b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:42.927 UTC [gossip.discovery] learnExistingMembers -> DEBU 114c Exiting" +"2019-09-24 01:04:42.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 114d Exiting" +"2019-09-24 01:04:42.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114e Exiting" +"2019-09-24 01:04:42.927 UTC [gossip.discovery] handleMsgFromComm -> DEBU 114f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.927 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1150 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:42.925 UTC [gossip.comm] func1 -> DEBU 1142 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.927 UTC [gossip.discovery] sendMemResponse -> DEBU 1151 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:42.927 UTC [msp] DeserializeIdentity -> DEBU 1154 Obtaining identity" +"2019-09-24 01:04:42.928 UTC [msp] DeserializeIdentity -> DEBU 1155 Obtaining identity" +"2019-09-24 01:04:42.928 UTC [msp] DeserializeIdentity -> DEBU 1156 Obtaining identity" +"2019-09-24 01:04:42.928 UTC [gossip.comm] Send -> DEBU 1157 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:42.928 UTC [gossip.discovery] sendMemResponse -> DEBU 1158 Exiting, replying with alive: alive: alive:\236\362\231p]\347\3272\322Ns\267B\025$\351\217\002 \\\004\216I\030\330\235\274)\341f\014q\261\376\336\234\221\340\241\243n\306\250\373&=\"V\266\337\255" > alive: " +"2019-09-24 01:04:42.928 UTC [gossip.comm] sendToEndpoint -> DEBU 1159 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.928 UTC [gossip.comm] sendToEndpoint -> DEBU 115a Exiting" +"2019-09-24 01:04:42.927 UTC [gossip.gossip] handleMessage -> DEBU 1152 Exiting" +"2019-09-24 01:04:42.928 UTC [gossip.gossip] handleMessage -> DEBU 115b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.927 UTC [msp.identity] Verify -> DEBU 1153 Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +"2019-09-24 01:04:42.928 UTC [msp.identity] Verify -> DEBU 115c Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +00000040 98 8c 58 2b 40 8a |..X+@.|" +"2019-09-24 01:04:42.929 UTC [msp.identity] Verify -> DEBU 115d Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:42.929 UTC [msp.identity] Verify -> DEBU 115e Verify: sig = 00000000 30 45 02 21 00 d3 33 ba 27 aa f8 d6 67 d9 14 11 |0E.!..3.'...g...| +00000010 6d 56 26 b2 99 0a d8 68 09 61 94 3a 00 af a4 bc |mV&....h.a.:....| +00000020 93 9a 2c 1f f0 02 20 2c 82 b4 f9 78 f6 20 0e ea |..,... ,...x. ..| +00000030 66 1a 35 97 79 66 5c c4 8c 62 d4 59 27 17 ce fc |f.5.yf\..b.Y'...| +00000040 a9 d9 19 08 14 c5 3a |......:|" +"2019-09-24 01:04:42.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 115f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:42.929 UTC [gossip.discovery] isSentByMe -> DEBU 1160 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:42.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 1161 Exiting" +"2019-09-24 01:04:42.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1162 Exiting" +"2019-09-24 01:04:42.929 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1163 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:42.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1164 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:42.930 UTC [msp.identity] Verify -> DEBU 1165 Verify: digest = 00000000 63 76 56 cf 65 6f 12 42 ba 93 ac 63 89 f4 0c 2e |cvV.eo.B...c....| +00000010 76 a2 62 73 dd eb 2d c6 7a d6 db 3a 48 63 84 2f |v.bs..-.z..:Hc./|" +"2019-09-24 01:04:42.930 UTC [msp.identity] Verify -> DEBU 1166 Verify: sig = 00000000 30 45 02 21 00 9b 56 19 4e a5 22 14 09 ce b9 5d |0E.!..V.N."....]| +00000010 07 b3 a0 55 fe 6a 73 98 9f c7 40 8c 59 b4 91 e6 |...U.js...@.Y...| +00000020 2f 04 a0 77 72 02 20 46 d8 34 f6 f8 ed b6 97 4d |/..wr. F.4.....M| +00000030 e4 f0 6c b4 45 9f a8 72 98 2f 80 ac 3a 8d d2 9d |..l.E..r./..:...| +00000040 a6 3a 63 1a 45 bd 8a |.:c.E..|" +"2019-09-24 01:04:42.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 1167 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:42.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1169 Exiting" +"2019-09-24 01:04:42.930 UTC [gossip.gossip] handleMessage -> DEBU 1168 Exiting" +"2019-09-24 01:04:42.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 116a Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:42.932 UTC [msp.identity] Verify -> DEBU 116b Verify: digest = 00000000 7c dc 33 bf 05 9c 1b 26 c9 08 e4 9d a1 82 86 35 ||.3....&.......5| +00000010 f9 2d 04 85 6f 2a fa 1a 12 d4 f9 93 8b 1c 97 a4 |.-..o*..........|" +"2019-09-24 01:04:42.932 UTC [msp.identity] Verify -> DEBU 116c Verify: sig = 00000000 30 44 02 20 2d 9a dc 0c 1f a3 35 b8 be 6e 2f 91 |0D. -.....5..n/.| +00000010 f6 60 8e 8b b3 34 c8 61 e1 cd 82 f0 9e d1 e2 f1 |.`...4.a........| +00000020 4a 38 66 32 02 20 7a 68 dd 48 69 e6 52 39 c3 17 |J8f2. zh.Hi.R9..| +00000030 84 37 21 de 39 6e b8 64 60 03 97 e0 a9 79 d4 b7 |.7!.9n.d`....y..| +00000040 98 8c 58 2b 40 8a |..X+@.|" +"2019-09-24 01:04:42.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 116d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:42.932 UTC [gossip.discovery] isSentByMe -> DEBU 116e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:42.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 116f Exiting" +"2019-09-24 01:04:42.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1170 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:42.933 UTC [msp] DeserializeIdentity -> DEBU 1171 Obtaining identity" +"2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1172 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1173 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1174 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1175 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1176 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:42.934 UTC [policies] Evaluate -> DEBU 1177 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func1 -> DEBU 1178 0xc0027f5f50 gate 1569287082935147600 evaluation starts" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 1179 0xc0027f5f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117a 0xc0027f5f50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117b 0xc0027f5f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func2 -> DEBU 117c 0xc0027f5f50 principal evaluation fails" +"2019-09-24 01:04:42.935 UTC [cauthdsl] func1 -> DEBU 117d 0xc0027f5f50 gate 1569287082935147600 evaluation fails" +"2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 117e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 117f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:42.936 UTC [policies] Evaluate -> DEBU 1180 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:42.936 UTC [cauthdsl] func1 -> DEBU 1181 0xc00278c7e0 gate 1569287082936623300 evaluation starts" +"2019-09-24 01:04:42.936 UTC [cauthdsl] func2 -> DEBU 1182 0xc00278c7e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:42.936 UTC [cauthdsl] func2 -> DEBU 1183 0xc00278c7e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:42.937 UTC [cauthdsl] func2 -> DEBU 1184 0xc00278c7e0 principal matched by identity 0" +"2019-09-24 01:04:42.937 UTC [msp.identity] Verify -> DEBU 1185 Verify: digest = 00000000 91 d6 5e cb 4a 9f 34 25 b9 bf 7c 1a 02 f7 89 62 |..^.J.4%..|....b| +00000010 31 f8 7a 1a 35 35 95 84 46 50 fb d1 66 97 61 2c |1.z.55..FP..f.a,|" +"2019-09-24 01:04:42.937 UTC [msp.identity] Verify -> DEBU 1186 Verify: sig = 00000000 30 45 02 21 00 87 57 ae 0d 02 5f 43 29 46 c6 f9 |0E.!..W..._C)F..| +00000010 c2 8a 9a 19 ed 7d 5b cc a7 a4 e8 cc ed 44 5b c4 |.....}[......D[.| +00000020 d3 c4 9d 21 d8 02 20 02 97 76 37 27 51 03 fb 02 |...!.. ..v7'Q...| +00000030 36 e8 c7 9c 4d 44 f0 75 2a 7c 2e 7f 7d e4 ea 38 |6...MD.u*|..}..8| +00000040 90 57 bf cb c4 b7 75 |.W....u|" +"2019-09-24 01:04:42.937 UTC [cauthdsl] func2 -> DEBU 1187 0xc00278c7e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:42.937 UTC [cauthdsl] func1 -> DEBU 1188 0xc00278c7e0 gate 1569287082936623300 evaluation succeeds" +"2019-09-24 01:04:42.937 UTC [policies] Evaluate -> DEBU 1189 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.937 UTC [policies] Evaluate -> DEBU 118a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:42.938 UTC [policies] Evaluate -> DEBU 118b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:42.938 UTC [policies] Evaluate -> DEBU 118c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:42.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 118d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:42.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 118e Exiting" +"2019-09-24 01:04:42.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 118f Exiting" +"2019-09-24 01:04:43.584 UTC [gossip.comm] func1 -> DEBU 1190 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.585 UTC [gossip.gossip] handleMessage -> DEBU 1191 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.585 UTC [gossip.gossip] handleMessage -> DEBU 1192 Exiting" +"2019-09-24 01:04:43.586 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1193 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.586 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1194 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:43.587 UTC [msp.identity] Verify -> DEBU 1195 Verify: digest = 00000000 09 d8 73 e6 5e a2 4b 91 17 f8 30 a9 59 83 ac 5b |..s.^.K...0.Y..[| +00000010 15 f6 c5 27 71 8b 48 30 ac fb 5a 23 ec 6c 90 e0 |...'q.H0..Z#.l..|" +"2019-09-24 01:04:43.587 UTC [msp.identity] Verify -> DEBU 1196 Verify: sig = 00000000 30 44 02 20 5f 92 80 a6 a7 01 ed be 21 cd cc 70 |0D. _.......!..p| +00000010 71 dd 39 6a d3 ee a4 6f 92 af 70 d1 dd 8b 80 cc |q.9j...o..p.....| +00000020 3c 27 45 1a 02 20 17 db fc 89 f0 41 fe 80 03 c6 |<'E.. .....A....| +00000030 73 98 b1 03 d1 69 87 a1 95 71 7f 38 a2 ae af 22 |s....i...q.8..."| +00000040 bf f4 29 62 bf 8a |..)b..|" +"2019-09-24 01:04:43.588 UTC [gossip.discovery] handleAliveMessage -> DEBU 1197 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 1198 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:43.588 UTC [gossip.discovery] learnExistingMembers -> DEBU 1199 updating membership: timestamp: " +"2019-09-24 01:04:43.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 119a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:43.589 UTC [gossip.discovery] learnExistingMembers -> DEBU 119b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:43.590 UTC [gossip.discovery] learnExistingMembers -> DEBU 119c Exiting" +"2019-09-24 01:04:43.590 UTC [gossip.discovery] handleAliveMessage -> DEBU 119d Exiting" +"2019-09-24 01:04:43.590 UTC [gossip.discovery] handleMsgFromComm -> DEBU 119e Exiting" +"2019-09-24 01:04:43.592 UTC [msp] DeserializeIdentity -> DEBU 119f Obtaining identity" +"2019-09-24 01:04:43.593 UTC [msp] DeserializeIdentity -> DEBU 11a0 Obtaining identity" +"2019-09-24 01:04:43.594 UTC [msp] DeserializeIdentity -> DEBU 11a1 Obtaining identity" +"2019-09-24 01:04:43.596 UTC [gossip.comm] Send -> DEBU 11a4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:43.596 UTC [msp] DeserializeIdentity -> DEBU 11a5 Obtaining identity" +"2019-09-24 01:04:43.594 UTC [gossip.comm] func1 -> DEBU 11a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.595 UTC [gossip.comm] func1 -> DEBU 11a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.596 UTC [gossip.comm] Send -> DEBU 11a6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:43.596 UTC [gossip.comm] sendToEndpoint -> DEBU 11a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.597 UTC [gossip.comm] sendToEndpoint -> DEBU 11a9 Exiting" +"2019-09-24 01:04:43.596 UTC [gossip.gossip] handleMessage -> DEBU 11a8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.597 UTC [gossip.gossip] handleMessage -> DEBU 11aa Exiting" +"2019-09-24 01:04:43.598 UTC [gossip.gossip] handleMessage -> DEBU 11ab Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ac Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.597 UTC [gossip.comm] sendToEndpoint -> DEBU 11ad Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11ae Exiting" +"2019-09-24 01:04:43.598 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:43.599 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b1 Exiting" +"2019-09-24 01:04:43.598 UTC [gossip.comm] sendToEndpoint -> DEBU 11af Exiting" +"2019-09-24 01:04:43.599 UTC [gossip.gossip] handleMessage -> DEBU 11b2 Exiting" +"2019-09-24 01:04:43.864 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 11b3 Sleeping 25s" +"2019-09-24 01:04:44.199 UTC [gossip.comm] func1 -> DEBU 11b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.201 UTC [gossip.gossip] handleMessage -> DEBU 11b5 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.201 UTC [gossip.gossip] handleMessage -> DEBU 11b6 Exiting" +"2019-09-24 01:04:44.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.202 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11b8 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:44.202 UTC [msp] DeserializeIdentity -> DEBU 11b9 Obtaining identity" +"2019-09-24 01:04:44.202 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11ba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:44.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:44.203 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11bc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11bd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11be This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:44.203 UTC [policies] Evaluate -> DEBU 11bf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:44.204 UTC [cauthdsl] func1 -> DEBU 11c0 0xc0026d9de0 gate 1569287084204060500 evaluation starts" +"2019-09-24 01:04:44.204 UTC [gossip.comm] func1 -> DEBU 11c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.204 UTC [cauthdsl] func2 -> DEBU 11c3 0xc0026d9de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:44.205 UTC [cauthdsl] func2 -> DEBU 11c4 0xc0026d9de0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:44.204 UTC [gossip.gossip] handleMessage -> DEBU 11c2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.207 UTC [cauthdsl] func2 -> DEBU 11c5 0xc0026d9de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:44.207 UTC [cauthdsl] func2 -> DEBU 11c7 0xc0026d9de0 principal evaluation fails" +"2019-09-24 01:04:44.207 UTC [gossip.comm] func1 -> DEBU 11c6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.208 UTC [gossip.comm] func1 -> DEBU 11c8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.207 UTC [cauthdsl] func1 -> DEBU 11c9 0xc0026d9de0 gate 1569287084204060500 evaluation fails" +"2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11ca Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11cb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:44.209 UTC [policies] Evaluate -> DEBU 11cc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:44.210 UTC [cauthdsl] func1 -> DEBU 11cd 0xc002763670 gate 1569287084209673200 evaluation starts" +"2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11ce 0xc002763670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11cf 0xc002763670 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:44.210 UTC [cauthdsl] func2 -> DEBU 11d0 0xc002763670 principal matched by identity 0" +"2019-09-24 01:04:44.210 UTC [gossip.comm] func1 -> DEBU 11d1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.210 UTC [msp.identity] Verify -> DEBU 11d2 Verify: digest = 00000000 8d ab cb 81 88 a2 5c d6 d9 ce 5b 30 38 10 d3 32 |......\...[08..2| +00000010 25 c8 56 6d ac 01 1e 70 b3 c5 cb 5b 1b bd 91 cf |%.Vm...p...[....|" +"2019-09-24 01:04:44.211 UTC [msp.identity] Verify -> DEBU 11d3 Verify: sig = 00000000 30 44 02 20 59 8e 78 e9 5a 3b 64 6b d4 32 d2 9d |0D. Y.x.Z;dk.2..| +00000010 f7 e6 49 6e 2b ee f6 20 7e c1 d9 de 78 04 7d 6e |..In+.. ~...x.}n| +00000020 87 b6 ae c3 02 20 2a 1c 53 bb f4 ce 7a b3 ff 1e |..... *.S...z...| +00000030 bd c4 37 b3 de 57 81 4f 28 f0 b2 21 00 09 f8 dc |..7..W.O(..!....| +00000040 fe f9 f3 8e c8 80 |......|" +"2019-09-24 01:04:44.211 UTC [cauthdsl] func2 -> DEBU 11d4 0xc002763670 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:44.211 UTC [cauthdsl] func1 -> DEBU 11d5 0xc002763670 gate 1569287084209673200 evaluation succeeds" +"2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:44.212 UTC [policies] Evaluate -> DEBU 11d9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:44.212 UTC [gossip.discovery] handleAliveMessage -> DEBU 11da Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.212 UTC [gossip.discovery] learnExistingMembers -> DEBU 11db Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11dc updating membership: timestamp: " +"2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11dd Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11de Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:44.213 UTC [gossip.discovery] learnExistingMembers -> DEBU 11df Exiting" +"2019-09-24 01:04:44.214 UTC [gossip.discovery] handleAliveMessage -> DEBU 11e0 Exiting" +"2019-09-24 01:04:44.214 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e1 Exiting" +"2019-09-24 01:04:44.215 UTC [gossip.gossip] handleMessage -> DEBU 11e2 Exiting" +"2019-09-24 01:04:44.216 UTC [gossip.gossip] handleMessage -> DEBU 11e4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.215 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.216 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e5 Exiting" +"2019-09-24 01:04:44.217 UTC [gossip.discovery] handleMsgFromComm -> DEBU 11e6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.217 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 11e7 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:44.217 UTC [msp] DeserializeIdentity -> DEBU 11e8 Obtaining identity" +"2019-09-24 01:04:44.217 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 11e9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:44.217 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11ea Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:44.218 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 11eb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:44.218 UTC [policies] Evaluate -> DEBU 11ee == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:44.218 UTC [cauthdsl] func1 -> DEBU 11ef 0xc002675070 gate 1569287084218478400 evaluation starts" +"2019-09-24 01:04:44.218 UTC [cauthdsl] func2 -> DEBU 11f0 0xc002675070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:44.218 UTC [cauthdsl] func2 -> DEBU 11f1 0xc002675070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:44.219 UTC [cauthdsl] func2 -> DEBU 11f2 0xc002675070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:44.219 UTC [cauthdsl] func2 -> DEBU 11f3 0xc002675070 principal evaluation fails" +"2019-09-24 01:04:44.219 UTC [cauthdsl] func1 -> DEBU 11f4 0xc002675070 gate 1569287084218478400 evaluation fails" +"2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:44.219 UTC [policies] Evaluate -> DEBU 11f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:44.220 UTC [cauthdsl] func1 -> DEBU 11f8 0xc0026758b0 gate 1569287084220287400 evaluation starts" +"2019-09-24 01:04:44.220 UTC [cauthdsl] func2 -> DEBU 11f9 0xc0026758b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:44.224 UTC [cauthdsl] func2 -> DEBU 11fa 0xc0026758b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:44.224 UTC [cauthdsl] func2 -> DEBU 11fb 0xc0026758b0 principal matched by identity 0" +"2019-09-24 01:04:44.224 UTC [msp.identity] Verify -> DEBU 11fc Verify: digest = 00000000 8c 5a b0 51 67 93 fe bf 74 19 4c 02 f5 98 0f 31 |.Z.Qg...t.L....1| +00000010 02 45 1b ed 7c 66 95 13 5c 1f 58 49 74 e5 2f 9e |.E..|f..\.XIt./.|" +"2019-09-24 01:04:44.225 UTC [msp.identity] Verify -> DEBU 11fd Verify: sig = 00000000 30 44 02 20 45 02 38 7e 48 91 94 b6 65 b2 63 11 |0D. E.8~H...e.c.| +00000010 a9 43 1c 41 60 e6 ae 74 db ef 3b 6f 72 4f 73 60 |.C.A`..t..;orOs`| +00000020 be 08 b4 4a 02 20 7e 3c d1 2c 40 31 64 87 f2 8e |...J. ~<.,@1d...| +00000030 d3 91 9c fd 42 11 4b bf 22 82 5b 89 cb 4b ab bc |....B.K.".[..K..| +00000040 67 a2 64 4c 8d 11 |g.dL..|" +"2019-09-24 01:04:44.225 UTC [cauthdsl] func2 -> DEBU 11fe 0xc0026758b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:44.228 UTC [cauthdsl] func1 -> DEBU 11ff 0xc0026758b0 gate 1569287084220287400 evaluation succeeds" +"2019-09-24 01:04:44.228 UTC [gossip.gossip] handleMessage -> DEBU 1200 Exiting" +"2019-09-24 01:04:44.228 UTC [gossip.comm] func1 -> DEBU 1202 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.228 UTC [policies] Evaluate -> DEBU 1201 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1203 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1204 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:44.229 UTC [policies] Evaluate -> DEBU 1205 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:44.229 UTC [gossip.discovery] handleAliveMessage -> DEBU 1206 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.229 UTC [gossip.discovery] learnExistingMembers -> DEBU 1207 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 1208 updating membership: timestamp: " +"2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 1209 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 120a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:44.230 UTC [gossip.discovery] learnExistingMembers -> DEBU 120b Exiting" +"2019-09-24 01:04:44.231 UTC [gossip.discovery] handleAliveMessage -> DEBU 120c Exiting" +"2019-09-24 01:04:44.231 UTC [gossip.discovery] handleMsgFromComm -> DEBU 120d Exiting" +"2019-09-24 01:04:44.231 UTC [gossip.gossip] handleMessage -> DEBU 120e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.231 UTC [gossip.gossip] handleMessage -> DEBU 120f Exiting" +"2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1210 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1212 Exiting" +"2019-09-24 01:04:44.232 UTC [gossip.gossip] handleMessage -> DEBU 1211 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.232 UTC [gossip.gossip] handleMessage -> DEBU 1213 Exiting" +"2019-09-24 01:04:44.232 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1214 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1215 Exiting" +"2019-09-24 01:04:44.233 UTC [gossip.gossip] handleMessage -> DEBU 1216 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.233 UTC [gossip.gossip] handleMessage -> DEBU 1217 Exiting" +"2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1218 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.233 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1219 Exiting" +"2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121a Obtaining identity" +"2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121b Obtaining identity" +"2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121c Obtaining identity" +"2019-09-24 01:04:44.234 UTC [msp] DeserializeIdentity -> DEBU 121d Obtaining identity" +"2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 121e Obtaining identity" +"2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 121f Obtaining identity" +"2019-09-24 01:04:44.235 UTC [msp] DeserializeIdentity -> DEBU 1220 Obtaining identity" +"2019-09-24 01:04:44.236 UTC [gossip.comm] Send -> DEBU 1221 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:44.236 UTC [gossip.comm] sendToEndpoint -> DEBU 1222 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.236 UTC [gossip.comm] sendToEndpoint -> DEBU 1223 Exiting" +"2019-09-24 01:04:44.236 UTC [msp] DeserializeIdentity -> DEBU 1224 Obtaining identity" +"2019-09-24 01:04:44.238 UTC [msp] DeserializeIdentity -> DEBU 1225 Obtaining identity" +"2019-09-24 01:04:44.238 UTC [gossip.comm] Send -> DEBU 1226 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:44.239 UTC [msp] DeserializeIdentity -> DEBU 1227 Obtaining identity" +"2019-09-24 01:04:44.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1228 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.240 UTC [gossip.comm] sendToEndpoint -> DEBU 1229 Exiting" +"2019-09-24 01:04:44.241 UTC [msp] DeserializeIdentity -> DEBU 122a Obtaining identity" +"2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122b Obtaining identity" +"2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122c Obtaining identity" +"2019-09-24 01:04:44.242 UTC [msp] DeserializeIdentity -> DEBU 122d Obtaining identity" +"2019-09-24 01:04:44.243 UTC [gossip.comm] Send -> DEBU 122e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:44.243 UTC [msp] DeserializeIdentity -> DEBU 122f Obtaining identity" +"2019-09-24 01:04:44.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1230 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.244 UTC [gossip.comm] sendToEndpoint -> DEBU 1231 Exiting" +"2019-09-24 01:04:44.244 UTC [gossip.comm] Send -> DEBU 1232 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1233 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 1234 Exiting" +"2019-09-24 01:04:44.261 UTC [msp] GetDefaultSigningIdentity -> DEBU 1235 Obtaining default signing identity" +"2019-09-24 01:04:44.261 UTC [msp.identity] Sign -> DEBU 1236 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151015 " +"2019-09-24 01:04:44.261 UTC [msp.identity] Sign -> DEBU 1237 Sign: digest: 6F189EBB11B9A7676DDBEB21A38816044BED9CB4C6E9F04FA98D2126B52B7197 " +"2019-09-24 01:04:44.262 UTC [msp] GetDefaultSigningIdentity -> DEBU 1238 Obtaining default signing identity" +"2019-09-24 01:04:44.262 UTC [msp.identity] Sign -> DEBU 1239 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:44.262 UTC [msp.identity] Sign -> DEBU 123a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:44.262 UTC [gossip.discovery] periodicalSendAlive -> DEBU 123b Sleeping 5s" +"2019-09-24 01:04:44.265 UTC [msp] DeserializeIdentity -> DEBU 123c Obtaining identity" +"2019-09-24 01:04:44.265 UTC [msp] DeserializeIdentity -> DEBU 123d Obtaining identity" +"2019-09-24 01:04:44.265 UTC [gossip.comm] Send -> DEBU 123e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:44.266 UTC [msp] DeserializeIdentity -> DEBU 123f Obtaining identity" +"2019-09-24 01:04:44.266 UTC [gossip.comm] Send -> DEBU 1240 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:44.266 UTC [msp] DeserializeIdentity -> DEBU 1241 Obtaining identity" +"2019-09-24 01:04:44.266 UTC [gossip.comm] Send -> DEBU 1242 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1243 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1244 Exiting" +"2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1245 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:44.266 UTC [gossip.comm] sendToEndpoint -> DEBU 1246 Exiting" +"2019-09-24 01:04:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1247 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:44.267 UTC [gossip.comm] sendToEndpoint -> DEBU 1248 Exiting" +"2019-09-24 01:04:45.723 UTC [msp] DeserializeIdentity -> DEBU 1249 Obtaining identity" +"2019-09-24 01:04:45.724 UTC [msp] DeserializeIdentity -> DEBU 124a Obtaining identity" +"2019-09-24 01:04:45.725 UTC [gossip.comm] Send -> DEBU 124b Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124d Exiting" +"2019-09-24 01:04:45.726 UTC [gossip.comm] sendToEndpoint -> DEBU 124e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.726 UTC [gossip.comm] sendToEndpoint -> DEBU 1250 Exiting" +"2019-09-24 01:04:45.725 UTC [gossip.comm] sendToEndpoint -> DEBU 124f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.727 UTC [gossip.comm] sendToEndpoint -> DEBU 1252 Exiting" +"2019-09-24 01:04:45.727 UTC [gossip.comm] func1 -> DEBU 1251 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.728 UTC [gossip.gossip] handleMessage -> DEBU 1253 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.728 UTC [gossip.comm] func1 -> DEBU 1254 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.728 UTC [msp] DeserializeIdentity -> DEBU 1255 Obtaining identity" +"2019-09-24 01:04:45.730 UTC [gossip.comm] func1 -> DEBU 1256 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.730 UTC [msp] DeserializeIdentity -> DEBU 1257 Obtaining identity" +"2019-09-24 01:04:45.731 UTC [msp] DeserializeIdentity -> DEBU 1258 Obtaining identity" +"2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1259 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 125a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 125b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.732 UTC [policies] Evaluate -> DEBU 125e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.732 UTC [cauthdsl] func1 -> DEBU 125f 0xc002612660 gate 1569287085732817600 evaluation starts" +"2019-09-24 01:04:45.732 UTC [cauthdsl] func2 -> DEBU 1260 0xc002612660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.732 UTC [cauthdsl] func2 -> DEBU 1261 0xc002612660 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.733 UTC [cauthdsl] func2 -> DEBU 1262 0xc002612660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.733 UTC [cauthdsl] func2 -> DEBU 1263 0xc002612660 principal evaluation fails" +"2019-09-24 01:04:45.734 UTC [cauthdsl] func1 -> DEBU 1264 0xc002612660 gate 1569287085732817600 evaluation fails" +"2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1265 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1266 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.734 UTC [policies] Evaluate -> DEBU 1267 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.734 UTC [cauthdsl] func1 -> DEBU 1268 0xc002612f90 gate 1569287085734816500 evaluation starts" +"2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 1269 0xc002612f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 126a 0xc002612f90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.735 UTC [cauthdsl] func2 -> DEBU 126b 0xc002612f90 principal matched by identity 0" +"2019-09-24 01:04:45.735 UTC [msp.identity] Verify -> DEBU 126c Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:45.736 UTC [msp.identity] Verify -> DEBU 126d Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:45.736 UTC [cauthdsl] func2 -> DEBU 126e 0xc002612f90 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.736 UTC [cauthdsl] func1 -> DEBU 126f 0xc002612f90 gate 1569287085734816500 evaluation succeeds" +"2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1270 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1271 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1272 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.737 UTC [policies] Evaluate -> DEBU 1273 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.738 UTC [msp.identity] Verify -> DEBU 1274 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:45.738 UTC [msp.identity] Verify -> DEBU 1275 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:45.739 UTC [msp] DeserializeIdentity -> DEBU 1276 Obtaining identity" +"2019-09-24 01:04:45.739 UTC [msp] DeserializeIdentity -> DEBU 1277 Obtaining identity" +"2019-09-24 01:04:45.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1278 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1279 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 127a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.741 UTC [policies] Evaluate -> DEBU 127b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.742 UTC [policies] Evaluate -> DEBU 127c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.744 UTC [policies] Evaluate -> DEBU 127d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.750 UTC [cauthdsl] func1 -> DEBU 127e 0xc0025f6f40 gate 1569287085745085500 evaluation starts" +"2019-09-24 01:04:45.750 UTC [cauthdsl] func2 -> DEBU 127f 0xc0025f6f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1280 0xc0025f6f40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1281 0xc0025f6f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.751 UTC [cauthdsl] func2 -> DEBU 1282 0xc0025f6f40 principal evaluation fails" +"2019-09-24 01:04:45.752 UTC [cauthdsl] func1 -> DEBU 1283 0xc0025f6f40 gate 1569287085745085500 evaluation fails" +"2019-09-24 01:04:45.752 UTC [policies] Evaluate -> DEBU 1284 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.753 UTC [policies] Evaluate -> DEBU 1285 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.754 UTC [policies] Evaluate -> DEBU 1286 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.755 UTC [cauthdsl] func1 -> DEBU 1287 0xc0025f7780 gate 1569287085754997400 evaluation starts" +"2019-09-24 01:04:45.755 UTC [cauthdsl] func2 -> DEBU 1288 0xc0025f7780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.755 UTC [cauthdsl] func2 -> DEBU 1289 0xc0025f7780 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.756 UTC [cauthdsl] func2 -> DEBU 128a 0xc0025f7780 principal matched by identity 0" +"2019-09-24 01:04:45.756 UTC [msp.identity] Verify -> DEBU 128b Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:45.757 UTC [msp.identity] Verify -> DEBU 128c Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:45.757 UTC [cauthdsl] func2 -> DEBU 128d 0xc0025f7780 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.757 UTC [cauthdsl] func1 -> DEBU 128e 0xc0025f7780 gate 1569287085754997400 evaluation succeeds" +"2019-09-24 01:04:45.757 UTC [policies] Evaluate -> DEBU 128f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.758 UTC [policies] Evaluate -> DEBU 1290 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.758 UTC [policies] Evaluate -> DEBU 1291 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.759 UTC [msp] DeserializeIdentity -> DEBU 1292 Obtaining identity" +"2019-09-24 01:04:45.759 UTC [msp] DeserializeIdentity -> DEBU 1293 Obtaining identity" +"2019-09-24 01:04:45.760 UTC [gossip.pull] Hello -> DEBU 1294 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:45.760 UTC [msp] DeserializeIdentity -> DEBU 1295 Obtaining identity" +"2019-09-24 01:04:45.761 UTC [msp] DeserializeIdentity -> DEBU 1296 Obtaining identity" +"2019-09-24 01:04:45.761 UTC [gossip.comm] Send -> DEBU 1297 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:45.762 UTC [gossip.comm] sendToEndpoint -> DEBU 1298 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.762 UTC [gossip.comm] sendToEndpoint -> DEBU 1299 Exiting" +"2019-09-24 01:04:45.763 UTC [policies] Evaluate -> DEBU 129a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.763 UTC [gossip.comm] func1 -> DEBU 129b Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.764 UTC [msp.identity] Verify -> DEBU 129c Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:45.764 UTC [msp.identity] Verify -> DEBU 129d Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:45.765 UTC [gossip.gossip] handleMessage -> DEBU 129e Exiting" +"2019-09-24 01:04:45.765 UTC [gossip.gossip] handleMessage -> DEBU 129f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.765 UTC [msp.identity] Verify -> DEBU 12a0 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:45.766 UTC [msp.identity] Verify -> DEBU 12a1 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:45.767 UTC [msp.identity] Verify -> DEBU 12a2 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:45.767 UTC [msp.identity] Verify -> DEBU 12a3 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:45.768 UTC [msp] DeserializeIdentity -> DEBU 12a4 Obtaining identity" +"2019-09-24 01:04:45.774 UTC [msp] DeserializeIdentity -> DEBU 12a5 Obtaining identity" +"2019-09-24 01:04:45.775 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12a6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.775 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12a7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.776 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12a8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.776 UTC [policies] Evaluate -> DEBU 12a9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.776 UTC [policies] Evaluate -> DEBU 12aa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.777 UTC [policies] Evaluate -> DEBU 12ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.777 UTC [cauthdsl] func1 -> DEBU 12ac 0xc0025928b0 gate 1569287085777317300 evaluation starts" +"2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12ad 0xc0025928b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12ae 0xc0025928b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.777 UTC [cauthdsl] func2 -> DEBU 12af 0xc0025928b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.778 UTC [cauthdsl] func2 -> DEBU 12b0 0xc0025928b0 principal evaluation fails" +"2019-09-24 01:04:45.779 UTC [cauthdsl] func1 -> DEBU 12b1 0xc0025928b0 gate 1569287085777317300 evaluation fails" +"2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.779 UTC [policies] Evaluate -> DEBU 12b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.780 UTC [cauthdsl] func1 -> DEBU 12b5 0xc002593120 gate 1569287085779813000 evaluation starts" +"2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b6 0xc002593120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b7 0xc002593120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.780 UTC [cauthdsl] func2 -> DEBU 12b8 0xc002593120 principal matched by identity 0" +"2019-09-24 01:04:45.780 UTC [msp.identity] Verify -> DEBU 12b9 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:45.780 UTC [msp.identity] Verify -> DEBU 12ba Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:45.781 UTC [cauthdsl] func2 -> DEBU 12bb 0xc002593120 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.781 UTC [cauthdsl] func1 -> DEBU 12bc 0xc002593120 gate 1569287085779813000 evaluation succeeds" +"2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12bd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12be == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.781 UTC [policies] Evaluate -> DEBU 12bf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.782 UTC [policies] Evaluate -> DEBU 12c0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.782 UTC [msp] DeserializeIdentity -> DEBU 12c1 Obtaining identity" +"2019-09-24 01:04:45.782 UTC [msp] DeserializeIdentity -> DEBU 12c2 Obtaining identity" +"2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12c3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.783 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12c5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.783 UTC [policies] Evaluate -> DEBU 12c8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func1 -> DEBU 12c9 0xc00257ebc0 gate 1569287085783842000 evaluation starts" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12ca 0xc00257ebc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cb 0xc00257ebc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cc 0xc00257ebc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func2 -> DEBU 12cd 0xc00257ebc0 principal evaluation fails" +"2019-09-24 01:04:45.784 UTC [cauthdsl] func1 -> DEBU 12ce 0xc00257ebc0 gate 1569287085783842000 evaluation fails" +"2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12cf Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.785 UTC [policies] Evaluate -> DEBU 12d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.786 UTC [cauthdsl] func1 -> DEBU 12d2 0xc00257f7b0 gate 1569287085786024100 evaluation starts" +"2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d3 0xc00257f7b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d4 0xc00257f7b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.786 UTC [cauthdsl] func2 -> DEBU 12d5 0xc00257f7b0 principal matched by identity 0" +"2019-09-24 01:04:45.786 UTC [msp.identity] Verify -> DEBU 12d6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:45.787 UTC [msp.identity] Verify -> DEBU 12d7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:45.787 UTC [cauthdsl] func2 -> DEBU 12d8 0xc00257f7b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.787 UTC [cauthdsl] func1 -> DEBU 12d9 0xc00257f7b0 gate 1569287085786024100 evaluation succeeds" +"2019-09-24 01:04:45.787 UTC [policies] Evaluate -> DEBU 12da Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12db == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12dc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.788 UTC [policies] Evaluate -> DEBU 12dd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.788 UTC [gossip.gossip] handleMessage -> DEBU 12de Exiting" +"2019-09-24 01:04:45.789 UTC [gossip.gossip] handleMessage -> DEBU 12df Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.789 UTC [msp] DeserializeIdentity -> DEBU 12e0 Obtaining identity" +"2019-09-24 01:04:45.790 UTC [msp] DeserializeIdentity -> DEBU 12e1 Obtaining identity" +"2019-09-24 01:04:45.790 UTC [msp] DeserializeIdentity -> DEBU 12e2 Obtaining identity" +"2019-09-24 01:04:45.791 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 12e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.792 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 12e5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.792 UTC [policies] Evaluate -> DEBU 12e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.792 UTC [cauthdsl] func1 -> DEBU 12e9 0xc00256f330 gate 1569287085792297300 evaluation starts" +"2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12ea 0xc00256f330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12eb 0xc00256f330 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.793 UTC [cauthdsl] func2 -> DEBU 12ec 0xc00256f330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.794 UTC [cauthdsl] func2 -> DEBU 12ed 0xc00256f330 principal evaluation fails" +"2019-09-24 01:04:45.794 UTC [cauthdsl] func1 -> DEBU 12ee 0xc00256f330 gate 1569287085792297300 evaluation fails" +"2019-09-24 01:04:45.794 UTC [policies] Evaluate -> DEBU 12ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.795 UTC [policies] Evaluate -> DEBU 12f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.795 UTC [policies] Evaluate -> DEBU 12f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.796 UTC [cauthdsl] func1 -> DEBU 12f2 0xc00256fb80 gate 1569287085796528500 evaluation starts" +"2019-09-24 01:04:45.796 UTC [cauthdsl] func2 -> DEBU 12f3 0xc00256fb80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.797 UTC [cauthdsl] func2 -> DEBU 12f4 0xc00256fb80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.797 UTC [cauthdsl] func2 -> DEBU 12f5 0xc00256fb80 principal matched by identity 0" +"2019-09-24 01:04:45.798 UTC [msp.identity] Verify -> DEBU 12f6 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:45.798 UTC [msp.identity] Verify -> DEBU 12f7 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:45.799 UTC [cauthdsl] func2 -> DEBU 12f8 0xc00256fb80 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.799 UTC [cauthdsl] func1 -> DEBU 12f9 0xc00256fb80 gate 1569287085796528500 evaluation succeeds" +"2019-09-24 01:04:45.799 UTC [policies] Evaluate -> DEBU 12fa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.800 UTC [policies] Evaluate -> DEBU 12fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.800 UTC [policies] Evaluate -> DEBU 12fc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.801 UTC [policies] Evaluate -> DEBU 12fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.802 UTC [msp.identity] Verify -> DEBU 12fe Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:45.802 UTC [msp.identity] Verify -> DEBU 12ff Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:45.803 UTC [msp.identity] Verify -> DEBU 1300 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:45.803 UTC [msp.identity] Verify -> DEBU 1301 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:45.804 UTC [msp] DeserializeIdentity -> DEBU 1302 Obtaining identity" +"2019-09-24 01:04:45.805 UTC [msp] DeserializeIdentity -> DEBU 1303 Obtaining identity" +"2019-09-24 01:04:45.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1304 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:45.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1305 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1306 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1307 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1308 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:45.807 UTC [policies] Evaluate -> DEBU 1309 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:45.807 UTC [cauthdsl] func1 -> DEBU 130a 0xc0024de240 gate 1569287085807903800 evaluation starts" +"2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130b 0xc0024de240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130c 0xc0024de240 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130d 0xc0024de240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:45.808 UTC [cauthdsl] func2 -> DEBU 130e 0xc0024de240 principal evaluation fails" +"2019-09-24 01:04:45.808 UTC [cauthdsl] func1 -> DEBU 130f 0xc0024de240 gate 1569287085807903800 evaluation fails" +"2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1310 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1311 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:45.809 UTC [policies] Evaluate -> DEBU 1312 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:45.809 UTC [cauthdsl] func1 -> DEBU 1313 0xc0024dea80 gate 1569287085809946700 evaluation starts" +"2019-09-24 01:04:45.810 UTC [cauthdsl] func2 -> DEBU 1314 0xc0024dea80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:45.810 UTC [cauthdsl] func2 -> DEBU 1315 0xc0024dea80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:45.811 UTC [cauthdsl] func2 -> DEBU 1316 0xc0024dea80 principal matched by identity 0" +"2019-09-24 01:04:45.811 UTC [msp.identity] Verify -> DEBU 1317 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:45.812 UTC [msp.identity] Verify -> DEBU 1318 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:45.812 UTC [cauthdsl] func2 -> DEBU 1319 0xc0024dea80 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:45.812 UTC [cauthdsl] func1 -> DEBU 131a 0xc0024dea80 gate 1569287085809946700 evaluation succeeds" +"2019-09-24 01:04:45.812 UTC [policies] Evaluate -> DEBU 131b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.812 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:45.813 UTC [policies] Evaluate -> DEBU 131d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:45.813 UTC [policies] Evaluate -> DEBU 131e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:45.813 UTC [gossip.gossip] handleMessage -> DEBU 131f Exiting" +"2019-09-24 01:04:45.813 UTC [gossip.gossip] handleMessage -> DEBU 1320 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.815 UTC [gossip.pull] HandleMessage -> DEBU 1321 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.816 UTC [gossip.gossip] handleMessage -> DEBU 1322 Exiting" +"2019-09-24 01:04:45.908 UTC [gossip.comm] func1 -> DEBU 1323 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.908 UTC [gossip.gossip] handleMessage -> DEBU 1324 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.909 UTC [msp] DeserializeIdentity -> DEBU 1325 Obtaining identity" +"2019-09-24 01:04:45.912 UTC [msp] DeserializeIdentity -> DEBU 1326 Obtaining identity" +"2019-09-24 01:04:45.912 UTC [gossip.gossip] handleMessage -> DEBU 1327 Exiting" +"2019-09-24 01:04:45.915 UTC [gossip.comm] func1 -> DEBU 1328 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.915 UTC [gossip.gossip] handleMessage -> DEBU 1329 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.916 UTC [gossip.pull] HandleMessage -> DEBU 132a GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:45.917 UTC [gossip.pull] SendDigest -> DEBU 132b Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:45.917 UTC [gossip.gossip] handleMessage -> DEBU 132c Exiting" +"2019-09-24 01:04:46.112 UTC [gossip.comm] func1 -> DEBU 132d Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.113 UTC [gossip.gossip] handleMessage -> DEBU 132e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.113 UTC [msp] DeserializeIdentity -> DEBU 132f Obtaining identity" +"2019-09-24 01:04:46.113 UTC [msp] DeserializeIdentity -> DEBU 1330 Obtaining identity" +"2019-09-24 01:04:46.114 UTC [msp] DeserializeIdentity -> DEBU 1331 Obtaining identity" +"2019-09-24 01:04:46.114 UTC [gossip.gossip] handleMessage -> DEBU 1332 Exiting" +"2019-09-24 01:04:46.311 UTC [gossip.comm] func1 -> DEBU 1333 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.311 UTC [gossip.gossip] handleMessage -> DEBU 1334 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1335 Obtaining identity" +"2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1336 Obtaining identity" +"2019-09-24 01:04:46.312 UTC [msp] DeserializeIdentity -> DEBU 1337 Obtaining identity" +"2019-09-24 01:04:46.313 UTC [gossip.gossip] handleMessage -> DEBU 1338 Exiting" +"2019-09-24 01:04:46.528 UTC [gossip.comm] func1 -> DEBU 1339 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.529 UTC [gossip.gossip] handleMessage -> DEBU 133a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.530 UTC [gossip.pull] HandleMessage -> DEBU 133b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.530 UTC [gossip.pull] SendDigest -> DEBU 133c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:46.531 UTC [gossip.gossip] handleMessage -> DEBU 133d Exiting" +"2019-09-24 01:04:46.535 UTC [gossip.comm] func1 -> DEBU 133e Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.535 UTC [gossip.gossip] handleMessage -> DEBU 133f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.536 UTC [gossip.gossip] handleMessage -> DEBU 1340 Exiting" +"2019-09-24 01:04:46.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1341 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.536 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1342 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:46.537 UTC [msp.identity] Verify -> DEBU 1343 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +"2019-09-24 01:04:46.538 UTC [msp.identity] Verify -> DEBU 1344 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +00000040 4d 18 6c e0 bf e8 ab |M.l....|" +"2019-09-24 01:04:46.539 UTC [msp.identity] Verify -> DEBU 1345 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:46.539 UTC [msp.identity] Verify -> DEBU 1346 Verify: sig = 00000000 30 45 02 21 00 df 13 9b 17 87 f4 a2 b1 71 bb 24 |0E.!.........q.$| +00000010 db 0d 61 2a ab 41 4e 8f d8 0e 48 29 bf 61 db e6 |..a*.AN...H).a..| +00000020 53 ca af c0 1f 02 20 6f 5d 35 55 8d 9f dc fd 2b |S..... o]5U....+| +00000030 23 4c fd 05 eb db 87 ec 9b 10 4e 7d 53 ca 1d 01 |#L........N}S...| +00000040 00 70 81 0c ba b3 e4 |.p.....|" +"2019-09-24 01:04:46.539 UTC [gossip.discovery] handleAliveMessage -> DEBU 1347 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:46.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 1348 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:46.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 1349 updating membership: timestamp: " +"2019-09-24 01:04:46.540 UTC [gossip.discovery] learnExistingMembers -> DEBU 134a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:46.541 UTC [gossip.discovery] learnExistingMembers -> DEBU 134b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:46.541 UTC [gossip.discovery] learnExistingMembers -> DEBU 134c Exiting" +"2019-09-24 01:04:46.541 UTC [gossip.discovery] handleAliveMessage -> DEBU 134d Exiting" +"2019-09-24 01:04:46.542 UTC [gossip.discovery] handleMsgFromComm -> DEBU 134e Exiting" +"2019-09-24 01:04:46.542 UTC [gossip.discovery] sendMemResponse -> DEBU 134f Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:46.542 UTC [msp] DeserializeIdentity -> DEBU 1350 Obtaining identity" +"2019-09-24 01:04:46.542 UTC [msp] DeserializeIdentity -> DEBU 1351 Obtaining identity" +"2019-09-24 01:04:46.543 UTC [gossip.comm] Send -> DEBU 1352 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.543 UTC [gossip.discovery] sendMemResponse -> DEBU 1353 Exiting, replying with alive: > alive: " +"2019-09-24 01:04:46.544 UTC [gossip.comm] sendToEndpoint -> DEBU 1354 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.544 UTC [gossip.comm] sendToEndpoint -> DEBU 1355 Exiting" +"2019-09-24 01:04:46.770 UTC [gossip.election] waitForInterrupt -> DEBU 1356 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:46.770 UTC [gossip.election] IsLeader -> DEBU 1357 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:46.770 UTC [msp] GetDefaultSigningIdentity -> DEBU 1358 Obtaining default signing identity" +"2019-09-24 01:04:46.770 UTC [msp.identity] Sign -> DEBU 1359 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510051801 " +"2019-09-24 01:04:46.770 UTC [msp.identity] Sign -> DEBU 135a Sign: digest: 0A12D848E96CA50EB7968A63B88F5D80B744732BD6332037DB617024831E1D04 " +"2019-09-24 01:04:46.771 UTC [gossip.election] waitForInterrupt -> DEBU 135b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:46.777 UTC [msp] DeserializeIdentity -> DEBU 135c Obtaining identity" +"2019-09-24 01:04:46.777 UTC [msp] DeserializeIdentity -> DEBU 135d Obtaining identity" +"2019-09-24 01:04:46.778 UTC [msp] DeserializeIdentity -> DEBU 135e Obtaining identity" +"2019-09-24 01:04:46.778 UTC [msp] DeserializeIdentity -> DEBU 135f Obtaining identity" +"2019-09-24 01:04:46.779 UTC [gossip.comm] Send -> DEBU 1360 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:46.779 UTC [msp] DeserializeIdentity -> DEBU 1361 Obtaining identity" +"2019-09-24 01:04:46.779 UTC [gossip.comm] sendToEndpoint -> DEBU 1362 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.779 UTC [msp] DeserializeIdentity -> DEBU 1363 Obtaining identity" +"2019-09-24 01:04:46.779 UTC [gossip.comm] sendToEndpoint -> DEBU 1364 Exiting" +"2019-09-24 01:04:46.840 UTC [gossip.comm] func1 -> DEBU 1365 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.840 UTC [gossip.gossip] handleMessage -> DEBU 1366 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.840 UTC [gossip.pull] HandleMessage -> DEBU 1367 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.841 UTC [msp] DeserializeIdentity -> DEBU 1368 Obtaining identity" +"2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 1369 Obtaining identity" +"2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 136a Obtaining identity" +"2019-09-24 01:04:46.842 UTC [msp] DeserializeIdentity -> DEBU 136b Obtaining identity" +"2019-09-24 01:04:46.843 UTC [msp] DeserializeIdentity -> DEBU 136c Obtaining identity" +"2019-09-24 01:04:46.843 UTC [msp] DeserializeIdentity -> DEBU 136d Obtaining identity" +"2019-09-24 01:04:46.843 UTC [gossip.pull] SendDigest -> DEBU 136e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:46.844 UTC [gossip.gossip] handleMessage -> DEBU 136f Exiting" +"2019-09-24 01:04:46.846 UTC [gossip.comm] func1 -> DEBU 1370 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.846 UTC [gossip.gossip] handleMessage -> DEBU 1371 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.847 UTC [gossip.gossip] handleMessage -> DEBU 1372 Exiting" +"2019-09-24 01:04:46.847 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1373 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.848 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1374 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:46.848 UTC [msp] DeserializeIdentity -> DEBU 1375 Obtaining identity" +"2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1376 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1377 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.849 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1378 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 1379 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 137a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:46.850 UTC [policies] Evaluate -> DEBU 137b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:46.851 UTC [cauthdsl] func1 -> DEBU 137c 0xc0024757c0 gate 1569287086851031600 evaluation starts" +"2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137d 0xc0024757c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137e 0xc0024757c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.851 UTC [cauthdsl] func2 -> DEBU 137f 0xc0024757c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:46.852 UTC [cauthdsl] func2 -> DEBU 1380 0xc0024757c0 principal evaluation fails" +"2019-09-24 01:04:46.852 UTC [cauthdsl] func1 -> DEBU 1381 0xc0024757c0 gate 1569287086851031600 evaluation fails" +"2019-09-24 01:04:46.852 UTC [policies] Evaluate -> DEBU 1382 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.853 UTC [policies] Evaluate -> DEBU 1383 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.853 UTC [policies] Evaluate -> DEBU 1384 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:46.853 UTC [cauthdsl] func1 -> DEBU 1385 0xc0003e6070 gate 1569287086853871100 evaluation starts" +"2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1386 0xc0003e6070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1387 0xc0003e6070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.854 UTC [cauthdsl] func2 -> DEBU 1388 0xc0003e6070 principal matched by identity 0" +"2019-09-24 01:04:46.855 UTC [msp.identity] Verify -> DEBU 1389 Verify: digest = 00000000 e5 fb c8 53 8e 61 60 37 39 1d f8 f3 08 12 6f 33 |...S.a`79.....o3| +00000010 18 a0 36 b2 51 3f 90 49 b6 41 ba 2f e2 e5 7e 2a |..6.Q?.I.A./..~*|" +"2019-09-24 01:04:46.855 UTC [msp.identity] Verify -> DEBU 138a Verify: sig = 00000000 30 44 02 20 76 58 ae eb 68 d1 e0 f6 a1 cf 46 d1 |0D. vX..h.....F.| +00000010 73 bc c5 c9 1c 4d a2 7a a6 66 37 a4 c5 3d fa b7 |s....M.z.f7..=..| +00000020 1f 7f 3f 0f 02 20 3c d0 b7 eb 72 96 23 08 ae a3 |..?.. <...r.#...| +00000030 04 fb f9 98 1c 47 05 81 49 f8 29 25 1a 8d 32 6c |.....G..I.)%..2l| +00000040 b9 09 70 44 d1 fb |..pD..|" +"2019-09-24 01:04:46.856 UTC [cauthdsl] func2 -> DEBU 138b 0xc0003e6070 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:46.856 UTC [cauthdsl] func1 -> DEBU 138c 0xc0003e6070 gate 1569287086853871100 evaluation succeeds" +"2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.856 UTC [policies] Evaluate -> DEBU 138f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:46.857 UTC [policies] Evaluate -> DEBU 1390 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:46.857 UTC [gossip.discovery] handleAliveMessage -> DEBU 1391 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:46.857 UTC [gossip.discovery] learnExistingMembers -> DEBU 1392 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1393 updating membership: timestamp: " +"2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1394 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1395 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:46.858 UTC [gossip.discovery] learnExistingMembers -> DEBU 1396 Exiting" +"2019-09-24 01:04:46.859 UTC [gossip.discovery] handleAliveMessage -> DEBU 1397 Exiting" +"2019-09-24 01:04:46.859 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1398 Exiting" +"2019-09-24 01:04:46.859 UTC [gossip.discovery] sendMemResponse -> DEBU 1399 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:46.859 UTC [msp] DeserializeIdentity -> DEBU 139a Obtaining identity" +"2019-09-24 01:04:46.860 UTC [msp] DeserializeIdentity -> DEBU 139b Obtaining identity" +"2019-09-24 01:04:46.861 UTC [msp] DeserializeIdentity -> DEBU 139c Obtaining identity" +"2019-09-24 01:04:46.861 UTC [gossip.comm] Send -> DEBU 139d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.862 UTC [gossip.discovery] sendMemResponse -> DEBU 139e Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:04:46.862 UTC [gossip.comm] sendToEndpoint -> DEBU 139f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.862 UTC [gossip.comm] sendToEndpoint -> DEBU 13a0 Exiting" +"2019-09-24 01:04:46.879 UTC [gossip.pull] Hello -> DEBU 13a1 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.880 UTC [gossip.pull] Hello -> DEBU 13a3 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.880 UTC [gossip.pull] Hello -> DEBU 13a5 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:46.880 UTC [gossip.comm] sendToEndpoint -> DEBU 13a7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.880 UTC [gossip.comm] Send -> DEBU 13a8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.881 UTC [gossip.comm] sendToEndpoint -> DEBU 13a9 Exiting" +"2019-09-24 01:04:46.880 UTC [gossip.comm] sendToEndpoint -> DEBU 13a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.881 UTC [gossip.comm] sendToEndpoint -> DEBU 13aa Exiting" +"2019-09-24 01:04:46.882 UTC [gossip.comm] sendToEndpoint -> DEBU 13ab Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.882 UTC [gossip.comm] sendToEndpoint -> DEBU 13ac Exiting" +"2019-09-24 01:04:46.883 UTC [gossip.comm] func1 -> DEBU 13ad Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.883 UTC [gossip.comm] func1 -> DEBU 13ae Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.884 UTC [gossip.comm] func1 -> DEBU 13af Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.883 UTC [gossip.gossip] handleMessage -> DEBU 13b0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.884 UTC [gossip.pull] HandleMessage -> DEBU 13b1 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.885 UTC [gossip.gossip] handleMessage -> DEBU 13b2 Exiting" +"2019-09-24 01:04:46.885 UTC [gossip.gossip] handleMessage -> DEBU 13b3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.886 UTC [gossip.pull] HandleMessage -> DEBU 13b4 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b5 Exiting" +"2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.886 UTC [gossip.pull] HandleMessage -> DEBU 13b7 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.886 UTC [gossip.gossip] handleMessage -> DEBU 13b8 Exiting" +"2019-09-24 01:04:46.893 UTC [msp] GetDefaultSigningIdentity -> DEBU 13b9 Obtaining default signing identity" +"2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13ba Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151016 " +"2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13bb Sign: digest: 86CC861171BCA47DDF52E5B1C5EB3BF3FE919D25B0D5C2C25FF7F5A18C1BC881 " +"2019-09-24 01:04:46.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 13bc Obtaining default signing identity" +"2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13bd Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:46.894 UTC [msp.identity] Sign -> DEBU 13be Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:46.895 UTC [gossip.comm] Send -> DEBU 13bf Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.895 UTC [msp] DeserializeIdentity -> DEBU 13c0 Obtaining identity" +"2019-09-24 01:04:46.896 UTC [gossip.comm] sendToEndpoint -> DEBU 13c1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.896 UTC [gossip.comm] sendToEndpoint -> DEBU 13c2 Exiting" +"2019-09-24 01:04:46.896 UTC [gossip.comm] Send -> DEBU 13c3 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.896 UTC [msp] DeserializeIdentity -> DEBU 13c4 Obtaining identity" +"2019-09-24 01:04:46.897 UTC [gossip.comm] Send -> DEBU 13c5 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c8 Exiting" +"2019-09-24 01:04:46.897 UTC [gossip.comm] sendToEndpoint -> DEBU 13c9 Exiting" +"2019-09-24 01:04:46.899 UTC [gossip.comm] func1 -> DEBU 13ca Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.899 UTC [gossip.gossip] handleMessage -> DEBU 13cb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.900 UTC [gossip.gossip] handleMessage -> DEBU 13cc Exiting" +"2019-09-24 01:04:46.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13cd Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13ce Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13cf Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +"2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d0 Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +00000040 35 45 33 bc c3 e3 ae |5E3....|" +"2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:46.901 UTC [msp.identity] Verify -> DEBU 13d2 Verify: sig = 00000000 30 44 02 20 54 d0 0b e1 58 03 58 77 7b 48 1e 6d |0D. T...X.Xw{H.m| +00000010 c4 dd 2c ff 14 0f 32 cf ea 7b b9 c9 e5 17 bd 52 |..,...2..{.....R| +00000020 ec 5f c7 17 02 20 7a d9 ab 37 54 2d e5 25 ef 1f |._... z..7T-.%..| +00000030 3c 85 bd 86 42 af e6 68 6d e3 1f 3d 57 fa 48 00 |<...B..hm..=W.H.| +00000040 a6 dc 8d 46 bd 50 |...F.P|" +"2019-09-24 01:04:46.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 13d3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:46.902 UTC [gossip.discovery] isSentByMe -> DEBU 13d4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:46.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 13d5 Exiting" +"2019-09-24 01:04:46.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13d6 Exiting" +"2019-09-24 01:04:46.906 UTC [gossip.comm] func1 -> DEBU 13d7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.906 UTC [gossip.comm] func1 -> DEBU 13d8 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.906 UTC [gossip.gossip] handleMessage -> DEBU 13d9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.907 UTC [gossip.gossip] handleMessage -> DEBU 13da Exiting" +"2019-09-24 01:04:46.907 UTC [gossip.gossip] handleMessage -> DEBU 13db Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.907 UTC [gossip.pull] HandleMessage -> DEBU 13dc GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.907 UTC [msp] DeserializeIdentity -> DEBU 13dd Obtaining identity" +"2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13de Obtaining identity" +"2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13df Obtaining identity" +"2019-09-24 01:04:46.908 UTC [msp] DeserializeIdentity -> DEBU 13e0 Obtaining identity" +"2019-09-24 01:04:46.909 UTC [msp] DeserializeIdentity -> DEBU 13e2 Obtaining identity" +"2019-09-24 01:04:46.909 UTC [msp] DeserializeIdentity -> DEBU 13e3 Obtaining identity" +"2019-09-24 01:04:46.909 UTC [gossip.discovery] handleMsgFromComm -> DEBU 13e1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.909 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13e4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:46.909 UTC [msp.identity] Verify -> DEBU 13e5 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +"2019-09-24 01:04:46.909 UTC [gossip.pull] SendDigest -> DEBU 13e7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:46.910 UTC [msp.identity] Verify -> DEBU 13e6 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +00000040 4d 18 6c e0 bf e8 ab |M.l....|" +"2019-09-24 01:04:46.910 UTC [gossip.gossip] handleMessage -> DEBU 13e8 Exiting" +"2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 13e9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 13ea Exiting" +"2019-09-24 01:04:46.911 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13eb Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:46.911 UTC [msp.identity] Verify -> DEBU 13ec Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +"2019-09-24 01:04:46.911 UTC [msp.identity] Verify -> DEBU 13ed Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +00000040 35 45 33 bc c3 e3 ae |5E3....|" +"2019-09-24 01:04:46.911 UTC [gossip.comm] func1 -> DEBU 13ee Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.912 UTC [gossip.discovery] isSentByMe -> DEBU 13f1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 13f2 Exiting" +"2019-09-24 01:04:46.912 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 13f3 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 13f4 Obtaining identity" +"2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 13f5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 13f7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:46.913 UTC [policies] Evaluate -> DEBU 13fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:46.913 UTC [cauthdsl] func1 -> DEBU 13fb 0xc0001871d0 gate 1569287086913745000 evaluation starts" +"2019-09-24 01:04:46.913 UTC [cauthdsl] func2 -> DEBU 13fc 0xc0001871d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13fd 0xc0001871d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13fe 0xc0001871d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:46.914 UTC [cauthdsl] func2 -> DEBU 13ff 0xc0001871d0 principal evaluation fails" +"2019-09-24 01:04:46.914 UTC [cauthdsl] func1 -> DEBU 1400 0xc0001871d0 gate 1569287086913745000 evaluation fails" +"2019-09-24 01:04:46.914 UTC [policies] Evaluate -> DEBU 1401 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.915 UTC [policies] Evaluate -> DEBU 1402 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.915 UTC [policies] Evaluate -> DEBU 1403 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:46.915 UTC [cauthdsl] func1 -> DEBU 1404 0xc000187a90 gate 1569287086915540200 evaluation starts" +"2019-09-24 01:04:46.915 UTC [cauthdsl] func2 -> DEBU 1405 0xc000187a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.916 UTC [cauthdsl] func2 -> DEBU 1406 0xc000187a90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.916 UTC [cauthdsl] func2 -> DEBU 1407 0xc000187a90 principal matched by identity 0" +"2019-09-24 01:04:46.916 UTC [msp.identity] Verify -> DEBU 1408 Verify: digest = 00000000 e5 fb c8 53 8e 61 60 37 39 1d f8 f3 08 12 6f 33 |...S.a`79.....o3| +00000010 18 a0 36 b2 51 3f 90 49 b6 41 ba 2f e2 e5 7e 2a |..6.Q?.I.A./..~*|" +"2019-09-24 01:04:46.916 UTC [msp.identity] Verify -> DEBU 1409 Verify: sig = 00000000 30 44 02 20 76 58 ae eb 68 d1 e0 f6 a1 cf 46 d1 |0D. vX..h.....F.| +00000010 73 bc c5 c9 1c 4d a2 7a a6 66 37 a4 c5 3d fa b7 |s....M.z.f7..=..| +00000020 1f 7f 3f 0f 02 20 3c d0 b7 eb 72 96 23 08 ae a3 |..?.. <...r.#...| +00000030 04 fb f9 98 1c 47 05 81 49 f8 29 25 1a 8d 32 6c |.....G..I.)%..2l| +00000040 b9 09 70 44 d1 fb |..pD..|" +"2019-09-24 01:04:46.917 UTC [cauthdsl] func2 -> DEBU 140a 0xc000187a90 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:46.911 UTC [gossip.gossip] handleMessage -> DEBU 13ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.919 UTC [cauthdsl] func1 -> DEBU 140b 0xc000187a90 gate 1569287086915540200 evaluation succeeds" +"2019-09-24 01:04:46.919 UTC [policies] Evaluate -> DEBU 140c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.920 UTC [policies] Evaluate -> DEBU 140d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.920 UTC [policies] Evaluate -> DEBU 140e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:46.922 UTC [policies] Evaluate -> DEBU 1410 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:46.920 UTC [gossip.comm] func1 -> DEBU 140f Got message: GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1411 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:46.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1412 Exiting" +"2019-09-24 01:04:46.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1413 Exiting" +"2019-09-24 01:04:46.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1414 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1415 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:46.924 UTC [msp.identity] Verify -> DEBU 1416 Verify: digest = 00000000 b8 45 87 27 b6 ed 2e 50 83 ad 1f 7d 8a 89 12 2e |.E.'...P...}....| +00000010 21 3d 5d fe 55 b3 e7 b7 9f 12 57 0d 65 c5 0b 7a |!=].U.....W.e..z|" +"2019-09-24 01:04:46.925 UTC [msp.identity] Verify -> DEBU 1417 Verify: sig = 00000000 30 45 02 21 00 84 dd e2 c3 d8 63 5a ce 44 ed eb |0E.!......cZ.D..| +00000010 87 48 f3 ec da 13 ac 78 f1 c7 36 c9 61 cc bb 4c |.H.....x..6.a..L| +00000020 df cc 1c 7b a4 02 20 73 a8 43 a1 a0 08 e4 d1 b8 |...{.. s.C......| +00000030 3d 69 85 1f ce be c2 15 12 ad b5 b2 00 29 d6 ee |=i...........)..| +00000040 4d 18 6c e0 bf e8 ab |M.l....|" +"2019-09-24 01:04:46.925 UTC [gossip.gossip] handleMessage -> DEBU 1418 Exiting" +"2019-09-24 01:04:46.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1419 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 141a Exiting" +"2019-09-24 01:04:46.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 141b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:46.892 UTC [msp.identity] Verify -> DEBU 141c Verify: digest = 00000000 86 cc 86 11 71 bc a4 7d df 52 e5 b1 c5 eb 3b f3 |....q..}.R....;.| +00000010 fe 91 9d 25 b0 d5 c2 c2 5f f7 f5 a1 8c 1b c8 81 |...%...._.......|" +"2019-09-24 01:04:46.896 UTC [msp.identity] Verify -> DEBU 141d Verify: sig = 00000000 30 45 02 21 00 97 b3 50 7c 3b ac 6f 8c 4a c0 af |0E.!...P|;.o.J..| +00000010 af 94 31 14 51 fc 53 6b 7f a6 8e 71 5a 04 37 59 |..1.Q.Sk...qZ.7Y| +00000020 d0 44 4b 59 23 02 20 2e 16 0f 59 a6 20 48 b4 b8 |.DKY#. ...Y. H..| +00000030 dc 78 8e 5d 28 a3 68 f4 16 ac 7a 1c 44 95 44 1b |.x.](.h...z.D.D.| +00000040 35 45 33 bc c3 e3 ae |5E3....|" +"2019-09-24 01:04:46.896 UTC [gossip.discovery] handleAliveMessage -> DEBU 141e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.896 UTC [gossip.discovery] isSentByMe -> DEBU 141f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 1420 Exiting" +"2019-09-24 01:04:46.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1421 Exiting" +"2019-09-24 01:04:46.891 UTC [gossip.gossip] handleMessage -> DEBU 1422 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.897 UTC [gossip.gossip] handleMessage -> DEBU 1423 Exiting" +"2019-09-24 01:04:46.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1424 Got message: GossipMessage: tag:EMPTY mem_req:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1425 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:46.899 UTC [msp] DeserializeIdentity -> DEBU 1426 Obtaining identity" +"2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1427 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1428 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1429 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:46.900 UTC [policies] Evaluate -> DEBU 142c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:46.900 UTC [cauthdsl] func1 -> DEBU 142d 0xc0003f95a0 gate 1569287086900868800 evaluation starts" +"2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 142e 0xc0003f95a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 142f 0xc0003f95a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 1430 0xc0003f95a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:46.901 UTC [cauthdsl] func2 -> DEBU 1431 0xc0003f95a0 principal evaluation fails" +"2019-09-24 01:04:46.901 UTC [cauthdsl] func1 -> DEBU 1432 0xc0003f95a0 gate 1569287086900868800 evaluation fails" +"2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1433 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1434 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:46.902 UTC [policies] Evaluate -> DEBU 1435 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:46.902 UTC [cauthdsl] func1 -> DEBU 1436 0xc0003f9de0 gate 1569287086902486300 evaluation starts" +"2019-09-24 01:04:46.902 UTC [cauthdsl] func2 -> DEBU 1437 0xc0003f9de0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:46.902 UTC [cauthdsl] func2 -> DEBU 1438 0xc0003f9de0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:46.903 UTC [cauthdsl] func2 -> DEBU 1439 0xc0003f9de0 principal matched by identity 0" +"2019-09-24 01:04:46.903 UTC [msp.identity] Verify -> DEBU 143a Verify: digest = 00000000 aa 7b 37 3a 35 a6 f2 b8 5f 05 43 3d cd 41 0c cb |.{7:5..._.C=.A..| +00000010 9e 97 6e 18 69 97 f5 b6 0e 89 d7 4e 8c 5f 8b da |..n.i......N._..|" +"2019-09-24 01:04:46.903 UTC [msp.identity] Verify -> DEBU 143b Verify: sig = 00000000 30 45 02 21 00 b5 ab 0c 58 e4 ab 95 5d ba 6a 98 |0E.!....X...].j.| +00000010 36 04 68 bf 6e e9 83 f2 58 66 42 59 c1 bd 21 a7 |6.h.n...XfBY..!.| +00000020 6a ff 61 b9 23 02 20 75 ac a0 3e 2f 0d a1 21 94 |j.a.#. u..>/..!.| +00000030 8a 16 12 5c 1c 0b db db fe 5a 52 45 fa 13 4f f5 |...\.....ZRE..O.| +00000040 eb d5 88 9c 99 99 38 |......8|" +"2019-09-24 01:04:46.908 UTC [cauthdsl] func2 -> DEBU 143c 0xc0003f9de0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:46.908 UTC [cauthdsl] func1 -> DEBU 143d 0xc0003f9de0 gate 1569287086902486300 evaluation succeeds" +"2019-09-24 01:04:46.908 UTC [policies] Evaluate -> DEBU 143e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.908 UTC [policies] Evaluate -> DEBU 143f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:46.909 UTC [policies] Evaluate -> DEBU 1440 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:46.909 UTC [policies] Evaluate -> DEBU 1441 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:46.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 1442 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1443 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1444 updating membership: timestamp: " +"2019-09-24 01:04:46.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 1445 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:46.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 1446 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:46.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 1447 Exiting" +"2019-09-24 01:04:46.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 1448 Exiting" +"2019-09-24 01:04:46.912 UTC [gossip.discovery] sendMemResponse -> DEBU 1449 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 144b Obtaining identity" +"2019-09-24 01:04:46.912 UTC [msp] DeserializeIdentity -> DEBU 144c Obtaining identity" +"2019-09-24 01:04:46.913 UTC [msp] DeserializeIdentity -> DEBU 144d Obtaining identity" +"2019-09-24 01:04:46.913 UTC [gossip.comm] Send -> DEBU 144e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:46.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 144a Exiting" +"2019-09-24 01:04:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1450 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:46.913 UTC [gossip.comm] sendToEndpoint -> DEBU 1451 Exiting" +"2019-09-24 01:04:46.913 UTC [gossip.discovery] sendMemResponse -> DEBU 144f Exiting, replying with alive: alive:/\r\241!\224\212\026\022\\\034\013\333\333\376ZRE\372\023O\365\353\325\210\234\231\2318" > alive: alive: " +"2019-09-24 01:04:48.545 UTC [gossip.comm] func1 -> DEBU 1452 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.545 UTC [gossip.gossip] handleMessage -> DEBU 1453 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.546 UTC [gossip.gossip] handleMessage -> DEBU 1454 Exiting" +"2019-09-24 01:04:48.546 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1455 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.547 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1456 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:48.547 UTC [msp.identity] Verify -> DEBU 1457 Verify: digest = 00000000 8f e6 97 0a 64 21 37 0f 43 3c df 95 b4 9a 25 69 |....d!7.C<....%i| +00000010 7a 2a 18 a1 bd a4 08 da 61 69 3d 54 c5 b3 d8 e9 |z*......ai=T....|" +"2019-09-24 01:04:48.547 UTC [msp.identity] Verify -> DEBU 1458 Verify: sig = 00000000 30 44 02 20 63 0d 9b 89 5b 55 31 30 03 32 38 59 |0D. c...[U10.28Y| +00000010 54 5e a5 f8 24 d5 5b b5 49 0c 63 d1 60 6c d6 ca |T^..$.[.I.c.`l..| +00000020 a8 f3 b2 65 02 20 06 26 b1 c6 92 3b bc f3 73 a3 |...e. .&...;..s.| +00000030 d4 b6 a2 d7 a2 ab 3a 47 2b 20 60 5e 9e 94 ec a2 |......:G+ `^....| +00000040 c7 2c 3e b4 09 e9 |.,>...|" +"2019-09-24 01:04:48.548 UTC [gossip.discovery] handleAliveMessage -> DEBU 1459 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145b updating membership: timestamp: " +"2019-09-24 01:04:48.548 UTC [gossip.discovery] learnExistingMembers -> DEBU 145c Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:48.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 145d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:48.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 145e Exiting" +"2019-09-24 01:04:48.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 145f Exiting" +"2019-09-24 01:04:48.549 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1460 Exiting" +"2019-09-24 01:04:48.555 UTC [gossip.comm] func1 -> DEBU 1461 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.555 UTC [gossip.gossip] handleMessage -> DEBU 1462 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.555 UTC [gossip.gossip] handleMessage -> DEBU 1463 Exiting" +"2019-09-24 01:04:48.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1464 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.556 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1465 Exiting" +"2019-09-24 01:04:48.556 UTC [gossip.comm] func1 -> DEBU 1466 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.556 UTC [gossip.gossip] handleMessage -> DEBU 1467 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.556 UTC [gossip.gossip] handleMessage -> DEBU 1468 Exiting" +"2019-09-24 01:04:48.557 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1469 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 146a Exiting" +"2019-09-24 01:04:48.558 UTC [msp] DeserializeIdentity -> DEBU 146b Obtaining identity" +"2019-09-24 01:04:48.558 UTC [msp] DeserializeIdentity -> DEBU 146c Obtaining identity" +"2019-09-24 01:04:48.560 UTC [msp] DeserializeIdentity -> DEBU 146d Obtaining identity" +"2019-09-24 01:04:48.561 UTC [gossip.comm] Send -> DEBU 146e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:48.561 UTC [gossip.comm] sendToEndpoint -> DEBU 146f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.561 UTC [gossip.comm] sendToEndpoint -> DEBU 1470 Exiting" +"2019-09-24 01:04:48.561 UTC [msp] DeserializeIdentity -> DEBU 1471 Obtaining identity" +"2019-09-24 01:04:48.562 UTC [gossip.comm] Send -> DEBU 1472 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:48.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1473 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:48.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1474 Exiting" +"2019-09-24 01:04:49.163 UTC [gossip.comm] func1 -> DEBU 1475 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.163 UTC [gossip.gossip] handleMessage -> DEBU 1476 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.163 UTC [gossip.gossip] handleMessage -> DEBU 1477 Exiting" +"2019-09-24 01:04:49.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1478 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.164 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1479 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:49.164 UTC [msp] DeserializeIdentity -> DEBU 147a Obtaining identity" +"2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 147b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 147c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.165 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 147d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.165 UTC [policies] Evaluate -> DEBU 147e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.166 UTC [policies] Evaluate -> DEBU 147f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.166 UTC [policies] Evaluate -> DEBU 1480 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.166 UTC [cauthdsl] func1 -> DEBU 1481 0xc00030ce20 gate 1569287089166684300 evaluation starts" +"2019-09-24 01:04:49.166 UTC [cauthdsl] func2 -> DEBU 1482 0xc00030ce20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1483 0xc00030ce20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1484 0xc00030ce20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.167 UTC [cauthdsl] func2 -> DEBU 1485 0xc00030ce20 principal evaluation fails" +"2019-09-24 01:04:49.167 UTC [cauthdsl] func1 -> DEBU 1486 0xc00030ce20 gate 1569287089166684300 evaluation fails" +"2019-09-24 01:04:49.168 UTC [policies] Evaluate -> DEBU 1487 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.168 UTC [policies] Evaluate -> DEBU 1488 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.169 UTC [policies] Evaluate -> DEBU 1489 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.170 UTC [cauthdsl] func1 -> DEBU 148a 0xc00030dc90 gate 1569287089170580100 evaluation starts" +"2019-09-24 01:04:49.170 UTC [cauthdsl] func2 -> DEBU 148b 0xc00030dc90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.170 UTC [cauthdsl] func2 -> DEBU 148c 0xc00030dc90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.171 UTC [cauthdsl] func2 -> DEBU 148d 0xc00030dc90 principal matched by identity 0" +"2019-09-24 01:04:49.171 UTC [msp.identity] Verify -> DEBU 148e Verify: digest = 00000000 bb fd 90 e3 6b 22 0d 01 1e 67 d1 91 d4 95 bc ce |....k"...g......| +00000010 f9 d2 cc fb 41 f7 f9 e9 88 f6 4c 0a 76 b4 5a d6 |....A.....L.v.Z.|" +"2019-09-24 01:04:49.171 UTC [msp.identity] Verify -> DEBU 148f Verify: sig = 00000000 30 45 02 21 00 a6 80 d2 af ec f7 78 68 59 2b 01 |0E.!.......xhY+.| +00000010 6a 39 02 29 b5 ad e2 15 bd fb dc 3d 86 22 d8 13 |j9.).......=."..| +00000020 9e 40 11 1a d6 02 20 32 8d 39 ad 04 ec d8 a0 df |.@.... 2.9......| +00000030 d8 ec 69 60 70 cd 1e 65 8b d2 41 55 d6 bd 98 c8 |..i`p..e..AU....| +00000040 e1 f1 97 b9 e1 4c 49 |.....LI|" +"2019-09-24 01:04:49.171 UTC [cauthdsl] func2 -> DEBU 1490 0xc00030dc90 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.171 UTC [cauthdsl] func1 -> DEBU 1491 0xc00030dc90 gate 1569287089170580100 evaluation succeeds" +"2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1492 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1493 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.172 UTC [policies] Evaluate -> DEBU 1494 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.174 UTC [policies] Evaluate -> DEBU 1495 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.176 UTC [gossip.discovery] handleAliveMessage -> DEBU 1496 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1497 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:49.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 1498 updating membership: timestamp: " +"2019-09-24 01:04:49.177 UTC [gossip.comm] func1 -> DEBU 1499 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 149a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:49.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 149b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:49.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 149c Exiting" +"2019-09-24 01:04:49.178 UTC [gossip.discovery] handleAliveMessage -> DEBU 149d Exiting" +"2019-09-24 01:04:49.178 UTC [gossip.discovery] handleMsgFromComm -> DEBU 149e Exiting" +"2019-09-24 01:04:49.179 UTC [gossip.gossip] handleMessage -> DEBU 149f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.179 UTC [gossip.gossip] handleMessage -> DEBU 14a0 Exiting" +"2019-09-24 01:04:49.187 UTC [gossip.comm] func1 -> DEBU 14a1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14a3 Exiting" +"2019-09-24 01:04:49.188 UTC [msp] DeserializeIdentity -> DEBU 14a4 Obtaining identity" +"2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a5 Obtaining identity" +"2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a6 Obtaining identity" +"2019-09-24 01:04:49.187 UTC [gossip.comm] func1 -> DEBU 14a7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.199 UTC [msp] DeserializeIdentity -> DEBU 14a8 Obtaining identity" +"2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14a9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14ab Exiting" +"2019-09-24 01:04:49.200 UTC [msp] DeserializeIdentity -> DEBU 14aa Obtaining identity" +"2019-09-24 01:04:49.200 UTC [gossip.gossip] handleMessage -> DEBU 14ac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14ad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.201 UTC [msp] DeserializeIdentity -> DEBU 14ae Obtaining identity" +"2019-09-24 01:04:49.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14af Exiting" +"2019-09-24 01:04:49.201 UTC [msp] DeserializeIdentity -> DEBU 14b0 Obtaining identity" +"2019-09-24 01:04:49.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14b1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.203 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 14b3 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:49.203 UTC [msp] DeserializeIdentity -> DEBU 14b4 Obtaining identity" +"2019-09-24 01:04:49.203 UTC [gossip.comm] func1 -> DEBU 14b5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.209 UTC [gossip.comm] func1 -> DEBU 14b6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.210 UTC [gossip.gossip] handleMessage -> DEBU 14b7 Exiting" +"2019-09-24 01:04:49.210 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 14b8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.210 UTC [gossip.gossip] handleMessage -> DEBU 14b9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.210 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14ba Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.202 UTC [gossip.comm] Send -> DEBU 14b2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:49.211 UTC [msp] DeserializeIdentity -> DEBU 14bb Obtaining identity" +"2019-09-24 01:04:49.211 UTC [gossip.comm] Send -> DEBU 14bc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:49.211 UTC [gossip.comm] sendToEndpoint -> DEBU 14bd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.211 UTC [gossip.comm] sendToEndpoint -> DEBU 14be Exiting" +"2019-09-24 01:04:49.212 UTC [gossip.comm] sendToEndpoint -> DEBU 14bf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.212 UTC [gossip.comm] sendToEndpoint -> DEBU 14c0 Exiting" +"2019-09-24 01:04:49.211 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 14c1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.221 UTC [policies] Evaluate -> DEBU 14c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func1 -> DEBU 14c5 0xc002a92750 gate 1569287089222203300 evaluation starts" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c6 0xc002a92750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c7 0xc002a92750 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c8 0xc002a92750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func2 -> DEBU 14c9 0xc002a92750 principal evaluation fails" +"2019-09-24 01:04:49.222 UTC [cauthdsl] func1 -> DEBU 14ca 0xc002a92750 gate 1569287089222203300 evaluation fails" +"2019-09-24 01:04:49.222 UTC [policies] Evaluate -> DEBU 14cb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.223 UTC [policies] Evaluate -> DEBU 14cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.223 UTC [policies] Evaluate -> DEBU 14cd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.223 UTC [cauthdsl] func1 -> DEBU 14ce 0xc002a93020 gate 1569287089223612800 evaluation starts" +"2019-09-24 01:04:49.223 UTC [cauthdsl] func2 -> DEBU 14cf 0xc002a93020 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.229 UTC [msp] GetDefaultSigningIdentity -> DEBU 14d0 Obtaining default signing identity" +"2019-09-24 01:04:49.229 UTC [msp.identity] Sign -> DEBU 14d2 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151017 " +"2019-09-24 01:04:49.229 UTC [msp.identity] Sign -> DEBU 14d3 Sign: digest: D8A48B08EB9185A28F2572A9660C88B8EABCB1646D9C4F83350BDD1AC8F9D30B " +"2019-09-24 01:04:49.229 UTC [cauthdsl] func2 -> DEBU 14d1 0xc002a93020 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.230 UTC [cauthdsl] func2 -> DEBU 14d4 0xc002a93020 principal matched by identity 0" +"2019-09-24 01:04:49.230 UTC [msp.identity] Verify -> DEBU 14d5 Verify: digest = 00000000 a0 c6 0b 00 e8 49 91 34 f9 47 5d 38 22 86 08 32 |.....I.4.G]8"..2| +00000010 49 09 1d e0 be dd 98 a3 7a 5b 62 3b c1 6c 8c 2c |I.......z[b;.l.,|" +"2019-09-24 01:04:49.230 UTC [msp.identity] Verify -> DEBU 14d7 Verify: sig = 00000000 30 45 02 21 00 ae ce 1a 43 66 d9 f1 68 2b 50 d3 |0E.!....Cf..h+P.| +00000010 96 6f af 85 82 1f af 90 3c a4 cc 0a 4c a8 d4 8b |.o......<...L...| +00000020 c0 79 a1 dd e1 02 20 3d f7 b0 5d 7c 39 83 e6 8d |.y.... =..]|9...| +00000030 18 43 09 30 16 7c 3d 3d 15 c2 28 d1 93 cf 16 45 |.C.0.|==..(....E| +00000040 db 1a b2 40 6e 8d 3d |...@n.=|" +"2019-09-24 01:04:49.230 UTC [msp] GetDefaultSigningIdentity -> DEBU 14d6 Obtaining default signing identity" +"2019-09-24 01:04:49.230 UTC [msp.identity] Sign -> DEBU 14d8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:49.231 UTC [msp.identity] Sign -> DEBU 14d9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:49.231 UTC [gossip.discovery] periodicalSendAlive -> DEBU 14da Sleeping 5s" +"2019-09-24 01:04:49.231 UTC [cauthdsl] func2 -> DEBU 14db 0xc002a93020 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.231 UTC [cauthdsl] func1 -> DEBU 14dc 0xc002a93020 gate 1569287089223612800 evaluation succeeds" +"2019-09-24 01:04:49.232 UTC [msp] DeserializeIdentity -> DEBU 14dd Obtaining identity" +"2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14de Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.233 UTC [msp] DeserializeIdentity -> DEBU 14df Obtaining identity" +"2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.233 UTC [msp] DeserializeIdentity -> DEBU 14e1 Obtaining identity" +"2019-09-24 01:04:49.233 UTC [gossip.comm] Send -> DEBU 14e2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:49.234 UTC [gossip.comm] Send -> DEBU 14e3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:49.234 UTC [msp] DeserializeIdentity -> DEBU 14e4 Obtaining identity" +"2019-09-24 01:04:49.234 UTC [gossip.comm] Send -> DEBU 14e5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e6 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e7 Exiting" +"2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14e8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:49.234 UTC [gossip.comm] sendToEndpoint -> DEBU 14ea Exiting" +"2019-09-24 01:04:49.235 UTC [gossip.comm] sendToEndpoint -> DEBU 14eb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:49.235 UTC [gossip.comm] sendToEndpoint -> DEBU 14ec Exiting" +"2019-09-24 01:04:49.233 UTC [policies] Evaluate -> DEBU 14e9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.238 UTC [policies] Evaluate -> DEBU 14ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.252 UTC [gossip.discovery] handleAliveMessage -> DEBU 14ee Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14ef Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f0 updating membership: timestamp: " +"2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f1 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:49.253 UTC [gossip.discovery] learnExistingMembers -> DEBU 14f3 Exiting" +"2019-09-24 01:04:49.253 UTC [gossip.discovery] handleAliveMessage -> DEBU 14f4 Exiting" +"2019-09-24 01:04:49.253 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f5 Exiting" +"2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14f7 Exiting" +"2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14f9 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14f8 Exiting" +"2019-09-24 01:04:49.254 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14fa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.254 UTC [gossip.gossip] handleMessage -> DEBU 14fb Exiting" +"2019-09-24 01:04:49.255 UTC [gossip.discovery] handleMsgFromComm -> DEBU 14fc Exiting" +"2019-09-24 01:04:49.255 UTC [msp] DeserializeIdentity -> DEBU 14fd Obtaining identity" +"2019-09-24 01:04:49.255 UTC [msp] DeserializeIdentity -> DEBU 14fe Obtaining identity" +"2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 14ff Obtaining identity" +"2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1500 Obtaining identity" +"2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1501 Obtaining identity" +"2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1502 Obtaining identity" +"2019-09-24 01:04:49.256 UTC [msp] DeserializeIdentity -> DEBU 1503 Obtaining identity" +"2019-09-24 01:04:49.257 UTC [gossip.comm] Send -> DEBU 1504 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:49.257 UTC [msp] DeserializeIdentity -> DEBU 1505 Obtaining identity" +"2019-09-24 01:04:49.258 UTC [gossip.comm] Send -> DEBU 1506 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1507 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1508 Exiting" +"2019-09-24 01:04:49.258 UTC [gossip.comm] sendToEndpoint -> DEBU 1509 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:49.259 UTC [gossip.comm] sendToEndpoint -> DEBU 150a Exiting" +"2019-09-24 01:04:49.689 UTC [msp] DeserializeIdentity -> DEBU 150b Obtaining identity" +"2019-09-24 01:04:49.691 UTC [msp] DeserializeIdentity -> DEBU 150c Obtaining identity" +"2019-09-24 01:04:49.691 UTC [gossip.comm] Send -> DEBU 150d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:49.692 UTC [gossip.comm] sendToEndpoint -> DEBU 150e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.692 UTC [gossip.comm] sendToEndpoint -> DEBU 150f Exiting" +"2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1510 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1511 Exiting" +"2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1512 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1513 Exiting" +"2019-09-24 01:04:49.694 UTC [gossip.comm] func1 -> DEBU 1514 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.695 UTC [gossip.gossip] handleMessage -> DEBU 1515 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.695 UTC [msp.identity] Verify -> DEBU 1516 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:49.695 UTC [msp.identity] Verify -> DEBU 1517 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:49.695 UTC [gossip.comm] func1 -> DEBU 1518 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.696 UTC [msp.identity] Verify -> DEBU 1519 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:49.696 UTC [gossip.comm] func1 -> DEBU 151a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.696 UTC [msp.identity] Verify -> DEBU 151b Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:49.696 UTC [msp] DeserializeIdentity -> DEBU 151c Obtaining identity" +"2019-09-24 01:04:49.696 UTC [msp] DeserializeIdentity -> DEBU 151d Obtaining identity" +"2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 151e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 151f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1520 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.697 UTC [policies] Evaluate -> DEBU 1521 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.697 UTC [policies] Evaluate -> DEBU 1522 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.698 UTC [policies] Evaluate -> DEBU 1523 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.698 UTC [cauthdsl] func1 -> DEBU 1524 0xc00303b0e0 gate 1569287089698370400 evaluation starts" +"2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1525 0xc00303b0e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1526 0xc00303b0e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1527 0xc00303b0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.698 UTC [cauthdsl] func2 -> DEBU 1528 0xc00303b0e0 principal evaluation fails" +"2019-09-24 01:04:49.699 UTC [cauthdsl] func1 -> DEBU 1529 0xc00303b0e0 gate 1569287089698370400 evaluation fails" +"2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.699 UTC [policies] Evaluate -> DEBU 152c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.699 UTC [cauthdsl] func1 -> DEBU 152d 0xc00303b920 gate 1569287089699632700 evaluation starts" +"2019-09-24 01:04:49.699 UTC [cauthdsl] func2 -> DEBU 152e 0xc00303b920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.699 UTC [cauthdsl] func2 -> DEBU 152f 0xc00303b920 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.700 UTC [cauthdsl] func2 -> DEBU 1530 0xc00303b920 principal matched by identity 0" +"2019-09-24 01:04:49.700 UTC [msp.identity] Verify -> DEBU 1531 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:49.700 UTC [msp.identity] Verify -> DEBU 1532 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:49.700 UTC [cauthdsl] func2 -> DEBU 1533 0xc00303b920 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.700 UTC [cauthdsl] func1 -> DEBU 1534 0xc00303b920 gate 1569287089699632700 evaluation succeeds" +"2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1535 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1536 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.700 UTC [policies] Evaluate -> DEBU 1537 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.701 UTC [policies] Evaluate -> DEBU 1538 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.701 UTC [msp] DeserializeIdentity -> DEBU 1539 Obtaining identity" +"2019-09-24 01:04:49.701 UTC [msp] DeserializeIdentity -> DEBU 153a Obtaining identity" +"2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 153b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 153c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 153d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.701 UTC [policies] Evaluate -> DEBU 153e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 153f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1540 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func1 -> DEBU 1541 0xc00304d120 gate 1569287089702294900 evaluation starts" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1542 0xc00304d120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1543 0xc00304d120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1544 0xc00304d120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func2 -> DEBU 1545 0xc00304d120 principal evaluation fails" +"2019-09-24 01:04:49.702 UTC [cauthdsl] func1 -> DEBU 1546 0xc00304d120 gate 1569287089702294900 evaluation fails" +"2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1547 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.702 UTC [policies] Evaluate -> DEBU 1548 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.703 UTC [policies] Evaluate -> DEBU 1549 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.703 UTC [cauthdsl] func1 -> DEBU 154a 0xc00304d960 gate 1569287089703142000 evaluation starts" +"2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154b 0xc00304d960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154c 0xc00304d960 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 154d 0xc00304d960 principal matched by identity 0" +"2019-09-24 01:04:49.703 UTC [msp.identity] Verify -> DEBU 154e Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:49.703 UTC [msp.identity] Verify -> DEBU 154f Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:49.703 UTC [cauthdsl] func2 -> DEBU 1550 0xc00304d960 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.704 UTC [cauthdsl] func1 -> DEBU 1551 0xc00304d960 gate 1569287089703142000 evaluation succeeds" +"2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1552 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1554 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.707 UTC [policies] Evaluate -> DEBU 1555 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.707 UTC [gossip.gossip] handleMessage -> DEBU 1556 Exiting" +"2019-09-24 01:04:49.707 UTC [gossip.gossip] handleMessage -> DEBU 1557 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.707 UTC [msp] DeserializeIdentity -> DEBU 1558 Obtaining identity" +"2019-09-24 01:04:49.708 UTC [msp] DeserializeIdentity -> DEBU 1559 Obtaining identity" +"2019-09-24 01:04:49.708 UTC [msp] DeserializeIdentity -> DEBU 155a Obtaining identity" +"2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 155b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 155c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 155d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.708 UTC [policies] Evaluate -> DEBU 155e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.709 UTC [policies] Evaluate -> DEBU 155f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.709 UTC [policies] Evaluate -> DEBU 1560 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.709 UTC [cauthdsl] func1 -> DEBU 1561 0xc0030d34a0 gate 1569287089709554700 evaluation starts" +"2019-09-24 01:04:49.709 UTC [cauthdsl] func2 -> DEBU 1562 0xc0030d34a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.710 UTC [cauthdsl] func2 -> DEBU 1563 0xc0030d34a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.711 UTC [cauthdsl] func2 -> DEBU 1564 0xc0030d34a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.711 UTC [cauthdsl] func2 -> DEBU 1565 0xc0030d34a0 principal evaluation fails" +"2019-09-24 01:04:49.714 UTC [cauthdsl] func1 -> DEBU 1566 0xc0030d34a0 gate 1569287089709554700 evaluation fails" +"2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1567 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1568 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.715 UTC [policies] Evaluate -> DEBU 1569 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.715 UTC [cauthdsl] func1 -> DEBU 156a 0xc0030d3ce0 gate 1569287089715705600 evaluation starts" +"2019-09-24 01:04:49.715 UTC [cauthdsl] func2 -> DEBU 156b 0xc0030d3ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 156c 0xc0030d3ce0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 156d 0xc0030d3ce0 principal matched by identity 0" +"2019-09-24 01:04:49.716 UTC [msp.identity] Verify -> DEBU 156e Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:49.716 UTC [msp.identity] Verify -> DEBU 156f Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:49.716 UTC [cauthdsl] func2 -> DEBU 1570 0xc0030d3ce0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.717 UTC [cauthdsl] func1 -> DEBU 1571 0xc0030d3ce0 gate 1569287089715705600 evaluation succeeds" +"2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1572 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1573 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1574 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.717 UTC [policies] Evaluate -> DEBU 1575 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.718 UTC [msp.identity] Verify -> DEBU 1576 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:49.718 UTC [msp.identity] Verify -> DEBU 1577 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:49.720 UTC [msp] DeserializeIdentity -> DEBU 1578 Obtaining identity" +"2019-09-24 01:04:49.720 UTC [msp] DeserializeIdentity -> DEBU 1579 Obtaining identity" +"2019-09-24 01:04:49.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 157a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 157c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.722 UTC [policies] Evaluate -> DEBU 157f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.722 UTC [cauthdsl] func1 -> DEBU 1580 0xc003193be0 gate 1569287089722508400 evaluation starts" +"2019-09-24 01:04:49.722 UTC [cauthdsl] func2 -> DEBU 1581 0xc003193be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.722 UTC [cauthdsl] func2 -> DEBU 1582 0xc003193be0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.723 UTC [cauthdsl] func2 -> DEBU 1583 0xc003193be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.723 UTC [cauthdsl] func2 -> DEBU 1584 0xc003193be0 principal evaluation fails" +"2019-09-24 01:04:49.723 UTC [cauthdsl] func1 -> DEBU 1585 0xc003193be0 gate 1569287089722508400 evaluation fails" +"2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1586 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1587 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.723 UTC [policies] Evaluate -> DEBU 1588 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.724 UTC [cauthdsl] func1 -> DEBU 1589 0xc0031de420 gate 1569287089724073100 evaluation starts" +"2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158a 0xc0031de420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158b 0xc0031de420 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158c 0xc0031de420 principal matched by identity 0" +"2019-09-24 01:04:49.724 UTC [msp.identity] Verify -> DEBU 158d Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:49.724 UTC [msp.identity] Verify -> DEBU 158e Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:49.724 UTC [cauthdsl] func2 -> DEBU 158f 0xc0031de420 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.725 UTC [cauthdsl] func1 -> DEBU 1590 0xc0031de420 gate 1569287089724073100 evaluation succeeds" +"2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1591 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1592 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.725 UTC [policies] Evaluate -> DEBU 1593 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.727 UTC [policies] Evaluate -> DEBU 1594 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.727 UTC [msp.identity] Verify -> DEBU 1595 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:49.728 UTC [msp.identity] Verify -> DEBU 1597 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 1596 Obtaining identity" +"2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 1598 Obtaining identity" +"2019-09-24 01:04:49.728 UTC [gossip.pull] Hello -> DEBU 1599 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 159a Obtaining identity" +"2019-09-24 01:04:49.728 UTC [msp] DeserializeIdentity -> DEBU 159b Obtaining identity" +"2019-09-24 01:04:49.729 UTC [gossip.comm] Send -> DEBU 159c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:49.729 UTC [gossip.comm] sendToEndpoint -> DEBU 159d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.729 UTC [gossip.comm] sendToEndpoint -> DEBU 159e Exiting" +"2019-09-24 01:04:49.730 UTC [gossip.gossip] handleMessage -> DEBU 159f Exiting" +"2019-09-24 01:04:49.730 UTC [gossip.gossip] handleMessage -> DEBU 15a0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a1 Obtaining identity" +"2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a2 Obtaining identity" +"2019-09-24 01:04:49.730 UTC [msp] DeserializeIdentity -> DEBU 15a3 Obtaining identity" +"2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15a4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.731 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15a6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.731 UTC [policies] Evaluate -> DEBU 15a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.731 UTC [cauthdsl] func1 -> DEBU 15aa 0xc0032be680 gate 1569287089731693000 evaluation starts" +"2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ab 0xc0032be680 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ac 0xc0032be680 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.731 UTC [cauthdsl] func2 -> DEBU 15ad 0xc0032be680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.732 UTC [cauthdsl] func2 -> DEBU 15ae 0xc0032be680 principal evaluation fails" +"2019-09-24 01:04:49.732 UTC [cauthdsl] func1 -> DEBU 15af 0xc0032be680 gate 1569287089731693000 evaluation fails" +"2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.732 UTC [policies] Evaluate -> DEBU 15b2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.733 UTC [cauthdsl] func1 -> DEBU 15b3 0xc0032beec0 gate 1569287089733076300 evaluation starts" +"2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b4 0xc0032beec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b5 0xc0032beec0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.733 UTC [cauthdsl] func2 -> DEBU 15b6 0xc0032beec0 principal matched by identity 0" +"2019-09-24 01:04:49.734 UTC [msp.identity] Verify -> DEBU 15b7 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:49.734 UTC [msp.identity] Verify -> DEBU 15b8 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:49.734 UTC [cauthdsl] func2 -> DEBU 15b9 0xc0032beec0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.734 UTC [cauthdsl] func1 -> DEBU 15ba 0xc0032beec0 gate 1569287089733076300 evaluation succeeds" +"2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15be Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.735 UTC [policies] Evaluate -> DEBU 15bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.736 UTC [msp.identity] Verify -> DEBU 15c0 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:49.736 UTC [msp.identity] Verify -> DEBU 15c1 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:49.735 UTC [gossip.comm] func1 -> DEBU 15bd Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.737 UTC [msp.identity] Verify -> DEBU 15c2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:49.737 UTC [msp.identity] Verify -> DEBU 15c3 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:49.738 UTC [msp] DeserializeIdentity -> DEBU 15c4 Obtaining identity" +"2019-09-24 01:04:49.738 UTC [msp] DeserializeIdentity -> DEBU 15c5 Obtaining identity" +"2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 15c6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15c7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.738 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 15c8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:49.738 UTC [policies] Evaluate -> DEBU 15c9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:49.739 UTC [policies] Evaluate -> DEBU 15ca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:49.739 UTC [policies] Evaluate -> DEBU 15cb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:49.739 UTC [cauthdsl] func1 -> DEBU 15cc 0xc0032b3780 gate 1569287089739419100 evaluation starts" +"2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15cd 0xc0032b3780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15ce 0xc0032b3780 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.739 UTC [cauthdsl] func2 -> DEBU 15cf 0xc0032b3780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:49.740 UTC [cauthdsl] func2 -> DEBU 15d0 0xc0032b3780 principal evaluation fails" +"2019-09-24 01:04:49.740 UTC [cauthdsl] func1 -> DEBU 15d1 0xc0032b3780 gate 1569287089739419100 evaluation fails" +"2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:49.740 UTC [policies] Evaluate -> DEBU 15d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:49.741 UTC [cauthdsl] func1 -> DEBU 15d5 0xc00333c0d0 gate 1569287089741157000 evaluation starts" +"2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d6 0xc00333c0d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d7 0xc00333c0d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:49.741 UTC [cauthdsl] func2 -> DEBU 15d8 0xc00333c0d0 principal matched by identity 0" +"2019-09-24 01:04:49.741 UTC [msp.identity] Verify -> DEBU 15d9 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:49.742 UTC [msp.identity] Verify -> DEBU 15da Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:49.742 UTC [cauthdsl] func2 -> DEBU 15db 0xc00333c0d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:49.742 UTC [cauthdsl] func1 -> DEBU 15dc 0xc00333c0d0 gate 1569287089741157000 evaluation succeeds" +"2019-09-24 01:04:49.742 UTC [policies] Evaluate -> DEBU 15dd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.743 UTC [policies] Evaluate -> DEBU 15de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:49.743 UTC [policies] Evaluate -> DEBU 15df Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:49.744 UTC [policies] Evaluate -> DEBU 15e0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:49.744 UTC [gossip.gossip] handleMessage -> DEBU 15e1 Exiting" +"2019-09-24 01:04:49.744 UTC [gossip.gossip] handleMessage -> DEBU 15e2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.744 UTC [gossip.pull] HandleMessage -> DEBU 15e3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.745 UTC [gossip.gossip] handleMessage -> DEBU 15e4 Exiting" +"2019-09-24 01:04:49.873 UTC [gossip.comm] func1 -> DEBU 15e5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.873 UTC [gossip.gossip] handleMessage -> DEBU 15e6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.876 UTC [msp] DeserializeIdentity -> DEBU 15e7 Obtaining identity" +"2019-09-24 01:04:49.876 UTC [msp] DeserializeIdentity -> DEBU 15e8 Obtaining identity" +"2019-09-24 01:04:49.877 UTC [gossip.gossip] handleMessage -> DEBU 15e9 Exiting" +"2019-09-24 01:04:49.882 UTC [gossip.comm] func1 -> DEBU 15ea Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.882 UTC [gossip.gossip] handleMessage -> DEBU 15eb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.882 UTC [gossip.pull] HandleMessage -> DEBU 15ec GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:49.882 UTC [gossip.pull] SendDigest -> DEBU 15ed Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:49.882 UTC [gossip.gossip] handleMessage -> DEBU 15ee Exiting" +"2019-09-24 01:04:50.077 UTC [gossip.comm] func1 -> DEBU 15ef Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.077 UTC [gossip.gossip] handleMessage -> DEBU 15f0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.077 UTC [msp] DeserializeIdentity -> DEBU 15f1 Obtaining identity" +"2019-09-24 01:04:50.078 UTC [msp] DeserializeIdentity -> DEBU 15f2 Obtaining identity" +"2019-09-24 01:04:50.078 UTC [msp] DeserializeIdentity -> DEBU 15f3 Obtaining identity" +"2019-09-24 01:04:50.078 UTC [gossip.gossip] handleMessage -> DEBU 15f4 Exiting" +"2019-09-24 01:04:50.275 UTC [gossip.comm] func1 -> DEBU 15f5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.275 UTC [gossip.gossip] handleMessage -> DEBU 15f6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.276 UTC [msp] DeserializeIdentity -> DEBU 15f7 Obtaining identity" +"2019-09-24 01:04:50.276 UTC [msp] DeserializeIdentity -> DEBU 15f8 Obtaining identity" +"2019-09-24 01:04:50.277 UTC [msp] DeserializeIdentity -> DEBU 15f9 Obtaining identity" +"2019-09-24 01:04:50.277 UTC [gossip.gossip] handleMessage -> DEBU 15fa Exiting" +"2019-09-24 01:04:50.495 UTC [gossip.comm] func1 -> DEBU 15fb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.495 UTC [gossip.gossip] handleMessage -> DEBU 15fc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.496 UTC [gossip.pull] HandleMessage -> DEBU 15fd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.496 UTC [gossip.pull] SendDigest -> DEBU 15fe Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:50.496 UTC [gossip.gossip] handleMessage -> DEBU 15ff Exiting" +"2019-09-24 01:04:50.502 UTC [gossip.comm] func1 -> DEBU 1600 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.502 UTC [gossip.gossip] handleMessage -> DEBU 1601 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.503 UTC [gossip.gossip] handleMessage -> DEBU 1602 Exiting" +"2019-09-24 01:04:50.504 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1603 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.504 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1604 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:50.505 UTC [msp.identity] Verify -> DEBU 1605 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +"2019-09-24 01:04:50.505 UTC [msp.identity] Verify -> DEBU 1606 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +00000040 20 c8 18 ce 88 1a 31 | .....1|" +"2019-09-24 01:04:50.506 UTC [msp.identity] Verify -> DEBU 1607 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:50.506 UTC [msp.identity] Verify -> DEBU 1608 Verify: sig = 00000000 30 45 02 21 00 d0 6c 8e 19 15 9f 37 57 df bc ea |0E.!..l....7W...| +00000010 9d 1d 2b 29 b7 f3 1c 46 b6 da b5 bf e6 09 98 de |..+)...F........| +00000020 82 65 85 10 a3 02 20 5e 50 5b 36 55 d1 f0 ad 03 |.e.... ^P[6U....| +00000030 c2 d4 f3 e2 d0 d9 b6 4a 18 42 6a d7 8f 2e bc b6 |.......J.Bj.....| +00000040 ab 7d 34 a8 ff ad ce |.}4....|" +"2019-09-24 01:04:50.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 1609 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:50.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 160a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160b updating membership: timestamp: " +"2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160c Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:50.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 160e Exiting" +"2019-09-24 01:04:50.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 160f Exiting" +"2019-09-24 01:04:50.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1610 Exiting" +"2019-09-24 01:04:50.508 UTC [gossip.discovery] sendMemResponse -> DEBU 1611 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:50.508 UTC [msp] DeserializeIdentity -> DEBU 1612 Obtaining identity" +"2019-09-24 01:04:50.508 UTC [msp] DeserializeIdentity -> DEBU 1613 Obtaining identity" +"2019-09-24 01:04:50.508 UTC [gossip.comm] Send -> DEBU 1614 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.508 UTC [gossip.discovery] sendMemResponse -> DEBU 1615 Exiting, replying with alive: > alive: " +"2019-09-24 01:04:50.508 UTC [gossip.comm] sendToEndpoint -> DEBU 1616 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.509 UTC [gossip.comm] sendToEndpoint -> DEBU 1617 Exiting" +"2019-09-24 01:04:50.806 UTC [gossip.comm] func1 -> DEBU 1618 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.808 UTC [gossip.gossip] handleMessage -> DEBU 1619 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.808 UTC [gossip.pull] HandleMessage -> DEBU 161a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.808 UTC [msp] DeserializeIdentity -> DEBU 161b Obtaining identity" +"2019-09-24 01:04:50.808 UTC [msp] DeserializeIdentity -> DEBU 161c Obtaining identity" +"2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161d Obtaining identity" +"2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161e Obtaining identity" +"2019-09-24 01:04:50.809 UTC [msp] DeserializeIdentity -> DEBU 161f Obtaining identity" +"2019-09-24 01:04:50.810 UTC [msp] DeserializeIdentity -> DEBU 1620 Obtaining identity" +"2019-09-24 01:04:50.810 UTC [gossip.pull] SendDigest -> DEBU 1621 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:50.810 UTC [gossip.gossip] handleMessage -> DEBU 1622 Exiting" +"2019-09-24 01:04:50.814 UTC [gossip.comm] func1 -> DEBU 1623 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.816 UTC [gossip.gossip] handleMessage -> DEBU 1624 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.816 UTC [gossip.gossip] handleMessage -> DEBU 1625 Exiting" +"2019-09-24 01:04:50.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1626 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1627 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:50.816 UTC [msp] DeserializeIdentity -> DEBU 1628 Obtaining identity" +"2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1629 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 162a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.816 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 162b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.816 UTC [policies] Evaluate -> DEBU 162c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 162d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 162e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func1 -> DEBU 162f 0xc003402290 gate 1569287090817058100 evaluation starts" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1630 0xc003402290 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1631 0xc003402290 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1632 0xc003402290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func2 -> DEBU 1633 0xc003402290 principal evaluation fails" +"2019-09-24 01:04:50.817 UTC [cauthdsl] func1 -> DEBU 1634 0xc003402290 gate 1569287090817058100 evaluation fails" +"2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 1635 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.817 UTC [policies] Evaluate -> DEBU 1636 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.818 UTC [policies] Evaluate -> DEBU 1637 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:50.818 UTC [cauthdsl] func1 -> DEBU 1638 0xc003402be0 gate 1569287090818351600 evaluation starts" +"2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 1639 0xc003402be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 163a 0xc003402be0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.818 UTC [cauthdsl] func2 -> DEBU 163b 0xc003402be0 principal matched by identity 0" +"2019-09-24 01:04:50.819 UTC [msp.identity] Verify -> DEBU 163c Verify: digest = 00000000 f5 5e ab 55 0b 38 8f 11 e2 dd bd f3 6c 98 f2 15 |.^.U.8......l...| +00000010 b9 00 12 f1 a3 f5 f9 73 90 66 8b 37 da be 03 15 |.......s.f.7....|" +"2019-09-24 01:04:50.819 UTC [msp.identity] Verify -> DEBU 163d Verify: sig = 00000000 30 45 02 21 00 e1 f0 65 2b 9e 9f 7d bc 68 89 88 |0E.!...e+..}.h..| +00000010 9a 78 77 d5 8c 43 9a 62 b9 f5 40 e9 e5 64 63 3d |.xw..C.b..@..dc=| +00000020 2b 0b 42 8a ef 02 20 63 3f 2e da 50 89 56 9a b8 |+.B... c?..P.V..| +00000030 a1 7a f3 16 94 f1 db 2b 91 76 53 d6 89 3a 17 ea |.z.....+.vS..:..| +00000040 04 e3 81 9e 37 1b 91 |....7..|" +"2019-09-24 01:04:50.819 UTC [cauthdsl] func2 -> DEBU 163e 0xc003402be0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:50.819 UTC [cauthdsl] func1 -> DEBU 163f 0xc003402be0 gate 1569287090818351600 evaluation succeeds" +"2019-09-24 01:04:50.819 UTC [policies] Evaluate -> DEBU 1640 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1641 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1642 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:50.820 UTC [policies] Evaluate -> DEBU 1643 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:50.820 UTC [gossip.discovery] handleAliveMessage -> DEBU 1644 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1645 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1646 updating membership: timestamp: " +"2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1647 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1648 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:50.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 1649 Exiting" +"2019-09-24 01:04:50.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 164a Exiting" +"2019-09-24 01:04:50.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 164b Exiting" +"2019-09-24 01:04:50.822 UTC [gossip.discovery] sendMemResponse -> DEBU 164c Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164d Obtaining identity" +"2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164e Obtaining identity" +"2019-09-24 01:04:50.822 UTC [msp] DeserializeIdentity -> DEBU 164f Obtaining identity" +"2019-09-24 01:04:50.823 UTC [gossip.comm] Send -> DEBU 1650 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1651 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.823 UTC [gossip.comm] sendToEndpoint -> DEBU 1653 Exiting" +"2019-09-24 01:04:50.823 UTC [gossip.discovery] sendMemResponse -> DEBU 1652 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1654 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:50.849 UTC [gossip.comm] Send -> DEBU 1655 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1656 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:50.849 UTC [gossip.comm] Send -> DEBU 1657 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.849 UTC [gossip.pull] Hello -> DEBU 1658 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:50.850 UTC [gossip.comm] Send -> DEBU 1659 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165b Exiting" +"2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.850 UTC [gossip.comm] sendToEndpoint -> DEBU 165d Exiting" +"2019-09-24 01:04:50.851 UTC [gossip.comm] sendToEndpoint -> DEBU 165e Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.851 UTC [gossip.comm] sendToEndpoint -> DEBU 165f Exiting" +"2019-09-24 01:04:50.852 UTC [gossip.comm] func1 -> DEBU 1660 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.852 UTC [gossip.gossip] handleMessage -> DEBU 1661 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.853 UTC [gossip.pull] HandleMessage -> DEBU 1662 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.853 UTC [gossip.gossip] handleMessage -> DEBU 1663 Exiting" +"2019-09-24 01:04:50.853 UTC [gossip.comm] func1 -> DEBU 1664 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.854 UTC [gossip.gossip] handleMessage -> DEBU 1665 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.854 UTC [gossip.pull] HandleMessage -> DEBU 1666 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.854 UTC [gossip.gossip] handleMessage -> DEBU 1667 Exiting" +"2019-09-24 01:04:50.855 UTC [gossip.comm] func1 -> DEBU 1668 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.855 UTC [gossip.gossip] handleMessage -> DEBU 1669 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.856 UTC [gossip.pull] HandleMessage -> DEBU 166a GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.856 UTC [gossip.gossip] handleMessage -> DEBU 166b Exiting" +"2019-09-24 01:04:50.863 UTC [msp] GetDefaultSigningIdentity -> DEBU 166c Obtaining default signing identity" +"2019-09-24 01:04:50.864 UTC [msp.identity] Sign -> DEBU 166d Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151018 " +"2019-09-24 01:04:50.864 UTC [msp.identity] Sign -> DEBU 166e Sign: digest: 919B604828F14752258EA1CEB98D3ADD173D6414808094C61EB3603F196D5AB8 " +"2019-09-24 01:04:50.865 UTC [msp] GetDefaultSigningIdentity -> DEBU 166f Obtaining default signing identity" +"2019-09-24 01:04:50.865 UTC [msp.identity] Sign -> DEBU 1670 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:50.865 UTC [msp.identity] Sign -> DEBU 1671 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:50.866 UTC [msp] DeserializeIdentity -> DEBU 1672 Obtaining identity" +"2019-09-24 01:04:50.866 UTC [gossip.comm] Send -> DEBU 1673 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.866 UTC [msp] DeserializeIdentity -> DEBU 1674 Obtaining identity" +"2019-09-24 01:04:50.867 UTC [gossip.comm] Send -> DEBU 1676 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.867 UTC [gossip.comm] sendToEndpoint -> DEBU 1675 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.868 UTC [gossip.comm] sendToEndpoint -> DEBU 1677 Exiting" +"2019-09-24 01:04:50.868 UTC [gossip.comm] Send -> DEBU 1678 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.868 UTC [gossip.comm] sendToEndpoint -> DEBU 1679 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.869 UTC [gossip.comm] sendToEndpoint -> DEBU 167a Exiting" +"2019-09-24 01:04:50.873 UTC [gossip.comm] sendToEndpoint -> DEBU 167b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.874 UTC [gossip.comm] sendToEndpoint -> DEBU 167c Exiting" +"2019-09-24 01:04:50.874 UTC [gossip.comm] func1 -> DEBU 167d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.874 UTC [gossip.comm] func1 -> DEBU 167e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.874 UTC [gossip.gossip] handleMessage -> DEBU 167f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.875 UTC [gossip.pull] HandleMessage -> DEBU 1680 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1681 Obtaining identity" +"2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1682 Obtaining identity" +"2019-09-24 01:04:50.876 UTC [msp] DeserializeIdentity -> DEBU 1683 Obtaining identity" +"2019-09-24 01:04:50.877 UTC [msp] DeserializeIdentity -> DEBU 1684 Obtaining identity" +"2019-09-24 01:04:50.878 UTC [gossip.comm] func1 -> DEBU 1685 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.877 UTC [msp] DeserializeIdentity -> DEBU 1686 Obtaining identity" +"2019-09-24 01:04:50.879 UTC [msp] DeserializeIdentity -> DEBU 1687 Obtaining identity" +"2019-09-24 01:04:50.880 UTC [gossip.pull] SendDigest -> DEBU 1688 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 1689 Exiting" +"2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 168a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.880 UTC [gossip.discovery] handleMsgFromComm -> DEBU 168b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.880 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 168c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:50.881 UTC [msp.identity] Verify -> DEBU 168d Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +"2019-09-24 01:04:50.881 UTC [msp.identity] Verify -> DEBU 168e Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +00000040 c2 02 36 31 a0 d2 38 |..61..8|" +"2019-09-24 01:04:50.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 168f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.881 UTC [gossip.discovery] isSentByMe -> DEBU 1690 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.881 UTC [gossip.discovery] handleAliveMessage -> DEBU 1691 Exiting" +"2019-09-24 01:04:50.881 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1692 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:50.885 UTC [msp.identity] Verify -> DEBU 1693 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +"2019-09-24 01:04:50.885 UTC [msp.identity] Verify -> DEBU 1694 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +00000040 20 c8 18 ce 88 1a 31 | .....1|" +"2019-09-24 01:04:50.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 1695 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.887 UTC [gossip.discovery] handleAliveMessage -> DEBU 1696 Exiting" +"2019-09-24 01:04:50.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1697 Exiting" +"2019-09-24 01:04:50.887 UTC [gossip.comm] func1 -> DEBU 1698 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.889 UTC [gossip.comm] func1 -> DEBU 1699 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.880 UTC [gossip.gossip] handleMessage -> DEBU 169a Exiting" +"2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169c Exiting" +"2019-09-24 01:04:50.890 UTC [gossip.gossip] handleMessage -> DEBU 169d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.890 UTC [gossip.discovery] handleMsgFromComm -> DEBU 169e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 169f Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:50.891 UTC [msp.identity] Verify -> DEBU 16a0 Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +"2019-09-24 01:04:50.891 UTC [msp.identity] Verify -> DEBU 16a1 Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +00000040 c2 02 36 31 a0 d2 38 |..61..8|" +"2019-09-24 01:04:50.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.891 UTC [gossip.discovery] isSentByMe -> DEBU 16a3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.891 UTC [gossip.discovery] handleAliveMessage -> DEBU 16a4 Exiting" +"2019-09-24 01:04:50.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16a5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:50.892 UTC [msp] DeserializeIdentity -> DEBU 16a6 Obtaining identity" +"2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.892 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16a9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:50.893 UTC [policies] Evaluate -> DEBU 16ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:50.893 UTC [cauthdsl] func1 -> DEBU 16ad 0xc0034a71d0 gate 1569287090893629600 evaluation starts" +"2019-09-24 01:04:50.893 UTC [cauthdsl] func2 -> DEBU 16ae 0xc0034a71d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16af 0xc0034a71d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16b0 0xc0034a71d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:50.894 UTC [cauthdsl] func2 -> DEBU 16b1 0xc0034a71d0 principal evaluation fails" +"2019-09-24 01:04:50.894 UTC [cauthdsl] func1 -> DEBU 16b2 0xc0034a71d0 gate 1569287090893629600 evaluation fails" +"2019-09-24 01:04:50.894 UTC [policies] Evaluate -> DEBU 16b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.894 UTC [policies] Evaluate -> DEBU 16b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.895 UTC [policies] Evaluate -> DEBU 16b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:50.895 UTC [cauthdsl] func1 -> DEBU 16b6 0xc0034a7a10 gate 1569287090895216600 evaluation starts" +"2019-09-24 01:04:50.896 UTC [cauthdsl] func2 -> DEBU 16b7 0xc0034a7a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.896 UTC [cauthdsl] func2 -> DEBU 16b8 0xc0034a7a10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.900 UTC [cauthdsl] func2 -> DEBU 16b9 0xc0034a7a10 principal matched by identity 0" +"2019-09-24 01:04:50.900 UTC [msp.identity] Verify -> DEBU 16ba Verify: digest = 00000000 f5 5e ab 55 0b 38 8f 11 e2 dd bd f3 6c 98 f2 15 |.^.U.8......l...| +00000010 b9 00 12 f1 a3 f5 f9 73 90 66 8b 37 da be 03 15 |.......s.f.7....|" +"2019-09-24 01:04:50.900 UTC [msp.identity] Verify -> DEBU 16bb Verify: sig = 00000000 30 45 02 21 00 e1 f0 65 2b 9e 9f 7d bc 68 89 88 |0E.!...e+..}.h..| +00000010 9a 78 77 d5 8c 43 9a 62 b9 f5 40 e9 e5 64 63 3d |.xw..C.b..@..dc=| +00000020 2b 0b 42 8a ef 02 20 63 3f 2e da 50 89 56 9a b8 |+.B... c?..P.V..| +00000030 a1 7a f3 16 94 f1 db 2b 91 76 53 d6 89 3a 17 ea |.z.....+.vS..:..| +00000040 04 e3 81 9e 37 1b 91 |....7..|" +"2019-09-24 01:04:50.901 UTC [cauthdsl] func2 -> DEBU 16bc 0xc0034a7a10 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:50.901 UTC [cauthdsl] func1 -> DEBU 16bd 0xc0034a7a10 gate 1569287090895216600 evaluation succeeds" +"2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:50.901 UTC [policies] Evaluate -> DEBU 16c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:50.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c3 Exiting" +"2019-09-24 01:04:50.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16c4 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:50.903 UTC [msp.identity] Verify -> DEBU 16c5 Verify: digest = 00000000 57 d4 83 c9 3a 92 b2 24 e7 05 d4 2a 07 d3 a5 d4 |W...:..$...*....| +00000010 36 57 0c 5e e1 06 7e 49 da 1d fc b9 8c 1b b9 c8 |6W.^..~I........|" +"2019-09-24 01:04:50.903 UTC [msp.identity] Verify -> DEBU 16c6 Verify: sig = 00000000 30 45 02 21 00 e6 0d 34 a6 65 b5 af fb e4 af 7e |0E.!...4.e.....~| +00000010 18 f1 56 60 e7 9e 44 cb 19 88 63 b8 fd 85 fa c7 |..V`..D...c.....| +00000020 41 c0 0a ac 0b 02 20 38 6d 67 37 35 36 0d 3b 16 |A..... 8mg756.;.| +00000030 cf ab ba 69 91 9f 3b a0 a6 28 02 3f 1b ac 4e 0b |...i..;..(.?..N.| +00000040 20 c8 18 ce 88 1a 31 | .....1|" +"2019-09-24 01:04:50.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 16c8 Exiting" +"2019-09-24 01:04:50.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16c9 Exiting" +"2019-09-24 01:04:50.904 UTC [gossip.gossip] handleMessage -> DEBU 16ca Exiting" +"2019-09-24 01:04:50.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16cb Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16cd Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:50.905 UTC [msp] DeserializeIdentity -> DEBU 16ce Obtaining identity" +"2019-09-24 01:04:50.904 UTC [gossip.gossip] handleMessage -> DEBU 16cc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 16cf Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16d0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.905 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 16d1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:50.906 UTC [policies] Evaluate -> DEBU 16d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:50.906 UTC [cauthdsl] func1 -> DEBU 16d5 0xc0034da220 gate 1569287090906271000 evaluation starts" +"2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d6 0xc0034da220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d7 0xc0034da220 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.906 UTC [cauthdsl] func2 -> DEBU 16d8 0xc0034da220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16d9 0xc0034da220 principal evaluation fails" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func1 -> DEBU 16da 0xc0034da220 gate 1569287090906271000 evaluation fails" +"2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:50.907 UTC [policies] Evaluate -> DEBU 16dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func1 -> DEBU 16de 0xc0034dabb0 gate 1569287090907604700 evaluation starts" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16df 0xc0034dabb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16e0 0xc0034dabb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:50.907 UTC [cauthdsl] func2 -> DEBU 16e1 0xc0034dabb0 principal matched by identity 0" +"2019-09-24 01:04:50.907 UTC [msp.identity] Verify -> DEBU 16e2 Verify: digest = 00000000 a8 58 bc 3b 59 b2 0c 80 f4 3c 71 30 6f 17 15 75 |.X.;Y.... DEBU 16e3 Verify: sig = 00000000 30 45 02 21 00 87 a7 83 10 13 7e 43 96 c2 80 b7 |0E.!......~C....| +00000010 ae 5c e5 27 15 77 4c bd cd ed 40 b7 95 26 7b 49 |.\.'.wL...@..&{I| +00000020 4d 97 d1 0e 84 02 20 38 58 53 47 e1 03 75 96 f9 |M..... 8XSG..u..| +00000030 d1 de 52 44 20 85 a1 a9 3d 5d 31 90 1a 87 04 02 |..RD ...=]1.....| +00000040 0e 7d a7 6d ac 9b e7 |.}.m...|" +"2019-09-24 01:04:50.908 UTC [cauthdsl] func2 -> DEBU 16e4 0xc0034dabb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:50.908 UTC [cauthdsl] func1 -> DEBU 16e5 0xc0034dabb0 gate 1569287090907604700 evaluation succeeds" +"2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:50.908 UTC [policies] Evaluate -> DEBU 16e8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:50.909 UTC [policies] Evaluate -> DEBU 16e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:50.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 16ea Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:50.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 16eb Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:50.909 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ec updating membership: timestamp: " +"2019-09-24 01:04:50.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ed Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:50.910 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ee Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:50.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 16ef Exiting" +"2019-09-24 01:04:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 16f0 Exiting" +"2019-09-24 01:04:50.911 UTC [gossip.discovery] sendMemResponse -> DEBU 16f1 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:50.911 UTC [msp] DeserializeIdentity -> DEBU 16f2 Obtaining identity" +"2019-09-24 01:04:50.912 UTC [msp] DeserializeIdentity -> DEBU 16f3 Obtaining identity" +"2019-09-24 01:04:50.912 UTC [msp] DeserializeIdentity -> DEBU 16f4 Obtaining identity" +"2019-09-24 01:04:50.912 UTC [gossip.comm] Send -> DEBU 16f5 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:50.912 UTC [gossip.discovery] sendMemResponse -> DEBU 16f6 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:04:50.912 UTC [gossip.comm] sendToEndpoint -> DEBU 16f7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.912 UTC [gossip.comm] sendToEndpoint -> DEBU 16f8 Exiting" +"2019-09-24 01:04:50.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16f9 Exiting" +"2019-09-24 01:04:50.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 16fa Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:50.917 UTC [gossip.gossip] handleMessage -> DEBU 16fb Exiting" +"2019-09-24 01:04:50.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 16fc Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:50.917 UTC [msp.identity] Verify -> DEBU 16fd Verify: digest = 00000000 91 9b 60 48 28 f1 47 52 25 8e a1 ce b9 8d 3a dd |..`H(.GR%.....:.| +00000010 17 3d 64 14 80 80 94 c6 1e b3 60 3f 19 6d 5a b8 |.=d.......`?.mZ.|" +"2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 16fe Verify: sig = 00000000 30 45 02 21 00 93 a4 a3 c0 4c 60 6c 63 4e ac d8 |0E.!.....L`lcN..| +00000010 bd a6 50 90 86 5a e7 bf fe 41 15 85 a7 0d 7f 1e |..P..Z...A......| +00000020 94 77 11 d2 1e 02 20 38 00 72 b3 b5 4c cf 41 1c |.w.... 8.r..L.A.| +00000030 ca 71 a9 54 fa 11 a1 03 fa 6a 2f 67 ce 78 aa 55 |.q.T.....j/g.x.U| +00000040 c2 02 36 31 a0 d2 38 |..61..8|" +"2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 16ff Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:50.918 UTC [msp.identity] Verify -> DEBU 1700 Verify: sig = 00000000 30 45 02 21 00 83 e5 74 cd af d8 8c 2c a0 5a 8c |0E.!...t....,.Z.| +00000010 29 44 ac fd b5 36 b4 47 87 e5 12 23 09 7a dc 47 |)D...6.G...#.z.G| +00000020 c8 8d 74 19 68 02 20 3b 9c 11 4e 96 56 04 c8 78 |..t.h. ;..N.V..x| +00000030 c3 38 19 20 36 7a 5e 4a 74 7b 6f f1 6d 89 09 0a |.8. 6z^Jt{o.m...| +00000040 6f c6 6a bd c7 ac 58 |o.j...X|" +"2019-09-24 01:04:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1701 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:50.919 UTC [gossip.discovery] isSentByMe -> DEBU 1702 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1703 Exiting" +"2019-09-24 01:04:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1704 Exiting" +"2019-09-24 01:04:51.737 UTC [gossip.election] waitForInterrupt -> DEBU 1705 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:51.737 UTC [gossip.election] IsLeader -> DEBU 1706 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:51.738 UTC [msp] GetDefaultSigningIdentity -> DEBU 1707 Obtaining default signing identity" +"2019-09-24 01:04:51.738 UTC [msp.identity] Sign -> DEBU 1708 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510061801 " +"2019-09-24 01:04:51.738 UTC [msp.identity] Sign -> DEBU 1709 Sign: digest: 55220C6A2CB7B5E11635943595CC1BB21B3917046147261DCD74B5FD419651E0 " +"2019-09-24 01:04:51.739 UTC [gossip.election] waitForInterrupt -> DEBU 170a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:51.747 UTC [msp] DeserializeIdentity -> DEBU 170b Obtaining identity" +"2019-09-24 01:04:51.747 UTC [msp] DeserializeIdentity -> DEBU 170c Obtaining identity" +"2019-09-24 01:04:51.748 UTC [msp] DeserializeIdentity -> DEBU 170d Obtaining identity" +"2019-09-24 01:04:51.748 UTC [msp] DeserializeIdentity -> DEBU 170e Obtaining identity" +"2019-09-24 01:04:51.749 UTC [gossip.comm] Send -> DEBU 170f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:51.749 UTC [msp] DeserializeIdentity -> DEBU 1710 Obtaining identity" +"2019-09-24 01:04:51.749 UTC [gossip.comm] sendToEndpoint -> DEBU 1711 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:04:51.750 UTC [gossip.comm] sendToEndpoint -> DEBU 1712 Exiting" +"2019-09-24 01:04:51.750 UTC [msp] DeserializeIdentity -> DEBU 1713 Obtaining identity" +"2019-09-24 01:04:53.552 UTC [gossip.comm] func1 -> DEBU 1714 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.552 UTC [gossip.gossip] handleMessage -> DEBU 1715 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.552 UTC [gossip.gossip] handleMessage -> DEBU 1716 Exiting" +"2019-09-24 01:04:53.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1717 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1718 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:53.553 UTC [msp.identity] Verify -> DEBU 1719 Verify: digest = 00000000 0f 30 32 fc 75 25 c0 07 ca 34 2b 54 e9 5a b8 12 |.02.u%...4+T.Z..| +00000010 93 4c d2 62 5c bc 99 92 1b 4b a6 ba 47 7c 09 eb |.L.b\....K..G|..|" +"2019-09-24 01:04:53.553 UTC [msp.identity] Verify -> DEBU 171a Verify: sig = 00000000 30 45 02 21 00 f7 10 57 ec 72 a9 5a d0 ba 09 7c |0E.!...W.r.Z...|| +00000010 21 34 bb ee 20 62 e6 36 11 bb e5 31 01 8d d7 65 |!4.. b.6...1...e| +00000020 b0 b9 99 6e 69 02 20 1c 84 6c 2e f9 1c 80 5d c1 |...ni. ..l....].| +00000030 95 ea 8b 91 a1 0f 3d ee e7 47 12 c7 f9 1c a9 66 |......=..G.....f| +00000040 9b ea cd 44 5e 7f 90 |...D^..|" +"2019-09-24 01:04:53.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 171b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 171c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171d updating membership: timestamp: " +"2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171e Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 171f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:53.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1720 Exiting" +"2019-09-24 01:04:53.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 1721 Exiting" +"2019-09-24 01:04:53.554 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1722 Exiting" +"2019-09-24 01:04:53.561 UTC [gossip.comm] func1 -> DEBU 1723 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.561 UTC [gossip.gossip] handleMessage -> DEBU 1724 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.562 UTC [gossip.gossip] handleMessage -> DEBU 1725 Exiting" +"2019-09-24 01:04:53.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1726 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1727 Exiting" +"2019-09-24 01:04:53.562 UTC [gossip.comm] func1 -> DEBU 1728 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.562 UTC [gossip.gossip] handleMessage -> DEBU 1729 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.563 UTC [gossip.gossip] handleMessage -> DEBU 172a Exiting" +"2019-09-24 01:04:53.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.563 UTC [gossip.discovery] handleMsgFromComm -> DEBU 172c Exiting" +"2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172d Obtaining identity" +"2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172e Obtaining identity" +"2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 172f Obtaining identity" +"2019-09-24 01:04:53.564 UTC [gossip.comm] Send -> DEBU 1730 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:53.564 UTC [msp] DeserializeIdentity -> DEBU 1731 Obtaining identity" +"2019-09-24 01:04:53.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1732 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1733 Exiting" +"2019-09-24 01:04:53.565 UTC [gossip.comm] Send -> DEBU 1734 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:53.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1735 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:53.566 UTC [gossip.comm] sendToEndpoint -> DEBU 1736 Exiting" +"2019-09-24 01:04:53.689 UTC [msp] DeserializeIdentity -> DEBU 1737 Obtaining identity" +"2019-09-24 01:04:53.689 UTC [msp] DeserializeIdentity -> DEBU 1738 Obtaining identity" +"2019-09-24 01:04:53.691 UTC [gossip.comm] Send -> DEBU 1739 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173b Exiting" +"2019-09-24 01:04:53.691 UTC [gossip.comm] sendToEndpoint -> DEBU 173c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173d Exiting" +"2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.692 UTC [gossip.comm] sendToEndpoint -> DEBU 173f Exiting" +"2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1740 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1741 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.694 UTC [gossip.comm] func1 -> DEBU 1742 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.694 UTC [gossip.gossip] handleMessage -> DEBU 1743 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.694 UTC [msp] DeserializeIdentity -> DEBU 1744 Obtaining identity" +"2019-09-24 01:04:53.695 UTC [msp] DeserializeIdentity -> DEBU 1745 Obtaining identity" +"2019-09-24 01:04:53.695 UTC [msp] DeserializeIdentity -> DEBU 1746 Obtaining identity" +"2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1747 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1748 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1749 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.696 UTC [policies] Evaluate -> DEBU 174c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.696 UTC [cauthdsl] func1 -> DEBU 174d 0xc003604030 gate 1569287093696890400 evaluation starts" +"2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 174e 0xc003604030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 174f 0xc003604030 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 1750 0xc003604030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.697 UTC [cauthdsl] func2 -> DEBU 1751 0xc003604030 principal evaluation fails" +"2019-09-24 01:04:53.697 UTC [cauthdsl] func1 -> DEBU 1752 0xc003604030 gate 1569287093696890400 evaluation fails" +"2019-09-24 01:04:53.697 UTC [policies] Evaluate -> DEBU 1753 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.698 UTC [policies] Evaluate -> DEBU 1754 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.698 UTC [policies] Evaluate -> DEBU 1755 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.698 UTC [cauthdsl] func1 -> DEBU 1756 0xc003604870 gate 1569287093698460700 evaluation starts" +"2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1757 0xc003604870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1758 0xc003604870 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.698 UTC [cauthdsl] func2 -> DEBU 1759 0xc003604870 principal matched by identity 0" +"2019-09-24 01:04:53.698 UTC [msp.identity] Verify -> DEBU 175a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:53.699 UTC [msp.identity] Verify -> DEBU 175b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:53.699 UTC [cauthdsl] func2 -> DEBU 175c 0xc003604870 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.699 UTC [cauthdsl] func1 -> DEBU 175d 0xc003604870 gate 1569287093698460700 evaluation succeeds" +"2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 175e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 175f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 1760 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.699 UTC [policies] Evaluate -> DEBU 1761 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1762 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1763 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1764 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:53.700 UTC [msp.identity] Verify -> DEBU 1765 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:53.701 UTC [msp] DeserializeIdentity -> DEBU 1766 Obtaining identity" +"2019-09-24 01:04:53.701 UTC [msp] DeserializeIdentity -> DEBU 1767 Obtaining identity" +"2019-09-24 01:04:53.701 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1768 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.701 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1769 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 176a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.702 UTC [policies] Evaluate -> DEBU 176d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.702 UTC [cauthdsl] func1 -> DEBU 176e 0xc00362b120 gate 1569287093702739900 evaluation starts" +"2019-09-24 01:04:53.702 UTC [cauthdsl] func2 -> DEBU 176f 0xc00362b120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.702 UTC [cauthdsl] func2 -> DEBU 1770 0xc00362b120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.703 UTC [cauthdsl] func2 -> DEBU 1771 0xc00362b120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.703 UTC [cauthdsl] func2 -> DEBU 1772 0xc00362b120 principal evaluation fails" +"2019-09-24 01:04:53.703 UTC [cauthdsl] func1 -> DEBU 1773 0xc00362b120 gate 1569287093702739900 evaluation fails" +"2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1774 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1775 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.704 UTC [policies] Evaluate -> DEBU 1776 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.704 UTC [cauthdsl] func1 -> DEBU 1777 0xc00362b980 gate 1569287093704779200 evaluation starts" +"2019-09-24 01:04:53.704 UTC [cauthdsl] func2 -> DEBU 1778 0xc00362b980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.705 UTC [cauthdsl] func2 -> DEBU 1779 0xc00362b980 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.705 UTC [cauthdsl] func2 -> DEBU 177a 0xc00362b980 principal matched by identity 0" +"2019-09-24 01:04:53.705 UTC [msp.identity] Verify -> DEBU 177b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:53.705 UTC [msp.identity] Verify -> DEBU 177c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:53.706 UTC [cauthdsl] func2 -> DEBU 177d 0xc00362b980 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.706 UTC [cauthdsl] func1 -> DEBU 177e 0xc00362b980 gate 1569287093704779200 evaluation succeeds" +"2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 177f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1780 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1781 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.706 UTC [policies] Evaluate -> DEBU 1782 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.707 UTC [gossip.gossip] handleMessage -> DEBU 1783 Exiting" +"2019-09-24 01:04:53.707 UTC [gossip.gossip] handleMessage -> DEBU 1784 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.707 UTC [msp] DeserializeIdentity -> DEBU 1785 Obtaining identity" +"2019-09-24 01:04:53.708 UTC [msp] DeserializeIdentity -> DEBU 1786 Obtaining identity" +"2019-09-24 01:04:53.708 UTC [msp] DeserializeIdentity -> DEBU 1787 Obtaining identity" +"2019-09-24 01:04:53.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1788 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1789 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.709 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 178a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.709 UTC [policies] Evaluate -> DEBU 178d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.709 UTC [cauthdsl] func1 -> DEBU 178e 0xc0036635f0 gate 1569287093709687900 evaluation starts" +"2019-09-24 01:04:53.709 UTC [cauthdsl] func2 -> DEBU 178f 0xc0036635f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1790 0xc0036635f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1791 0xc0036635f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.710 UTC [cauthdsl] func2 -> DEBU 1792 0xc0036635f0 principal evaluation fails" +"2019-09-24 01:04:53.710 UTC [cauthdsl] func1 -> DEBU 1793 0xc0036635f0 gate 1569287093709687900 evaluation fails" +"2019-09-24 01:04:53.710 UTC [policies] Evaluate -> DEBU 1794 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.711 UTC [policies] Evaluate -> DEBU 1795 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.711 UTC [policies] Evaluate -> DEBU 1796 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.711 UTC [cauthdsl] func1 -> DEBU 1797 0xc003663e30 gate 1569287093711491600 evaluation starts" +"2019-09-24 01:04:53.711 UTC [cauthdsl] func2 -> DEBU 1798 0xc003663e30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.711 UTC [cauthdsl] func2 -> DEBU 1799 0xc003663e30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.712 UTC [cauthdsl] func2 -> DEBU 179a 0xc003663e30 principal matched by identity 0" +"2019-09-24 01:04:53.712 UTC [msp.identity] Verify -> DEBU 179b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:53.718 UTC [msp.identity] Verify -> DEBU 179c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:53.719 UTC [cauthdsl] func2 -> DEBU 179d 0xc003663e30 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.719 UTC [cauthdsl] func1 -> DEBU 179e 0xc003663e30 gate 1569287093711491600 evaluation succeeds" +"2019-09-24 01:04:53.719 UTC [policies] Evaluate -> DEBU 179f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.719 UTC [policies] Evaluate -> DEBU 17a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.720 UTC [policies] Evaluate -> DEBU 17a1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.720 UTC [policies] Evaluate -> DEBU 17a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.720 UTC [msp.identity] Verify -> DEBU 17a3 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:53.720 UTC [msp.identity] Verify -> DEBU 17a4 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:53.721 UTC [msp] DeserializeIdentity -> DEBU 17a5 Obtaining identity" +"2019-09-24 01:04:53.723 UTC [msp] DeserializeIdentity -> DEBU 17a6 Obtaining identity" +"2019-09-24 01:04:53.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17a7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17a8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17a9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17aa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17ab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.725 UTC [policies] Evaluate -> DEBU 17ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.725 UTC [cauthdsl] func1 -> DEBU 17ad 0xc003683f70 gate 1569287093725420700 evaluation starts" +"2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17ae 0xc003683f70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17af 0xc003683f70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.725 UTC [cauthdsl] func2 -> DEBU 17b0 0xc003683f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b1 0xc003683f70 principal evaluation fails" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func1 -> DEBU 17b2 0xc003683f70 gate 1569287093725420700 evaluation fails" +"2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.726 UTC [policies] Evaluate -> DEBU 17b5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func1 -> DEBU 17b6 0xc00370e7b0 gate 1569287093726622300 evaluation starts" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b7 0xc00370e7b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b8 0xc00370e7b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.726 UTC [cauthdsl] func2 -> DEBU 17b9 0xc00370e7b0 principal matched by identity 0" +"2019-09-24 01:04:53.726 UTC [msp.identity] Verify -> DEBU 17ba Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:53.726 UTC [msp.identity] Verify -> DEBU 17bb Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:53.727 UTC [cauthdsl] func2 -> DEBU 17bc 0xc00370e7b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.728 UTC [cauthdsl] func1 -> DEBU 17bd 0xc00370e7b0 gate 1569287093726622300 evaluation succeeds" +"2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17be Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17c0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.729 UTC [policies] Evaluate -> DEBU 17c1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.730 UTC [msp] DeserializeIdentity -> DEBU 17c2 Obtaining identity" +"2019-09-24 01:04:53.730 UTC [msp] DeserializeIdentity -> DEBU 17c3 Obtaining identity" +"2019-09-24 01:04:53.730 UTC [gossip.pull] Hello -> DEBU 17c4 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:53.731 UTC [msp.identity] Verify -> DEBU 17c5 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:53.731 UTC [msp] DeserializeIdentity -> DEBU 17c6 Obtaining identity" +"2019-09-24 01:04:53.731 UTC [msp] DeserializeIdentity -> DEBU 17c7 Obtaining identity" +"2019-09-24 01:04:53.731 UTC [msp.identity] Verify -> DEBU 17c8 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:53.731 UTC [gossip.comm] Send -> DEBU 17c9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:53.732 UTC [gossip.gossip] handleMessage -> DEBU 17ca Exiting" +"2019-09-24 01:04:53.732 UTC [gossip.comm] sendToEndpoint -> DEBU 17cb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.732 UTC [gossip.comm] sendToEndpoint -> DEBU 17cc Exiting" +"2019-09-24 01:04:53.732 UTC [gossip.gossip] handleMessage -> DEBU 17cd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.733 UTC [gossip.comm] func1 -> DEBU 17ce Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17cf Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d0 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:53.735 UTC [msp.identity] Verify -> DEBU 17d2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:53.736 UTC [msp] DeserializeIdentity -> DEBU 17d3 Obtaining identity" +"2019-09-24 01:04:53.736 UTC [msp] DeserializeIdentity -> DEBU 17d4 Obtaining identity" +"2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17d5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17d7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.737 UTC [policies] Evaluate -> DEBU 17da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.737 UTC [cauthdsl] func1 -> DEBU 17db 0xc0037d19d0 gate 1569287093737576600 evaluation starts" +"2019-09-24 01:04:53.737 UTC [cauthdsl] func2 -> DEBU 17dc 0xc0037d19d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.738 UTC [cauthdsl] func2 -> DEBU 17dd 0xc0037d19d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.739 UTC [cauthdsl] func2 -> DEBU 17de 0xc0037d19d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.739 UTC [cauthdsl] func2 -> DEBU 17df 0xc0037d19d0 principal evaluation fails" +"2019-09-24 01:04:53.739 UTC [cauthdsl] func1 -> DEBU 17e0 0xc0037d19d0 gate 1569287093737576600 evaluation fails" +"2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.739 UTC [policies] Evaluate -> DEBU 17e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.742 UTC [cauthdsl] func1 -> DEBU 17e4 0xc003828210 gate 1569287093740169900 evaluation starts" +"2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e5 0xc003828210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e6 0xc003828210 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.743 UTC [cauthdsl] func2 -> DEBU 17e7 0xc003828210 principal matched by identity 0" +"2019-09-24 01:04:53.743 UTC [msp.identity] Verify -> DEBU 17e8 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:53.743 UTC [msp.identity] Verify -> DEBU 17e9 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:53.744 UTC [cauthdsl] func2 -> DEBU 17ea 0xc003828210 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.744 UTC [cauthdsl] func1 -> DEBU 17eb 0xc003828210 gate 1569287093740169900 evaluation succeeds" +"2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ee Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.744 UTC [policies] Evaluate -> DEBU 17ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.744 UTC [msp] DeserializeIdentity -> DEBU 17f0 Obtaining identity" +"2019-09-24 01:04:53.745 UTC [msp] DeserializeIdentity -> DEBU 17f1 Obtaining identity" +"2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 17f2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.745 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 17f4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:53.745 UTC [policies] Evaluate -> DEBU 17f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:53.746 UTC [policies] Evaluate -> DEBU 17f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:53.746 UTC [policies] Evaluate -> DEBU 17f7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:53.746 UTC [cauthdsl] func1 -> DEBU 17f8 0xc0038299f0 gate 1569287093746463400 evaluation starts" +"2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17f9 0xc0038299f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17fa 0xc0038299f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.746 UTC [cauthdsl] func2 -> DEBU 17fb 0xc0038299f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 17fc 0xc0038299f0 principal evaluation fails" +"2019-09-24 01:04:53.747 UTC [cauthdsl] func1 -> DEBU 17fd 0xc0038299f0 gate 1569287093746463400 evaluation fails" +"2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 17fe Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 17ff == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:53.747 UTC [policies] Evaluate -> DEBU 1800 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:53.747 UTC [cauthdsl] func1 -> DEBU 1801 0xc00386a230 gate 1569287093747662500 evaluation starts" +"2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 1802 0xc00386a230 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:53.747 UTC [cauthdsl] func2 -> DEBU 1803 0xc00386a230 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:53.748 UTC [cauthdsl] func2 -> DEBU 1804 0xc00386a230 principal matched by identity 0" +"2019-09-24 01:04:53.748 UTC [msp.identity] Verify -> DEBU 1805 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:53.748 UTC [msp.identity] Verify -> DEBU 1806 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:53.749 UTC [cauthdsl] func2 -> DEBU 1807 0xc00386a230 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:53.749 UTC [cauthdsl] func1 -> DEBU 1808 0xc00386a230 gate 1569287093747662500 evaluation succeeds" +"2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 1809 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:53.749 UTC [policies] Evaluate -> DEBU 180c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:53.749 UTC [gossip.gossip] handleMessage -> DEBU 180d Exiting" +"2019-09-24 01:04:53.750 UTC [gossip.gossip] handleMessage -> DEBU 180e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.750 UTC [gossip.pull] HandleMessage -> DEBU 180f GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.750 UTC [gossip.gossip] handleMessage -> DEBU 1810 Exiting" +"2019-09-24 01:04:53.873 UTC [gossip.comm] func1 -> DEBU 1811 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.874 UTC [gossip.gossip] handleMessage -> DEBU 1812 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.875 UTC [msp] DeserializeIdentity -> DEBU 1813 Obtaining identity" +"2019-09-24 01:04:53.875 UTC [msp] DeserializeIdentity -> DEBU 1814 Obtaining identity" +"2019-09-24 01:04:53.877 UTC [gossip.gossip] handleMessage -> DEBU 1815 Exiting" +"2019-09-24 01:04:53.883 UTC [gossip.comm] func1 -> DEBU 1816 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.883 UTC [gossip.gossip] handleMessage -> DEBU 1817 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.883 UTC [gossip.pull] HandleMessage -> DEBU 1818 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:04:53.884 UTC [gossip.pull] SendDigest -> DEBU 1819 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:53.884 UTC [gossip.gossip] handleMessage -> DEBU 181a Exiting" +"2019-09-24 01:04:54.077 UTC [gossip.comm] func1 -> DEBU 181b Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.077 UTC [gossip.gossip] handleMessage -> DEBU 181c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.077 UTC [msp] DeserializeIdentity -> DEBU 181d Obtaining identity" +"2019-09-24 01:04:54.078 UTC [msp] DeserializeIdentity -> DEBU 181e Obtaining identity" +"2019-09-24 01:04:54.078 UTC [msp] DeserializeIdentity -> DEBU 181f Obtaining identity" +"2019-09-24 01:04:54.081 UTC [gossip.gossip] handleMessage -> DEBU 1820 Exiting" +"2019-09-24 01:04:54.168 UTC [gossip.comm] func1 -> DEBU 1821 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.169 UTC [gossip.gossip] handleMessage -> DEBU 1822 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.170 UTC [gossip.gossip] handleMessage -> DEBU 1823 Exiting" +"2019-09-24 01:04:54.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1824 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1825 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:54.171 UTC [msp] DeserializeIdentity -> DEBU 1826 Obtaining identity" +"2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1827 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1828 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1829 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.172 UTC [policies] Evaluate -> DEBU 182a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:54.175 UTC [gossip.comm] func1 -> DEBU 182b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.175 UTC [policies] Evaluate -> DEBU 182c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:54.175 UTC [policies] Evaluate -> DEBU 182d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:54.176 UTC [cauthdsl] func1 -> DEBU 182e 0xc0038948b0 gate 1569287094176228000 evaluation starts" +"2019-09-24 01:04:54.176 UTC [cauthdsl] func2 -> DEBU 182f 0xc0038948b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.175 UTC [gossip.comm] func1 -> DEBU 1830 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.176 UTC [cauthdsl] func2 -> DEBU 1831 0xc0038948b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.178 UTC [gossip.gossip] handleMessage -> DEBU 1832 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.178 UTC [cauthdsl] func2 -> DEBU 1833 0xc0038948b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:54.179 UTC [cauthdsl] func2 -> DEBU 1834 0xc0038948b0 principal evaluation fails" +"2019-09-24 01:04:54.179 UTC [cauthdsl] func1 -> DEBU 1835 0xc0038948b0 gate 1569287094176228000 evaluation fails" +"2019-09-24 01:04:54.180 UTC [gossip.comm] func1 -> DEBU 1836 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.180 UTC [policies] Evaluate -> DEBU 1837 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.181 UTC [policies] Evaluate -> DEBU 1838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.183 UTC [policies] Evaluate -> DEBU 183a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:54.183 UTC [gossip.comm] func1 -> DEBU 1839 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.183 UTC [cauthdsl] func1 -> DEBU 183b 0xc0038950f0 gate 1569287094183587100 evaluation starts" +"2019-09-24 01:04:54.183 UTC [gossip.comm] func1 -> DEBU 183c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183d 0xc0038950f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183e 0xc0038950f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.184 UTC [cauthdsl] func2 -> DEBU 183f 0xc0038950f0 principal matched by identity 0" +"2019-09-24 01:04:54.184 UTC [msp.identity] Verify -> DEBU 1840 Verify: digest = 00000000 ae 12 c2 9a 74 ba 9c 98 cd c7 1c 9e 95 ef 14 90 |....t...........| +00000010 44 19 1b e5 f7 59 93 31 a6 19 f0 f6 b6 f2 b9 59 |D....Y.1.......Y|" +"2019-09-24 01:04:54.185 UTC [msp.identity] Verify -> DEBU 1841 Verify: sig = 00000000 30 45 02 21 00 bc 7f cf 92 ae 8d ee be bb 92 fc |0E.!............| +00000010 79 17 f3 7f a1 22 b0 21 f7 27 db 94 6a 4a 5c 92 |y....".!.'..jJ\.| +00000020 11 b5 31 a3 9e 02 20 45 a0 a3 b1 d7 8f f3 84 28 |..1... E.......(| +00000030 32 8f 28 82 1b df 05 7b 55 1a c9 b7 bf 86 48 6c |2.(....{U.....Hl| +00000040 ba be 8b 13 7b 44 d3 |....{D.|" +"2019-09-24 01:04:54.185 UTC [cauthdsl] func2 -> DEBU 1842 0xc0038950f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:54.185 UTC [cauthdsl] func1 -> DEBU 1843 0xc0038950f0 gate 1569287094183587100 evaluation succeeds" +"2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1844 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1845 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.185 UTC [policies] Evaluate -> DEBU 1846 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:54.186 UTC [policies] Evaluate -> DEBU 1847 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:54.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1848 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 1849 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:54.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 184a updating membership: timestamp: " +"2019-09-24 01:04:54.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 184b Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:54.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 184c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:54.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 184d Exiting" +"2019-09-24 01:04:54.190 UTC [gossip.discovery] handleAliveMessage -> DEBU 184e Exiting" +"2019-09-24 01:04:54.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 184f Exiting" +"2019-09-24 01:04:54.191 UTC [gossip.gossip] handleMessage -> DEBU 1850 Exiting" +"2019-09-24 01:04:54.192 UTC [gossip.gossip] handleMessage -> DEBU 1851 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1852 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.192 UTC [msp] DeserializeIdentity -> DEBU 1853 Obtaining identity" +"2019-09-24 01:04:54.193 UTC [msp] DeserializeIdentity -> DEBU 1854 Obtaining identity" +"2019-09-24 01:04:54.194 UTC [msp] DeserializeIdentity -> DEBU 1855 Obtaining identity" +"2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1856 Obtaining identity" +"2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1857 Obtaining identity" +"2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1858 Obtaining identity" +"2019-09-24 01:04:54.195 UTC [msp] DeserializeIdentity -> DEBU 1859 Obtaining identity" +"2019-09-24 01:04:54.196 UTC [gossip.comm] Send -> DEBU 185a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:54.196 UTC [msp] DeserializeIdentity -> DEBU 185b Obtaining identity" +"2019-09-24 01:04:54.197 UTC [gossip.comm] Send -> DEBU 185c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185e Exiting" +"2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 185f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.197 UTC [gossip.comm] sendToEndpoint -> DEBU 1860 Exiting" +"2019-09-24 01:04:54.198 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1861 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:54.198 UTC [msp] DeserializeIdentity -> DEBU 1862 Obtaining identity" +"2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1863 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1864 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.199 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1865 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1866 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1867 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:54.199 UTC [policies] Evaluate -> DEBU 1868 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:54.199 UTC [cauthdsl] func1 -> DEBU 1869 0xc0038bb270 gate 1569287094199979700 evaluation starts" +"2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186a 0xc0038bb270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186b 0xc0038bb270 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186c 0xc0038bb270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:54.200 UTC [cauthdsl] func2 -> DEBU 186d 0xc0038bb270 principal evaluation fails" +"2019-09-24 01:04:54.201 UTC [cauthdsl] func1 -> DEBU 186e 0xc0038bb270 gate 1569287094199979700 evaluation fails" +"2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 186f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 1870 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.201 UTC [policies] Evaluate -> DEBU 1871 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:54.201 UTC [cauthdsl] func1 -> DEBU 1872 0xc0038bbac0 gate 1569287094201715700 evaluation starts" +"2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1873 0xc0038bbac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1874 0xc0038bbac0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.202 UTC [cauthdsl] func2 -> DEBU 1875 0xc0038bbac0 principal matched by identity 0" +"2019-09-24 01:04:54.202 UTC [msp.identity] Verify -> DEBU 1876 Verify: digest = 00000000 f4 f9 09 e7 13 84 d2 36 15 2e 37 23 7b 2b 5a 8a |.......6..7#{+Z.| +00000010 d1 b1 be b1 bd 9c 57 9b ce a2 81 11 40 f3 2b 62 |......W.....@.+b|" +"2019-09-24 01:04:54.202 UTC [msp.identity] Verify -> DEBU 1877 Verify: sig = 00000000 30 45 02 21 00 ab b3 bd f0 74 97 a2 ed 0f 40 3f |0E.!.....t....@?| +00000010 9e 5a ae b3 bf 0b 56 e3 7c 84 27 cc 29 2f 21 cd |.Z....V.|.'.)/!.| +00000020 59 d9 15 07 13 02 20 47 36 78 41 92 00 5b f9 fa |Y..... G6xA..[..| +00000030 bd b8 8d dc 67 e0 88 d7 39 ca 2b e6 1b 29 e7 b1 |....g...9.+..)..| +00000040 00 6c b2 50 6d 70 c4 |.l.Pmp.|" +"2019-09-24 01:04:54.203 UTC [cauthdsl] func2 -> DEBU 1878 0xc0038bbac0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:54.203 UTC [cauthdsl] func1 -> DEBU 1879 0xc0038bbac0 gate 1569287094201715700 evaluation succeeds" +"2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:54.203 UTC [policies] Evaluate -> DEBU 187d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:54.204 UTC [gossip.discovery] handleAliveMessage -> DEBU 187e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 187f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 1880 updating membership: timestamp: " +"2019-09-24 01:04:54.204 UTC [gossip.discovery] learnExistingMembers -> DEBU 1881 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:54.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1882 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:54.205 UTC [gossip.discovery] learnExistingMembers -> DEBU 1883 Exiting" +"2019-09-24 01:04:54.205 UTC [gossip.discovery] handleAliveMessage -> DEBU 1884 Exiting" +"2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1885 Exiting" +"2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1886 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1887 Exiting" +"2019-09-24 01:04:54.205 UTC [gossip.gossip] handleMessage -> DEBU 1888 Exiting" +"2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 1889 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 188a Exiting" +"2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.206 UTC [gossip.gossip] handleMessage -> DEBU 188c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188d Exiting" +"2019-09-24 01:04:54.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 188f Exiting" +"2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1890 Exiting" +"2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1891 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.207 UTC [gossip.gossip] handleMessage -> DEBU 1892 Exiting" +"2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1894 Exiting" +"2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1895 Obtaining identity" +"2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1896 Obtaining identity" +"2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1897 Obtaining identity" +"2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1898 Obtaining identity" +"2019-09-24 01:04:54.208 UTC [msp] DeserializeIdentity -> DEBU 1899 Obtaining identity" +"2019-09-24 01:04:54.209 UTC [msp] DeserializeIdentity -> DEBU 189a Obtaining identity" +"2019-09-24 01:04:54.209 UTC [msp] DeserializeIdentity -> DEBU 189b Obtaining identity" +"2019-09-24 01:04:54.209 UTC [gossip.comm] Send -> DEBU 189c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:54.210 UTC [msp] DeserializeIdentity -> DEBU 189d Obtaining identity" +"2019-09-24 01:04:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 189e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.210 UTC [gossip.comm] sendToEndpoint -> DEBU 189f Exiting" +"2019-09-24 01:04:54.210 UTC [gossip.comm] Send -> DEBU 18a0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:54.213 UTC [gossip.comm] sendToEndpoint -> DEBU 18a1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.214 UTC [gossip.comm] sendToEndpoint -> DEBU 18a2 Exiting" +"2019-09-24 01:04:54.231 UTC [msp] GetDefaultSigningIdentity -> DEBU 18a3 Obtaining default signing identity" +"2019-09-24 01:04:54.231 UTC [msp.identity] Sign -> DEBU 18a4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151019 " +"2019-09-24 01:04:54.232 UTC [msp.identity] Sign -> DEBU 18a5 Sign: digest: 5E018370BD54108CBA14FB03A94C559D85B2688E56E970A9C0A21BC420583808 " +"2019-09-24 01:04:54.232 UTC [msp] GetDefaultSigningIdentity -> DEBU 18a6 Obtaining default signing identity" +"2019-09-24 01:04:54.233 UTC [msp.identity] Sign -> DEBU 18a7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:54.233 UTC [msp.identity] Sign -> DEBU 18a8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:54.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 18a9 Sleeping 5s" +"2019-09-24 01:04:54.241 UTC [msp] DeserializeIdentity -> DEBU 18aa Obtaining identity" +"2019-09-24 01:04:54.242 UTC [msp] DeserializeIdentity -> DEBU 18ab Obtaining identity" +"2019-09-24 01:04:54.242 UTC [gossip.comm] Send -> DEBU 18ac Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:54.243 UTC [msp] DeserializeIdentity -> DEBU 18ad Obtaining identity" +"2019-09-24 01:04:54.243 UTC [gossip.comm] sendToEndpoint -> DEBU 18ae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:04:54.243 UTC [gossip.comm] Send -> DEBU 18af Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:54.243 UTC [gossip.comm] sendToEndpoint -> DEBU 18b0 Exiting" +"2019-09-24 01:04:54.243 UTC [msp] DeserializeIdentity -> DEBU 18b1 Obtaining identity" +"2019-09-24 01:04:54.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.244 UTC [gossip.comm] Send -> DEBU 18b3 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:54.244 UTC [gossip.comm] sendToEndpoint -> DEBU 18b4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.245 UTC [gossip.comm] sendToEndpoint -> DEBU 18b5 Exiting" +"2019-09-24 01:04:54.245 UTC [gossip.comm] sendToEndpoint -> DEBU 18b6 Exiting" +"2019-09-24 01:04:54.253 UTC [gossip.comm] func1 -> DEBU 18b7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.253 UTC [gossip.gossip] handleMessage -> DEBU 18b8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.254 UTC [gossip.gossip] handleMessage -> DEBU 18b9 Exiting" +"2019-09-24 01:04:54.255 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ba Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.255 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18bb Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:54.255 UTC [msp.identity] Verify -> DEBU 18bc Verify: digest = 00000000 5e 01 83 70 bd 54 10 8c ba 14 fb 03 a9 4c 55 9d |^..p.T.......LU.| +00000010 85 b2 68 8e 56 e9 70 a9 c0 a2 1b c4 20 58 38 08 |..h.V.p..... X8.|" +"2019-09-24 01:04:54.255 UTC [msp.identity] Verify -> DEBU 18bd Verify: sig = 00000000 30 44 02 20 4e 1c b8 2a e8 66 f6 4a 43 df 5e 75 |0D. N..*.f.JC.^u| +00000010 5e 36 8c 32 03 7e ef 26 40 5e c2 bc 82 20 fe 74 |^6.2.~.&@^... .t| +00000020 76 8a 3e 7a 02 20 42 17 fd 4c a7 5a 28 bc 42 55 |v.>z. B..L.Z(.BU| +00000030 3b 12 8d db 5a 09 33 b5 c6 f2 f7 4b 02 3e 49 5a |;...Z.3....K.>IZ| +00000040 0e e2 e7 3f 2e ea |...?..|" +"2019-09-24 01:04:54.256 UTC [gossip.discovery] isSentByMe -> DEBU 18be Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.256 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18bf Exiting" +"2019-09-24 01:04:54.276 UTC [gossip.comm] func1 -> DEBU 18c0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.277 UTC [gossip.gossip] handleMessage -> DEBU 18c1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.278 UTC [msp] DeserializeIdentity -> DEBU 18c2 Obtaining identity" +"2019-09-24 01:04:54.278 UTC [msp] DeserializeIdentity -> DEBU 18c3 Obtaining identity" +"2019-09-24 01:04:54.279 UTC [msp] DeserializeIdentity -> DEBU 18c4 Obtaining identity" +"2019-09-24 01:04:54.279 UTC [gossip.gossip] handleMessage -> DEBU 18c5 Exiting" +"2019-09-24 01:04:54.495 UTC [gossip.comm] func1 -> DEBU 18c6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.495 UTC [gossip.gossip] handleMessage -> DEBU 18c7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.496 UTC [gossip.pull] HandleMessage -> DEBU 18c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.497 UTC [gossip.pull] SendDigest -> DEBU 18c9 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:54.497 UTC [gossip.gossip] handleMessage -> DEBU 18ca Exiting" +"2019-09-24 01:04:54.503 UTC [gossip.comm] func1 -> DEBU 18cb Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.503 UTC [gossip.gossip] handleMessage -> DEBU 18cc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.505 UTC [gossip.gossip] handleMessage -> DEBU 18cd Exiting" +"2019-09-24 01:04:54.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18ce Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.505 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18cf Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:54.505 UTC [msp.identity] Verify -> DEBU 18d0 Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +"2019-09-24 01:04:54.505 UTC [msp.identity] Verify -> DEBU 18d1 Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +"2019-09-24 01:04:54.506 UTC [msp.identity] Verify -> DEBU 18d2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:54.506 UTC [msp.identity] Verify -> DEBU 18d3 Verify: sig = 00000000 30 45 02 21 00 ca e9 1f e2 bb d0 d4 af 7b 93 bd |0E.!.........{..| +00000010 c8 a8 82 0d c8 45 4f f1 94 40 22 30 bc af dd 8c |.....EO..@"0....| +00000020 45 74 c5 b8 ca 02 20 59 88 4e 78 d9 07 3b 48 af |Et.... Y.Nx..;H.| +00000030 27 a1 6c 13 62 19 0e 7d dc 34 04 f2 e4 0f 51 ed |'.l.b..}.4....Q.| +00000040 5c d4 24 32 e7 da 6d |\.$2..m|" +"2019-09-24 01:04:54.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 18d4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:54.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d6 updating membership: timestamp: " +"2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d7 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:54.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 18d9 Exiting" +"2019-09-24 01:04:54.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 18da Exiting" +"2019-09-24 01:04:54.508 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18db Exiting" +"2019-09-24 01:04:54.508 UTC [gossip.discovery] sendMemResponse -> DEBU 18dc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:54.508 UTC [msp] DeserializeIdentity -> DEBU 18dd Obtaining identity" +"2019-09-24 01:04:54.509 UTC [msp] DeserializeIdentity -> DEBU 18de Obtaining identity" +"2019-09-24 01:04:54.509 UTC [gossip.comm] Send -> DEBU 18df Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.509 UTC [gossip.discovery] sendMemResponse -> DEBU 18e0 Exiting, replying with alive: > alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:54.510 UTC [gossip.comm] sendToEndpoint -> DEBU 18e1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.510 UTC [gossip.comm] sendToEndpoint -> DEBU 18e2 Exiting" +"2019-09-24 01:04:54.807 UTC [gossip.comm] func1 -> DEBU 18e3 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.808 UTC [gossip.gossip] handleMessage -> DEBU 18e4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.808 UTC [gossip.pull] HandleMessage -> DEBU 18e5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.809 UTC [msp] DeserializeIdentity -> DEBU 18e6 Obtaining identity" +"2019-09-24 01:04:54.809 UTC [msp] DeserializeIdentity -> DEBU 18e7 Obtaining identity" +"2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18e8 Obtaining identity" +"2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18e9 Obtaining identity" +"2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18ea Obtaining identity" +"2019-09-24 01:04:54.810 UTC [msp] DeserializeIdentity -> DEBU 18eb Obtaining identity" +"2019-09-24 01:04:54.810 UTC [gossip.pull] SendDigest -> DEBU 18ec Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:54.811 UTC [gossip.gossip] handleMessage -> DEBU 18ed Exiting" +"2019-09-24 01:04:54.815 UTC [gossip.comm] func1 -> DEBU 18ee Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.815 UTC [gossip.gossip] handleMessage -> DEBU 18ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.815 UTC [gossip.gossip] handleMessage -> DEBU 18f0 Exiting" +"2019-09-24 01:04:54.816 UTC [gossip.discovery] handleMsgFromComm -> DEBU 18f1 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.816 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 18f2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:54.817 UTC [msp] DeserializeIdentity -> DEBU 18f3 Obtaining identity" +"2019-09-24 01:04:54.817 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 18f4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:54.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.819 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 18f6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.819 UTC [policies] Evaluate -> DEBU 18f7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:54.820 UTC [policies] Evaluate -> DEBU 18f8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:54.820 UTC [policies] Evaluate -> DEBU 18f9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:54.821 UTC [cauthdsl] func1 -> DEBU 18fa 0xc003a02a20 gate 1569287094821185000 evaluation starts" +"2019-09-24 01:04:54.823 UTC [cauthdsl] func2 -> DEBU 18fb 0xc003a02a20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.823 UTC [cauthdsl] func2 -> DEBU 18fc 0xc003a02a20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.824 UTC [cauthdsl] func2 -> DEBU 18fd 0xc003a02a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:54.825 UTC [cauthdsl] func2 -> DEBU 18fe 0xc003a02a20 principal evaluation fails" +"2019-09-24 01:04:54.825 UTC [cauthdsl] func1 -> DEBU 18ff 0xc003a02a20 gate 1569287094821185000 evaluation fails" +"2019-09-24 01:04:54.825 UTC [policies] Evaluate -> DEBU 1900 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.825 UTC [policies] Evaluate -> DEBU 1901 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.826 UTC [policies] Evaluate -> DEBU 1902 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:54.826 UTC [cauthdsl] func1 -> DEBU 1903 0xc003a03260 gate 1569287094826507800 evaluation starts" +"2019-09-24 01:04:54.826 UTC [cauthdsl] func2 -> DEBU 1904 0xc003a03260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1905 0xc003a03260 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1906 0xc003a03260 principal matched by identity 0" +"2019-09-24 01:04:54.827 UTC [msp.identity] Verify -> DEBU 1907 Verify: digest = 00000000 7a 01 ae 55 90 19 8d 3d 42 98 c2 b3 96 78 ef 8f |z..U...=B....x..| +00000010 c2 d2 c4 26 ff e6 6b 45 d3 4a a4 d1 9e 51 47 2f |...&..kE.J...QG/|" +"2019-09-24 01:04:54.827 UTC [msp.identity] Verify -> DEBU 1908 Verify: sig = 00000000 30 45 02 21 00 e7 1a 37 92 34 62 25 dc e7 2d c8 |0E.!...7.4b%..-.| +00000010 65 c7 66 03 a2 2c 50 8d d4 00 34 62 de 96 e7 b2 |e.f..,P...4b....| +00000020 30 fc 36 ad 03 02 20 25 0a e1 6c b1 b6 9b 9d 7b |0.6... %..l....{| +00000030 a7 f2 25 c4 d5 96 b9 18 38 73 37 0e 5c e6 21 79 |..%.....8s7.\.!y| +00000040 63 5c 9f 3b ee 33 9c |c\.;.3.|" +"2019-09-24 01:04:54.827 UTC [cauthdsl] func2 -> DEBU 1909 0xc003a03260 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:54.828 UTC [cauthdsl] func1 -> DEBU 190a 0xc003a03260 gate 1569287094826507800 evaluation succeeds" +"2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:54.828 UTC [policies] Evaluate -> DEBU 190e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:54.828 UTC [gossip.discovery] handleAliveMessage -> DEBU 190f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1910 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1911 updating membership: timestamp: " +"2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1912 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:54.829 UTC [gossip.discovery] learnExistingMembers -> DEBU 1913 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:54.830 UTC [gossip.discovery] learnExistingMembers -> DEBU 1914 Exiting" +"2019-09-24 01:04:54.830 UTC [gossip.discovery] handleAliveMessage -> DEBU 1915 Exiting" +"2019-09-24 01:04:54.830 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1916 Exiting" +"2019-09-24 01:04:54.830 UTC [gossip.discovery] sendMemResponse -> DEBU 1917 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:54.831 UTC [msp] DeserializeIdentity -> DEBU 1918 Obtaining identity" +"2019-09-24 01:04:54.831 UTC [msp] DeserializeIdentity -> DEBU 1919 Obtaining identity" +"2019-09-24 01:04:54.832 UTC [msp] DeserializeIdentity -> DEBU 191a Obtaining identity" +"2019-09-24 01:04:54.832 UTC [gossip.comm] Send -> DEBU 191b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.832 UTC [gossip.discovery] sendMemResponse -> DEBU 191c Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:54.832 UTC [gossip.comm] sendToEndpoint -> DEBU 191d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.833 UTC [gossip.comm] sendToEndpoint -> DEBU 191e Exiting" +"2019-09-24 01:04:54.850 UTC [gossip.pull] Hello -> DEBU 191f Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:54.851 UTC [gossip.comm] Send -> DEBU 1920 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.851 UTC [gossip.pull] Hello -> DEBU 1921 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:54.851 UTC [gossip.comm] Send -> DEBU 1922 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1923 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1924 Exiting" +"2019-09-24 01:04:54.852 UTC [gossip.pull] Hello -> DEBU 1925 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:54.852 UTC [gossip.comm] Send -> DEBU 1926 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.852 UTC [gossip.comm] sendToEndpoint -> DEBU 1927 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.853 UTC [gossip.comm] sendToEndpoint -> DEBU 1929 Exiting" +"2019-09-24 01:04:54.853 UTC [gossip.comm] func1 -> DEBU 1928 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.854 UTC [gossip.gossip] handleMessage -> DEBU 192a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.854 UTC [gossip.pull] HandleMessage -> DEBU 192b GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.853 UTC [gossip.comm] sendToEndpoint -> DEBU 192c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.854 UTC [gossip.comm] sendToEndpoint -> DEBU 192e Exiting" +"2019-09-24 01:04:54.854 UTC [gossip.gossip] handleMessage -> DEBU 192d Exiting" +"2019-09-24 01:04:54.855 UTC [gossip.comm] func1 -> DEBU 192f Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.855 UTC [gossip.gossip] handleMessage -> DEBU 1930 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.855 UTC [gossip.pull] HandleMessage -> DEBU 1931 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.855 UTC [gossip.gossip] handleMessage -> DEBU 1932 Exiting" +"2019-09-24 01:04:54.856 UTC [gossip.comm] func1 -> DEBU 1933 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.856 UTC [gossip.gossip] handleMessage -> DEBU 1934 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.856 UTC [gossip.pull] HandleMessage -> DEBU 1935 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.856 UTC [gossip.gossip] handleMessage -> DEBU 1936 Exiting" +"2019-09-24 01:04:54.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 1937 Obtaining default signing identity" +"2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 1938 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101A " +"2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 1939 Sign: digest: 89C505F5415F9852461C31F4430506923ACAEB7146C740E89BD4B2FB7B3804ED " +"2019-09-24 01:04:54.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 193a Obtaining default signing identity" +"2019-09-24 01:04:54.869 UTC [msp.identity] Sign -> DEBU 193b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:54.870 UTC [msp.identity] Sign -> DEBU 193c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:54.870 UTC [gossip.comm] Send -> DEBU 193d Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.871 UTC [msp] DeserializeIdentity -> DEBU 193e Obtaining identity" +"2019-09-24 01:04:54.871 UTC [gossip.comm] sendToEndpoint -> DEBU 193f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.871 UTC [gossip.comm] sendToEndpoint -> DEBU 1940 Exiting" +"2019-09-24 01:04:54.872 UTC [gossip.comm] Send -> DEBU 1941 Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.875 UTC [msp] DeserializeIdentity -> DEBU 1944 Obtaining identity" +"2019-09-24 01:04:54.873 UTC [gossip.comm] func1 -> DEBU 1942 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.875 UTC [gossip.gossip] handleMessage -> DEBU 1945 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.876 UTC [gossip.pull] HandleMessage -> DEBU 1947 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 1948 Obtaining identity" +"2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 1949 Obtaining identity" +"2019-09-24 01:04:54.876 UTC [gossip.comm] sendToEndpoint -> DEBU 194a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.877 UTC [gossip.comm] sendToEndpoint -> DEBU 194c Exiting" +"2019-09-24 01:04:54.875 UTC [gossip.comm] Send -> DEBU 1946 Entering, sending GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.876 UTC [msp] DeserializeIdentity -> DEBU 194b Obtaining identity" +"2019-09-24 01:04:54.878 UTC [msp] DeserializeIdentity -> DEBU 194d Obtaining identity" +"2019-09-24 01:04:54.878 UTC [msp] DeserializeIdentity -> DEBU 194e Obtaining identity" +"2019-09-24 01:04:54.879 UTC [gossip.comm] sendToEndpoint -> DEBU 194f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\261\325B\335\263\371T" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.879 UTC [gossip.comm] sendToEndpoint -> DEBU 1950 Exiting" +"2019-09-24 01:04:54.879 UTC [gossip.comm] func1 -> DEBU 1951 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.874 UTC [gossip.comm] func1 -> DEBU 1943 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.879 UTC [msp] DeserializeIdentity -> DEBU 1952 Obtaining identity" +"2019-09-24 01:04:54.882 UTC [gossip.pull] SendDigest -> DEBU 1954 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:54.881 UTC [gossip.comm] func1 -> DEBU 1953 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.882 UTC [gossip.gossip] handleMessage -> DEBU 1955 Exiting" +"2019-09-24 01:04:54.883 UTC [gossip.gossip] handleMessage -> DEBU 1956 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.884 UTC [gossip.gossip] handleMessage -> DEBU 1957 Exiting" +"2019-09-24 01:04:54.884 UTC [gossip.gossip] handleMessage -> DEBU 1958 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1959 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.884 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 195a Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:54.886 UTC [msp.identity] Verify -> DEBU 195b Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +"2019-09-24 01:04:54.886 UTC [msp.identity] Verify -> DEBU 195c Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +00000040 d5 42 dd b3 f9 54 |.B...T|" +"2019-09-24 01:04:54.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 195d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.886 UTC [gossip.discovery] isSentByMe -> DEBU 195e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.888 UTC [gossip.discovery] handleAliveMessage -> DEBU 195f Exiting" +"2019-09-24 01:04:54.888 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1960 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:54.888 UTC [msp] DeserializeIdentity -> DEBU 1961 Obtaining identity" +"2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1962 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1963 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.889 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1964 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1965 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1966 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:54.889 UTC [policies] Evaluate -> DEBU 1967 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:54.889 UTC [cauthdsl] func1 -> DEBU 1968 0xc003c11f40 gate 1569287094889701400 evaluation starts" +"2019-09-24 01:04:54.889 UTC [cauthdsl] func2 -> DEBU 1969 0xc003c11f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.889 UTC [cauthdsl] func2 -> DEBU 196a 0xc003c11f40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.890 UTC [cauthdsl] func2 -> DEBU 196b 0xc003c11f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:54.890 UTC [cauthdsl] func2 -> DEBU 196c 0xc003c11f40 principal evaluation fails" +"2019-09-24 01:04:54.890 UTC [cauthdsl] func1 -> DEBU 196d 0xc003c11f40 gate 1569287094889701400 evaluation fails" +"2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 196e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 196f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.890 UTC [policies] Evaluate -> DEBU 1970 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:54.890 UTC [cauthdsl] func1 -> DEBU 1971 0xc003c98780 gate 1569287094890897700 evaluation starts" +"2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1972 0xc003c98780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1973 0xc003c98780 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.891 UTC [cauthdsl] func2 -> DEBU 1974 0xc003c98780 principal matched by identity 0" +"2019-09-24 01:04:54.891 UTC [msp.identity] Verify -> DEBU 1975 Verify: digest = 00000000 7a 01 ae 55 90 19 8d 3d 42 98 c2 b3 96 78 ef 8f |z..U...=B....x..| +00000010 c2 d2 c4 26 ff e6 6b 45 d3 4a a4 d1 9e 51 47 2f |...&..kE.J...QG/|" +"2019-09-24 01:04:54.891 UTC [msp.identity] Verify -> DEBU 1976 Verify: sig = 00000000 30 45 02 21 00 e7 1a 37 92 34 62 25 dc e7 2d c8 |0E.!...7.4b%..-.| +00000010 65 c7 66 03 a2 2c 50 8d d4 00 34 62 de 96 e7 b2 |e.f..,P...4b....| +00000020 30 fc 36 ad 03 02 20 25 0a e1 6c b1 b6 9b 9d 7b |0.6... %..l....{| +00000030 a7 f2 25 c4 d5 96 b9 18 38 73 37 0e 5c e6 21 79 |..%.....8s7.\.!y| +00000040 63 5c 9f 3b ee 33 9c |c\.;.3.|" +"2019-09-24 01:04:54.892 UTC [cauthdsl] func2 -> DEBU 1977 0xc003c98780 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:54.892 UTC [cauthdsl] func1 -> DEBU 1978 0xc003c98780 gate 1569287094890897700 evaluation succeeds" +"2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 1979 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:54.892 UTC [policies] Evaluate -> DEBU 197c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:54.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 197d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.893 UTC [gossip.discovery] handleAliveMessage -> DEBU 197e Exiting" +"2019-09-24 01:04:54.893 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 197f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:54.894 UTC [msp.identity] Verify -> DEBU 1980 Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +"2019-09-24 01:04:54.894 UTC [msp.identity] Verify -> DEBU 1981 Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +"2019-09-24 01:04:54.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 1982 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.894 UTC [gossip.discovery] handleAliveMessage -> DEBU 1983 Exiting" +"2019-09-24 01:04:54.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1984 Exiting" +"2019-09-24 01:04:54.895 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1985 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1986 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:54.895 UTC [gossip.gossip] handleMessage -> DEBU 1987 Exiting" +"2019-09-24 01:04:54.895 UTC [gossip.gossip] handleMessage -> DEBU 1988 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.895 UTC [msp.identity] Verify -> DEBU 1989 Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +"2019-09-24 01:04:54.895 UTC [msp.identity] Verify -> DEBU 198a Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +00000040 d5 42 dd b3 f9 54 |.B...T|" +"2019-09-24 01:04:54.896 UTC [gossip.comm] func1 -> DEBU 198b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.898 UTC [msp.identity] Verify -> DEBU 198c Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:54.898 UTC [msp.identity] Verify -> DEBU 198d Verify: sig = 00000000 30 45 02 21 00 f5 3d 79 52 b6 ca 38 b5 a3 80 2b |0E.!..=yR..8...+| +00000010 db d1 a3 bf a9 2a 30 90 e0 76 dc ac 5e 69 ac d0 |.....*0..v..^i..| +00000020 c5 64 64 84 18 02 20 6c f2 d8 87 1d 99 02 37 af |.dd... l......7.| +00000030 0c 2a d3 53 ff a1 17 72 b1 d9 a6 d9 22 bb 49 12 |.*.S...r....".I.| +00000040 c8 8b f8 5e a8 49 f6 |...^.I.|" +"2019-09-24 01:04:54.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 198e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:54.899 UTC [gossip.discovery] isSentByMe -> DEBU 198f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:54.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 1990 Exiting" +"2019-09-24 01:04:54.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1991 Exiting" +"2019-09-24 01:04:54.899 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1992 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.899 UTC [gossip.gossip] handleMessage -> DEBU 1993 Exiting" +"2019-09-24 01:04:54.900 UTC [gossip.gossip] handleMessage -> DEBU 1994 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1995 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:54.900 UTC [msp.identity] Verify -> DEBU 1996 Verify: digest = 00000000 89 c5 05 f5 41 5f 98 52 46 1c 31 f4 43 05 06 92 |....A_.RF.1.C...| +00000010 3a ca eb 71 46 c7 40 e8 9b d4 b2 fb 7b 38 04 ed |:..qF.@.....{8..|" +"2019-09-24 01:04:54.900 UTC [msp.identity] Verify -> DEBU 1997 Verify: sig = 00000000 30 44 02 20 1a 78 28 65 93 80 61 98 77 5c 55 e2 |0D. .x(e..a.w\U.| +00000010 0c 12 c6 f9 47 c6 bc c6 57 4d b5 3b d3 f2 70 e2 |....G...WM.;..p.| +00000020 d6 e0 03 d1 02 20 39 52 b1 0b de ae e9 77 83 74 |..... 9R.....w.t| +00000030 ac a5 11 ae 9c f5 05 61 6e 7f fb d8 cc 3e 14 b1 |.......an....>..| +00000040 d5 42 dd b3 f9 54 |.B...T|" +"2019-09-24 01:04:54.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1998 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.901 UTC [gossip.discovery] isSentByMe -> DEBU 1999 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 199a Exiting" +"2019-09-24 01:04:54.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 199b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:54.903 UTC [msp.identity] Verify -> DEBU 199c Verify: digest = 00000000 ba af 29 bb 78 ae 02 50 97 33 ad 0a 8f 45 b6 b2 |..).x..P.3...E..| +00000010 f6 b8 35 8a 52 d7 84 81 87 ad 1c 92 de 96 35 aa |..5.R.........5.|" +"2019-09-24 01:04:54.903 UTC [msp.identity] Verify -> DEBU 199d Verify: sig = 00000000 30 45 02 21 00 da 25 93 77 8a e6 fb e2 5d 2b 8b |0E.!..%.w....]+.| +00000010 9f 7f a2 c9 46 29 c9 b4 86 d7 a4 eb 95 0f 4f 01 |....F)........O.| +00000020 79 72 e6 8c ae 02 20 4e ce fd a8 94 10 b8 d9 12 |yr.... N........| +00000030 a9 0a 6c 2a fc f4 80 42 b9 03 2b 54 84 b6 b6 fa |..l*...B..+T....| +00000040 4f 7d 9a 31 44 d3 c7 |O}.1D..|" +"2019-09-24 01:04:54.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 199e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:54.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 199f Exiting" +"2019-09-24 01:04:54.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a0 Exiting" +"2019-09-24 01:04:54.904 UTC [gossip.gossip] handleMessage -> DEBU 19a1 Exiting" +"2019-09-24 01:04:54.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19a2 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 19a3 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:54.905 UTC [msp] DeserializeIdentity -> DEBU 19a4 Obtaining identity" +"2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19a5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.906 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19a7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:54.908 UTC [policies] Evaluate -> DEBU 19a8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:54.908 UTC [policies] Evaluate -> DEBU 19a9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19aa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func1 -> DEBU 19ab 0xc003e29980 gate 1569287094909050100 evaluation starts" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ac 0xc003e29980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ad 0xc003e29980 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19ae 0xc003e29980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func2 -> DEBU 19af 0xc003e29980 principal evaluation fails" +"2019-09-24 01:04:54.909 UTC [cauthdsl] func1 -> DEBU 19b0 0xc003e29980 gate 1569287094909050100 evaluation fails" +"2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.909 UTC [policies] Evaluate -> DEBU 19b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:54.910 UTC [policies] Evaluate -> DEBU 19b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:54.910 UTC [cauthdsl] func1 -> DEBU 19b4 0xc003e621d0 gate 1569287094910118200 evaluation starts" +"2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b5 0xc003e621d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b6 0xc003e621d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:54.910 UTC [cauthdsl] func2 -> DEBU 19b7 0xc003e621d0 principal matched by identity 0" +"2019-09-24 01:04:54.910 UTC [msp.identity] Verify -> DEBU 19b8 Verify: digest = 00000000 d2 d2 d7 0c 52 e9 f1 6b 80 14 5e 13 4e 37 1d 6c |....R..k..^.N7.l| +00000010 f2 0d 66 aa 5c e6 12 6e be 52 93 0b cd cd f1 4e |..f.\..n.R.....N|" +"2019-09-24 01:04:54.910 UTC [msp.identity] Verify -> DEBU 19b9 Verify: sig = 00000000 30 44 02 20 0f 57 ae 46 82 65 fe eb cd 0f f0 ab |0D. .W.F.e......| +00000010 66 67 ea fe f1 50 a5 29 c0 92 8c 06 f9 05 00 d0 |fg...P.)........| +00000020 62 f2 1e 25 02 20 5e 86 06 59 b9 ff 1e 28 55 04 |b..%. ^..Y...(U.| +00000030 34 4f da b3 ec f5 5b dd f2 f2 1b 6e d4 df 2f 54 |4O....[....n../T| +00000040 07 33 4b 1b 0e 90 |.3K...|" +"2019-09-24 01:04:54.911 UTC [cauthdsl] func2 -> DEBU 19ba 0xc003e621d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:54.911 UTC [cauthdsl] func1 -> DEBU 19bb 0xc003e621d0 gate 1569287094910118200 evaluation succeeds" +"2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19be Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:54.911 UTC [policies] Evaluate -> DEBU 19bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:54.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:54.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:54.911 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c2 updating membership: timestamp: " +"2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c3 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:54.912 UTC [gossip.discovery] learnExistingMembers -> DEBU 19c5 Exiting" +"2019-09-24 01:04:54.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 19c6 Exiting" +"2019-09-24 01:04:54.912 UTC [gossip.discovery] sendMemResponse -> DEBU 19c7 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:54.912 UTC [msp] DeserializeIdentity -> DEBU 19c8 Obtaining identity" +"2019-09-24 01:04:54.913 UTC [msp] DeserializeIdentity -> DEBU 19c9 Obtaining identity" +"2019-09-24 01:04:54.913 UTC [msp] DeserializeIdentity -> DEBU 19ca Obtaining identity" +"2019-09-24 01:04:54.913 UTC [gossip.comm] Send -> DEBU 19cb Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:54.913 UTC [gossip.discovery] sendMemResponse -> DEBU 19cc Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:54.914 UTC [gossip.comm] sendToEndpoint -> DEBU 19cd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:04:54.914 UTC [gossip.comm] sendToEndpoint -> DEBU 19ce Exiting" +"2019-09-24 01:04:54.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 19cf Exiting" +"2019-09-24 01:04:56.739 UTC [gossip.election] waitForInterrupt -> DEBU 19d0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:04:56.739 UTC [gossip.election] IsLeader -> DEBU 19d1 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:04:56.740 UTC [msp] GetDefaultSigningIdentity -> DEBU 19d2 Obtaining default signing identity" +"2019-09-24 01:04:56.740 UTC [msp.identity] Sign -> DEBU 19d3 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510071801 " +"2019-09-24 01:04:56.740 UTC [msp.identity] Sign -> DEBU 19d4 Sign: digest: C1A88620DB1EEB3D16B30B6707ADDB5712E2A959488E4CE50D090F0AEC9D9DF2 " +"2019-09-24 01:04:56.740 UTC [gossip.election] waitForInterrupt -> DEBU 19d5 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:04:56.743 UTC [msp] DeserializeIdentity -> DEBU 19d6 Obtaining identity" +"2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d7 Obtaining identity" +"2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d8 Obtaining identity" +"2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19d9 Obtaining identity" +"2019-09-24 01:04:56.745 UTC [gossip.comm] Send -> DEBU 19da Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:56.745 UTC [msp] DeserializeIdentity -> DEBU 19db Obtaining identity" +"2019-09-24 01:04:56.746 UTC [msp] DeserializeIdentity -> DEBU 19dd Obtaining identity" +"2019-09-24 01:04:56.746 UTC [gossip.comm] sendToEndpoint -> DEBU 19dc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:04:56.746 UTC [gossip.comm] sendToEndpoint -> DEBU 19de Exiting" +"2019-09-24 01:04:57.689 UTC [msp] DeserializeIdentity -> DEBU 19df Obtaining identity" +"2019-09-24 01:04:57.689 UTC [msp] DeserializeIdentity -> DEBU 19e0 Obtaining identity" +"2019-09-24 01:04:57.690 UTC [gossip.comm] Send -> DEBU 19e1 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:04:57.690 UTC [gossip.comm] sendToEndpoint -> DEBU 19e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.690 UTC [gossip.comm] sendToEndpoint -> DEBU 19e3 Exiting" +"2019-09-24 01:04:57.691 UTC [gossip.comm] sendToEndpoint -> DEBU 19e4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.692 UTC [gossip.comm] sendToEndpoint -> DEBU 19e7 Exiting" +"2019-09-24 01:04:57.691 UTC [gossip.comm] sendToEndpoint -> DEBU 19e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.693 UTC [gossip.comm] sendToEndpoint -> DEBU 19e8 Exiting" +"2019-09-24 01:04:57.693 UTC [gossip.comm] func1 -> DEBU 19e9 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.694 UTC [gossip.gossip] handleMessage -> DEBU 19ea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.692 UTC [gossip.comm] func1 -> DEBU 19e6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.694 UTC [msp] DeserializeIdentity -> DEBU 19ec Obtaining identity" +"2019-09-24 01:04:57.694 UTC [gossip.comm] func1 -> DEBU 19eb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.695 UTC [msp] DeserializeIdentity -> DEBU 19ed Obtaining identity" +"2019-09-24 01:04:57.695 UTC [msp] DeserializeIdentity -> DEBU 19ee Obtaining identity" +"2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 19ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 19f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.696 UTC [policies] Evaluate -> DEBU 19f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.696 UTC [policies] Evaluate -> DEBU 19f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.697 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.697 UTC [cauthdsl] func1 -> DEBU 19f5 0xc003e7eb50 gate 1569287097697194200 evaluation starts" +"2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f6 0xc003e7eb50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f7 0xc003e7eb50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.697 UTC [cauthdsl] func2 -> DEBU 19f8 0xc003e7eb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.698 UTC [cauthdsl] func2 -> DEBU 19f9 0xc003e7eb50 principal evaluation fails" +"2019-09-24 01:04:57.698 UTC [cauthdsl] func1 -> DEBU 19fa 0xc003e7eb50 gate 1569287097697194200 evaluation fails" +"2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.698 UTC [policies] Evaluate -> DEBU 19fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.699 UTC [cauthdsl] func1 -> DEBU 19fe 0xc003e7f390 gate 1569287097699196500 evaluation starts" +"2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 19ff 0xc003e7f390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 1a00 0xc003e7f390 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.699 UTC [cauthdsl] func2 -> DEBU 1a01 0xc003e7f390 principal matched by identity 0" +"2019-09-24 01:04:57.700 UTC [msp.identity] Verify -> DEBU 1a02 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:57.700 UTC [msp.identity] Verify -> DEBU 1a03 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:57.700 UTC [cauthdsl] func2 -> DEBU 1a04 0xc003e7f390 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.700 UTC [cauthdsl] func1 -> DEBU 1a05 0xc003e7f390 gate 1569287097699196500 evaluation succeeds" +"2019-09-24 01:04:57.700 UTC [policies] Evaluate -> DEBU 1a06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a08 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.701 UTC [policies] Evaluate -> DEBU 1a09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.702 UTC [msp.identity] Verify -> DEBU 1a0a Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:57.703 UTC [msp.identity] Verify -> DEBU 1a0b Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:57.703 UTC [msp] DeserializeIdentity -> DEBU 1a0c Obtaining identity" +"2019-09-24 01:04:57.703 UTC [msp] DeserializeIdentity -> DEBU 1a0d Obtaining identity" +"2019-09-24 01:04:57.703 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.703 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a0f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a10 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a11 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.704 UTC [policies] Evaluate -> DEBU 1a13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.704 UTC [cauthdsl] func1 -> DEBU 1a14 0xc003ea33a0 gate 1569287097704816600 evaluation starts" +"2019-09-24 01:04:57.704 UTC [cauthdsl] func2 -> DEBU 1a15 0xc003ea33a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a16 0xc003ea33a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a17 0xc003ea33a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.705 UTC [cauthdsl] func2 -> DEBU 1a18 0xc003ea33a0 principal evaluation fails" +"2019-09-24 01:04:57.705 UTC [cauthdsl] func1 -> DEBU 1a19 0xc003ea33a0 gate 1569287097704816600 evaluation fails" +"2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.705 UTC [policies] Evaluate -> DEBU 1a1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.706 UTC [cauthdsl] func1 -> DEBU 1a1d 0xc003ea3c20 gate 1569287097706119800 evaluation starts" +"2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a1e 0xc003ea3c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a1f 0xc003ea3c20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.706 UTC [cauthdsl] func2 -> DEBU 1a20 0xc003ea3c20 principal matched by identity 0" +"2019-09-24 01:04:57.706 UTC [msp.identity] Verify -> DEBU 1a21 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:57.707 UTC [msp.identity] Verify -> DEBU 1a22 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:57.707 UTC [cauthdsl] func2 -> DEBU 1a23 0xc003ea3c20 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.707 UTC [cauthdsl] func1 -> DEBU 1a24 0xc003ea3c20 gate 1569287097706119800 evaluation succeeds" +"2019-09-24 01:04:57.707 UTC [policies] Evaluate -> DEBU 1a25 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.707 UTC [policies] Evaluate -> DEBU 1a26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.708 UTC [policies] Evaluate -> DEBU 1a27 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.708 UTC [policies] Evaluate -> DEBU 1a28 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.708 UTC [msp.identity] Verify -> DEBU 1a29 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:57.708 UTC [msp.identity] Verify -> DEBU 1a2a Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:57.709 UTC [gossip.gossip] handleMessage -> DEBU 1a2b Exiting" +"2019-09-24 01:04:57.709 UTC [gossip.gossip] handleMessage -> DEBU 1a2c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.709 UTC [msp] DeserializeIdentity -> DEBU 1a2d Obtaining identity" +"2019-09-24 01:04:57.710 UTC [msp] DeserializeIdentity -> DEBU 1a2e Obtaining identity" +"2019-09-24 01:04:57.710 UTC [msp] DeserializeIdentity -> DEBU 1a2f Obtaining identity" +"2019-09-24 01:04:57.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a31 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a32 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.714 UTC [policies] Evaluate -> DEBU 1a33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.715 UTC [policies] Evaluate -> DEBU 1a34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.715 UTC [policies] Evaluate -> DEBU 1a35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.720 UTC [cauthdsl] func1 -> DEBU 1a36 0xc003f12010 gate 1569287097715700900 evaluation starts" +"2019-09-24 01:04:57.720 UTC [cauthdsl] func2 -> DEBU 1a37 0xc003f12010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.720 UTC [cauthdsl] func2 -> DEBU 1a38 0xc003f12010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.721 UTC [cauthdsl] func2 -> DEBU 1a39 0xc003f12010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.721 UTC [cauthdsl] func2 -> DEBU 1a3a 0xc003f12010 principal evaluation fails" +"2019-09-24 01:04:57.721 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc003f12010 gate 1569287097715700900 evaluation fails" +"2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.721 UTC [policies] Evaluate -> DEBU 1a3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.722 UTC [cauthdsl] func1 -> DEBU 1a3f 0xc003f12850 gate 1569287097722062900 evaluation starts" +"2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a40 0xc003f12850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a41 0xc003f12850 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.722 UTC [cauthdsl] func2 -> DEBU 1a42 0xc003f12850 principal matched by identity 0" +"2019-09-24 01:04:57.722 UTC [msp.identity] Verify -> DEBU 1a43 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:57.723 UTC [msp.identity] Verify -> DEBU 1a44 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:57.723 UTC [cauthdsl] func2 -> DEBU 1a45 0xc003f12850 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.723 UTC [cauthdsl] func1 -> DEBU 1a46 0xc003f12850 gate 1569287097722062900 evaluation succeeds" +"2019-09-24 01:04:57.723 UTC [policies] Evaluate -> DEBU 1a47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a49 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.724 UTC [policies] Evaluate -> DEBU 1a4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4d Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:57.725 UTC [msp.identity] Verify -> DEBU 1a4e Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:57.726 UTC [msp] DeserializeIdentity -> DEBU 1a4f Obtaining identity" +"2019-09-24 01:04:57.726 UTC [msp] DeserializeIdentity -> DEBU 1a50 Obtaining identity" +"2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a51 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a52 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.726 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a53 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.727 UTC [policies] Evaluate -> DEBU 1a56 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.727 UTC [cauthdsl] func1 -> DEBU 1a57 0xc003f39000 gate 1569287097727389100 evaluation starts" +"2019-09-24 01:04:57.727 UTC [cauthdsl] func2 -> DEBU 1a58 0xc003f39000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.727 UTC [cauthdsl] func2 -> DEBU 1a59 0xc003f39000 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.728 UTC [cauthdsl] func2 -> DEBU 1a5a 0xc003f39000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.728 UTC [cauthdsl] func2 -> DEBU 1a5b 0xc003f39000 principal evaluation fails" +"2019-09-24 01:04:57.728 UTC [cauthdsl] func1 -> DEBU 1a5c 0xc003f39000 gate 1569287097727389100 evaluation fails" +"2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.728 UTC [policies] Evaluate -> DEBU 1a5f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.729 UTC [cauthdsl] func1 -> DEBU 1a60 0xc003f39840 gate 1569287097729071600 evaluation starts" +"2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a61 0xc003f39840 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a62 0xc003f39840 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.729 UTC [cauthdsl] func2 -> DEBU 1a63 0xc003f39840 principal matched by identity 0" +"2019-09-24 01:04:57.729 UTC [msp.identity] Verify -> DEBU 1a64 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:57.730 UTC [msp.identity] Verify -> DEBU 1a65 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:57.730 UTC [cauthdsl] func2 -> DEBU 1a66 0xc003f39840 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.730 UTC [cauthdsl] func1 -> DEBU 1a67 0xc003f39840 gate 1569287097729071600 evaluation succeeds" +"2019-09-24 01:04:57.730 UTC [policies] Evaluate -> DEBU 1a68 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a6a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.731 UTC [policies] Evaluate -> DEBU 1a6b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.731 UTC [gossip.gossip] handleMessage -> DEBU 1a6c Exiting" +"2019-09-24 01:04:57.732 UTC [gossip.gossip] handleMessage -> DEBU 1a6d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.732 UTC [msp] DeserializeIdentity -> DEBU 1a6e Obtaining identity" +"2019-09-24 01:04:57.732 UTC [msp] DeserializeIdentity -> DEBU 1a6f Obtaining identity" +"2019-09-24 01:04:57.732 UTC [gossip.pull] Hello -> DEBU 1a71 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:57.733 UTC [msp] DeserializeIdentity -> DEBU 1a72 Obtaining identity" +"2019-09-24 01:04:57.732 UTC [msp.identity] Verify -> DEBU 1a70 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:04:57.733 UTC [msp] DeserializeIdentity -> DEBU 1a73 Obtaining identity" +"2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a74 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:04:57.734 UTC [gossip.comm] Send -> DEBU 1a75 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:57.734 UTC [gossip.comm] sendToEndpoint -> DEBU 1a76 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a77 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:04:57.734 UTC [msp.identity] Verify -> DEBU 1a78 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:04:57.734 UTC [gossip.comm] sendToEndpoint -> DEBU 1a79 Exiting" +"2019-09-24 01:04:57.735 UTC [msp] DeserializeIdentity -> DEBU 1a7a Obtaining identity" +"2019-09-24 01:04:57.735 UTC [msp] DeserializeIdentity -> DEBU 1a7b Obtaining identity" +"2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a7c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a7d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.736 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a7e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.736 UTC [policies] Evaluate -> DEBU 1a7f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.736 UTC [policies] Evaluate -> DEBU 1a81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.736 UTC [gossip.comm] func1 -> DEBU 1a80 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.737 UTC [policies] Evaluate -> DEBU 1a82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func1 -> DEBU 1a83 0xc003f961e0 gate 1569287097737183900 evaluation starts" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a84 0xc003f961e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a85 0xc003f961e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a86 0xc003f961e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func2 -> DEBU 1a87 0xc003f961e0 principal evaluation fails" +"2019-09-24 01:04:57.737 UTC [cauthdsl] func1 -> DEBU 1a88 0xc003f961e0 gate 1569287097737183900 evaluation fails" +"2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a89 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a8a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.738 UTC [policies] Evaluate -> DEBU 1a8b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.738 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc003f96ad0 gate 1569287097738334700 evaluation starts" +"2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8d 0xc003f96ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8e 0xc003f96ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.738 UTC [cauthdsl] func2 -> DEBU 1a8f 0xc003f96ad0 principal matched by identity 0" +"2019-09-24 01:04:57.738 UTC [msp.identity] Verify -> DEBU 1a90 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:04:57.739 UTC [msp.identity] Verify -> DEBU 1a91 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:04:57.739 UTC [cauthdsl] func2 -> DEBU 1a92 0xc003f96ad0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.739 UTC [cauthdsl] func1 -> DEBU 1a93 0xc003f96ad0 gate 1569287097738334700 evaluation succeeds" +"2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a94 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a95 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a96 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.740 UTC [policies] Evaluate -> DEBU 1a97 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.740 UTC [msp] DeserializeIdentity -> DEBU 1a98 Obtaining identity" +"2019-09-24 01:04:57.743 UTC [msp] DeserializeIdentity -> DEBU 1a99 Obtaining identity" +"2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1a9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a9b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.744 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1a9c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:57.744 UTC [policies] Evaluate -> DEBU 1a9f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func1 -> DEBU 1aa0 0xc0030c2540 gate 1569287097745225900 evaluation starts" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa1 0xc0030c2540 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa2 0xc0030c2540 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa3 0xc0030c2540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc0030c2540 principal evaluation fails" +"2019-09-24 01:04:57.745 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc0030c2540 gate 1569287097745225900 evaluation fails" +"2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:57.746 UTC [policies] Evaluate -> DEBU 1aa8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:57.747 UTC [cauthdsl] func1 -> DEBU 1aa9 0xc0030c2d80 gate 1569287097747170100 evaluation starts" +"2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aaa 0xc0030c2d80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aab 0xc0030c2d80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:57.747 UTC [cauthdsl] func2 -> DEBU 1aac 0xc0030c2d80 principal matched by identity 0" +"2019-09-24 01:04:57.747 UTC [msp.identity] Verify -> DEBU 1aad Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:04:57.747 UTC [msp.identity] Verify -> DEBU 1aae Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:04:57.748 UTC [cauthdsl] func2 -> DEBU 1aaf 0xc0030c2d80 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:57.748 UTC [cauthdsl] func1 -> DEBU 1ab0 0xc0030c2d80 gate 1569287097747170100 evaluation succeeds" +"2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:57.748 UTC [policies] Evaluate -> DEBU 1ab4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab5 Exiting" +"2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.749 UTC [gossip.pull] HandleMessage -> DEBU 1ab7 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.749 UTC [gossip.gossip] handleMessage -> DEBU 1ab8 Exiting" +"2019-09-24 01:04:57.873 UTC [gossip.comm] func1 -> DEBU 1ab9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.875 UTC [gossip.gossip] handleMessage -> DEBU 1aba Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.875 UTC [msp] DeserializeIdentity -> DEBU 1abb Obtaining identity" +"2019-09-24 01:04:57.875 UTC [msp] DeserializeIdentity -> DEBU 1abc Obtaining identity" +"2019-09-24 01:04:57.876 UTC [gossip.gossip] handleMessage -> DEBU 1abd Exiting" +"2019-09-24 01:04:57.891 UTC [gossip.comm] func1 -> DEBU 1abe Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.891 UTC [gossip.gossip] handleMessage -> DEBU 1abf Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.891 UTC [gossip.pull] HandleMessage -> DEBU 1ac0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:04:57.891 UTC [gossip.pull] SendDigest -> DEBU 1ac1 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:57.891 UTC [gossip.gossip] handleMessage -> DEBU 1ac2 Exiting" +"2019-09-24 01:04:58.076 UTC [gossip.comm] func1 -> DEBU 1ac3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.076 UTC [gossip.gossip] handleMessage -> DEBU 1ac4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.077 UTC [msp] DeserializeIdentity -> DEBU 1ac5 Obtaining identity" +"2019-09-24 01:04:58.077 UTC [msp] DeserializeIdentity -> DEBU 1ac6 Obtaining identity" +"2019-09-24 01:04:58.078 UTC [msp] DeserializeIdentity -> DEBU 1ac7 Obtaining identity" +"2019-09-24 01:04:58.078 UTC [gossip.gossip] handleMessage -> DEBU 1ac8 Exiting" +"2019-09-24 01:04:58.275 UTC [gossip.comm] func1 -> DEBU 1ac9 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.275 UTC [gossip.gossip] handleMessage -> DEBU 1aca Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.279 UTC [msp] DeserializeIdentity -> DEBU 1acb Obtaining identity" +"2019-09-24 01:04:58.280 UTC [msp] DeserializeIdentity -> DEBU 1acc Obtaining identity" +"2019-09-24 01:04:58.280 UTC [msp] DeserializeIdentity -> DEBU 1acd Obtaining identity" +"2019-09-24 01:04:58.280 UTC [gossip.gossip] handleMessage -> DEBU 1ace Exiting" +"2019-09-24 01:04:58.506 UTC [gossip.comm] func1 -> DEBU 1acf Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.506 UTC [gossip.comm] func1 -> DEBU 1ad0 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.507 UTC [gossip.gossip] handleMessage -> DEBU 1ad1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.510 UTC [gossip.pull] HandleMessage -> DEBU 1ad2 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.511 UTC [gossip.pull] SendDigest -> DEBU 1ad3 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:04:58.511 UTC [gossip.gossip] handleMessage -> DEBU 1ad4 Exiting" +"2019-09-24 01:04:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1ad5 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ad6 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.512 UTC [gossip.gossip] handleMessage -> DEBU 1ad7 Exiting" +"2019-09-24 01:04:58.512 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ad8 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1ad9 Verify: digest = 00000000 e3 b0 d9 be 7a 84 49 63 90 1f 0d 0e 7a 16 c6 76 |....z.Ic....z..v| +00000010 8a c2 f3 34 70 30 4a b3 c4 94 2d a1 1c a7 4b 97 |...4p0J...-...K.|" +"2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1ada Verify: sig = 00000000 30 45 02 21 00 9b 7d 57 89 f2 38 a9 80 ce 37 f0 |0E.!..}W..8...7.| +00000010 15 15 f0 d7 2a 1b f1 d0 69 75 33 c5 d5 04 08 ae |....*...iu3.....| +00000020 1f 7d 8e 9f 43 02 20 7c 6a 50 6b 35 55 7d 8c 0f |.}..C. |jPk5U}..| +00000030 8e 9e e4 ef af 3c 99 cd 08 29 04 f1 ae 64 74 6d |.....<...)...dtm| +00000040 5f 8c d0 58 38 2a 4e |_..X8*N|" +"2019-09-24 01:04:58.513 UTC [msp.identity] Verify -> DEBU 1adb Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:04:58.514 UTC [msp.identity] Verify -> DEBU 1adc Verify: sig = 00000000 30 45 02 21 00 99 23 38 95 9e bd 64 51 a8 17 5d |0E.!..#8...dQ..]| +00000010 e2 f7 6c 29 32 b8 99 5b 2e e0 85 89 cc d6 5c 58 |..l)2..[......\X| +00000020 18 a8 7e 05 4d 02 20 7a cf 2f 69 68 ad bd 53 3a |..~.M. z./ih..S:| +00000030 b1 e0 d8 35 68 1f da 0d 37 e9 2e ec 55 2f 20 a4 |...5h...7...U/ .| +00000040 42 ad b3 f5 65 89 58 |B...e.X|" +"2019-09-24 01:04:58.514 UTC [gossip.discovery] handleAliveMessage -> DEBU 1add Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ade Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1adf updating membership: timestamp: " +"2019-09-24 01:04:58.514 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae0 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:58.515 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ae2 Exiting" +"2019-09-24 01:04:58.515 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ae3 Exiting" +"2019-09-24 01:04:58.515 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ae4 Exiting" +"2019-09-24 01:04:58.516 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:04:58.516 UTC [msp] DeserializeIdentity -> DEBU 1ae6 Obtaining identity" +"2019-09-24 01:04:58.516 UTC [msp] DeserializeIdentity -> DEBU 1ae7 Obtaining identity" +"2019-09-24 01:04:58.517 UTC [gossip.comm] Send -> DEBU 1ae8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.517 UTC [gossip.discovery] sendMemResponse -> DEBU 1ae9 Exiting, replying with alive: > alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:58.517 UTC [gossip.comm] sendToEndpoint -> DEBU 1aea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.517 UTC [gossip.comm] sendToEndpoint -> DEBU 1aeb Exiting" +"2019-09-24 01:04:58.547 UTC [gossip.comm] func1 -> DEBU 1aec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.547 UTC [gossip.gossip] handleMessage -> DEBU 1aed Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.547 UTC [gossip.gossip] handleMessage -> DEBU 1aee Exiting" +"2019-09-24 01:04:58.548 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1aef Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.548 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1af0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:04:58.548 UTC [msp.identity] Verify -> DEBU 1af1 Verify: digest = 00000000 4d 1a c8 05 29 4f f5 e6 81 7f d7 a4 11 80 a0 4a |M...)O.........J| +00000010 40 d3 55 b0 9a a9 2e 9a 55 82 84 fa 20 cb cb b9 |@.U.....U... ...|" +"2019-09-24 01:04:58.548 UTC [msp.identity] Verify -> DEBU 1af2 Verify: sig = 00000000 30 44 02 20 4c b4 81 5c e5 fb 90 fb a1 23 0a 37 |0D. L..\.....#.7| +00000010 b9 8e 8a f3 fa 94 6a 83 21 0e b1 1e 1c c1 03 62 |......j.!......b| +00000020 4a e1 51 8f 02 20 33 79 04 79 81 0c 70 df 9e 3d |J.Q.. 3y.y..p..=| +00000030 29 4f e8 06 9b 6a 98 d9 e6 c2 b4 c9 54 69 b2 8b |)O...j......Ti..| +00000040 58 f9 93 5b eb 36 |X..[.6|" +"2019-09-24 01:04:58.549 UTC [gossip.discovery] handleAliveMessage -> DEBU 1af3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af5 updating membership: timestamp: " +"2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af6 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:58.549 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:58.550 UTC [gossip.discovery] learnExistingMembers -> DEBU 1af8 Exiting" +"2019-09-24 01:04:58.550 UTC [gossip.discovery] handleAliveMessage -> DEBU 1af9 Exiting" +"2019-09-24 01:04:58.550 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1afa Exiting" +"2019-09-24 01:04:58.550 UTC [msp] DeserializeIdentity -> DEBU 1afb Obtaining identity" +"2019-09-24 01:04:58.550 UTC [msp] DeserializeIdentity -> DEBU 1afc Obtaining identity" +"2019-09-24 01:04:58.551 UTC [msp] DeserializeIdentity -> DEBU 1afd Obtaining identity" +"2019-09-24 01:04:58.551 UTC [gossip.comm] Send -> DEBU 1afe Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:58.551 UTC [msp] DeserializeIdentity -> DEBU 1aff Obtaining identity" +"2019-09-24 01:04:58.551 UTC [gossip.comm] Send -> DEBU 1b00 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b01 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b02 Exiting" +"2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b03 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.552 UTC [gossip.comm] sendToEndpoint -> DEBU 1b04 Exiting" +"2019-09-24 01:04:58.558 UTC [gossip.comm] func1 -> DEBU 1b05 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.558 UTC [gossip.gossip] handleMessage -> DEBU 1b06 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.558 UTC [gossip.gossip] handleMessage -> DEBU 1b07 Exiting" +"2019-09-24 01:04:58.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b08 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b09 Exiting" +"2019-09-24 01:04:58.559 UTC [gossip.comm] func1 -> DEBU 1b0a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.559 UTC [gossip.gossip] handleMessage -> DEBU 1b0b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.559 UTC [gossip.gossip] handleMessage -> DEBU 1b0c Exiting" +"2019-09-24 01:04:58.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b0e Exiting" +"2019-09-24 01:04:58.808 UTC [gossip.comm] func1 -> DEBU 1b0f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.808 UTC [gossip.gossip] handleMessage -> DEBU 1b10 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.809 UTC [gossip.pull] HandleMessage -> DEBU 1b11 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b12 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b13 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b14 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b15 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b16 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [msp] DeserializeIdentity -> DEBU 1b17 Obtaining identity" +"2019-09-24 01:04:58.809 UTC [gossip.pull] SendDigest -> DEBU 1b18 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:04:58.810 UTC [gossip.gossip] handleMessage -> DEBU 1b19 Exiting" +"2019-09-24 01:04:58.816 UTC [gossip.comm] func1 -> DEBU 1b1a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.816 UTC [gossip.gossip] handleMessage -> DEBU 1b1b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.817 UTC [gossip.gossip] handleMessage -> DEBU 1b1c Exiting" +"2019-09-24 01:04:58.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b1d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.817 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b1e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:58.818 UTC [msp] DeserializeIdentity -> DEBU 1b1f Obtaining identity" +"2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b20 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b21 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.818 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b22 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.818 UTC [policies] Evaluate -> DEBU 1b23 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:58.819 UTC [policies] Evaluate -> DEBU 1b24 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:58.819 UTC [policies] Evaluate -> DEBU 1b25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:58.819 UTC [cauthdsl] func1 -> DEBU 1b26 0xc003466fc0 gate 1569287098819433200 evaluation starts" +"2019-09-24 01:04:58.819 UTC [cauthdsl] func2 -> DEBU 1b27 0xc003466fc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.819 UTC [cauthdsl] func2 -> DEBU 1b28 0xc003466fc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.820 UTC [cauthdsl] func2 -> DEBU 1b29 0xc003466fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:58.820 UTC [cauthdsl] func2 -> DEBU 1b2a 0xc003466fc0 principal evaluation fails" +"2019-09-24 01:04:58.822 UTC [cauthdsl] func1 -> DEBU 1b2b 0xc003466fc0 gate 1569287098819433200 evaluation fails" +"2019-09-24 01:04:58.822 UTC [policies] Evaluate -> DEBU 1b2c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.822 UTC [policies] Evaluate -> DEBU 1b2d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.823 UTC [policies] Evaluate -> DEBU 1b2e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:58.823 UTC [cauthdsl] func1 -> DEBU 1b2f 0xc003467800 gate 1569287098823655500 evaluation starts" +"2019-09-24 01:04:58.823 UTC [cauthdsl] func2 -> DEBU 1b30 0xc003467800 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.824 UTC [cauthdsl] func2 -> DEBU 1b31 0xc003467800 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.824 UTC [cauthdsl] func2 -> DEBU 1b32 0xc003467800 principal matched by identity 0" +"2019-09-24 01:04:58.824 UTC [msp.identity] Verify -> DEBU 1b33 Verify: digest = 00000000 fa e6 2c b4 91 91 2a 25 4e 0c 0d 07 cf 51 f4 0c |..,...*%N....Q..| +00000010 00 19 fb 8b ef 7e c8 30 13 61 3d fd 9b 2d 1b 63 |.....~.0.a=..-.c|" +"2019-09-24 01:04:58.824 UTC [msp.identity] Verify -> DEBU 1b34 Verify: sig = 00000000 30 44 02 20 0e 4b d2 29 1c 9c 5e c9 2b d6 a6 4e |0D. .K.)..^.+..N| +00000010 6b ff 99 fc 06 f6 09 be c1 93 71 7d 36 e5 fc 18 |k.........q}6...| +00000020 eb 45 dd 50 02 20 40 d6 a9 8c 3b d7 ef 7e 6a 48 |.E.P. @...;..~jH| +00000030 0b 65 7a 80 ac f9 bc b0 ea 4f 7a a9 66 d5 74 0e |.ez......Oz.f.t.| +00000040 e2 da 70 5d 06 06 |..p]..|" +"2019-09-24 01:04:58.825 UTC [cauthdsl] func2 -> DEBU 1b35 0xc003467800 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:58.825 UTC [cauthdsl] func1 -> DEBU 1b36 0xc003467800 gate 1569287098823655500 evaluation succeeds" +"2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b37 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b38 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.825 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:58.826 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:58.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b3b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3d updating membership: timestamp: " +"2019-09-24 01:04:58.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3e Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:58.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b3f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:04:58.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 1b40 Exiting" +"2019-09-24 01:04:58.827 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b41 Exiting" +"2019-09-24 01:04:58.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b42 Exiting" +"2019-09-24 01:04:58.827 UTC [gossip.discovery] sendMemResponse -> DEBU 1b43 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:04:58.828 UTC [msp] DeserializeIdentity -> DEBU 1b44 Obtaining identity" +"2019-09-24 01:04:58.829 UTC [msp] DeserializeIdentity -> DEBU 1b45 Obtaining identity" +"2019-09-24 01:04:58.829 UTC [msp] DeserializeIdentity -> DEBU 1b46 Obtaining identity" +"2019-09-24 01:04:58.829 UTC [gossip.comm] Send -> DEBU 1b47 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1b48 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1b49 Exiting" +"2019-09-24 01:04:58.830 UTC [gossip.discovery] sendMemResponse -> DEBU 1b4a Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:58.853 UTC [gossip.pull] Hello -> DEBU 1b4b Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:04:58.854 UTC [gossip.comm] Send -> DEBU 1b4c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.854 UTC [gossip.pull] Hello -> DEBU 1b4d Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:04:58.854 UTC [gossip.comm] Send -> DEBU 1b4e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.855 UTC [gossip.pull] Hello -> DEBU 1b4f Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:04:58.855 UTC [gossip.comm] Send -> DEBU 1b50 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.855 UTC [gossip.comm] sendToEndpoint -> DEBU 1b51 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.855 UTC [gossip.comm] sendToEndpoint -> DEBU 1b52 Exiting" +"2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b54 Exiting" +"2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b55 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.856 UTC [gossip.comm] sendToEndpoint -> DEBU 1b56 Exiting" +"2019-09-24 01:04:58.857 UTC [gossip.comm] func1 -> DEBU 1b57 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.857 UTC [gossip.comm] func1 -> DEBU 1b58 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.857 UTC [gossip.gossip] handleMessage -> DEBU 1b59 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.858 UTC [gossip.pull] HandleMessage -> DEBU 1b5a GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.858 UTC [gossip.comm] func1 -> DEBU 1b5b Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.858 UTC [gossip.gossip] handleMessage -> DEBU 1b5c Exiting" +"2019-09-24 01:04:58.859 UTC [gossip.gossip] handleMessage -> DEBU 1b5d Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.859 UTC [gossip.pull] HandleMessage -> DEBU 1b5e GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.859 UTC [gossip.gossip] handleMessage -> DEBU 1b5f Exiting" +"2019-09-24 01:04:58.860 UTC [gossip.gossip] handleMessage -> DEBU 1b60 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.860 UTC [gossip.pull] HandleMessage -> DEBU 1b61 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.860 UTC [gossip.gossip] handleMessage -> DEBU 1b62 Exiting" +"2019-09-24 01:04:58.874 UTC [gossip.comm] func1 -> DEBU 1b63 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.874 UTC [gossip.gossip] handleMessage -> DEBU 1b64 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.875 UTC [gossip.pull] HandleMessage -> DEBU 1b65 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.875 UTC [msp] DeserializeIdentity -> DEBU 1b66 Obtaining identity" +"2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b67 Obtaining identity" +"2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b68 Obtaining identity" +"2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b69 Obtaining identity" +"2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b6a Obtaining identity" +"2019-09-24 01:04:58.878 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b6b Obtaining default signing identity" +"2019-09-24 01:04:58.878 UTC [msp.identity] Sign -> DEBU 1b6c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101B " +"2019-09-24 01:04:58.878 UTC [msp.identity] Sign -> DEBU 1b6d Sign: digest: A7D5B7C49335254EFD2C13660B952D6AB4B892CE143F8199690B3222AC3E8D2A " +"2019-09-24 01:04:58.878 UTC [msp] GetDefaultSigningIdentity -> DEBU 1b6e Obtaining default signing identity" +"2019-09-24 01:04:58.879 UTC [msp.identity] Sign -> DEBU 1b6f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:58.879 UTC [msp.identity] Sign -> DEBU 1b70 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:58.879 UTC [gossip.comm] Send -> DEBU 1b71 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.877 UTC [msp] DeserializeIdentity -> DEBU 1b72 Obtaining identity" +"2019-09-24 01:04:58.879 UTC [gossip.pull] SendDigest -> DEBU 1b73 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:04:58.879 UTC [gossip.gossip] handleMessage -> DEBU 1b74 Exiting" +"2019-09-24 01:04:58.879 UTC [msp] DeserializeIdentity -> DEBU 1b75 Obtaining identity" +"2019-09-24 01:04:58.880 UTC [gossip.comm] Send -> DEBU 1b76 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.880 UTC [msp] DeserializeIdentity -> DEBU 1b77 Obtaining identity" +"2019-09-24 01:04:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 1b78 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.881 UTC [gossip.comm] sendToEndpoint -> DEBU 1b79 Exiting" +"2019-09-24 01:04:58.881 UTC [gossip.comm] Send -> DEBU 1b7a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7c Exiting" +"2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.882 UTC [gossip.comm] sendToEndpoint -> DEBU 1b7e Exiting" +"2019-09-24 01:04:58.884 UTC [gossip.comm] func1 -> DEBU 1b7f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.886 UTC [gossip.comm] func1 -> DEBU 1b80 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.884 UTC [gossip.gossip] handleMessage -> DEBU 1b81 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.886 UTC [gossip.gossip] handleMessage -> DEBU 1b82 Exiting" +"2019-09-24 01:04:58.887 UTC [gossip.gossip] handleMessage -> DEBU 1b83 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.890 UTC [gossip.comm] func1 -> DEBU 1b84 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.890 UTC [gossip.comm] func1 -> DEBU 1b85 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1b86 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b87 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:58.891 UTC [msp.identity] Verify -> DEBU 1b88 Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +"2019-09-24 01:04:58.891 UTC [msp.identity] Verify -> DEBU 1b89 Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +00000040 24 c8 a8 1c be f2 |$.....|" +"2019-09-24 01:04:58.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.892 UTC [gossip.discovery] isSentByMe -> DEBU 1b8b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 1b8c Exiting" +"2019-09-24 01:04:58.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1b8d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:58.895 UTC [msp] DeserializeIdentity -> DEBU 1b8e Obtaining identity" +"2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1b8f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b90 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1b91 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b92 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b93 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:58.896 UTC [policies] Evaluate -> DEBU 1b94 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:58.896 UTC [cauthdsl] func1 -> DEBU 1b95 0xc003a1cbd0 gate 1569287098896727700 evaluation starts" +"2019-09-24 01:04:58.896 UTC [cauthdsl] func2 -> DEBU 1b96 0xc003a1cbd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.896 UTC [cauthdsl] func2 -> DEBU 1b97 0xc003a1cbd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.897 UTC [cauthdsl] func2 -> DEBU 1b98 0xc003a1cbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:58.897 UTC [cauthdsl] func2 -> DEBU 1b99 0xc003a1cbd0 principal evaluation fails" +"2019-09-24 01:04:58.897 UTC [cauthdsl] func1 -> DEBU 1b9a 0xc003a1cbd0 gate 1569287098896727700 evaluation fails" +"2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.898 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:58.898 UTC [cauthdsl] func1 -> DEBU 1b9e 0xc003a1d410 gate 1569287098898290100 evaluation starts" +"2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1b9f 0xc003a1d410 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1ba0 0xc003a1d410 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.898 UTC [cauthdsl] func2 -> DEBU 1ba1 0xc003a1d410 principal matched by identity 0" +"2019-09-24 01:04:58.898 UTC [msp.identity] Verify -> DEBU 1ba2 Verify: digest = 00000000 d2 d2 d7 0c 52 e9 f1 6b 80 14 5e 13 4e 37 1d 6c |....R..k..^.N7.l| +00000010 f2 0d 66 aa 5c e6 12 6e be 52 93 0b cd cd f1 4e |..f.\..n.R.....N|" +"2019-09-24 01:04:58.899 UTC [msp.identity] Verify -> DEBU 1ba3 Verify: sig = 00000000 30 44 02 20 0f 57 ae 46 82 65 fe eb cd 0f f0 ab |0D. .W.F.e......| +00000010 66 67 ea fe f1 50 a5 29 c0 92 8c 06 f9 05 00 d0 |fg...P.)........| +00000020 62 f2 1e 25 02 20 5e 86 06 59 b9 ff 1e 28 55 04 |b..%. ^..Y...(U.| +00000030 34 4f da b3 ec f5 5b dd f2 f2 1b 6e d4 df 2f 54 |4O....[....n../T| +00000040 07 33 4b 1b 0e 90 |.3K...|" +"2019-09-24 01:04:58.899 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc003a1d410 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:58.899 UTC [cauthdsl] func1 -> DEBU 1ba5 0xc003a1d410 gate 1569287098898290100 evaluation succeeds" +"2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.899 UTC [policies] Evaluate -> DEBU 1ba8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:58.900 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:58.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1baa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bab Exiting" +"2019-09-24 01:04:58.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bac Exiting" +"2019-09-24 01:04:58.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.900 UTC [gossip.gossip] handleMessage -> DEBU 1bae Exiting" +"2019-09-24 01:04:58.901 UTC [gossip.gossip] handleMessage -> DEBU 1baf Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bb0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb1 Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +"2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb2 Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +00000040 24 c8 a8 1c be f2 |$.....|" +"2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb3 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:04:58.902 UTC [msp.identity] Verify -> DEBU 1bb4 Verify: sig = 00000000 30 45 02 21 00 b3 e8 bf f5 c0 79 4d db c2 53 12 |0E.!......yM..S.| +00000010 bd 11 28 22 1b f2 31 45 66 e7 ea 61 bc 4e 15 51 |..("..1Ef..a.N.Q| +00000020 30 0c ad 6b 70 02 20 17 10 da be a6 55 f1 8e b2 |0..kp. .....U...| +00000030 90 f9 9b bd a5 de d6 26 d2 f0 2c f0 fd 8d 91 79 |.......&..,....y| +00000040 15 d5 eb 2a d8 23 e6 |...*.#.|" +"2019-09-24 01:04:58.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:58.903 UTC [gossip.discovery] isSentByMe -> DEBU 1bb6 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:04:58.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bb7 Exiting" +"2019-09-24 01:04:58.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bb8 Exiting" +"2019-09-24 01:04:58.904 UTC [gossip.gossip] handleMessage -> DEBU 1bb9 Exiting" +"2019-09-24 01:04:58.904 UTC [gossip.gossip] handleMessage -> DEBU 1bba Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1bbb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bbc Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:04:58.906 UTC [msp.identity] Verify -> DEBU 1bbd Verify: digest = 00000000 a7 d5 b7 c4 93 35 25 4e fd 2c 13 66 0b 95 2d 6a |.....5%N.,.f..-j| +00000010 b4 b8 92 ce 14 3f 81 99 69 0b 32 22 ac 3e 8d 2a |.....?..i.2".>.*|" +"2019-09-24 01:04:58.906 UTC [msp.identity] Verify -> DEBU 1bbe Verify: sig = 00000000 30 44 02 20 04 1b bf 73 26 f2 61 37 07 a6 2a 81 |0D. ...s&.a7..*.| +00000010 55 88 83 3b 33 d2 84 09 3b 31 36 25 0f ad 45 9b |U..;3...;16%..E.| +00000020 61 7e 5e 4f 02 20 5b 25 0c 8c 5c 43 be 1c 98 5f |a~^O. [%..\C..._| +00000030 b8 39 de 12 07 ee 68 87 00 72 e7 d7 b5 30 86 dd |.9....h..r...0..| +00000040 24 c8 a8 1c be f2 |$.....|" +"2019-09-24 01:04:58.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bbf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.907 UTC [gossip.discovery] isSentByMe -> DEBU 1bc0 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bc1 Exiting" +"2019-09-24 01:04:58.907 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1bc2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:58.910 UTC [msp] DeserializeIdentity -> DEBU 1bc3 Obtaining identity" +"2019-09-24 01:04:58.910 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1bc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:58.911 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bc5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.911 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1bc6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.911 UTC [policies] Evaluate -> DEBU 1bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:58.911 UTC [policies] Evaluate -> DEBU 1bc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:58.912 UTC [policies] Evaluate -> DEBU 1bc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func1 -> DEBU 1bca 0xc003ba6f40 gate 1569287098912328000 evaluation starts" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcb 0xc003ba6f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcc 0xc003ba6f40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bcd 0xc003ba6f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func2 -> DEBU 1bce 0xc003ba6f40 principal evaluation fails" +"2019-09-24 01:04:58.912 UTC [cauthdsl] func1 -> DEBU 1bcf 0xc003ba6f40 gate 1569287098912328000 evaluation fails" +"2019-09-24 01:04:58.912 UTC [policies] Evaluate -> DEBU 1bd0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.913 UTC [policies] Evaluate -> DEBU 1bd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.913 UTC [policies] Evaluate -> DEBU 1bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:58.913 UTC [cauthdsl] func1 -> DEBU 1bd3 0xc003ba7780 gate 1569287098913285300 evaluation starts" +"2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd4 0xc003ba7780 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd5 0xc003ba7780 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.913 UTC [cauthdsl] func2 -> DEBU 1bd6 0xc003ba7780 principal matched by identity 0" +"2019-09-24 01:04:58.913 UTC [msp.identity] Verify -> DEBU 1bd7 Verify: digest = 00000000 fa e6 2c b4 91 91 2a 25 4e 0c 0d 07 cf 51 f4 0c |..,...*%N....Q..| +00000010 00 19 fb 8b ef 7e c8 30 13 61 3d fd 9b 2d 1b 63 |.....~.0.a=..-.c|" +"2019-09-24 01:04:58.913 UTC [msp.identity] Verify -> DEBU 1bd8 Verify: sig = 00000000 30 44 02 20 0e 4b d2 29 1c 9c 5e c9 2b d6 a6 4e |0D. .K.)..^.+..N| +00000010 6b ff 99 fc 06 f6 09 be c1 93 71 7d 36 e5 fc 18 |k.........q}6...| +00000020 eb 45 dd 50 02 20 40 d6 a9 8c 3b d7 ef 7e 6a 48 |.E.P. @...;..~jH| +00000030 0b 65 7a 80 ac f9 bc b0 ea 4f 7a a9 66 d5 74 0e |.ez......Oz.f.t.| +00000040 e2 da 70 5d 06 06 |..p]..|" +"2019-09-24 01:04:58.914 UTC [cauthdsl] func2 -> DEBU 1bd9 0xc003ba7780 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:58.914 UTC [cauthdsl] func1 -> DEBU 1bda 0xc003ba7780 gate 1569287098913285300 evaluation succeeds" +"2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.914 UTC [policies] Evaluate -> DEBU 1bdd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:58.915 UTC [policies] Evaluate -> DEBU 1bde == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:58.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 1bdf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 1be0 Exiting" +"2019-09-24 01:04:58.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1be1 Exiting" +"2019-09-24 01:04:58.916 UTC [gossip.gossip] handleMessage -> DEBU 1be2 Exiting" +"2019-09-24 01:04:58.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1be3 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1be4 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:58.917 UTC [msp] DeserializeIdentity -> DEBU 1be5 Obtaining identity" +"2019-09-24 01:04:58.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1be6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:58.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1be8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:58.921 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:58.921 UTC [policies] Evaluate -> DEBU 1bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:58.922 UTC [policies] Evaluate -> DEBU 1beb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:58.922 UTC [cauthdsl] func1 -> DEBU 1bec 0xc003d77330 gate 1569287098922116800 evaluation starts" +"2019-09-24 01:04:58.922 UTC [cauthdsl] func2 -> DEBU 1bed 0xc003d77330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.922 UTC [cauthdsl] func2 -> DEBU 1bee 0xc003d77330 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.923 UTC [cauthdsl] func2 -> DEBU 1bef 0xc003d77330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:58.923 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc003d77330 principal evaluation fails" +"2019-09-24 01:04:58.923 UTC [cauthdsl] func1 -> DEBU 1bf1 0xc003d77330 gate 1569287098922116800 evaluation fails" +"2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:58.923 UTC [policies] Evaluate -> DEBU 1bf4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:58.924 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc003d77b70 gate 1569287098924457500 evaluation starts" +"2019-09-24 01:04:58.926 UTC [cauthdsl] func2 -> DEBU 1bf6 0xc003d77b70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:58.927 UTC [cauthdsl] func2 -> DEBU 1bf7 0xc003d77b70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:58.927 UTC [cauthdsl] func2 -> DEBU 1bf8 0xc003d77b70 principal matched by identity 0" +"2019-09-24 01:04:58.927 UTC [msp.identity] Verify -> DEBU 1bf9 Verify: digest = 00000000 4d f6 15 bd 1d 92 18 6f ce d3 f6 0a 13 d7 d5 5f |M......o......._| +00000010 69 ab af ea 96 5b c4 cc ad 43 fe e4 ad f9 66 e5 |i....[...C....f.|" +"2019-09-24 01:04:58.927 UTC [msp.identity] Verify -> DEBU 1bfa Verify: sig = 00000000 30 44 02 20 5c 38 a4 51 b8 43 fa b1 e5 54 17 87 |0D. \8.Q.C...T..| +00000010 59 c8 aa 0e 5c 97 3a a5 30 16 f1 3d 00 64 01 0f |Y...\.:.0..=.d..| +00000020 30 f8 e8 d0 02 20 26 f2 8a 60 b3 39 48 c2 58 bc |0.... &..`.9H.X.| +00000030 6c ca 18 66 18 9d 0e 3b 35 44 40 ad 03 51 21 cd |l..f...;5D@..Q!.| +00000040 95 04 d2 4e ba cc |...N..|" +"2019-09-24 01:04:58.928 UTC [cauthdsl] func2 -> DEBU 1bfb 0xc003d77b70 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:58.928 UTC [cauthdsl] func1 -> DEBU 1bfc 0xc003d77b70 gate 1569287098924457500 evaluation succeeds" +"2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bfd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bfe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1bff Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:58.928 UTC [policies] Evaluate -> DEBU 1c00 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:58.928 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c01 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c02 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c03 updating membership: timestamp: " +"2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c04 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c05 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:58.929 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c06 Exiting" +"2019-09-24 01:04:58.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c07 Exiting" +"2019-09-24 01:04:58.930 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c08 Exiting" +"2019-09-24 01:04:58.930 UTC [gossip.discovery] sendMemResponse -> DEBU 1c09 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:04:58.930 UTC [msp] DeserializeIdentity -> DEBU 1c0a Obtaining identity" +"2019-09-24 01:04:58.930 UTC [msp] DeserializeIdentity -> DEBU 1c0b Obtaining identity" +"2019-09-24 01:04:58.931 UTC [msp] DeserializeIdentity -> DEBU 1c0c Obtaining identity" +"2019-09-24 01:04:58.931 UTC [gossip.comm] Send -> DEBU 1c0d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:04:58.931 UTC [gossip.discovery] sendMemResponse -> DEBU 1c0e Exiting, replying with alive: alive: alive: alive:z\002 B\027\375L\247Z(\274BU;\022\215\333Z\t3\265\306\362\367K\002>IZ\016\342\347?.\352" > " +"2019-09-24 01:04:58.931 UTC [gossip.comm] sendToEndpoint -> DEBU 1c0f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:04:58.932 UTC [gossip.comm] sendToEndpoint -> DEBU 1c10 Exiting" +"2019-09-24 01:04:59.163 UTC [gossip.comm] func1 -> DEBU 1c11 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.163 UTC [gossip.gossip] handleMessage -> DEBU 1c12 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.164 UTC [gossip.gossip] handleMessage -> DEBU 1c13 Exiting" +"2019-09-24 01:04:59.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c14 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.165 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c15 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:04:59.165 UTC [msp] DeserializeIdentity -> DEBU 1c16 Obtaining identity" +"2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c17 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c18 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:59.166 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c19 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:59.166 UTC [policies] Evaluate -> DEBU 1c1a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:59.166 UTC [policies] Evaluate -> DEBU 1c1b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:59.167 UTC [policies] Evaluate -> DEBU 1c1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:59.167 UTC [cauthdsl] func1 -> DEBU 1c1d 0xc003e51bb0 gate 1569287099167229900 evaluation starts" +"2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c1e 0xc003e51bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c1f 0xc003e51bb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:59.167 UTC [cauthdsl] func2 -> DEBU 1c20 0xc003e51bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:59.168 UTC [cauthdsl] func2 -> DEBU 1c21 0xc003e51bb0 principal evaluation fails" +"2019-09-24 01:04:59.168 UTC [cauthdsl] func1 -> DEBU 1c22 0xc003e51bb0 gate 1569287099167229900 evaluation fails" +"2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c23 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c24 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:59.168 UTC [policies] Evaluate -> DEBU 1c25 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:59.169 UTC [cauthdsl] func1 -> DEBU 1c26 0xc003f8e3f0 gate 1569287099169005900 evaluation starts" +"2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c27 0xc003f8e3f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c28 0xc003f8e3f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:59.169 UTC [cauthdsl] func2 -> DEBU 1c29 0xc003f8e3f0 principal matched by identity 0" +"2019-09-24 01:04:59.169 UTC [msp.identity] Verify -> DEBU 1c2a Verify: digest = 00000000 1f e1 61 07 00 d4 6a 13 e1 c4 f4 a5 37 7f c1 ca |..a...j.....7...| +00000010 b8 5d ad 8b c7 7a a5 63 b5 db ea 53 6f d2 9c cb |.]...z.c...So...|" +"2019-09-24 01:04:59.169 UTC [msp.identity] Verify -> DEBU 1c2b Verify: sig = 00000000 30 44 02 20 05 66 5b 85 f7 31 ec 1c f0 c2 89 02 |0D. .f[..1......| +00000010 a7 aa 25 93 d5 09 c6 f4 42 91 a2 58 05 bc b1 ff |..%.....B..X....| +00000020 5e 17 3f e1 02 20 6a 02 4b 09 44 f5 33 d4 d5 46 |^.?.. j.K.D.3..F| +00000030 02 08 24 fe 2c 13 dc 9d 88 5b 51 32 ca 4d b3 36 |..$.,....[Q2.M.6| +00000040 aa 54 cb 35 c9 56 |.T.5.V|" +"2019-09-24 01:04:59.170 UTC [cauthdsl] func2 -> DEBU 1c2c 0xc003f8e3f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:59.170 UTC [cauthdsl] func1 -> DEBU 1c2d 0xc003f8e3f0 gate 1569287099169005900 evaluation succeeds" +"2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c2e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c2f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:59.170 UTC [policies] Evaluate -> DEBU 1c30 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:59.172 UTC [policies] Evaluate -> DEBU 1c31 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:59.172 UTC [gossip.comm] func1 -> DEBU 1c32 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.172 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c33 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c34 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:04:59.173 UTC [gossip.gossip] handleMessage -> DEBU 1c36 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.173 UTC [gossip.comm] func1 -> DEBU 1c35 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.175 UTC [gossip.comm] func1 -> DEBU 1c37 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c38 updating membership: timestamp: " +"2019-09-24 01:04:59.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c39 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:59.177 UTC [gossip.comm] func1 -> DEBU 1c3a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.177 UTC [gossip.comm] func1 -> DEBU 1c3b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.176 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c3c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:59.178 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c3d Exiting" +"2019-09-24 01:04:59.179 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c3e Exiting" +"2019-09-24 01:04:59.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c3f Exiting" +"2019-09-24 01:04:59.179 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c40 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.179 UTC [gossip.gossip] handleMessage -> DEBU 1c41 Exiting" +"2019-09-24 01:04:59.180 UTC [gossip.gossip] handleMessage -> DEBU 1c43 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.179 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1c42 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:04:59.180 UTC [msp] DeserializeIdentity -> DEBU 1c45 Obtaining identity" +"2019-09-24 01:04:59.180 UTC [msp] DeserializeIdentity -> DEBU 1c44 Obtaining identity" +"2019-09-24 01:04:59.181 UTC [msp] DeserializeIdentity -> DEBU 1c46 Obtaining identity" +"2019-09-24 01:04:59.181 UTC [msp] DeserializeIdentity -> DEBU 1c47 Obtaining identity" +"2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1c48 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:04:59.182 UTC [msp] DeserializeIdentity -> DEBU 1c49 Obtaining identity" +"2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:59.182 UTC [msp] DeserializeIdentity -> DEBU 1c4c Obtaining identity" +"2019-09-24 01:04:59.182 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1c4b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c4d Obtaining identity" +"2019-09-24 01:04:59.183 UTC [gossip.comm] Send -> DEBU 1c4e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c4f Obtaining identity" +"2019-09-24 01:04:59.183 UTC [msp] DeserializeIdentity -> DEBU 1c51 Obtaining identity" +"2019-09-24 01:04:59.184 UTC [gossip.comm] Send -> DEBU 1c52 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:04:59.183 UTC [gossip.comm] sendToEndpoint -> DEBU 1c53 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.184 UTC [gossip.comm] sendToEndpoint -> DEBU 1c54 Exiting" +"2019-09-24 01:04:59.183 UTC [policies] Evaluate -> DEBU 1c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:04:59.185 UTC [policies] Evaluate -> DEBU 1c55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:04:59.185 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:04:59.185 UTC [cauthdsl] func1 -> DEBU 1c58 0xc003e65eb0 gate 1569287099185492000 evaluation starts" +"2019-09-24 01:04:59.185 UTC [cauthdsl] func2 -> DEBU 1c59 0xc003e65eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:59.186 UTC [cauthdsl] func2 -> DEBU 1c5a 0xc003e65eb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:59.185 UTC [gossip.comm] sendToEndpoint -> DEBU 1c56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.186 UTC [cauthdsl] func2 -> DEBU 1c5b 0xc003e65eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:04:59.187 UTC [gossip.comm] sendToEndpoint -> DEBU 1c5c Exiting" +"2019-09-24 01:04:59.190 UTC [cauthdsl] func2 -> DEBU 1c5d 0xc003e65eb0 principal evaluation fails" +"2019-09-24 01:04:59.191 UTC [cauthdsl] func1 -> DEBU 1c5e 0xc003e65eb0 gate 1569287099185492000 evaluation fails" +"2019-09-24 01:04:59.191 UTC [policies] Evaluate -> DEBU 1c5f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:59.191 UTC [policies] Evaluate -> DEBU 1c60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:04:59.192 UTC [policies] Evaluate -> DEBU 1c61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:04:59.192 UTC [cauthdsl] func1 -> DEBU 1c62 0xc0028ec6f0 gate 1569287099192150700 evaluation starts" +"2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c63 0xc0028ec6f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c64 0xc0028ec6f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:04:59.192 UTC [cauthdsl] func2 -> DEBU 1c65 0xc0028ec6f0 principal matched by identity 0" +"2019-09-24 01:04:59.192 UTC [msp.identity] Verify -> DEBU 1c66 Verify: digest = 00000000 d6 b7 32 91 35 1c 01 2b 8d 4e d1 49 aa 25 d9 51 |..2.5..+.N.I.%.Q| +00000010 d6 0f 2f 37 8d ce a2 62 e8 18 21 59 63 29 f6 e5 |../7...b..!Yc)..|" +"2019-09-24 01:04:59.192 UTC [msp.identity] Verify -> DEBU 1c67 Verify: sig = 00000000 30 45 02 21 00 dd 6d 36 f8 cd 3a 1c 38 f4 f3 9c |0E.!..m6..:.8...| +00000010 fd 03 07 75 a4 60 b8 97 51 15 4f fd a1 ae 0e 67 |...u.`..Q.O....g| +00000020 34 93 a6 d7 a1 02 20 5a b9 a7 f9 79 ab 62 6c ad |4..... Z...y.bl.| +00000030 83 6a 65 80 ea 60 3e b5 9b 96 af 6a b6 07 46 58 |.je..`>....j..FX| +00000040 26 c1 ea 77 a4 e1 84 |&..w...|" +"2019-09-24 01:04:59.193 UTC [cauthdsl] func2 -> DEBU 1c68 0xc0028ec6f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:04:59.193 UTC [cauthdsl] func1 -> DEBU 1c69 0xc0028ec6f0 gate 1569287099192150700 evaluation succeeds" +"2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:04:59.193 UTC [policies] Evaluate -> DEBU 1c6d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:04:59.194 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c6e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c6f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c70 updating membership: timestamp: " +"2019-09-24 01:04:59.194 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c71 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:04:59.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c72 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:04:59.196 UTC [gossip.discovery] learnExistingMembers -> DEBU 1c73 Exiting" +"2019-09-24 01:04:59.196 UTC [gossip.discovery] handleAliveMessage -> DEBU 1c74 Exiting" +"2019-09-24 01:04:59.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c75 Exiting" +"2019-09-24 01:04:59.196 UTC [gossip.gossip] handleMessage -> DEBU 1c76 Exiting" +"2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c77 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c78 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c79 Exiting" +"2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c7a Exiting" +"2019-09-24 01:04:59.197 UTC [gossip.gossip] handleMessage -> DEBU 1c7b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c7c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c7d Exiting" +"2019-09-24 01:04:59.198 UTC [gossip.gossip] handleMessage -> DEBU 1c7e Exiting" +"2019-09-24 01:04:59.198 UTC [gossip.gossip] handleMessage -> DEBU 1c7f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c80 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c81 Exiting" +"2019-09-24 01:04:59.199 UTC [gossip.gossip] handleMessage -> DEBU 1c82 Exiting" +"2019-09-24 01:04:59.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c83 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.199 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1c84 Exiting" +"2019-09-24 01:04:59.206 UTC [msp] DeserializeIdentity -> DEBU 1c85 Obtaining identity" +"2019-09-24 01:04:59.206 UTC [msp] DeserializeIdentity -> DEBU 1c86 Obtaining identity" +"2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c87 Obtaining identity" +"2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c88 Obtaining identity" +"2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c89 Obtaining identity" +"2019-09-24 01:04:59.207 UTC [msp] DeserializeIdentity -> DEBU 1c8a Obtaining identity" +"2019-09-24 01:04:59.208 UTC [gossip.comm] Send -> DEBU 1c8b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:59.208 UTC [msp] DeserializeIdentity -> DEBU 1c8c Obtaining identity" +"2019-09-24 01:04:59.208 UTC [msp] DeserializeIdentity -> DEBU 1c8d Obtaining identity" +"2019-09-24 01:04:59.209 UTC [gossip.comm] Send -> DEBU 1c8e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:59.209 UTC [gossip.comm] sendToEndpoint -> DEBU 1c8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.209 UTC [gossip.comm] sendToEndpoint -> DEBU 1c90 Exiting" +"2019-09-24 01:04:59.210 UTC [gossip.comm] sendToEndpoint -> DEBU 1c91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.210 UTC [gossip.comm] sendToEndpoint -> DEBU 1c92 Exiting" +"2019-09-24 01:04:59.233 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c93 Obtaining default signing identity" +"2019-09-24 01:04:59.233 UTC [msp.identity] Sign -> DEBU 1c94 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101C " +"2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c95 Sign: digest: 3BD934C528418AE7056BB4CE5E7219BAEBC27372ED51771AA0EEFA990448F6E6 " +"2019-09-24 01:04:59.234 UTC [msp] GetDefaultSigningIdentity -> DEBU 1c96 Obtaining default signing identity" +"2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c97 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:04:59.234 UTC [msp.identity] Sign -> DEBU 1c98 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:04:59.235 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1c99 Sleeping 5s" +"2019-09-24 01:04:59.240 UTC [msp] DeserializeIdentity -> DEBU 1c9a Obtaining identity" +"2019-09-24 01:04:59.240 UTC [msp] DeserializeIdentity -> DEBU 1c9b Obtaining identity" +"2019-09-24 01:04:59.241 UTC [msp] DeserializeIdentity -> DEBU 1c9c Obtaining identity" +"2019-09-24 01:04:59.241 UTC [gossip.comm] Send -> DEBU 1c9d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:59.241 UTC [gossip.comm] Send -> DEBU 1c9e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:59.241 UTC [msp] DeserializeIdentity -> DEBU 1c9f Obtaining identity" +"2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca4 Exiting" +"2019-09-24 01:04:59.242 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca3 Exiting" +"2019-09-24 01:04:59.242 UTC [gossip.comm] Send -> DEBU 1ca1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:04:59.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:04:59.243 UTC [gossip.comm] sendToEndpoint -> DEBU 1ca6 Exiting" +"2019-09-24 01:05:01.689 UTC [msp] DeserializeIdentity -> DEBU 1ca7 Obtaining identity" +"2019-09-24 01:05:01.689 UTC [msp] DeserializeIdentity -> DEBU 1ca8 Obtaining identity" +"2019-09-24 01:05:01.690 UTC [gossip.comm] Send -> DEBU 1ca9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1caa Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cab Exiting" +"2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cac Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.691 UTC [gossip.comm] sendToEndpoint -> DEBU 1cad Exiting" +"2019-09-24 01:05:01.692 UTC [gossip.comm] sendToEndpoint -> DEBU 1cae Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1caf Exiting" +"2019-09-24 01:05:01.694 UTC [gossip.comm] func1 -> DEBU 1cb0 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.694 UTC [gossip.gossip] handleMessage -> DEBU 1cb1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.695 UTC [msp.identity] Verify -> DEBU 1cb2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:01.696 UTC [msp.identity] Verify -> DEBU 1cb5 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:01.696 UTC [gossip.comm] func1 -> DEBU 1cb3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.696 UTC [gossip.comm] func1 -> DEBU 1cb4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.697 UTC [msp.identity] Verify -> DEBU 1cb6 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:01.697 UTC [msp.identity] Verify -> DEBU 1cb7 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:01.698 UTC [msp] DeserializeIdentity -> DEBU 1cb8 Obtaining identity" +"2019-09-24 01:05:01.698 UTC [msp] DeserializeIdentity -> DEBU 1cb9 Obtaining identity" +"2019-09-24 01:05:01.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cba Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cbb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cbc Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.699 UTC [policies] Evaluate -> DEBU 1cbf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.699 UTC [cauthdsl] func1 -> DEBU 1cc0 0xc0038ccce0 gate 1569287101699924900 evaluation starts" +"2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc1 0xc0038ccce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc2 0xc0038ccce0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc3 0xc0038ccce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.700 UTC [cauthdsl] func2 -> DEBU 1cc4 0xc0038ccce0 principal evaluation fails" +"2019-09-24 01:05:01.700 UTC [cauthdsl] func1 -> DEBU 1cc5 0xc0038ccce0 gate 1569287101699924900 evaluation fails" +"2019-09-24 01:05:01.700 UTC [policies] Evaluate -> DEBU 1cc6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.701 UTC [policies] Evaluate -> DEBU 1cc7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.701 UTC [policies] Evaluate -> DEBU 1cc8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.701 UTC [cauthdsl] func1 -> DEBU 1cc9 0xc0038cd520 gate 1569287101701309900 evaluation starts" +"2019-09-24 01:05:01.701 UTC [cauthdsl] func2 -> DEBU 1cca 0xc0038cd520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.701 UTC [cauthdsl] func2 -> DEBU 1ccb 0xc0038cd520 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.702 UTC [cauthdsl] func2 -> DEBU 1ccc 0xc0038cd520 principal matched by identity 0" +"2019-09-24 01:05:01.702 UTC [msp.identity] Verify -> DEBU 1ccd Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:01.702 UTC [msp.identity] Verify -> DEBU 1cce Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:01.702 UTC [cauthdsl] func2 -> DEBU 1ccf 0xc0038cd520 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.703 UTC [cauthdsl] func1 -> DEBU 1cd0 0xc0038cd520 gate 1569287101701309900 evaluation succeeds" +"2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.703 UTC [policies] Evaluate -> DEBU 1cd4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.704 UTC [msp] DeserializeIdentity -> DEBU 1cd5 Obtaining identity" +"2019-09-24 01:05:01.704 UTC [msp] DeserializeIdentity -> DEBU 1cd6 Obtaining identity" +"2019-09-24 01:05:01.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cd7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.705 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cd9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cda == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cdb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.705 UTC [policies] Evaluate -> DEBU 1cdc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.705 UTC [cauthdsl] func1 -> DEBU 1cdd 0xc0038dccf0 gate 1569287101705831400 evaluation starts" +"2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1cde 0xc0038dccf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1cdf 0xc0038dccf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1ce0 0xc0038dccf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.706 UTC [cauthdsl] func2 -> DEBU 1ce1 0xc0038dccf0 principal evaluation fails" +"2019-09-24 01:05:01.706 UTC [cauthdsl] func1 -> DEBU 1ce2 0xc0038dccf0 gate 1569287101705831400 evaluation fails" +"2019-09-24 01:05:01.706 UTC [policies] Evaluate -> DEBU 1ce3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.707 UTC [policies] Evaluate -> DEBU 1ce4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.707 UTC [policies] Evaluate -> DEBU 1ce5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.707 UTC [cauthdsl] func1 -> DEBU 1ce6 0xc0038dd530 gate 1569287101707537700 evaluation starts" +"2019-09-24 01:05:01.707 UTC [cauthdsl] func2 -> DEBU 1ce7 0xc0038dd530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.707 UTC [cauthdsl] func2 -> DEBU 1ce8 0xc0038dd530 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.708 UTC [cauthdsl] func2 -> DEBU 1ce9 0xc0038dd530 principal matched by identity 0" +"2019-09-24 01:05:01.708 UTC [msp.identity] Verify -> DEBU 1cea Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:01.708 UTC [msp.identity] Verify -> DEBU 1ceb Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:01.708 UTC [cauthdsl] func2 -> DEBU 1cec 0xc0038dd530 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.708 UTC [cauthdsl] func1 -> DEBU 1ced 0xc0038dd530 gate 1569287101707537700 evaluation succeeds" +"2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cf0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.709 UTC [policies] Evaluate -> DEBU 1cf1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.709 UTC [gossip.gossip] handleMessage -> DEBU 1cf2 Exiting" +"2019-09-24 01:05:01.710 UTC [gossip.gossip] handleMessage -> DEBU 1cf3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf4 Obtaining identity" +"2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf5 Obtaining identity" +"2019-09-24 01:05:01.710 UTC [msp] DeserializeIdentity -> DEBU 1cf6 Obtaining identity" +"2019-09-24 01:05:01.714 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1cf7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.714 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cf8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1cf9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.720 UTC [policies] Evaluate -> DEBU 1cfa == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.721 UTC [policies] Evaluate -> DEBU 1cfb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.721 UTC [policies] Evaluate -> DEBU 1cfc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.721 UTC [cauthdsl] func1 -> DEBU 1cfd 0xc003c23040 gate 1569287101721497600 evaluation starts" +"2019-09-24 01:05:01.721 UTC [cauthdsl] func2 -> DEBU 1cfe 0xc003c23040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.721 UTC [cauthdsl] func2 -> DEBU 1cff 0xc003c23040 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.722 UTC [cauthdsl] func2 -> DEBU 1d00 0xc003c23040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.722 UTC [cauthdsl] func2 -> DEBU 1d01 0xc003c23040 principal evaluation fails" +"2019-09-24 01:05:01.722 UTC [cauthdsl] func1 -> DEBU 1d02 0xc003c23040 gate 1569287101721497600 evaluation fails" +"2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d03 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d04 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.722 UTC [policies] Evaluate -> DEBU 1d05 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.723 UTC [cauthdsl] func1 -> DEBU 1d06 0xc003c23880 gate 1569287101723023200 evaluation starts" +"2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d07 0xc003c23880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d08 0xc003c23880 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.723 UTC [cauthdsl] func2 -> DEBU 1d09 0xc003c23880 principal matched by identity 0" +"2019-09-24 01:05:01.723 UTC [msp.identity] Verify -> DEBU 1d0a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:01.724 UTC [msp.identity] Verify -> DEBU 1d0b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:01.725 UTC [cauthdsl] func2 -> DEBU 1d0c 0xc003c23880 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.725 UTC [cauthdsl] func1 -> DEBU 1d0d 0xc003c23880 gate 1569287101723023200 evaluation succeeds" +"2019-09-24 01:05:01.725 UTC [policies] Evaluate -> DEBU 1d0e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d0f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d10 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.726 UTC [policies] Evaluate -> DEBU 1d11 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.727 UTC [msp.identity] Verify -> DEBU 1d12 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:01.727 UTC [msp.identity] Verify -> DEBU 1d13 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:01.728 UTC [msp.identity] Verify -> DEBU 1d14 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:01.728 UTC [msp.identity] Verify -> DEBU 1d15 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:01.729 UTC [msp] DeserializeIdentity -> DEBU 1d16 Obtaining identity" +"2019-09-24 01:05:01.729 UTC [msp] DeserializeIdentity -> DEBU 1d17 Obtaining identity" +"2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d19 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.730 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d1a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.731 UTC [policies] Evaluate -> DEBU 1d1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.732 UTC [cauthdsl] func1 -> DEBU 1d1e 0xc003cbde90 gate 1569287101732001000 evaluation starts" +"2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d1f 0xc003cbde90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d20 0xc003cbde90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.732 UTC [cauthdsl] func2 -> DEBU 1d21 0xc003cbde90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.733 UTC [cauthdsl] func2 -> DEBU 1d22 0xc003cbde90 principal evaluation fails" +"2019-09-24 01:05:01.733 UTC [cauthdsl] func1 -> DEBU 1d23 0xc003cbde90 gate 1569287101732001000 evaluation fails" +"2019-09-24 01:05:01.733 UTC [policies] Evaluate -> DEBU 1d24 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.733 UTC [policies] Evaluate -> DEBU 1d25 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.734 UTC [policies] Evaluate -> DEBU 1d26 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.734 UTC [cauthdsl] func1 -> DEBU 1d28 0xc003e946d0 gate 1569287101734937300 evaluation starts" +"2019-09-24 01:05:01.734 UTC [msp] DeserializeIdentity -> DEBU 1d27 Obtaining identity" +"2019-09-24 01:05:01.735 UTC [msp] DeserializeIdentity -> DEBU 1d29 Obtaining identity" +"2019-09-24 01:05:01.736 UTC [gossip.pull] Hello -> DEBU 1d2a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:01.736 UTC [msp] DeserializeIdentity -> DEBU 1d2b Obtaining identity" +"2019-09-24 01:05:01.736 UTC [msp] DeserializeIdentity -> DEBU 1d2c Obtaining identity" +"2019-09-24 01:05:01.737 UTC [gossip.comm] Send -> DEBU 1d2d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:01.737 UTC [gossip.comm] sendToEndpoint -> DEBU 1d2e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.737 UTC [gossip.comm] sendToEndpoint -> DEBU 1d2f Exiting" +"2019-09-24 01:05:01.738 UTC [gossip.comm] func1 -> DEBU 1d30 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d31 0xc003e946d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d32 0xc003e946d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.738 UTC [cauthdsl] func2 -> DEBU 1d33 0xc003e946d0 principal matched by identity 0" +"2019-09-24 01:05:01.739 UTC [msp.identity] Verify -> DEBU 1d34 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:01.739 UTC [msp.identity] Verify -> DEBU 1d35 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:01.739 UTC [cauthdsl] func2 -> DEBU 1d36 0xc003e946d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.739 UTC [cauthdsl] func1 -> DEBU 1d37 0xc003e946d0 gate 1569287101734937300 evaluation succeeds" +"2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d38 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.739 UTC [policies] Evaluate -> DEBU 1d3a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.740 UTC [policies] Evaluate -> DEBU 1d3b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.740 UTC [gossip.gossip] handleMessage -> DEBU 1d3c Exiting" +"2019-09-24 01:05:01.740 UTC [gossip.gossip] handleMessage -> DEBU 1d3d Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.740 UTC [msp] DeserializeIdentity -> DEBU 1d3e Obtaining identity" +"2019-09-24 01:05:01.741 UTC [gossip.election] waitForInterrupt -> DEBU 1d3f d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:01.741 UTC [gossip.election] IsLeader -> DEBU 1d40 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:01.741 UTC [msp] GetDefaultSigningIdentity -> DEBU 1d41 Obtaining default signing identity" +"2019-09-24 01:05:01.741 UTC [msp.identity] Sign -> DEBU 1d42 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510081801 " +"2019-09-24 01:05:01.742 UTC [msp.identity] Sign -> DEBU 1d43 Sign: digest: 3E1769C597F64C0C38E12DC81BBC2F1C30AF0836D6F44C7BBAABA67453513A15 " +"2019-09-24 01:05:01.742 UTC [gossip.election] waitForInterrupt -> DEBU 1d44 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:01.741 UTC [msp] DeserializeIdentity -> DEBU 1d45 Obtaining identity" +"2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d47 Obtaining identity" +"2019-09-24 01:05:01.742 UTC [msp] DeserializeIdentity -> DEBU 1d46 Obtaining identity" +"2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d48 Obtaining identity" +"2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d49 Obtaining identity" +"2019-09-24 01:05:01.743 UTC [msp] DeserializeIdentity -> DEBU 1d4a Obtaining identity" +"2019-09-24 01:05:01.743 UTC [gossip.comm] Send -> DEBU 1d4b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:01.744 UTC [msp] DeserializeIdentity -> DEBU 1d4c Obtaining identity" +"2019-09-24 01:05:01.744 UTC [msp] DeserializeIdentity -> DEBU 1d4d Obtaining identity" +"2019-09-24 01:05:01.744 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:01.744 UTC [gossip.comm] sendToEndpoint -> DEBU 1d4f Exiting" +"2019-09-24 01:05:01.745 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d50 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d51 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.746 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d52 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d54 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.746 UTC [policies] Evaluate -> DEBU 1d55 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func1 -> DEBU 1d56 0xc0041321e0 gate 1569287101747123100 evaluation starts" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d57 0xc0041321e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d58 0xc0041321e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d59 0xc0041321e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func2 -> DEBU 1d5a 0xc0041321e0 principal evaluation fails" +"2019-09-24 01:05:01.747 UTC [cauthdsl] func1 -> DEBU 1d5b 0xc0041321e0 gate 1569287101747123100 evaluation fails" +"2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.748 UTC [policies] Evaluate -> DEBU 1d5e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.748 UTC [cauthdsl] func1 -> DEBU 1d5f 0xc004132a20 gate 1569287101748503200 evaluation starts" +"2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d60 0xc004132a20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d61 0xc004132a20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.748 UTC [cauthdsl] func2 -> DEBU 1d62 0xc004132a20 principal matched by identity 0" +"2019-09-24 01:05:01.749 UTC [msp.identity] Verify -> DEBU 1d63 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:01.749 UTC [msp.identity] Verify -> DEBU 1d64 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:01.749 UTC [cauthdsl] func2 -> DEBU 1d65 0xc004132a20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.749 UTC [cauthdsl] func1 -> DEBU 1d66 0xc004132a20 gate 1569287101748503200 evaluation succeeds" +"2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d67 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d69 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.750 UTC [policies] Evaluate -> DEBU 1d6a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.751 UTC [msp.identity] Verify -> DEBU 1d6b Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:01.751 UTC [msp.identity] Verify -> DEBU 1d6c Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:01.751 UTC [msp] DeserializeIdentity -> DEBU 1d6d Obtaining identity" +"2019-09-24 01:05:01.751 UTC [msp] DeserializeIdentity -> DEBU 1d6e Obtaining identity" +"2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1d6f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d70 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1d71 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:01.752 UTC [policies] Evaluate -> DEBU 1d72 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:01.752 UTC [policies] Evaluate -> DEBU 1d73 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:01.753 UTC [policies] Evaluate -> DEBU 1d74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func1 -> DEBU 1d75 0xc0025f0910 gate 1569287101753217700 evaluation starts" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d76 0xc0025f0910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d77 0xc0025f0910 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d78 0xc0025f0910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func2 -> DEBU 1d79 0xc0025f0910 principal evaluation fails" +"2019-09-24 01:05:01.753 UTC [cauthdsl] func1 -> DEBU 1d7a 0xc0025f0910 gate 1569287101753217700 evaluation fails" +"2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:01.754 UTC [policies] Evaluate -> DEBU 1d7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:01.754 UTC [cauthdsl] func1 -> DEBU 1d7e 0xc0025f1150 gate 1569287101754665800 evaluation starts" +"2019-09-24 01:05:01.754 UTC [cauthdsl] func2 -> DEBU 1d7f 0xc0025f1150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:01.754 UTC [cauthdsl] func2 -> DEBU 1d80 0xc0025f1150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:01.755 UTC [cauthdsl] func2 -> DEBU 1d81 0xc0025f1150 principal matched by identity 0" +"2019-09-24 01:05:01.755 UTC [msp.identity] Verify -> DEBU 1d82 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:01.756 UTC [msp.identity] Verify -> DEBU 1d83 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:01.756 UTC [cauthdsl] func2 -> DEBU 1d84 0xc0025f1150 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:01.756 UTC [cauthdsl] func1 -> DEBU 1d85 0xc0025f1150 gate 1569287101754665800 evaluation succeeds" +"2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d86 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d87 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:01.757 UTC [policies] Evaluate -> DEBU 1d88 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:01.758 UTC [policies] Evaluate -> DEBU 1d89 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:01.758 UTC [msp.identity] Verify -> DEBU 1d8a Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:01.758 UTC [msp.identity] Verify -> DEBU 1d8b Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:01.758 UTC [gossip.gossip] handleMessage -> DEBU 1d8c Exiting" +"2019-09-24 01:05:01.759 UTC [gossip.gossip] handleMessage -> DEBU 1d8d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.759 UTC [gossip.pull] HandleMessage -> DEBU 1d8e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.759 UTC [gossip.gossip] handleMessage -> DEBU 1d8f Exiting" +"2019-09-24 01:05:01.832 UTC [gossip.comm] func1 -> DEBU 1d90 Got message: GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.832 UTC [gossip.gossip] handleMessage -> DEBU 1d91 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.832 UTC [gossip.gossip] handleMessage -> DEBU 1d92 Exiting" +"2019-09-24 01:05:01.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d93 Got message: GossipMessage: nonce:9607930029945762733 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1d94 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d95 Verify: digest = 00000000 ec 01 a5 82 65 90 de ba a6 5c 3b 74 b5 af cb bf |....e....\;t....| +00000010 2b 09 d9 a4 fb 35 19 91 45 94 33 9e d1 c9 91 6b |+....5..E.3....k|" +"2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d96 Verify: sig = 00000000 30 45 02 21 00 ba 27 79 5f af ed 9c 41 c8 ef 58 |0E.!..'y_...A..X| +00000010 a4 c4 7a 10 4e 92 1a e9 bd e6 7e 66 f9 51 51 2b |..z.N.....~f.QQ+| +00000020 d5 3b 46 db a8 02 20 17 e8 ad a9 b1 61 f3 c1 1d |.;F... .....a...| +00000030 16 53 75 6f c6 56 92 8f 8c c9 d6 5d a6 b5 17 58 |.Suo.V.....]...X| +00000040 af 56 7d ce 71 f4 87 |.V}.q..|" +"2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d97 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:01.834 UTC [msp.identity] Verify -> DEBU 1d98 Verify: sig = 00000000 30 44 02 20 16 76 8e 25 d8 da 9c a2 4e 74 59 ae |0D. .v.%....NtY.| +00000010 bb d1 de c1 ce 88 da fd 35 08 73 6c c1 1e 64 1d |........5.sl..d.| +00000020 b6 58 d0 c4 02 20 20 da ce 75 4d 46 0f 51 db e4 |.X... ..uMF.Q..| +00000030 06 69 ec 88 39 8a 88 71 56 c1 4a fb 95 d1 27 56 |.i..9..qV.J...'V| +00000040 7a b1 f7 08 eb f7 |z.....|" +"2019-09-24 01:05:01.835 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1d99 Exiting" +"2019-09-24 01:05:01.835 UTC [gossip.discovery] sendMemResponse -> DEBU 1d9a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:01.835 UTC [msp] DeserializeIdentity -> DEBU 1d9b Obtaining identity" +"2019-09-24 01:05:01.836 UTC [msp] DeserializeIdentity -> DEBU 1d9c Obtaining identity" +"2019-09-24 01:05:01.836 UTC [gossip.comm] Send -> DEBU 1d9d Entering, sending GossipMessage: Channel: , nonce: 9607930029945762733, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:01.836 UTC [gossip.discovery] sendMemResponse -> DEBU 1d9e Exiting, replying with alive: alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +"2019-09-24 01:05:01.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1d9f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9607930029945762733, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 337 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.836 UTC [gossip.comm] sendToEndpoint -> DEBU 1da0 Exiting" +"2019-09-24 01:05:01.872 UTC [gossip.comm] func1 -> DEBU 1da1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.872 UTC [gossip.gossip] handleMessage -> DEBU 1da2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.873 UTC [msp] DeserializeIdentity -> DEBU 1da3 Obtaining identity" +"2019-09-24 01:05:01.873 UTC [msp] DeserializeIdentity -> DEBU 1da4 Obtaining identity" +"2019-09-24 01:05:01.873 UTC [gossip.gossip] handleMessage -> DEBU 1da5 Exiting" +"2019-09-24 01:05:01.891 UTC [gossip.comm] func1 -> DEBU 1da6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.892 UTC [gossip.gossip] handleMessage -> DEBU 1da7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.892 UTC [gossip.pull] HandleMessage -> DEBU 1da8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:01.892 UTC [gossip.pull] SendDigest -> DEBU 1da9 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:01.893 UTC [gossip.gossip] handleMessage -> DEBU 1daa Exiting" +"2019-09-24 01:05:02.079 UTC [gossip.comm] func1 -> DEBU 1dab Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.079 UTC [gossip.gossip] handleMessage -> DEBU 1dac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.079 UTC [msp] DeserializeIdentity -> DEBU 1dad Obtaining identity" +"2019-09-24 01:05:02.080 UTC [msp] DeserializeIdentity -> DEBU 1dae Obtaining identity" +"2019-09-24 01:05:02.080 UTC [msp] DeserializeIdentity -> DEBU 1daf Obtaining identity" +"2019-09-24 01:05:02.080 UTC [gossip.gossip] handleMessage -> DEBU 1db0 Exiting" +"2019-09-24 01:05:02.276 UTC [gossip.comm] func1 -> DEBU 1db1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.276 UTC [gossip.gossip] handleMessage -> DEBU 1db2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.276 UTC [msp] DeserializeIdentity -> DEBU 1db3 Obtaining identity" +"2019-09-24 01:05:02.276 UTC [msp] DeserializeIdentity -> DEBU 1db4 Obtaining identity" +"2019-09-24 01:05:02.277 UTC [msp] DeserializeIdentity -> DEBU 1db5 Obtaining identity" +"2019-09-24 01:05:02.277 UTC [gossip.gossip] handleMessage -> DEBU 1db6 Exiting" +"2019-09-24 01:05:02.505 UTC [gossip.comm] func1 -> DEBU 1db7 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.505 UTC [gossip.gossip] handleMessage -> DEBU 1db8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.506 UTC [gossip.pull] HandleMessage -> DEBU 1db9 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.506 UTC [gossip.pull] SendDigest -> DEBU 1dba Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:02.506 UTC [gossip.gossip] handleMessage -> DEBU 1dbb Exiting" +"2019-09-24 01:05:02.508 UTC [gossip.comm] func1 -> DEBU 1dbc Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.508 UTC [gossip.gossip] handleMessage -> DEBU 1dbd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.509 UTC [gossip.gossip] handleMessage -> DEBU 1dbe Exiting" +"2019-09-24 01:05:02.509 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dbf Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.510 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1dc0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:02.510 UTC [msp.identity] Verify -> DEBU 1dc1 Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +"2019-09-24 01:05:02.510 UTC [msp.identity] Verify -> DEBU 1dc2 Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1dc3 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:02.511 UTC [msp.identity] Verify -> DEBU 1dc4 Verify: sig = 00000000 30 44 02 20 59 86 17 73 e7 af 2d c7 5d 06 fb 28 |0D. Y..s..-.]..(| +00000010 39 f3 00 ab 59 5b fd 58 71 98 5b 64 55 f9 69 71 |9...Y[.Xq.[dU.iq| +00000020 e8 9e 51 97 02 20 26 b3 17 9a a7 64 ee 1f c0 86 |..Q.. &....d....| +00000030 9f d2 0d db e2 67 10 47 77 d9 33 a7 45 b3 cb 70 |.....g.Gw.3.E..p| +00000040 2d 46 4f ba 87 54 |-FO..T|" +"2019-09-24 01:05:02.511 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dc5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:02.511 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc6 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:02.511 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc7 updating membership: timestamp: " +"2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc8 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dc9 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:02.512 UTC [gossip.discovery] learnExistingMembers -> DEBU 1dca Exiting" +"2019-09-24 01:05:02.512 UTC [gossip.discovery] handleAliveMessage -> DEBU 1dcb Exiting" +"2019-09-24 01:05:02.512 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1dcc Exiting" +"2019-09-24 01:05:02.512 UTC [gossip.discovery] sendMemResponse -> DEBU 1dcd Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:02.513 UTC [msp] DeserializeIdentity -> DEBU 1dce Obtaining identity" +"2019-09-24 01:05:02.514 UTC [msp] DeserializeIdentity -> DEBU 1dcf Obtaining identity" +"2019-09-24 01:05:02.514 UTC [gossip.comm] Send -> DEBU 1dd0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.515 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.515 UTC [gossip.comm] sendToEndpoint -> DEBU 1dd2 Exiting" +"2019-09-24 01:05:02.515 UTC [gossip.discovery] sendMemResponse -> DEBU 1dd3 Exiting, replying with alive: > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +"2019-09-24 01:05:02.809 UTC [gossip.comm] func1 -> DEBU 1dd4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.810 UTC [gossip.gossip] handleMessage -> DEBU 1dd5 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.810 UTC [gossip.pull] HandleMessage -> DEBU 1dd6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.810 UTC [msp] DeserializeIdentity -> DEBU 1dd7 Obtaining identity" +"2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dd8 Obtaining identity" +"2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dd9 Obtaining identity" +"2019-09-24 01:05:02.811 UTC [msp] DeserializeIdentity -> DEBU 1dda Obtaining identity" +"2019-09-24 01:05:02.812 UTC [msp] DeserializeIdentity -> DEBU 1ddb Obtaining identity" +"2019-09-24 01:05:02.812 UTC [msp] DeserializeIdentity -> DEBU 1ddc Obtaining identity" +"2019-09-24 01:05:02.812 UTC [gossip.pull] SendDigest -> DEBU 1ddd Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:02.812 UTC [gossip.gossip] handleMessage -> DEBU 1dde Exiting" +"2019-09-24 01:05:02.817 UTC [gossip.comm] func1 -> DEBU 1ddf Got message: GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.818 UTC [gossip.gossip] handleMessage -> DEBU 1de0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.819 UTC [gossip.gossip] handleMessage -> DEBU 1de1 Exiting" +"2019-09-24 01:05:02.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1de2 Got message: GossipMessage: tag:EMPTY mem_req:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1de3 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:02.819 UTC [msp] DeserializeIdentity -> DEBU 1de4 Obtaining identity" +"2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1de5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1de7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1de8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1de9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:02.820 UTC [policies] Evaluate -> DEBU 1dea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:02.821 UTC [cauthdsl] func1 -> DEBU 1deb 0xc0031917d0 gate 1569287102821237700 evaluation starts" +"2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1dec 0xc0031917d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1ded 0xc0031917d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1dee 0xc0031917d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:02.821 UTC [cauthdsl] func2 -> DEBU 1def 0xc0031917d0 principal evaluation fails" +"2019-09-24 01:05:02.822 UTC [cauthdsl] func1 -> DEBU 1df0 0xc0031917d0 gate 1569287102821237700 evaluation fails" +"2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.822 UTC [policies] Evaluate -> DEBU 1df3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:02.822 UTC [cauthdsl] func1 -> DEBU 1df4 0xc0034b6010 gate 1569287102822753900 evaluation starts" +"2019-09-24 01:05:02.822 UTC [cauthdsl] func2 -> DEBU 1df5 0xc0034b6010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1df6 0xc0034b6010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1df7 0xc0034b6010 principal matched by identity 0" +"2019-09-24 01:05:02.823 UTC [msp.identity] Verify -> DEBU 1df8 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +"2019-09-24 01:05:02.823 UTC [msp.identity] Verify -> DEBU 1df9 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +"2019-09-24 01:05:02.823 UTC [cauthdsl] func2 -> DEBU 1dfa 0xc0034b6010 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:02.823 UTC [cauthdsl] func1 -> DEBU 1dfb 0xc0034b6010 gate 1569287102822753900 evaluation succeeds" +"2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dfe Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:02.824 UTC [policies] Evaluate -> DEBU 1dff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:02.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e00 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e01 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e02 updating membership: timestamp: " +"2019-09-24 01:05:02.825 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e03 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:02.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e04 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:02.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e05 Exiting" +"2019-09-24 01:05:02.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e06 Exiting" +"2019-09-24 01:05:02.826 UTC [gossip.discovery] sendMemResponse -> DEBU 1e07 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e08 Obtaining identity" +"2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e09 Obtaining identity" +"2019-09-24 01:05:02.827 UTC [msp] DeserializeIdentity -> DEBU 1e0a Obtaining identity" +"2019-09-24 01:05:02.828 UTC [gossip.comm] Send -> DEBU 1e0b Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.828 UTC [gossip.discovery] sendMemResponse -> DEBU 1e0c Exiting, replying with alive: alive:\265\233\226\257j\266\007FX&\301\352w\244\341\204" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +"2019-09-24 01:05:02.828 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.829 UTC [gossip.comm] sendToEndpoint -> DEBU 1e0e Exiting" +"2019-09-24 01:05:02.826 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e0f Exiting" +"2019-09-24 01:05:02.855 UTC [gossip.pull] Hello -> DEBU 1e10 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:02.856 UTC [gossip.comm] Send -> DEBU 1e11 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.857 UTC [gossip.comm] sendToEndpoint -> DEBU 1e12 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.857 UTC [gossip.comm] sendToEndpoint -> DEBU 1e14 Exiting" +"2019-09-24 01:05:02.857 UTC [gossip.pull] Hello -> DEBU 1e13 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:02.858 UTC [gossip.comm] Send -> DEBU 1e15 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.859 UTC [gossip.comm] func1 -> DEBU 1e16 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.859 UTC [gossip.comm] sendToEndpoint -> DEBU 1e18 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.859 UTC [gossip.comm] sendToEndpoint -> DEBU 1e19 Exiting" +"2019-09-24 01:05:02.860 UTC [gossip.gossip] handleMessage -> DEBU 1e1a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.860 UTC [gossip.pull] HandleMessage -> DEBU 1e1b GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.859 UTC [gossip.pull] Hello -> DEBU 1e17 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:02.861 UTC [gossip.comm] Send -> DEBU 1e1c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.861 UTC [gossip.gossip] handleMessage -> DEBU 1e1d Exiting" +"2019-09-24 01:05:02.861 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.861 UTC [gossip.comm] sendToEndpoint -> DEBU 1e1f Exiting" +"2019-09-24 01:05:02.862 UTC [gossip.comm] func1 -> DEBU 1e20 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.862 UTC [gossip.gossip] handleMessage -> DEBU 1e21 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.862 UTC [gossip.pull] HandleMessage -> DEBU 1e22 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.862 UTC [gossip.gossip] handleMessage -> DEBU 1e23 Exiting" +"2019-09-24 01:05:02.863 UTC [gossip.comm] func1 -> DEBU 1e24 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.863 UTC [gossip.gossip] handleMessage -> DEBU 1e25 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.863 UTC [gossip.pull] HandleMessage -> DEBU 1e26 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.863 UTC [gossip.gossip] handleMessage -> DEBU 1e27 Exiting" +"2019-09-24 01:05:02.876 UTC [gossip.comm] func1 -> DEBU 1e28 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.876 UTC [gossip.gossip] handleMessage -> DEBU 1e29 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.877 UTC [gossip.pull] HandleMessage -> DEBU 1e2a GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2b Obtaining identity" +"2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2c Obtaining identity" +"2019-09-24 01:05:02.878 UTC [msp] DeserializeIdentity -> DEBU 1e2d Obtaining identity" +"2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e2e Obtaining identity" +"2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e2f Obtaining identity" +"2019-09-24 01:05:02.879 UTC [msp] DeserializeIdentity -> DEBU 1e30 Obtaining identity" +"2019-09-24 01:05:02.879 UTC [gossip.pull] SendDigest -> DEBU 1e31 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:02.880 UTC [gossip.gossip] handleMessage -> DEBU 1e32 Exiting" +"2019-09-24 01:05:02.882 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e33 Obtaining default signing identity" +"2019-09-24 01:05:02.882 UTC [msp.identity] Sign -> DEBU 1e34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101D " +"2019-09-24 01:05:02.882 UTC [msp.identity] Sign -> DEBU 1e35 Sign: digest: 113328036A796C8E3A7C01359F48116BE9FEFD8A5EACA8B5B65CE47554B5A397 " +"2019-09-24 01:05:02.883 UTC [msp] GetDefaultSigningIdentity -> DEBU 1e36 Obtaining default signing identity" +"2019-09-24 01:05:02.883 UTC [msp.identity] Sign -> DEBU 1e37 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:02.883 UTC [msp.identity] Sign -> DEBU 1e38 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:02.884 UTC [gossip.comm] Send -> DEBU 1e39 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.884 UTC [msp] DeserializeIdentity -> DEBU 1e3a Obtaining identity" +"2019-09-24 01:05:02.884 UTC [gossip.comm] Send -> DEBU 1e3b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.884 UTC [msp] DeserializeIdentity -> DEBU 1e3c Obtaining identity" +"2019-09-24 01:05:02.885 UTC [gossip.comm] Send -> DEBU 1e3d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.885 UTC [gossip.comm] sendToEndpoint -> DEBU 1e3e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.885 UTC [gossip.comm] sendToEndpoint -> DEBU 1e3f Exiting" +"2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e40 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e41 Exiting" +"2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e42 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.886 UTC [gossip.comm] sendToEndpoint -> DEBU 1e43 Exiting" +"2019-09-24 01:05:02.888 UTC [gossip.comm] func1 -> DEBU 1e44 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.894 UTC [gossip.gossip] handleMessage -> DEBU 1e45 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.894 UTC [gossip.gossip] handleMessage -> DEBU 1e46 Exiting" +"2019-09-24 01:05:02.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e48 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:02.894 UTC [msp.identity] Verify -> DEBU 1e49 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +"2019-09-24 01:05:02.895 UTC [msp.identity] Verify -> DEBU 1e4a Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +00000040 c8 5c 19 95 96 df bb |.\.....|" +"2019-09-24 01:05:02.895 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.895 UTC [gossip.discovery] isSentByMe -> DEBU 1e4c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.895 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e4d Exiting" +"2019-09-24 01:05:02.896 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e4e Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:02.896 UTC [msp.identity] Verify -> DEBU 1e4f Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +"2019-09-24 01:05:02.896 UTC [msp.identity] Verify -> DEBU 1e50 Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1e51 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:02.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e52 Exiting" +"2019-09-24 01:05:02.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e53 Exiting" +"2019-09-24 01:05:02.897 UTC [gossip.comm] func1 -> DEBU 1e54 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.897 UTC [gossip.gossip] handleMessage -> DEBU 1e55 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.897 UTC [gossip.gossip] handleMessage -> DEBU 1e56 Exiting" +"2019-09-24 01:05:02.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.898 UTC [gossip.comm] func1 -> DEBU 1e58 Got message: GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.898 UTC [gossip.comm] func1 -> DEBU 1e5a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.898 UTC [gossip.gossip] handleMessage -> DEBU 1e5b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e59 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:02.899 UTC [msp.identity] Verify -> DEBU 1e5c Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +"2019-09-24 01:05:02.899 UTC [msp.identity] Verify -> DEBU 1e5d Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +00000040 c8 5c 19 95 96 df bb |.\.....|" +"2019-09-24 01:05:02.900 UTC [msp.identity] Verify -> DEBU 1e5e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:02.900 UTC [msp.identity] Verify -> DEBU 1e5f Verify: sig = 00000000 30 45 02 21 00 e6 85 b4 aa c5 c3 f7 7a 44 fd 27 |0E.!........zD.'| +00000010 22 d8 e9 08 20 ab 53 ac 5d 19 32 21 7c 93 75 57 |"... .S.].2!|.uW| +00000020 ac 88 12 d8 dd 02 20 14 a1 39 da 93 d9 57 17 7d |...... ..9...W.}| +00000030 4d d2 28 14 43 9d c4 dc f5 1e d3 a6 f2 f9 1c f1 |M.(.C...........| +00000040 1e 05 9a 23 8e f6 48 |...#..H|" +"2019-09-24 01:05:02.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e60 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:02.901 UTC [gossip.discovery] isSentByMe -> DEBU 1e61 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:02.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e62 Exiting" +"2019-09-24 01:05:02.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e63 Exiting" +"2019-09-24 01:05:02.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e64 Got message: GossipMessage: tag:EMPTY mem_req:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e65 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:02.902 UTC [msp] DeserializeIdentity -> DEBU 1e66 Obtaining identity" +"2019-09-24 01:05:02.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e67 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:02.903 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e68 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.903 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e69 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.908 UTC [policies] Evaluate -> DEBU 1e6a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:02.909 UTC [policies] Evaluate -> DEBU 1e6b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:02.909 UTC [policies] Evaluate -> DEBU 1e6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:02.909 UTC [gossip.gossip] handleMessage -> DEBU 1e6d Exiting" +"2019-09-24 01:05:02.910 UTC [gossip.gossip] handleMessage -> DEBU 1e6f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.909 UTC [cauthdsl] func1 -> DEBU 1e6e 0xc00249fca0 gate 1569287102909533500 evaluation starts" +"2019-09-24 01:05:02.910 UTC [cauthdsl] func2 -> DEBU 1e70 0xc00249fca0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.910 UTC [cauthdsl] func2 -> DEBU 1e71 0xc00249fca0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e72 0xc00249fca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e73 0xc00249fca0 principal evaluation fails" +"2019-09-24 01:05:02.911 UTC [cauthdsl] func1 -> DEBU 1e74 0xc00249fca0 gate 1569287102909533500 evaluation fails" +"2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e75 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e76 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.911 UTC [policies] Evaluate -> DEBU 1e77 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:02.911 UTC [cauthdsl] func1 -> DEBU 1e78 0xc002487040 gate 1569287102911528200 evaluation starts" +"2019-09-24 01:05:02.911 UTC [cauthdsl] func2 -> DEBU 1e79 0xc002487040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.912 UTC [cauthdsl] func2 -> DEBU 1e7a 0xc002487040 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.912 UTC [cauthdsl] func2 -> DEBU 1e7b 0xc002487040 principal matched by identity 0" +"2019-09-24 01:05:02.912 UTC [msp.identity] Verify -> DEBU 1e7c Verify: digest = 00000000 0f 7e 9c c8 61 82 b2 2d 31 6f 26 7f 38 5f a8 ed |.~..a..-1o&.8_..| +00000010 3c 1b 95 d0 39 ca 65 79 ab f3 95 5d a4 e9 17 24 |<...9.ey...]...$|" +"2019-09-24 01:05:02.912 UTC [msp.identity] Verify -> DEBU 1e7d Verify: sig = 00000000 30 44 02 20 0f 0f 11 87 58 a5 c4 25 ed 95 d8 d4 |0D. ....X..%....| +00000010 48 e4 45 c7 80 4a 21 7d 3d 3d d6 e0 4a 44 39 ce |H.E..J!}==..JD9.| +00000020 cc 10 a5 5c 02 20 4a 74 e9 4c 44 ba 76 21 3e bf |...\. Jt.LD.v!>.| +00000030 67 c1 42 2d 8b 62 64 d6 b5 1d b4 6e f2 07 e6 ac |g.B-.bd....n....| +00000040 a1 87 f6 1b e3 82 |......|" +"2019-09-24 01:05:02.913 UTC [cauthdsl] func2 -> DEBU 1e7e 0xc002487040 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:02.913 UTC [cauthdsl] func1 -> DEBU 1e7f 0xc002487040 gate 1569287102911528200 evaluation succeeds" +"2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e80 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e82 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:02.913 UTC [policies] Evaluate -> DEBU 1e83 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:02.913 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e84 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e85 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e86 updating membership: timestamp: " +"2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e87 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:02.914 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e88 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:02.918 UTC [gossip.discovery] learnExistingMembers -> DEBU 1e89 Exiting" +"2019-09-24 01:05:02.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e8a Exiting" +"2019-09-24 01:05:02.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e8b Exiting" +"2019-09-24 01:05:02.920 UTC [gossip.discovery] sendMemResponse -> DEBU 1e8c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:02.920 UTC [msp] DeserializeIdentity -> DEBU 1e8d Obtaining identity" +"2019-09-24 01:05:02.921 UTC [msp] DeserializeIdentity -> DEBU 1e8e Obtaining identity" +"2019-09-24 01:05:02.921 UTC [msp] DeserializeIdentity -> DEBU 1e8f Obtaining identity" +"2019-09-24 01:05:02.921 UTC [gossip.comm] Send -> DEBU 1e90 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:02.921 UTC [gossip.discovery] sendMemResponse -> DEBU 1e91 Exiting, replying with alive: alive:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +"2019-09-24 01:05:02.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1e92 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.921 UTC [gossip.comm] sendToEndpoint -> DEBU 1e93 Exiting" +"2019-09-24 01:05:02.922 UTC [gossip.gossip] handleMessage -> DEBU 1e94 Exiting" +"2019-09-24 01:05:02.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1e95 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:02.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e96 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:02.924 UTC [msp.identity] Verify -> DEBU 1e97 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +"2019-09-24 01:05:02.924 UTC [msp.identity] Verify -> DEBU 1e98 Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +00000040 c8 5c 19 95 96 df bb |.\.....|" +"2019-09-24 01:05:02.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e99 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.924 UTC [gossip.discovery] isSentByMe -> DEBU 1e9a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 1e9b Exiting" +"2019-09-24 01:05:02.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1e9c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:02.924 UTC [msp] DeserializeIdentity -> DEBU 1e9d Obtaining identity" +"2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1e9e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1e9f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.925 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ea0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:02.925 UTC [policies] Evaluate -> DEBU 1ea3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:02.925 UTC [cauthdsl] func1 -> DEBU 1ea4 0xc0027d9bb0 gate 1569287102925725400 evaluation starts" +"2019-09-24 01:05:02.925 UTC [cauthdsl] func2 -> DEBU 1ea5 0xc0027d9bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea6 0xc0027d9bb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea7 0xc0027d9bb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:02.926 UTC [cauthdsl] func2 -> DEBU 1ea8 0xc0027d9bb0 principal evaluation fails" +"2019-09-24 01:05:02.926 UTC [cauthdsl] func1 -> DEBU 1ea9 0xc0027d9bb0 gate 1569287102925725400 evaluation fails" +"2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eaa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:02.926 UTC [policies] Evaluate -> DEBU 1eac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:02.926 UTC [cauthdsl] func1 -> DEBU 1ead 0xc0029be3f0 gate 1569287102926674100 evaluation starts" +"2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eae 0xc0029be3f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eaf 0xc0029be3f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:02.927 UTC [cauthdsl] func2 -> DEBU 1eb0 0xc0029be3f0 principal matched by identity 0" +"2019-09-24 01:05:02.930 UTC [msp.identity] Verify -> DEBU 1eb1 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +"2019-09-24 01:05:02.930 UTC [msp.identity] Verify -> DEBU 1eb2 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +"2019-09-24 01:05:02.930 UTC [cauthdsl] func2 -> DEBU 1eb3 0xc0029be3f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:02.930 UTC [cauthdsl] func1 -> DEBU 1eb4 0xc0029be3f0 gate 1569287102926674100 evaluation succeeds" +"2019-09-24 01:05:02.930 UTC [policies] Evaluate -> DEBU 1eb5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.930 UTC [policies] Evaluate -> DEBU 1eb6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:02.931 UTC [policies] Evaluate -> DEBU 1eb7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:02.931 UTC [policies] Evaluate -> DEBU 1eb8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:02.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1eb9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:02.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 1eba Exiting" +"2019-09-24 01:05:02.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ebb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:02.932 UTC [msp.identity] Verify -> DEBU 1ebc Verify: digest = 00000000 bd 22 b1 b0 e1 cd be 16 10 30 f1 da e1 f5 29 52 |.".......0....)R| +00000010 11 c1 21 4e 39 33 57 c8 cc 16 44 b1 2f ef d5 db |..!N93W...D./...|" +"2019-09-24 01:05:02.932 UTC [msp.identity] Verify -> DEBU 1ebd Verify: sig = 00000000 30 44 02 20 0e 22 3c 52 83 04 40 4d 55 f1 85 ba |0D. ." DEBU 1ebe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:02.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ebf Exiting" +"2019-09-24 01:05:02.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec0 Exiting" +"2019-09-24 01:05:03.487 UTC [gossip.comm] func1 -> DEBU 1ec1 Got message: GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.487 UTC [gossip.gossip] handleMessage -> DEBU 1ec2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.488 UTC [gossip.gossip] handleMessage -> DEBU 1ec3 Exiting" +"2019-09-24 01:05:03.488 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ec4 Got message: GossipMessage: nonce:9012046223815031437 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.488 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1ec5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:03.488 UTC [msp] DeserializeIdentity -> DEBU 1ec6 Obtaining identity" +"2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1ec7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ec8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:03.489 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1ec9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1eca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1ecb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:03.489 UTC [policies] Evaluate -> DEBU 1ecc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:03.490 UTC [cauthdsl] func1 -> DEBU 1ecd 0xc0027dd6a0 gate 1569287103490191000 evaluation starts" +"2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ece 0xc0027dd6a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ecf 0xc0027dd6a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:03.490 UTC [cauthdsl] func2 -> DEBU 1ed0 0xc0027dd6a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:03.491 UTC [cauthdsl] func2 -> DEBU 1ed1 0xc0027dd6a0 principal evaluation fails" +"2019-09-24 01:05:03.491 UTC [cauthdsl] func1 -> DEBU 1ed2 0xc0027dd6a0 gate 1569287103490191000 evaluation fails" +"2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:03.491 UTC [policies] Evaluate -> DEBU 1ed5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:03.491 UTC [cauthdsl] func1 -> DEBU 1ed6 0xc0027ddee0 gate 1569287103491915600 evaluation starts" +"2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed7 0xc0027ddee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed8 0xc0027ddee0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:03.492 UTC [cauthdsl] func2 -> DEBU 1ed9 0xc0027ddee0 principal matched by identity 0" +"2019-09-24 01:05:03.492 UTC [msp.identity] Verify -> DEBU 1eda Verify: digest = 00000000 3f 53 d2 95 c9 07 69 47 ae 84 7a 52 0e b4 2d ee |?S....iG..zR..-.| +00000010 cf 63 96 b8 e3 ce c9 a6 06 77 1f 68 53 78 bf a0 |.c.......w.hSx..|" +"2019-09-24 01:05:03.492 UTC [msp.identity] Verify -> DEBU 1edb Verify: sig = 00000000 30 45 02 21 00 9e a3 7b 46 de 9d a7 47 41 83 73 |0E.!...{F...GA.s| +00000010 e9 68 b9 5c 51 2e 3d 34 18 55 4e 6b da ae 59 7d |.h.\Q.=4.UNk..Y}| +00000020 b4 be 27 8e e2 02 20 6e 62 9a 71 5e 32 ac 84 93 |..'... nb.q^2...| +00000030 d1 6c 2e 3a cd 90 27 9f e0 e3 99 d2 85 2a 9a 6d |.l.:..'......*.m| +00000040 29 a0 5d 13 c2 79 48 |).]..yH|" +"2019-09-24 01:05:03.493 UTC [cauthdsl] func2 -> DEBU 1edc 0xc0027ddee0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:03.493 UTC [cauthdsl] func1 -> DEBU 1edd 0xc0027ddee0 gate 1569287103491915600 evaluation succeeds" +"2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ede Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1edf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ee0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:03.493 UTC [policies] Evaluate -> DEBU 1ee1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:03.494 UTC [gossip.discovery] sendMemResponse -> DEBU 1ee2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee3 Obtaining identity" +"2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee4 Obtaining identity" +"2019-09-24 01:05:03.494 UTC [msp] DeserializeIdentity -> DEBU 1ee5 Obtaining identity" +"2019-09-24 01:05:03.495 UTC [gossip.comm] Send -> DEBU 1ee6 Entering, sending GossipMessage: Channel: , nonce: 9012046223815031437, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:03.495 UTC [gossip.discovery] sendMemResponse -> DEBU 1ee7 Exiting, replying with alive:\277g\301B-\213bd\326\265\035\264n\362\007\346\254\241\207\366\033\343\202" > alive:9\313\253\261E\363\354\260\267}\002 a\002\211\004\346:O\232d \346*:\373\026\341b\360\232\265\271\266x\331.\245\245fV1\204n" > alive: alive:\002 \\*\355#\336\232\245\223XX<\207W\216*\364D\024\240\010K\211r\234\205\276$\343k\330w\236" > " +"2019-09-24 01:05:03.495 UTC [gossip.comm] sendToEndpoint -> DEBU 1ee8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9012046223815031437, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.495 UTC [gossip.comm] sendToEndpoint -> DEBU 1ee9 Exiting" +"2019-09-24 01:05:03.494 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eea Exiting" +"2019-09-24 01:05:03.552 UTC [gossip.comm] func1 -> DEBU 1eeb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.552 UTC [gossip.gossip] handleMessage -> DEBU 1eec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.552 UTC [gossip.gossip] handleMessage -> DEBU 1eed Exiting" +"2019-09-24 01:05:03.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1eee Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.553 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1eef Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:03.553 UTC [msp.identity] Verify -> DEBU 1ef0 Verify: digest = 00000000 a3 69 cc 15 b6 d1 81 fa db 34 e6 c1 58 65 63 70 |.i.......4..Xecp| +00000010 68 dc 8d 1c cd 05 0a 2e e6 5d 1c 04 b4 42 4c 68 |h........]...BLh|" +"2019-09-24 01:05:03.553 UTC [msp.identity] Verify -> DEBU 1ef1 Verify: sig = 00000000 30 45 02 21 00 c8 a1 c1 85 4a fb 07 5d 53 50 c7 |0E.!.....J..]SP.| +00000010 7f 71 7f 92 de 7e a8 47 fa e7 06 f1 4b 19 02 48 |.q...~.G....K..H| +00000020 bb 6d ec 7f 84 02 20 5a 64 39 24 0b c2 45 50 a9 |.m.... Zd9$..EP.| +00000030 00 24 e2 27 c7 4b ee b0 49 8d 8f a6 e4 0b 0a 30 |.$.'.K..I......0| +00000040 f0 bc 05 3c 87 38 a7 |...<.8.|" +"2019-09-24 01:05:03.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:03.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef4 updating membership: timestamp: " +"2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:03.555 UTC [gossip.discovery] learnExistingMembers -> DEBU 1ef7 Exiting" +"2019-09-24 01:05:03.555 UTC [gossip.discovery] handleAliveMessage -> DEBU 1ef8 Exiting" +"2019-09-24 01:05:03.555 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1ef9 Exiting" +"2019-09-24 01:05:03.560 UTC [gossip.comm] func1 -> DEBU 1efa Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.560 UTC [gossip.gossip] handleMessage -> DEBU 1efb Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.560 UTC [gossip.gossip] handleMessage -> DEBU 1efc Exiting" +"2019-09-24 01:05:03.560 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.561 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1efe Exiting" +"2019-09-24 01:05:03.561 UTC [gossip.comm] func1 -> DEBU 1eff Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.562 UTC [gossip.gossip] handleMessage -> DEBU 1f00 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.562 UTC [gossip.gossip] handleMessage -> DEBU 1f01 Exiting" +"2019-09-24 01:05:03.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f03 Exiting" +"2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f04 Obtaining identity" +"2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f05 Obtaining identity" +"2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f06 Obtaining identity" +"2019-09-24 01:05:03.563 UTC [gossip.comm] Send -> DEBU 1f07 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:03.563 UTC [msp] DeserializeIdentity -> DEBU 1f08 Obtaining identity" +"2019-09-24 01:05:03.563 UTC [gossip.comm] sendToEndpoint -> DEBU 1f09 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.564 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0b Exiting" +"2019-09-24 01:05:03.564 UTC [gossip.comm] Send -> DEBU 1f0a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:03.564 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.565 UTC [gossip.comm] sendToEndpoint -> DEBU 1f0d Exiting" +"2019-09-24 01:05:03.635 UTC [msp] DeserializeIdentity -> DEBU 1f0e Obtaining identity" +"2019-09-24 01:05:03.636 UTC [gossip.comm] Send -> DEBU 1f0f Entering, sending GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:03.636 UTC [gossip.comm] sendToEndpoint -> DEBU 1f10 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:15712217619669910565 tag:EMPTY mem_req:B" > > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.636 UTC [gossip.comm] sendToEndpoint -> DEBU 1f11 Exiting" +"2019-09-24 01:05:03.638 UTC [gossip.comm] func1 -> DEBU 1f12 Got message: GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.638 UTC [gossip.gossip] handleMessage -> DEBU 1f13 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.639 UTC [gossip.gossip] handleMessage -> DEBU 1f14 Exiting" +"2019-09-24 01:05:03.639 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f15 Got message: GossipMessage: Channel: , nonce: 15712217619669910565, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 660 bytes, Signature: 0 bytes" +"2019-09-24 01:05:03.639 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f16 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:03.640 UTC [msp.identity] Verify -> DEBU 1f17 Verify: digest = 00000000 11 33 28 03 6a 79 6c 8e 3a 7c 01 35 9f 48 11 6b |.3(.jyl.:|.5.H.k| +00000010 e9 fe fd 8a 5e ac a8 b5 b6 5c e4 75 54 b5 a3 97 |....^....\.uT...|" +"2019-09-24 01:05:03.640 UTC [msp.identity] Verify -> DEBU 1f18 Verify: sig = 00000000 30 45 02 21 00 b2 35 e7 ae 21 f5 54 54 18 31 c1 |0E.!..5..!.TT.1.| +00000010 05 ee 59 17 c0 38 11 b6 bd 6c 09 e0 1d ab 2c 16 |..Y..8...l....,.| +00000020 4f d5 1a 9c 49 02 20 05 8d 32 c8 e0 24 60 c5 70 |O...I. ..2..$`.p| +00000030 4a 66 27 6a 64 ad df 2a 00 8e 25 c5 72 87 1a 61 |Jf'jd..*..%.r..a| +00000040 c8 5c 19 95 96 df bb |.\.....|" +"2019-09-24 01:05:03.640 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f19 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.640 UTC [gossip.discovery] isSentByMe -> DEBU 1f1a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.641 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f1b Exiting" +"2019-09-24 01:05:03.641 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f1c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:03.641 UTC [msp] DeserializeIdentity -> DEBU 1f1d Obtaining identity" +"2019-09-24 01:05:03.641 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f1e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:03.641 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f1f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:03.642 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f20 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f21 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f22 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:03.642 UTC [policies] Evaluate -> DEBU 1f23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f24 0xc00033bfd0 gate 1569287103643003200 evaluation starts" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f25 0xc00033bfd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f26 0xc00033bfd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f27 0xc00033bfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func2 -> DEBU 1f28 0xc00033bfd0 principal evaluation fails" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f29 0xc00033bfd0 gate 1569287103643003200 evaluation fails" +"2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:03.643 UTC [policies] Evaluate -> DEBU 1f2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:03.643 UTC [cauthdsl] func1 -> DEBU 1f2d 0xc0027ae810 gate 1569287103643868100 evaluation starts" +"2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f2e 0xc0027ae810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f2f 0xc0027ae810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:03.644 UTC [cauthdsl] func2 -> DEBU 1f30 0xc0027ae810 principal matched by identity 0" +"2019-09-24 01:05:03.644 UTC [msp.identity] Verify -> DEBU 1f31 Verify: digest = 00000000 e4 41 40 bf 71 a3 8d 81 45 69 68 cf 32 e4 be e1 |.A@.q...Eih.2...| +00000010 95 39 e0 1c 8a 38 8c 0b 28 9a 14 5e 27 2f 75 a1 |.9...8..(..^'/u.|" +"2019-09-24 01:05:03.644 UTC [msp.identity] Verify -> DEBU 1f32 Verify: sig = 00000000 30 45 02 21 00 eb c4 13 e9 3b 19 33 f4 39 99 ce |0E.!.....;.3.9..| +00000010 cf 7c d2 24 6b a3 7d c0 80 38 3e 39 cb ab b1 45 |.|.$k.}..8>9...E| +00000020 f3 ec b0 b7 7d 02 20 61 02 89 04 e6 3a 4f 9a 64 |....}. a....:O.d| +00000030 20 e6 2a 3a fb 16 e1 62 f0 9a b5 b9 b6 78 d9 2e | .*:...b.....x..| +00000040 a5 a5 66 56 31 84 6e |..fV1.n|" +"2019-09-24 01:05:03.645 UTC [cauthdsl] func2 -> DEBU 1f33 0xc0027ae810 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:03.645 UTC [cauthdsl] func1 -> DEBU 1f34 0xc0027ae810 gate 1569287103643868100 evaluation succeeds" +"2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f37 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:03.645 UTC [policies] Evaluate -> DEBU 1f38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:03.645 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f39 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:03.646 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f3a Exiting" +"2019-09-24 01:05:03.646 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f3b Exiting" +"2019-09-24 01:05:04.173 UTC [gossip.comm] func1 -> DEBU 1f3c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.174 UTC [gossip.gossip] handleMessage -> DEBU 1f3e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.173 UTC [gossip.comm] func1 -> DEBU 1f3d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f3f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.175 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f40 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:04.175 UTC [msp] DeserializeIdentity -> DEBU 1f41 Obtaining identity" +"2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f44 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:04.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f45 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f46 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f47 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:04.176 UTC [policies] Evaluate -> DEBU 1f48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:04.176 UTC [cauthdsl] func1 -> DEBU 1f49 0xc0028244d0 gate 1569287104176625400 evaluation starts" +"2019-09-24 01:05:04.174 UTC [gossip.gossip] handleMessage -> DEBU 1f43 Exiting" +"2019-09-24 01:05:04.176 UTC [cauthdsl] func2 -> DEBU 1f4a 0xc0028244d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:04.177 UTC [gossip.gossip] handleMessage -> DEBU 1f4b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.177 UTC [cauthdsl] func2 -> DEBU 1f4c 0xc0028244d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:04.177 UTC [cauthdsl] func2 -> DEBU 1f4d 0xc0028244d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:04.178 UTC [cauthdsl] func2 -> DEBU 1f4e 0xc0028244d0 principal evaluation fails" +"2019-09-24 01:05:04.178 UTC [cauthdsl] func1 -> DEBU 1f4f 0xc0028244d0 gate 1569287104176625400 evaluation fails" +"2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f50 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:04.178 UTC [policies] Evaluate -> DEBU 1f52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:04.178 UTC [cauthdsl] func1 -> DEBU 1f53 0xc002824e20 gate 1569287104178943200 evaluation starts" +"2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f54 0xc002824e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f55 0xc002824e20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:04.179 UTC [cauthdsl] func2 -> DEBU 1f56 0xc002824e20 principal matched by identity 0" +"2019-09-24 01:05:04.179 UTC [msp.identity] Verify -> DEBU 1f57 Verify: digest = 00000000 03 ef 90 7e 65 c9 e7 2a 83 6a 02 30 53 c1 4d fe |...~e..*.j.0S.M.| +00000010 f8 85 9a 15 7f ed 8e c0 85 82 40 49 2a 2a 72 22 |..........@I**r"|" +"2019-09-24 01:05:04.179 UTC [msp.identity] Verify -> DEBU 1f58 Verify: sig = 00000000 30 45 02 21 00 d4 19 53 02 b5 d4 86 8f ff 8d 0c |0E.!...S........| +00000010 22 a7 8a ce 58 88 86 5d c5 a6 e7 86 07 15 0c ba |"...X..]........| +00000020 d8 f9 b5 c0 2e 02 20 01 f5 c4 26 27 32 d0 7a 88 |...... ...&'2.z.| +00000030 6b e6 1f 82 30 b1 9d f6 44 49 f3 13 f5 67 3c 46 |k...0...DI...g DEBU 1f59 0xc002824e20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:04.181 UTC [cauthdsl] func1 -> DEBU 1f5a 0xc002824e20 gate 1569287104178943200 evaluation succeeds" +"2019-09-24 01:05:04.182 UTC [policies] Evaluate -> DEBU 1f5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:04.184 UTC [policies] Evaluate -> DEBU 1f5f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:04.185 UTC [policies] Evaluate -> DEBU 1f60 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:04.182 UTC [gossip.comm] func1 -> DEBU 1f5b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.184 UTC [gossip.comm] func1 -> DEBU 1f5d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.184 UTC [gossip.comm] func1 -> DEBU 1f5e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.185 UTC [policies] Evaluate -> DEBU 1f61 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:04.185 UTC [gossip.comm] func1 -> DEBU 1f62 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.185 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f64 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f65 updating membership: timestamp: " +"2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f66 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f67 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:04.186 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f68 Exiting" +"2019-09-24 01:05:04.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f69 Exiting" +"2019-09-24 01:05:04.186 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6a Exiting" +"2019-09-24 01:05:04.187 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f6b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.187 UTC [gossip.gossip] handleMessage -> DEBU 1f6c Exiting" +"2019-09-24 01:05:04.187 UTC [gossip.gossip] handleMessage -> DEBU 1f6e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.187 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 1f6d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f6f Obtaining identity" +"2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f70 Obtaining identity" +"2019-09-24 01:05:04.190 UTC [msp] DeserializeIdentity -> DEBU 1f71 Obtaining identity" +"2019-09-24 01:05:04.191 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1f72 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:04.191 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f73 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:04.192 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1f75 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:04.192 UTC [policies] Evaluate -> DEBU 1f78 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:04.191 UTC [msp] DeserializeIdentity -> DEBU 1f74 Obtaining identity" +"2019-09-24 01:05:04.192 UTC [cauthdsl] func1 -> DEBU 1f79 0xc0036467f0 gate 1569287104192837800 evaluation starts" +"2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7a 0xc0036467f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7c 0xc0036467f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:04.193 UTC [cauthdsl] func2 -> DEBU 1f7d 0xc0036467f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:04.194 UTC [cauthdsl] func2 -> DEBU 1f7e 0xc0036467f0 principal evaluation fails" +"2019-09-24 01:05:04.194 UTC [cauthdsl] func1 -> DEBU 1f7f 0xc0036467f0 gate 1569287104192837800 evaluation fails" +"2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f80 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f81 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:04.193 UTC [msp] DeserializeIdentity -> DEBU 1f7b Obtaining identity" +"2019-09-24 01:05:04.194 UTC [policies] Evaluate -> DEBU 1f82 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:04.195 UTC [cauthdsl] func1 -> DEBU 1f84 0xc003647150 gate 1569287104195158000 evaluation starts" +"2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f85 0xc003647150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f86 0xc003647150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:04.195 UTC [cauthdsl] func2 -> DEBU 1f87 0xc003647150 principal matched by identity 0" +"2019-09-24 01:05:04.195 UTC [msp.identity] Verify -> DEBU 1f88 Verify: digest = 00000000 de 2a 78 89 8a de 28 ef 08 7e 0d df 54 40 ee ac |.*x...(..~..T@..| +00000010 5f ee ec c8 4f d4 a3 fa 2b 81 dc cb 9d 98 ea fb |_...O...+.......|" +"2019-09-24 01:05:04.196 UTC [msp.identity] Verify -> DEBU 1f89 Verify: sig = 00000000 30 44 02 20 5b 6b 8e 6d 22 0e 39 c1 90 66 af ff |0D. [k.m".9..f..| +00000010 02 0f 3a 5c c7 a5 40 68 d0 a4 f1 4b 0f 6a fc c3 |..:\..@h...K.j..| +00000020 20 ea 40 a3 02 20 2d 70 9a e6 1b d3 eb bf 02 ce | .@.. -p........| +00000030 27 10 13 6c ff 6e a0 9c d2 fa 49 e5 00 e2 36 47 |'..l.n....I...6G| +00000040 7c f1 ae 13 47 9c ||...G.|" +"2019-09-24 01:05:04.195 UTC [msp] DeserializeIdentity -> DEBU 1f83 Obtaining identity" +"2019-09-24 01:05:04.196 UTC [msp] DeserializeIdentity -> DEBU 1f8a Obtaining identity" +"2019-09-24 01:05:04.196 UTC [cauthdsl] func2 -> DEBU 1f8b 0xc003647150 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:04.196 UTC [cauthdsl] func1 -> DEBU 1f8c 0xc003647150 gate 1569287104195158000 evaluation succeeds" +"2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f8d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f90 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:04.197 UTC [policies] Evaluate -> DEBU 1f91 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:04.197 UTC [msp] DeserializeIdentity -> DEBU 1f8f Obtaining identity" +"2019-09-24 01:05:04.197 UTC [gossip.comm] Send -> DEBU 1f92 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:04.198 UTC [msp] DeserializeIdentity -> DEBU 1f93 Obtaining identity" +"2019-09-24 01:05:04.197 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f94 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.198 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f95 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:04.198 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f97 updating membership: timestamp: " +"2019-09-24 01:05:04.200 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f99 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:04.198 UTC [gossip.comm] sendToEndpoint -> DEBU 1f98 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.201 UTC [gossip.comm] sendToEndpoint -> DEBU 1f9a Exiting" +"2019-09-24 01:05:04.201 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f9b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:04.201 UTC [gossip.discovery] learnExistingMembers -> DEBU 1f9c Exiting" +"2019-09-24 01:05:04.198 UTC [gossip.comm] Send -> DEBU 1f96 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:04.201 UTC [gossip.discovery] handleAliveMessage -> DEBU 1f9d Exiting" +"2019-09-24 01:05:04.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1f9f Exiting" +"2019-09-24 01:05:04.201 UTC [gossip.comm] sendToEndpoint -> DEBU 1f9e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.202 UTC [gossip.comm] sendToEndpoint -> DEBU 1fa0 Exiting" +"2019-09-24 01:05:04.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.202 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa2 Exiting" +"2019-09-24 01:05:04.202 UTC [gossip.gossip] handleMessage -> DEBU 1fa3 Exiting" +"2019-09-24 01:05:04.203 UTC [gossip.gossip] handleMessage -> DEBU 1fa4 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.203 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fa7 Exiting" +"2019-09-24 01:05:04.203 UTC [gossip.gossip] handleMessage -> DEBU 1fa6 Exiting" +"2019-09-24 01:05:04.204 UTC [gossip.gossip] handleMessage -> DEBU 1fa8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.205 UTC [gossip.gossip] handleMessage -> DEBU 1fa9 Exiting" +"2019-09-24 01:05:04.205 UTC [gossip.gossip] handleMessage -> DEBU 1faa Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fac Exiting" +"2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.205 UTC [gossip.discovery] handleMsgFromComm -> DEBU 1fae Exiting" +"2019-09-24 01:05:04.206 UTC [gossip.gossip] handleMessage -> DEBU 1faf Exiting" +"2019-09-24 01:05:04.212 UTC [msp] DeserializeIdentity -> DEBU 1fb0 Obtaining identity" +"2019-09-24 01:05:04.212 UTC [msp] DeserializeIdentity -> DEBU 1fb1 Obtaining identity" +"2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb2 Obtaining identity" +"2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb3 Obtaining identity" +"2019-09-24 01:05:04.213 UTC [msp] DeserializeIdentity -> DEBU 1fb4 Obtaining identity" +"2019-09-24 01:05:04.215 UTC [msp] DeserializeIdentity -> DEBU 1fb5 Obtaining identity" +"2019-09-24 01:05:04.215 UTC [gossip.comm] Send -> DEBU 1fb6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:04.215 UTC [msp] DeserializeIdentity -> DEBU 1fb7 Obtaining identity" +"2019-09-24 01:05:04.216 UTC [gossip.comm] sendToEndpoint -> DEBU 1fb8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.216 UTC [msp] DeserializeIdentity -> DEBU 1fb9 Obtaining identity" +"2019-09-24 01:05:04.216 UTC [gossip.comm] sendToEndpoint -> DEBU 1fba Exiting" +"2019-09-24 01:05:04.216 UTC [gossip.comm] Send -> DEBU 1fbb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:04.217 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.217 UTC [gossip.comm] sendToEndpoint -> DEBU 1fbd Exiting" +"2019-09-24 01:05:04.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fbe Obtaining default signing identity" +"2019-09-24 01:05:04.235 UTC [msp.identity] Sign -> DEBU 1fbf Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101E " +"2019-09-24 01:05:04.235 UTC [msp.identity] Sign -> DEBU 1fc0 Sign: digest: 932748BB536E70F9A1251CCF3D9EE42BCD1E92DDD3F87014B85F92B8395D9019 " +"2019-09-24 01:05:04.236 UTC [msp] GetDefaultSigningIdentity -> DEBU 1fc1 Obtaining default signing identity" +"2019-09-24 01:05:04.236 UTC [msp.identity] Sign -> DEBU 1fc2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:04.236 UTC [msp.identity] Sign -> DEBU 1fc3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:04.236 UTC [gossip.discovery] periodicalSendAlive -> DEBU 1fc4 Sleeping 5s" +"2019-09-24 01:05:04.237 UTC [msp] DeserializeIdentity -> DEBU 1fc5 Obtaining identity" +"2019-09-24 01:05:04.237 UTC [msp] DeserializeIdentity -> DEBU 1fc6 Obtaining identity" +"2019-09-24 01:05:04.237 UTC [gossip.comm] Send -> DEBU 1fc7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:04.238 UTC [msp] DeserializeIdentity -> DEBU 1fc8 Obtaining identity" +"2019-09-24 01:05:04.238 UTC [gossip.comm] Send -> DEBU 1fc9 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:04.238 UTC [msp] DeserializeIdentity -> DEBU 1fca Obtaining identity" +"2019-09-24 01:05:04.238 UTC [gossip.comm] Send -> DEBU 1fcb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcc Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcd Exiting" +"2019-09-24 01:05:04.238 UTC [gossip.comm] sendToEndpoint -> DEBU 1fce Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fcf Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd0 Exiting" +"2019-09-24 01:05:04.239 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd1 Exiting" +"2019-09-24 01:05:05.693 UTC [msp] DeserializeIdentity -> DEBU 1fd2 Obtaining identity" +"2019-09-24 01:05:05.693 UTC [msp] DeserializeIdentity -> DEBU 1fd3 Obtaining identity" +"2019-09-24 01:05:05.693 UTC [gossip.comm] Send -> DEBU 1fd4 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:05.693 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd6 Exiting" +"2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.694 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd8 Exiting" +"2019-09-24 01:05:05.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1fd9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.695 UTC [gossip.comm] sendToEndpoint -> DEBU 1fda Exiting" +"2019-09-24 01:05:05.695 UTC [gossip.comm] func1 -> DEBU 1fdb Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.695 UTC [gossip.gossip] handleMessage -> DEBU 1fdc Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.696 UTC [gossip.comm] func1 -> DEBU 1fdd Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.696 UTC [msp.identity] Verify -> DEBU 1fde Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:05.696 UTC [gossip.comm] func1 -> DEBU 1fdf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.697 UTC [msp.identity] Verify -> DEBU 1fe0 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:05.697 UTC [msp.identity] Verify -> DEBU 1fe1 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:05.698 UTC [msp.identity] Verify -> DEBU 1fe2 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:05.698 UTC [msp] DeserializeIdentity -> DEBU 1fe3 Obtaining identity" +"2019-09-24 01:05:05.698 UTC [msp] DeserializeIdentity -> DEBU 1fe4 Obtaining identity" +"2019-09-24 01:05:05.698 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 1fe5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 1fe7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fe8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fe9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.699 UTC [policies] Evaluate -> DEBU 1fea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.699 UTC [cauthdsl] func1 -> DEBU 1feb 0xc002b5a750 gate 1569287105699528600 evaluation starts" +"2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fec 0xc002b5a750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fed 0xc002b5a750 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fee 0xc002b5a750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.699 UTC [cauthdsl] func2 -> DEBU 1fef 0xc002b5a750 principal evaluation fails" +"2019-09-24 01:05:05.700 UTC [cauthdsl] func1 -> DEBU 1ff0 0xc002b5a750 gate 1569287105699528600 evaluation fails" +"2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.700 UTC [policies] Evaluate -> DEBU 1ff3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.700 UTC [cauthdsl] func1 -> DEBU 1ff4 0xc002b5af90 gate 1569287105700697400 evaluation starts" +"2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff5 0xc002b5af90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff6 0xc002b5af90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.700 UTC [cauthdsl] func2 -> DEBU 1ff7 0xc002b5af90 principal matched by identity 0" +"2019-09-24 01:05:05.701 UTC [msp.identity] Verify -> DEBU 1ff8 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:05.701 UTC [msp.identity] Verify -> DEBU 1ff9 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:05.701 UTC [cauthdsl] func2 -> DEBU 1ffa 0xc002b5af90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.701 UTC [cauthdsl] func1 -> DEBU 1ffb 0xc002b5af90 gate 1569287105700697400 evaluation succeeds" +"2019-09-24 01:05:05.701 UTC [policies] Evaluate -> DEBU 1ffc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.702 UTC [policies] Evaluate -> DEBU 1ffd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.702 UTC [policies] Evaluate -> DEBU 1ffe Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.710 UTC [policies] Evaluate -> DEBU 1fff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.711 UTC [msp] DeserializeIdentity -> DEBU 2000 Obtaining identity" +"2019-09-24 01:05:05.711 UTC [msp] DeserializeIdentity -> DEBU 2001 Obtaining identity" +"2019-09-24 01:05:05.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2002 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2003 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2004 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2005 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2006 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.722 UTC [policies] Evaluate -> DEBU 2007 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.722 UTC [cauthdsl] func1 -> DEBU 2008 0xc003a7a760 gate 1569287105722785500 evaluation starts" +"2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 2009 0xc003a7a760 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 200a 0xc003a7a760 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.722 UTC [cauthdsl] func2 -> DEBU 200b 0xc003a7a760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 200c 0xc003a7a760 principal evaluation fails" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func1 -> DEBU 200d 0xc003a7a760 gate 1569287105722785500 evaluation fails" +"2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 200e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 200f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.723 UTC [policies] Evaluate -> DEBU 2010 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func1 -> DEBU 2011 0xc003a7afa0 gate 1569287105723551200 evaluation starts" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2012 0xc003a7afa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2013 0xc003a7afa0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.723 UTC [cauthdsl] func2 -> DEBU 2014 0xc003a7afa0 principal matched by identity 0" +"2019-09-24 01:05:05.724 UTC [msp.identity] Verify -> DEBU 2015 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:05.724 UTC [msp.identity] Verify -> DEBU 2016 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:05.725 UTC [cauthdsl] func2 -> DEBU 2017 0xc003a7afa0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.725 UTC [cauthdsl] func1 -> DEBU 2018 0xc003a7afa0 gate 1569287105723551200 evaluation succeeds" +"2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 2019 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.725 UTC [policies] Evaluate -> DEBU 201c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.726 UTC [gossip.gossip] handleMessage -> DEBU 201d Exiting" +"2019-09-24 01:05:05.726 UTC [gossip.gossip] handleMessage -> DEBU 201e Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.726 UTC [msp] DeserializeIdentity -> DEBU 201f Obtaining identity" +"2019-09-24 01:05:05.727 UTC [msp] DeserializeIdentity -> DEBU 2020 Obtaining identity" +"2019-09-24 01:05:05.727 UTC [msp] DeserializeIdentity -> DEBU 2021 Obtaining identity" +"2019-09-24 01:05:05.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2022 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2023 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2024 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2025 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2026 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.728 UTC [policies] Evaluate -> DEBU 2027 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.728 UTC [cauthdsl] func1 -> DEBU 2028 0xc003b04ab0 gate 1569287105728613600 evaluation starts" +"2019-09-24 01:05:05.728 UTC [cauthdsl] func2 -> DEBU 2029 0xc003b04ab0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.729 UTC [cauthdsl] func2 -> DEBU 202a 0xc003b04ab0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.730 UTC [cauthdsl] func2 -> DEBU 202b 0xc003b04ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.730 UTC [cauthdsl] func2 -> DEBU 202c 0xc003b04ab0 principal evaluation fails" +"2019-09-24 01:05:05.730 UTC [cauthdsl] func1 -> DEBU 202d 0xc003b04ab0 gate 1569287105728613600 evaluation fails" +"2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 202e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 202f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.730 UTC [policies] Evaluate -> DEBU 2030 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.731 UTC [cauthdsl] func1 -> DEBU 2031 0xc003b052f0 gate 1569287105731278900 evaluation starts" +"2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2032 0xc003b052f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2033 0xc003b052f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.731 UTC [cauthdsl] func2 -> DEBU 2034 0xc003b052f0 principal matched by identity 0" +"2019-09-24 01:05:05.732 UTC [msp.identity] Verify -> DEBU 2035 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:05.732 UTC [msp.identity] Verify -> DEBU 2036 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:05.732 UTC [cauthdsl] func2 -> DEBU 2037 0xc003b052f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.733 UTC [cauthdsl] func1 -> DEBU 2038 0xc003b052f0 gate 1569287105731278900 evaluation succeeds" +"2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 2039 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.733 UTC [policies] Evaluate -> DEBU 203c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.734 UTC [msp.identity] Verify -> DEBU 203d Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:05.734 UTC [msp.identity] Verify -> DEBU 203e Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:05.736 UTC [msp.identity] Verify -> DEBU 203f Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:05.736 UTC [msp.identity] Verify -> DEBU 2040 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2041 Obtaining identity" +"2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2042 Obtaining identity" +"2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2043 Obtaining identity" +"2019-09-24 01:05:05.737 UTC [msp] DeserializeIdentity -> DEBU 2044 Obtaining identity" +"2019-09-24 01:05:05.738 UTC [gossip.pull] Hello -> DEBU 2045 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:05.738 UTC [msp] DeserializeIdentity -> DEBU 2046 Obtaining identity" +"2019-09-24 01:05:05.738 UTC [msp] DeserializeIdentity -> DEBU 2047 Obtaining identity" +"2019-09-24 01:05:05.738 UTC [gossip.comm] Send -> DEBU 2048 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:05.739 UTC [gossip.comm] sendToEndpoint -> DEBU 2049 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.739 UTC [gossip.comm] sendToEndpoint -> DEBU 204a Exiting" +"2019-09-24 01:05:05.740 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 204b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.740 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 204c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.741 UTC [gossip.comm] func1 -> DEBU 204d Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.743 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 204e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.743 UTC [policies] Evaluate -> DEBU 204f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.743 UTC [policies] Evaluate -> DEBU 2050 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.744 UTC [policies] Evaluate -> DEBU 2051 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.744 UTC [cauthdsl] func1 -> DEBU 2052 0xc003c93900 gate 1569287105744239900 evaluation starts" +"2019-09-24 01:05:05.744 UTC [cauthdsl] func2 -> DEBU 2053 0xc003c93900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.744 UTC [cauthdsl] func2 -> DEBU 2054 0xc003c93900 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.745 UTC [cauthdsl] func2 -> DEBU 2055 0xc003c93900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.745 UTC [cauthdsl] func2 -> DEBU 2056 0xc003c93900 principal evaluation fails" +"2019-09-24 01:05:05.745 UTC [cauthdsl] func1 -> DEBU 2057 0xc003c93900 gate 1569287105744239900 evaluation fails" +"2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 2058 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 2059 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.746 UTC [policies] Evaluate -> DEBU 205a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.746 UTC [cauthdsl] func1 -> DEBU 205b 0xc003e1e140 gate 1569287105746463000 evaluation starts" +"2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205c 0xc003e1e140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205d 0xc003e1e140 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.746 UTC [cauthdsl] func2 -> DEBU 205e 0xc003e1e140 principal matched by identity 0" +"2019-09-24 01:05:05.747 UTC [msp.identity] Verify -> DEBU 205f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:05.747 UTC [msp.identity] Verify -> DEBU 2060 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:05.747 UTC [cauthdsl] func2 -> DEBU 2061 0xc003e1e140 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.747 UTC [cauthdsl] func1 -> DEBU 2062 0xc003e1e140 gate 1569287105746463000 evaluation succeeds" +"2019-09-24 01:05:05.747 UTC [policies] Evaluate -> DEBU 2063 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2064 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2065 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.748 UTC [policies] Evaluate -> DEBU 2066 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.748 UTC [gossip.gossip] handleMessage -> DEBU 2067 Exiting" +"2019-09-24 01:05:05.748 UTC [gossip.gossip] handleMessage -> DEBU 2068 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 2069 Obtaining identity" +"2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 206a Obtaining identity" +"2019-09-24 01:05:05.749 UTC [msp] DeserializeIdentity -> DEBU 206b Obtaining identity" +"2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 206c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 206d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.749 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 206e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 206f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 2070 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.750 UTC [policies] Evaluate -> DEBU 2071 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.750 UTC [cauthdsl] func1 -> DEBU 2072 0xc003e1fc50 gate 1569287105750463900 evaluation starts" +"2019-09-24 01:05:05.750 UTC [cauthdsl] func2 -> DEBU 2073 0xc003e1fc50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.750 UTC [cauthdsl] func2 -> DEBU 2074 0xc003e1fc50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.751 UTC [cauthdsl] func2 -> DEBU 2075 0xc003e1fc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.751 UTC [cauthdsl] func2 -> DEBU 2076 0xc003e1fc50 principal evaluation fails" +"2019-09-24 01:05:05.751 UTC [cauthdsl] func1 -> DEBU 2077 0xc003e1fc50 gate 1569287105750463900 evaluation fails" +"2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 2078 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 2079 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.751 UTC [policies] Evaluate -> DEBU 207a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func1 -> DEBU 207b 0xc0040b2490 gate 1569287105752013700 evaluation starts" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207c 0xc0040b2490 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207d 0xc0040b2490 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 207e 0xc0040b2490 principal matched by identity 0" +"2019-09-24 01:05:05.752 UTC [msp.identity] Verify -> DEBU 207f Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:05.752 UTC [msp.identity] Verify -> DEBU 2080 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func2 -> DEBU 2081 0xc0040b2490 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.752 UTC [cauthdsl] func1 -> DEBU 2082 0xc0040b2490 gate 1569287105752013700 evaluation succeeds" +"2019-09-24 01:05:05.752 UTC [policies] Evaluate -> DEBU 2083 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2084 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2085 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.753 UTC [policies] Evaluate -> DEBU 2086 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.753 UTC [msp.identity] Verify -> DEBU 2087 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:05.753 UTC [msp.identity] Verify -> DEBU 2088 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:05.754 UTC [msp] DeserializeIdentity -> DEBU 2089 Obtaining identity" +"2019-09-24 01:05:05.754 UTC [msp] DeserializeIdentity -> DEBU 208a Obtaining identity" +"2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 208b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.754 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 208d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 208e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 208f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:05.755 UTC [policies] Evaluate -> DEBU 2090 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:05.755 UTC [cauthdsl] func1 -> DEBU 2091 0xc0028e2380 gate 1569287105755255100 evaluation starts" +"2019-09-24 01:05:05.755 UTC [cauthdsl] func2 -> DEBU 2092 0xc0028e2380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.755 UTC [cauthdsl] func2 -> DEBU 2093 0xc0028e2380 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 2094 0xc0028e2380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 2095 0xc0028e2380 principal evaluation fails" +"2019-09-24 01:05:05.756 UTC [cauthdsl] func1 -> DEBU 2096 0xc0028e2380 gate 1569287105755255100 evaluation fails" +"2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2097 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2098 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:05.756 UTC [policies] Evaluate -> DEBU 2099 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:05.756 UTC [cauthdsl] func1 -> DEBU 209a 0xc0028e2bc0 gate 1569287105756702700 evaluation starts" +"2019-09-24 01:05:05.756 UTC [cauthdsl] func2 -> DEBU 209b 0xc0028e2bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 209c 0xc0028e2bc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 209d 0xc0028e2bc0 principal matched by identity 0" +"2019-09-24 01:05:05.757 UTC [msp.identity] Verify -> DEBU 209e Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:05.757 UTC [msp.identity] Verify -> DEBU 209f Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:05.757 UTC [cauthdsl] func2 -> DEBU 20a0 0xc0028e2bc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:05.757 UTC [cauthdsl] func1 -> DEBU 20a1 0xc0028e2bc0 gate 1569287105756702700 evaluation succeeds" +"2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:05.758 UTC [policies] Evaluate -> DEBU 20a5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:05.758 UTC [msp.identity] Verify -> DEBU 20a6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:05.758 UTC [msp.identity] Verify -> DEBU 20a7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20a8 Exiting" +"2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20a9 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.759 UTC [gossip.pull] HandleMessage -> DEBU 20aa GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.759 UTC [gossip.gossip] handleMessage -> DEBU 20ab Exiting" +"2019-09-24 01:05:05.873 UTC [gossip.comm] func1 -> DEBU 20ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.874 UTC [gossip.gossip] handleMessage -> DEBU 20ad Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.876 UTC [msp] DeserializeIdentity -> DEBU 20ae Obtaining identity" +"2019-09-24 01:05:05.876 UTC [msp] DeserializeIdentity -> DEBU 20af Obtaining identity" +"2019-09-24 01:05:05.876 UTC [gossip.gossip] handleMessage -> DEBU 20b0 Exiting" +"2019-09-24 01:05:05.893 UTC [gossip.comm] func1 -> DEBU 20b1 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.893 UTC [gossip.gossip] handleMessage -> DEBU 20b2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.893 UTC [gossip.pull] HandleMessage -> DEBU 20b3 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:05.893 UTC [gossip.pull] SendDigest -> DEBU 20b4 Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:05.893 UTC [gossip.gossip] handleMessage -> DEBU 20b5 Exiting" +"2019-09-24 01:05:06.080 UTC [gossip.comm] func1 -> DEBU 20b6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.081 UTC [gossip.gossip] handleMessage -> DEBU 20b7 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.081 UTC [msp] DeserializeIdentity -> DEBU 20b8 Obtaining identity" +"2019-09-24 01:05:06.081 UTC [msp] DeserializeIdentity -> DEBU 20b9 Obtaining identity" +"2019-09-24 01:05:06.082 UTC [msp] DeserializeIdentity -> DEBU 20ba Obtaining identity" +"2019-09-24 01:05:06.082 UTC [gossip.gossip] handleMessage -> DEBU 20bb Exiting" +"2019-09-24 01:05:06.286 UTC [gossip.comm] func1 -> DEBU 20bc Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.286 UTC [gossip.gossip] handleMessage -> DEBU 20bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20be Obtaining identity" +"2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20bf Obtaining identity" +"2019-09-24 01:05:06.287 UTC [msp] DeserializeIdentity -> DEBU 20c0 Obtaining identity" +"2019-09-24 01:05:06.288 UTC [gossip.gossip] handleMessage -> DEBU 20c1 Exiting" +"2019-09-24 01:05:06.514 UTC [gossip.comm] func1 -> DEBU 20c2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.514 UTC [gossip.comm] func1 -> DEBU 20c3 Got message: GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.514 UTC [gossip.gossip] handleMessage -> DEBU 20c4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.514 UTC [gossip.pull] HandleMessage -> DEBU 20c5 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.515 UTC [gossip.pull] SendDigest -> DEBU 20c6 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:06.515 UTC [gossip.gossip] handleMessage -> DEBU 20c7 Exiting" +"2019-09-24 01:05:06.515 UTC [gossip.gossip] handleMessage -> DEBU 20c8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.516 UTC [gossip.gossip] handleMessage -> DEBU 20c9 Exiting" +"2019-09-24 01:05:06.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20ca Got message: GossipMessage: tag:EMPTY mem_req:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20cb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:06.516 UTC [msp.identity] Verify -> DEBU 20cc Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +"2019-09-24 01:05:06.516 UTC [msp.identity] Verify -> DEBU 20cd Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +00000040 e8 f3 3c 28 9b 30 |..<(.0|" +"2019-09-24 01:05:06.517 UTC [msp.identity] Verify -> DEBU 20ce Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:06.517 UTC [msp.identity] Verify -> DEBU 20cf Verify: sig = 00000000 30 45 02 21 00 b2 3a a3 77 53 75 98 4e e1 49 f9 |0E.!..:.wSu.N.I.| +00000010 05 85 3f 58 04 d2 5f 07 a5 2f 03 7a 80 51 e3 2e |..?X.._../.z.Q..| +00000020 7d 9c 04 b7 22 02 20 7a 55 df f0 70 95 bd 44 35 |}...". zU..p..D5| +00000030 83 1b 57 d6 7f c8 bc a4 9d 9a 03 49 c8 10 13 c6 |..W........I....| +00000040 7f a0 96 59 6a 9c 9c |...Yj..|" +"2019-09-24 01:05:06.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 20d0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d2 updating membership: timestamp: " +"2019-09-24 01:05:06.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d3 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:06.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:06.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 20d5 Exiting" +"2019-09-24 01:05:06.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 20d6 Exiting" +"2019-09-24 01:05:06.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20d7 Exiting" +"2019-09-24 01:05:06.519 UTC [gossip.discovery] sendMemResponse -> DEBU 20d8 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:06.520 UTC [msp] DeserializeIdentity -> DEBU 20d9 Obtaining identity" +"2019-09-24 01:05:06.520 UTC [msp] DeserializeIdentity -> DEBU 20da Obtaining identity" +"2019-09-24 01:05:06.520 UTC [gossip.comm] Send -> DEBU 20db Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.521 UTC [gossip.discovery] sendMemResponse -> DEBU 20dc Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" secret_envelope: > alive: " +"2019-09-24 01:05:06.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20dd Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.521 UTC [gossip.comm] sendToEndpoint -> DEBU 20de Exiting" +"2019-09-24 01:05:06.742 UTC [gossip.election] waitForInterrupt -> DEBU 20df d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:06.742 UTC [gossip.election] IsLeader -> DEBU 20e0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:06.743 UTC [msp] GetDefaultSigningIdentity -> DEBU 20e1 Obtaining default signing identity" +"2019-09-24 01:05:06.743 UTC [msp.identity] Sign -> DEBU 20e2 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510091801 " +"2019-09-24 01:05:06.743 UTC [msp.identity] Sign -> DEBU 20e3 Sign: digest: FB93C52C991691034EF98B283C8BA564C8485B630705CFF61B2580E12B332F35 " +"2019-09-24 01:05:06.744 UTC [gossip.election] waitForInterrupt -> DEBU 20e4 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:06.749 UTC [msp] DeserializeIdentity -> DEBU 20e5 Obtaining identity" +"2019-09-24 01:05:06.749 UTC [msp] DeserializeIdentity -> DEBU 20e6 Obtaining identity" +"2019-09-24 01:05:06.750 UTC [msp] DeserializeIdentity -> DEBU 20e7 Obtaining identity" +"2019-09-24 01:05:06.750 UTC [msp] DeserializeIdentity -> DEBU 20e8 Obtaining identity" +"2019-09-24 01:05:06.751 UTC [gossip.comm] Send -> DEBU 20e9 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:06.751 UTC [msp] DeserializeIdentity -> DEBU 20ea Obtaining identity" +"2019-09-24 01:05:06.751 UTC [gossip.comm] sendToEndpoint -> DEBU 20eb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:06.751 UTC [gossip.comm] sendToEndpoint -> DEBU 20ec Exiting" +"2019-09-24 01:05:06.751 UTC [msp] DeserializeIdentity -> DEBU 20ed Obtaining identity" +"2019-09-24 01:05:06.809 UTC [gossip.comm] func1 -> DEBU 20ee Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.811 UTC [gossip.gossip] handleMessage -> DEBU 20ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.811 UTC [gossip.pull] HandleMessage -> DEBU 20f0 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f1 Obtaining identity" +"2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f2 Obtaining identity" +"2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f3 Obtaining identity" +"2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f4 Obtaining identity" +"2019-09-24 01:05:06.811 UTC [msp] DeserializeIdentity -> DEBU 20f5 Obtaining identity" +"2019-09-24 01:05:06.812 UTC [msp] DeserializeIdentity -> DEBU 20f6 Obtaining identity" +"2019-09-24 01:05:06.812 UTC [gossip.pull] SendDigest -> DEBU 20f7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:06.812 UTC [gossip.gossip] handleMessage -> DEBU 20f8 Exiting" +"2019-09-24 01:05:06.819 UTC [gossip.comm] func1 -> DEBU 20f9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.819 UTC [gossip.gossip] handleMessage -> DEBU 20fa Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.819 UTC [gossip.gossip] handleMessage -> DEBU 20fb Exiting" +"2019-09-24 01:05:06.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 20fc Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.820 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 20fd Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:06.820 UTC [msp] DeserializeIdentity -> DEBU 20fe Obtaining identity" +"2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 20ff Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2100 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.820 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2101 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2102 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2103 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:06.820 UTC [policies] Evaluate -> DEBU 2104 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func1 -> DEBU 2105 0xc002b12810 gate 1569287106821059900 evaluation starts" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2106 0xc002b12810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2107 0xc002b12810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2108 0xc002b12810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func2 -> DEBU 2109 0xc002b12810 principal evaluation fails" +"2019-09-24 01:05:06.821 UTC [cauthdsl] func1 -> DEBU 210a 0xc002b12810 gate 1569287106821059900 evaluation fails" +"2019-09-24 01:05:06.821 UTC [policies] Evaluate -> DEBU 210b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.821 UTC [policies] Evaluate -> DEBU 210c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.822 UTC [policies] Evaluate -> DEBU 210d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func1 -> DEBU 210e 0xc002b13050 gate 1569287106822077400 evaluation starts" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 210f 0xc002b13050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2110 0xc002b13050 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2111 0xc002b13050 principal matched by identity 0" +"2019-09-24 01:05:06.822 UTC [msp.identity] Verify -> DEBU 2112 Verify: digest = 00000000 b6 9e 41 b7 51 1a 09 09 d6 63 42 d0 4c e8 a2 11 |..A.Q....cB.L...| +00000010 18 a6 b1 5e 46 bb d2 12 39 0c 58 44 a1 e6 fa e0 |...^F...9.XD....|" +"2019-09-24 01:05:06.822 UTC [msp.identity] Verify -> DEBU 2113 Verify: sig = 00000000 30 44 02 20 5f a3 f8 7f 4e 98 1f fd e7 a4 04 fa |0D. _...N.......| +00000010 39 59 ab ce ed 40 06 8a 8e 02 2d 62 ff e3 08 70 |9Y...@....-b...p| +00000020 00 41 6f aa 02 20 73 1e ba ff ef 40 5c 32 27 36 |.Ao.. s....@\2'6| +00000030 1f 5c 5d b7 94 76 6b 68 e1 16 10 9d 26 af 7b b7 |.\]..vkh....&.{.| +00000040 56 f7 e5 f4 e3 8e |V.....|" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func2 -> DEBU 2114 0xc002b13050 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:06.822 UTC [cauthdsl] func1 -> DEBU 2115 0xc002b13050 gate 1569287106822077400 evaluation succeeds" +"2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2116 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2117 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2118 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:06.823 UTC [policies] Evaluate -> DEBU 2119 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:06.823 UTC [gossip.discovery] handleAliveMessage -> DEBU 211a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211c updating membership: timestamp: " +"2019-09-24 01:05:06.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 211d Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:06.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 211e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:06.824 UTC [gossip.discovery] learnExistingMembers -> DEBU 211f Exiting" +"2019-09-24 01:05:06.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 2120 Exiting" +"2019-09-24 01:05:06.824 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2121 Exiting" +"2019-09-24 01:05:06.824 UTC [gossip.discovery] sendMemResponse -> DEBU 2122 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2123 Obtaining identity" +"2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2124 Obtaining identity" +"2019-09-24 01:05:06.824 UTC [msp] DeserializeIdentity -> DEBU 2125 Obtaining identity" +"2019-09-24 01:05:06.825 UTC [gossip.comm] Send -> DEBU 2126 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.825 UTC [gossip.discovery] sendMemResponse -> DEBU 2127 Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" > alive: alive: alive: " +"2019-09-24 01:05:06.825 UTC [gossip.comm] sendToEndpoint -> DEBU 2128 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.825 UTC [gossip.comm] sendToEndpoint -> DEBU 2129 Exiting" +"2019-09-24 01:05:06.862 UTC [gossip.pull] Hello -> DEBU 212a Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:06.863 UTC [gossip.comm] Send -> DEBU 212b Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.864 UTC [gossip.pull] Hello -> DEBU 212c Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:06.865 UTC [gossip.comm] Send -> DEBU 212d Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.865 UTC [gossip.pull] Hello -> DEBU 212e Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:06.865 UTC [gossip.comm] Send -> DEBU 212f Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2130 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2131 Exiting" +"2019-09-24 01:05:06.866 UTC [gossip.comm] sendToEndpoint -> DEBU 2132 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.867 UTC [gossip.comm] sendToEndpoint -> DEBU 2133 Exiting" +"2019-09-24 01:05:06.868 UTC [gossip.comm] sendToEndpoint -> DEBU 2134 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.868 UTC [gossip.comm] sendToEndpoint -> DEBU 2135 Exiting" +"2019-09-24 01:05:06.871 UTC [gossip.comm] func1 -> DEBU 2136 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.871 UTC [gossip.gossip] handleMessage -> DEBU 2137 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.871 UTC [gossip.pull] HandleMessage -> DEBU 2138 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.872 UTC [gossip.gossip] handleMessage -> DEBU 2139 Exiting" +"2019-09-24 01:05:06.872 UTC [gossip.comm] func1 -> DEBU 213a Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.872 UTC [gossip.gossip] handleMessage -> DEBU 213b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.873 UTC [gossip.pull] HandleMessage -> DEBU 213c GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.873 UTC [gossip.gossip] handleMessage -> DEBU 213d Exiting" +"2019-09-24 01:05:06.874 UTC [gossip.comm] func1 -> DEBU 213e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.874 UTC [gossip.gossip] handleMessage -> DEBU 213f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.875 UTC [gossip.pull] HandleMessage -> DEBU 2140 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.875 UTC [gossip.gossip] handleMessage -> DEBU 2141 Exiting" +"2019-09-24 01:05:06.877 UTC [gossip.comm] func1 -> DEBU 2142 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.877 UTC [gossip.gossip] handleMessage -> DEBU 2143 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.877 UTC [gossip.pull] HandleMessage -> DEBU 2144 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2145 Obtaining identity" +"2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2146 Obtaining identity" +"2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2147 Obtaining identity" +"2019-09-24 01:05:06.878 UTC [msp] DeserializeIdentity -> DEBU 2148 Obtaining identity" +"2019-09-24 01:05:06.879 UTC [msp] DeserializeIdentity -> DEBU 2149 Obtaining identity" +"2019-09-24 01:05:06.880 UTC [msp] DeserializeIdentity -> DEBU 214a Obtaining identity" +"2019-09-24 01:05:06.880 UTC [gossip.pull] SendDigest -> DEBU 214b Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:06.880 UTC [gossip.gossip] handleMessage -> DEBU 214c Exiting" +"2019-09-24 01:05:06.886 UTC [msp] GetDefaultSigningIdentity -> DEBU 214d Obtaining default signing identity" +"2019-09-24 01:05:06.886 UTC [msp.identity] Sign -> DEBU 214e Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315101F " +"2019-09-24 01:05:06.886 UTC [msp.identity] Sign -> DEBU 214f Sign: digest: 42943EFC85F043B7C617A076DD1525B0B2737F477AD82F6A349D6DE1BBD66AC7 " +"2019-09-24 01:05:06.887 UTC [msp] GetDefaultSigningIdentity -> DEBU 2150 Obtaining default signing identity" +"2019-09-24 01:05:06.887 UTC [msp.identity] Sign -> DEBU 2151 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:06.887 UTC [msp.identity] Sign -> DEBU 2152 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:06.887 UTC [msp] DeserializeIdentity -> DEBU 2153 Obtaining identity" +"2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2154 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.887 UTC [msp] DeserializeIdentity -> DEBU 2155 Obtaining identity" +"2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2156 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2157 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2158 Exiting" +"2019-09-24 01:05:06.887 UTC [gossip.comm] Send -> DEBU 2159 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.887 UTC [gossip.comm] sendToEndpoint -> DEBU 215a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215b Exiting" +"2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.888 UTC [gossip.comm] sendToEndpoint -> DEBU 215d Exiting" +"2019-09-24 01:05:06.896 UTC [gossip.comm] func1 -> DEBU 215e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.896 UTC [gossip.gossip] handleMessage -> DEBU 215f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.896 UTC [gossip.gossip] handleMessage -> DEBU 2160 Exiting" +"2019-09-24 01:05:06.896 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2161 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2162 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2163 Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +"2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2164 Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +"2019-09-24 01:05:06.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2165 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:06.897 UTC [gossip.discovery] isSentByMe -> DEBU 2166 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:06.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2167 Exiting" +"2019-09-24 01:05:06.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2168 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 2169 Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +"2019-09-24 01:05:06.897 UTC [msp.identity] Verify -> DEBU 216a Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +00000040 e8 f3 3c 28 9b 30 |..<(.0|" +"2019-09-24 01:05:06.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 216b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 216c Exiting" +"2019-09-24 01:05:06.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 216d Exiting" +"2019-09-24 01:05:06.898 UTC [gossip.comm] func1 -> DEBU 216e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.comm] func1 -> DEBU 216f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2170 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2171 Exiting" +"2019-09-24 01:05:06.898 UTC [gossip.gossip] handleMessage -> DEBU 2172 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2173 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2174 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:06.898 UTC [msp.identity] Verify -> DEBU 2175 Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +"2019-09-24 01:05:06.898 UTC [msp.identity] Verify -> DEBU 2176 Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +"2019-09-24 01:05:06.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2177 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:06.899 UTC [gossip.discovery] isSentByMe -> DEBU 2178 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:06.899 UTC [gossip.discovery] handleAliveMessage -> DEBU 2179 Exiting" +"2019-09-24 01:05:06.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 217a Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:06.899 UTC [msp] DeserializeIdentity -> DEBU 217b Obtaining identity" +"2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 217c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 217d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.899 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 217e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 217f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2180 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2181 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func1 -> DEBU 2182 0xc002b8f3d0 gate 1569287106899636300 evaluation starts" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2183 0xc002b8f3d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2184 0xc002b8f3d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2185 0xc002b8f3d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func2 -> DEBU 2186 0xc002b8f3d0 principal evaluation fails" +"2019-09-24 01:05:06.899 UTC [cauthdsl] func1 -> DEBU 2187 0xc002b8f3d0 gate 1569287106899636300 evaluation fails" +"2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2188 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.899 UTC [policies] Evaluate -> DEBU 2189 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 218a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func1 -> DEBU 218b 0xc002b8fc10 gate 1569287106900071000 evaluation starts" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218c 0xc002b8fc10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218d 0xc002b8fc10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 218e 0xc002b8fc10 principal matched by identity 0" +"2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 218f Verify: digest = 00000000 b6 9e 41 b7 51 1a 09 09 d6 63 42 d0 4c e8 a2 11 |..A.Q....cB.L...| +00000010 18 a6 b1 5e 46 bb d2 12 39 0c 58 44 a1 e6 fa e0 |...^F...9.XD....|" +"2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 2190 Verify: sig = 00000000 30 44 02 20 5f a3 f8 7f 4e 98 1f fd e7 a4 04 fa |0D. _...N.......| +00000010 39 59 ab ce ed 40 06 8a 8e 02 2d 62 ff e3 08 70 |9Y...@....-b...p| +00000020 00 41 6f aa 02 20 73 1e ba ff ef 40 5c 32 27 36 |.Ao.. s....@\2'6| +00000030 1f 5c 5d b7 94 76 6b 68 e1 16 10 9d 26 af 7b b7 |.\]..vkh....&.{.| +00000040 56 f7 e5 f4 e3 8e |V.....|" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func2 -> DEBU 2191 0xc002b8fc10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:06.900 UTC [cauthdsl] func1 -> DEBU 2192 0xc002b8fc10 gate 1569287106900071000 evaluation succeeds" +"2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2193 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2194 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2195 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:06.900 UTC [policies] Evaluate -> DEBU 2196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:06.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2197 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:06.900 UTC [gossip.discovery] handleAliveMessage -> DEBU 2198 Exiting" +"2019-09-24 01:05:06.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2199 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:06.900 UTC [msp.identity] Verify -> DEBU 219a Verify: digest = 00000000 18 da 6c 73 b1 f1 fc a2 38 0a ae bb ef a5 4a 33 |..ls....8.....J3| +00000010 a7 f6 ea cb 39 68 fb 6b 83 3a a6 7e 4e 97 38 76 |....9h.k.:.~N.8v|" +"2019-09-24 01:05:06.901 UTC [msp.identity] Verify -> DEBU 219b Verify: sig = 00000000 30 44 02 20 39 32 57 8a f8 10 1c 8a 19 9f a9 24 |0D. 92W........$| +00000010 76 86 6a 18 50 c0 70 77 5c f2 fc 9e 15 e4 9e 26 |v.j.P.pw\......&| +00000020 a6 26 b7 68 02 20 3e 07 cb da 1d 9c 8d 9c 43 89 |.&.h. >.......C.| +00000030 51 df db 79 fa b5 3b b1 7d 77 f5 34 df 16 de 9c |Q..y..;.}w.4....| +00000040 e8 f3 3c 28 9b 30 |..<(.0|" +"2019-09-24 01:05:06.912 UTC [gossip.comm] func1 -> DEBU 219c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 219d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:06.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 219e Exiting" +"2019-09-24 01:05:06.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 219f Exiting" +"2019-09-24 01:05:06.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21a0 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21a1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:06.917 UTC [msp] DeserializeIdentity -> DEBU 21a2 Obtaining identity" +"2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 21a3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21a4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 21a5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:06.917 UTC [policies] Evaluate -> DEBU 21a8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:06.917 UTC [cauthdsl] func1 -> DEBU 21a9 0xc0039f61a0 gate 1569287106917878200 evaluation starts" +"2019-09-24 01:05:06.917 UTC [cauthdsl] func2 -> DEBU 21aa 0xc0039f61a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.917 UTC [cauthdsl] func2 -> DEBU 21ab 0xc0039f61a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21ac 0xc0039f61a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:06.918 UTC [gossip.gossip] handleMessage -> DEBU 21ad Exiting" +"2019-09-24 01:05:06.918 UTC [gossip.gossip] handleMessage -> DEBU 21ae Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21af 0xc0039f61a0 principal evaluation fails" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func1 -> DEBU 21b0 0xc0039f61a0 gate 1569287106917878200 evaluation fails" +"2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:06.918 UTC [policies] Evaluate -> DEBU 21b3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func1 -> DEBU 21b4 0xc0039f69e0 gate 1569287106918785800 evaluation starts" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21b5 0xc0039f69e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:06.918 UTC [cauthdsl] func2 -> DEBU 21b6 0xc0039f69e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:06.919 UTC [cauthdsl] func2 -> DEBU 21b7 0xc0039f69e0 principal matched by identity 0" +"2019-09-24 01:05:06.919 UTC [msp.identity] Verify -> DEBU 21b8 Verify: digest = 00000000 5d f2 cf ee 2b 70 d9 8b 79 34 f0 4c 8c 4c ec 7b |]...+p..y4.L.L.{| +00000010 17 08 c4 8d 02 56 a0 ee 03 ee dd 61 12 91 f5 30 |.....V.....a...0|" +"2019-09-24 01:05:06.919 UTC [msp.identity] Verify -> DEBU 21b9 Verify: sig = 00000000 30 45 02 21 00 82 01 cc 46 fe 5a 10 48 80 69 28 |0E.!....F.Z.H.i(| +00000010 d6 c1 46 6b 8f 5c ee 50 6d 87 75 08 f8 67 82 d9 |..Fk.\.Pm.u..g..| +00000020 3f 0c 7b 14 8f 02 20 2f 32 49 be f7 c4 63 80 1e |?.{... /2I...c..| +00000030 de c5 a6 fe 60 0f 10 dc 47 31 60 d1 4c 09 77 3b |....`...G1`.L.w;| +00000040 14 bc 0b fa e5 a0 04 |.......|" +"2019-09-24 01:05:06.919 UTC [cauthdsl] func2 -> DEBU 21ba 0xc0039f69e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:06.919 UTC [cauthdsl] func1 -> DEBU 21bb 0xc0039f69e0 gate 1569287106918785800 evaluation succeeds" +"2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21bc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21bd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:06.919 UTC [policies] Evaluate -> DEBU 21be Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:06.920 UTC [policies] Evaluate -> DEBU 21bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:06.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c0 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c1 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c2 updating membership: timestamp: " +"2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c3 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:06.920 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c4 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:06.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 21c5 Exiting" +"2019-09-24 01:05:06.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 21c6 Exiting" +"2019-09-24 01:05:06.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c7 Exiting" +"2019-09-24 01:05:06.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:06.924 UTC [msp.identity] Verify -> DEBU 21ca Verify: digest = 00000000 42 94 3e fc 85 f0 43 b7 c6 17 a0 76 dd 15 25 b0 |B.>...C....v..%.| +00000010 b2 73 7f 47 7a d8 2f 6a 34 9d 6d e1 bb d6 6a c7 |.s.Gz./j4.m...j.|" +"2019-09-24 01:05:06.924 UTC [msp.identity] Verify -> DEBU 21cb Verify: sig = 00000000 30 45 02 21 00 f5 15 5e 87 50 95 5d fd e8 f5 83 |0E.!...^.P.]....| +00000010 2a f1 de 80 1e be ea 0f 81 eb 68 1a fb 87 02 0c |*.........h.....| +00000020 a0 77 ad 5e 22 02 20 51 d9 db 4d 37 ca ed c0 c8 |.w.^". Q..M7....| +00000030 93 30 e5 ca 73 fd f6 a3 a7 40 c5 ba 35 ca e2 a6 |.0..s....@..5...| +00000040 ed 63 2a 1b b9 12 2f |.c*.../|" +"2019-09-24 01:05:06.925 UTC [gossip.gossip] handleMessage -> DEBU 21cc Exiting" +"2019-09-24 01:05:06.925 UTC [gossip.discovery] sendMemResponse -> DEBU 21cd Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21ce Obtaining identity" +"2019-09-24 01:05:06.925 UTC [msp.identity] Verify -> DEBU 21cf Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:06.925 UTC [msp.identity] Verify -> DEBU 21d0 Verify: sig = 00000000 30 44 02 20 29 7d ee c9 93 e4 d7 2b eb d5 28 47 |0D. )}.....+..(G| +00000010 ad b1 f2 47 9f 1f e7 c3 25 27 70 e0 4c d6 2e ae |...G....%'p.L...| +00000020 10 68 4a e0 02 20 68 42 65 36 a7 ad 0b be 55 49 |.hJ.. hBe6....UI| +00000030 53 ce dd 31 da c8 c5 cd 11 34 81 07 c6 72 eb 11 |S..1.....4...r..| +00000040 14 7f 4b ef a7 20 |..K.. |" +"2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21d1 Obtaining identity" +"2019-09-24 01:05:06.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:06.925 UTC [gossip.discovery] isSentByMe -> DEBU 21d3 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:06.925 UTC [msp] DeserializeIdentity -> DEBU 21d4 Obtaining identity" +"2019-09-24 01:05:06.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 21d5 Exiting" +"2019-09-24 01:05:06.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21d6 Exiting" +"2019-09-24 01:05:06.925 UTC [gossip.comm] Send -> DEBU 21d7 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:06.926 UTC [gossip.discovery] sendMemResponse -> DEBU 21d8 Exiting, replying with alive:\007\313\332\035\234\215\234C\211Q\337\333y\372\265;\261}w\3654\337\026\336\234\350\363<(\2330" > alive: alive: alive: " +"2019-09-24 01:05:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 21d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:06.926 UTC [gossip.comm] sendToEndpoint -> DEBU 21da Exiting" +"2019-09-24 01:05:07.349 UTC [chaincode.platform.util] DockerBuild -> DEBU 21db Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-824835084/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-824835084/000006.o: In function `_cgo_18049202ccd9_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:49: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking" +"2019-09-24 01:05:08.551 UTC [gossip.comm] func1 -> DEBU 21dc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.551 UTC [gossip.gossip] handleMessage -> DEBU 21dd Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.551 UTC [gossip.gossip] handleMessage -> DEBU 21de Exiting" +"2019-09-24 01:05:08.552 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21df Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.552 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 21e0 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:08.553 UTC [msp.identity] Verify -> DEBU 21e1 Verify: digest = 00000000 84 c7 65 a0 ac 29 90 0a 04 0e 1f 3a 88 b5 74 e0 |..e..).....:..t.| +00000010 1a ec eb 79 a9 cd 1f 39 1e 4d e7 a9 43 fc ed 86 |...y...9.M..C...|" +"2019-09-24 01:05:08.553 UTC [msp.identity] Verify -> DEBU 21e2 Verify: sig = 00000000 30 44 02 20 37 f7 85 7a 4a b4 d5 7b 8a 63 5a b0 |0D. 7..zJ..{.cZ.| +00000010 c3 da 36 38 e0 6b a8 cf 3b 75 a8 f2 6e a0 af 44 |..68.k..;u..n..D| +00000020 f5 30 d9 ea 02 20 28 f0 07 d1 42 fb 5d 4b 9f 1f |.0... (...B.]K..| +00000030 ba fe b8 84 8c 68 55 71 ad 70 7d 46 22 69 b0 ac |.....hUq.p}F"i..| +00000040 66 c7 4e 2e 9e 76 |f.N..v|" +"2019-09-24 01:05:08.553 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e4 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:08.553 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e5 updating membership: timestamp: " +"2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e6 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e7 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:08.554 UTC [gossip.discovery] learnExistingMembers -> DEBU 21e8 Exiting" +"2019-09-24 01:05:08.554 UTC [gossip.discovery] handleAliveMessage -> DEBU 21e9 Exiting" +"2019-09-24 01:05:08.557 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ea Exiting" +"2019-09-24 01:05:08.557 UTC [gossip.comm] func1 -> DEBU 21eb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.558 UTC [gossip.gossip] handleMessage -> DEBU 21ec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.558 UTC [gossip.gossip] handleMessage -> DEBU 21ed Exiting" +"2019-09-24 01:05:08.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ee Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.559 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21ef Exiting" +"2019-09-24 01:05:08.561 UTC [gossip.comm] func1 -> DEBU 21f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.561 UTC [gossip.gossip] handleMessage -> DEBU 21f1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.561 UTC [gossip.gossip] handleMessage -> DEBU 21f2 Exiting" +"2019-09-24 01:05:08.561 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 21f4 Exiting" +"2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f5 Obtaining identity" +"2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f6 Obtaining identity" +"2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f7 Obtaining identity" +"2019-09-24 01:05:08.562 UTC [gossip.comm] Send -> DEBU 21f8 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:08.562 UTC [msp] DeserializeIdentity -> DEBU 21f9 Obtaining identity" +"2019-09-24 01:05:08.563 UTC [gossip.comm] Send -> DEBU 21fa Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:08.563 UTC [gossip.comm] sendToEndpoint -> DEBU 21fb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.563 UTC [gossip.comm] sendToEndpoint -> DEBU 21fc Exiting" +"2019-09-24 01:05:08.564 UTC [gossip.comm] sendToEndpoint -> DEBU 21fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:08.564 UTC [gossip.comm] sendToEndpoint -> DEBU 21fe Exiting" +"2019-09-24 01:05:08.832 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 21ff Sleeping 25s" +"2019-09-24 01:05:09.170 UTC [gossip.comm] func1 -> DEBU 2200 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.171 UTC [gossip.gossip] handleMessage -> DEBU 2201 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.171 UTC [gossip.gossip] handleMessage -> DEBU 2202 Exiting" +"2019-09-24 01:05:09.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2203 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2204 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:09.172 UTC [msp] DeserializeIdentity -> DEBU 2205 Obtaining identity" +"2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2206 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2207 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.174 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2208 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2209 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 220a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 220b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 220c 0xc003f39d60 gate 1569287109174360400 evaluation starts" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220d 0xc003f39d60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220e 0xc003f39d60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 220f 0xc003f39d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2210 0xc003f39d60 principal evaluation fails" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 2211 0xc003f39d60 gate 1569287109174360400 evaluation fails" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2212 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2213 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 2214 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 2215 0xc003f125a0 gate 1569287109174623100 evaluation starts" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2216 0xc003f125a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2217 0xc003f125a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 2218 0xc003f125a0 principal matched by identity 0" +"2019-09-24 01:05:09.174 UTC [msp.identity] Verify -> DEBU 2219 Verify: digest = 00000000 06 ae 9f c8 3e 1c 57 48 bd fe 0f 3d 0f 1e 68 e1 |....>.WH...=..h.| +00000010 e0 8e df 4c 04 85 eb a2 ce e4 b5 90 7d 85 ce dc |...L........}...|" +"2019-09-24 01:05:09.174 UTC [msp.identity] Verify -> DEBU 221a Verify: sig = 00000000 30 44 02 20 33 6a 81 22 e7 e5 c9 66 93 7a e8 93 |0D. 3j."...f.z..| +00000010 a8 5d 5a 89 bf 3d 41 5b 88 44 f8 84 d0 8c c7 df |.]Z..=A[.D......| +00000020 51 d5 12 64 02 20 34 a1 5a 95 c9 9d 5f 09 c7 cd |Q..d. 4.Z..._...| +00000030 75 99 cc fc f9 61 eb c9 97 63 32 a4 8e 5b ed 9d |u....a...c2..[..| +00000040 fd e1 f0 f4 ea 1d |......|" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func2 -> DEBU 221b 0xc003f125a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.174 UTC [cauthdsl] func1 -> DEBU 221c 0xc003f125a0 gate 1569287109174623100 evaluation succeeds" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.174 UTC [policies] Evaluate -> DEBU 221f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.175 UTC [policies] Evaluate -> DEBU 2220 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2221 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2222 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2223 updating membership: timestamp: " +"2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2224 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2225 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] learnExistingMembers -> DEBU 2226 Exiting" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] handleAliveMessage -> DEBU 2227 Exiting" +"2019-09-24 01:05:09.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2228 Exiting" +"2019-09-24 01:05:09.175 UTC [gossip.comm] func1 -> DEBU 2229 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.175 UTC [gossip.gossip] handleMessage -> DEBU 222a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.176 UTC [gossip.gossip] handleMessage -> DEBU 222b Exiting" +"2019-09-24 01:05:09.176 UTC [gossip.discovery] handleMsgFromComm -> DEBU 222c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.176 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 222d Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:09.176 UTC [msp] DeserializeIdentity -> DEBU 222e Obtaining identity" +"2019-09-24 01:05:09.176 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 222f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2230 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.177 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2231 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2232 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2233 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.178 UTC [policies] Evaluate -> DEBU 2234 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.178 UTC [cauthdsl] func1 -> DEBU 2235 0xc003ef6a70 gate 1569287109178232100 evaluation starts" +"2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2236 0xc003ef6a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2237 0xc003ef6a70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.178 UTC [cauthdsl] func2 -> DEBU 2238 0xc003ef6a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.179 UTC [cauthdsl] func2 -> DEBU 2239 0xc003ef6a70 principal evaluation fails" +"2019-09-24 01:05:09.179 UTC [cauthdsl] func1 -> DEBU 223a 0xc003ef6a70 gate 1569287109178232100 evaluation fails" +"2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.179 UTC [policies] Evaluate -> DEBU 223d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.179 UTC [cauthdsl] func1 -> DEBU 223e 0xc003ef7300 gate 1569287109179807900 evaluation starts" +"2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 223f 0xc003ef7300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2240 0xc003ef7300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2241 0xc003ef7300 principal matched by identity 0" +"2019-09-24 01:05:09.180 UTC [msp.identity] Verify -> DEBU 2242 Verify: digest = 00000000 d4 a8 65 9b 52 49 85 64 bb 6b 87 7b 8e 73 93 98 |..e.RI.d.k.{.s..| +00000010 3b 23 7f ca 42 c0 19 67 04 d8 0a 5b d9 c0 56 e4 |;#..B..g...[..V.|" +"2019-09-24 01:05:09.180 UTC [msp.identity] Verify -> DEBU 2243 Verify: sig = 00000000 30 45 02 21 00 ad 08 bc 53 8a c2 9f 51 92 c9 1f |0E.!....S...Q...| +00000010 98 19 47 3f a5 f8 fa 62 4f 0a af b1 71 ca 01 39 |..G?...bO...q..9| +00000020 73 28 18 ed 4e 02 20 7d 8b 5f bc 62 90 65 0c f5 |s(..N. }._.b.e..| +00000030 56 bf d3 24 b1 9f 94 f1 80 f1 06 26 57 8b 26 6e |V..$.......&W.&n| +00000040 b4 b8 12 a5 9c bd 88 |.......|" +"2019-09-24 01:05:09.180 UTC [cauthdsl] func2 -> DEBU 2244 0xc003ef7300 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.181 UTC [cauthdsl] func1 -> DEBU 2245 0xc003ef7300 gate 1569287109179807900 evaluation succeeds" +"2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2246 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2247 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2248 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.181 UTC [policies] Evaluate -> DEBU 2249 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.181 UTC [gossip.discovery] handleAliveMessage -> DEBU 224a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224c updating membership: timestamp: " +"2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224d Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:09.182 UTC [gossip.discovery] learnExistingMembers -> DEBU 224f Exiting" +"2019-09-24 01:05:09.182 UTC [gossip.discovery] handleAliveMessage -> DEBU 2250 Exiting" +"2019-09-24 01:05:09.182 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2251 Exiting" +"2019-09-24 01:05:09.184 UTC [msp] DeserializeIdentity -> DEBU 2252 Obtaining identity" +"2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2253 Obtaining identity" +"2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2254 Obtaining identity" +"2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2255 Obtaining identity" +"2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2256 Obtaining identity" +"2019-09-24 01:05:09.185 UTC [msp] DeserializeIdentity -> DEBU 2257 Obtaining identity" +"2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 2258 Obtaining identity" +"2019-09-24 01:05:09.186 UTC [gossip.comm] Send -> DEBU 2259 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225a Obtaining identity" +"2019-09-24 01:05:09.186 UTC [gossip.comm] Send -> DEBU 225b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225c Obtaining identity" +"2019-09-24 01:05:09.186 UTC [msp] DeserializeIdentity -> DEBU 225d Obtaining identity" +"2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 225e Obtaining identity" +"2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 225f Obtaining identity" +"2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 2260 Obtaining identity" +"2019-09-24 01:05:09.187 UTC [gossip.comm] Send -> DEBU 2261 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:09.187 UTC [msp] DeserializeIdentity -> DEBU 2262 Obtaining identity" +"2019-09-24 01:05:09.188 UTC [gossip.comm] Send -> DEBU 2263 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:09.192 UTC [gossip.comm] func1 -> DEBU 2264 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.193 UTC [gossip.comm] sendToEndpoint -> DEBU 2265 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.193 UTC [gossip.comm] sendToEndpoint -> DEBU 2266 Exiting" +"2019-09-24 01:05:09.193 UTC [gossip.comm] func1 -> DEBU 2267 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 2268 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.194 UTC [gossip.comm] sendToEndpoint -> DEBU 2269 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 226a Exiting" +"2019-09-24 01:05:09.194 UTC [gossip.gossip] handleMessage -> DEBU 226b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.194 UTC [gossip.comm] sendToEndpoint -> DEBU 226c Exiting" +"2019-09-24 01:05:09.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 226d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.195 UTC [gossip.comm] sendToEndpoint -> DEBU 226e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.195 UTC [gossip.comm] sendToEndpoint -> DEBU 226f Exiting" +"2019-09-24 01:05:09.195 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2270 Exiting" +"2019-09-24 01:05:09.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2271 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.198 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2273 Exiting" +"2019-09-24 01:05:09.196 UTC [gossip.comm] sendToEndpoint -> DEBU 2272 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.198 UTC [gossip.comm] sendToEndpoint -> DEBU 2274 Exiting" +"2019-09-24 01:05:09.198 UTC [gossip.comm] func1 -> DEBU 2275 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.199 UTC [gossip.comm] func1 -> DEBU 2276 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2277 Exiting" +"2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2278 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 2279 Exiting" +"2019-09-24 01:05:09.199 UTC [gossip.gossip] handleMessage -> DEBU 227a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227c Exiting" +"2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:09.200 UTC [gossip.discovery] handleMsgFromComm -> DEBU 227e Exiting" +"2019-09-24 01:05:09.200 UTC [gossip.gossip] handleMessage -> DEBU 227f Exiting" +"2019-09-24 01:05:09.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 2280 Obtaining default signing identity" +"2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2281 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151020 " +"2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2282 Sign: digest: 1E086772AE5777446190CD67E4691693AB9501F038CBE230BAC7E164839BAEF9 " +"2019-09-24 01:05:09.237 UTC [msp] GetDefaultSigningIdentity -> DEBU 2283 Obtaining default signing identity" +"2019-09-24 01:05:09.237 UTC [msp.identity] Sign -> DEBU 2284 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:09.238 UTC [msp.identity] Sign -> DEBU 2285 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:09.238 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2286 Sleeping 5s" +"2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 2287 Obtaining identity" +"2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 2288 Obtaining identity" +"2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 2289 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 228a Obtaining identity" +"2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 228b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:09.244 UTC [msp] DeserializeIdentity -> DEBU 228c Obtaining identity" +"2019-09-24 01:05:09.244 UTC [gossip.comm] Send -> DEBU 228d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 228e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 228f Exiting" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2290 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2291 Exiting" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2292 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:09.245 UTC [gossip.comm] sendToEndpoint -> DEBU 2293 Exiting" +"2019-09-24 01:05:09.689 UTC [msp] DeserializeIdentity -> DEBU 2294 Obtaining identity" +"2019-09-24 01:05:09.690 UTC [msp] DeserializeIdentity -> DEBU 2295 Obtaining identity" +"2019-09-24 01:05:09.690 UTC [gossip.comm] Send -> DEBU 2296 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2297 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2298 Exiting" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 2299 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229a Exiting" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.691 UTC [gossip.comm] sendToEndpoint -> DEBU 229c Exiting" +"2019-09-24 01:05:09.693 UTC [gossip.comm] func1 -> DEBU 229d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.693 UTC [gossip.gossip] handleMessage -> DEBU 229e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 229f Obtaining identity" +"2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 22a0 Obtaining identity" +"2019-09-24 01:05:09.693 UTC [msp] DeserializeIdentity -> DEBU 22a1 Obtaining identity" +"2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22a2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22a3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.694 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22a4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.694 UTC [policies] Evaluate -> DEBU 22a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func1 -> DEBU 22a8 0xc003e71850 gate 1569287109694665700 evaluation starts" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22a9 0xc003e71850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22aa 0xc003e71850 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22ab 0xc003e71850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func2 -> DEBU 22ac 0xc003e71850 principal evaluation fails" +"2019-09-24 01:05:09.694 UTC [cauthdsl] func1 -> DEBU 22ad 0xc003e71850 gate 1569287109694665700 evaluation fails" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22ae Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func1 -> DEBU 22b1 0xc003cec210 gate 1569287109695173500 evaluation starts" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b2 0xc003cec210 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b3 0xc003cec210 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b4 0xc003cec210 principal matched by identity 0" +"2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22b5 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22b6 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func2 -> DEBU 22b7 0xc003cec210 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.695 UTC [cauthdsl] func1 -> DEBU 22b8 0xc003cec210 gate 1569287109695173500 evaluation succeeds" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22b9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22ba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22bb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.695 UTC [policies] Evaluate -> DEBU 22bc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22bd Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:09.695 UTC [msp.identity] Verify -> DEBU 22be Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:09.696 UTC [msp] DeserializeIdentity -> DEBU 22bf Obtaining identity" +"2019-09-24 01:05:09.696 UTC [msp] DeserializeIdentity -> DEBU 22c0 Obtaining identity" +"2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22c3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.696 UTC [policies] Evaluate -> DEBU 22c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func1 -> DEBU 22c7 0xc003c98100 gate 1569287109696737100 evaluation starts" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22c8 0xc003c98100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22c9 0xc003c98100 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22ca 0xc003c98100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func2 -> DEBU 22cb 0xc003c98100 principal evaluation fails" +"2019-09-24 01:05:09.696 UTC [cauthdsl] func1 -> DEBU 22cc 0xc003c98100 gate 1569287109696737100 evaluation fails" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func1 -> DEBU 22d0 0xc003c98940 gate 1569287109697162300 evaluation starts" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d1 0xc003c98940 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d2 0xc003c98940 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d3 0xc003c98940 principal matched by identity 0" +"2019-09-24 01:05:09.697 UTC [msp.identity] Verify -> DEBU 22d4 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:09.697 UTC [msp.identity] Verify -> DEBU 22d5 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func2 -> DEBU 22d6 0xc003c98940 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.697 UTC [cauthdsl] func1 -> DEBU 22d7 0xc003c98940 gate 1569287109697162300 evaluation succeeds" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22da Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.697 UTC [policies] Evaluate -> DEBU 22db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.698 UTC [msp.identity] Verify -> DEBU 22dc Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:09.698 UTC [msp.identity] Verify -> DEBU 22dd Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:09.703 UTC [gossip.comm] func1 -> DEBU 22de Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.703 UTC [gossip.comm] func1 -> DEBU 22df Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.703 UTC [gossip.gossip] handleMessage -> DEBU 22e0 Exiting" +"2019-09-24 01:05:09.704 UTC [gossip.gossip] handleMessage -> DEBU 22e1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.705 UTC [msp.identity] Verify -> DEBU 22e2 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:09.710 UTC [msp.identity] Verify -> DEBU 22e3 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:09.711 UTC [msp.identity] Verify -> DEBU 22e4 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:09.711 UTC [msp.identity] Verify -> DEBU 22e5 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:09.715 UTC [msp] DeserializeIdentity -> DEBU 22e6 Obtaining identity" +"2019-09-24 01:05:09.716 UTC [msp] DeserializeIdentity -> DEBU 22e7 Obtaining identity" +"2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 22e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22e9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.716 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 22ea Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.716 UTC [policies] Evaluate -> DEBU 22ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.716 UTC [cauthdsl] func1 -> DEBU 22ee 0xc003c11930 gate 1569287109716701000 evaluation starts" +"2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22ef 0xc003c11930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f0 0xc003c11930 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f1 0xc003c11930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.716 UTC [cauthdsl] func2 -> DEBU 22f2 0xc003c11930 principal evaluation fails" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22f3 0xc003c11930 gate 1569287109716701000 evaluation fails" +"2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22f7 0xc003bd0170 gate 1569287109717288400 evaluation starts" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22f8 0xc003bd0170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22f9 0xc003bd0170 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22fa 0xc003bd0170 principal matched by identity 0" +"2019-09-24 01:05:09.717 UTC [msp.identity] Verify -> DEBU 22fb Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:09.717 UTC [msp.identity] Verify -> DEBU 22fc Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func2 -> DEBU 22fd 0xc003bd0170 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.717 UTC [cauthdsl] func1 -> DEBU 22fe 0xc003bd0170 gate 1569287109717288400 evaluation succeeds" +"2019-09-24 01:05:09.717 UTC [policies] Evaluate -> DEBU 22ff Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2300 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2301 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2302 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.718 UTC [msp] DeserializeIdentity -> DEBU 2303 Obtaining identity" +"2019-09-24 01:05:09.718 UTC [msp] DeserializeIdentity -> DEBU 2304 Obtaining identity" +"2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2305 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2306 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2307 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2308 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 2309 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.718 UTC [policies] Evaluate -> DEBU 230a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.718 UTC [cauthdsl] func1 -> DEBU 230b 0xc003bd1950 gate 1569287109718965400 evaluation starts" +"2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230c 0xc003bd1950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230d 0xc003bd1950 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230e 0xc003bd1950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.719 UTC [cauthdsl] func2 -> DEBU 230f 0xc003bd1950 principal evaluation fails" +"2019-09-24 01:05:09.719 UTC [cauthdsl] func1 -> DEBU 2310 0xc003bd1950 gate 1569287109718965400 evaluation fails" +"2019-09-24 01:05:09.719 UTC [policies] Evaluate -> DEBU 2311 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.719 UTC [policies] Evaluate -> DEBU 2312 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.720 UTC [policies] Evaluate -> DEBU 2313 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func1 -> DEBU 2314 0xc003bbc190 gate 1569287109721050900 evaluation starts" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2315 0xc003bbc190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2316 0xc003bbc190 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 2317 0xc003bbc190 principal matched by identity 0" +"2019-09-24 01:05:09.721 UTC [msp.identity] Verify -> DEBU 2318 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:09.721 UTC [msp.identity] Verify -> DEBU 2319 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func2 -> DEBU 231a 0xc003bbc190 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.721 UTC [cauthdsl] func1 -> DEBU 231b 0xc003bbc190 gate 1569287109721050900 evaluation succeeds" +"2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.721 UTC [policies] Evaluate -> DEBU 231f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.721 UTC [gossip.gossip] handleMessage -> DEBU 2320 Exiting" +"2019-09-24 01:05:09.721 UTC [gossip.gossip] handleMessage -> DEBU 2321 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2322 Obtaining identity" +"2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2323 Obtaining identity" +"2019-09-24 01:05:09.721 UTC [msp] DeserializeIdentity -> DEBU 2324 Obtaining identity" +"2019-09-24 01:05:09.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2325 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2326 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2327 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.722 UTC [policies] Evaluate -> DEBU 2328 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2329 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 232a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 232b 0xc003bbdca0 gate 1569287109724364200 evaluation starts" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232c 0xc003bbdca0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232d 0xc003bbdca0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232e 0xc003bbdca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 232f 0xc003bbdca0 principal evaluation fails" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 2330 0xc003bbdca0 gate 1569287109724364200 evaluation fails" +"2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2331 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2332 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.724 UTC [policies] Evaluate -> DEBU 2333 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func1 -> DEBU 2334 0xc003ba04f0 gate 1569287109724887800 evaluation starts" +"2019-09-24 01:05:09.724 UTC [cauthdsl] func2 -> DEBU 2335 0xc003ba04f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 2336 0xc003ba04f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 2337 0xc003ba04f0 principal matched by identity 0" +"2019-09-24 01:05:09.725 UTC [msp.identity] Verify -> DEBU 2338 Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:09.725 UTC [msp.identity] Verify -> DEBU 2339 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:09.725 UTC [cauthdsl] func2 -> DEBU 233a 0xc003ba04f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.726 UTC [cauthdsl] func1 -> DEBU 233b 0xc003ba04f0 gate 1569287109724887800 evaluation succeeds" +"2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.726 UTC [policies] Evaluate -> DEBU 233f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.726 UTC [msp.identity] Verify -> DEBU 2340 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:09.726 UTC [msp.identity] Verify -> DEBU 2341 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:09.727 UTC [msp.identity] Verify -> DEBU 2342 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:09.727 UTC [msp.identity] Verify -> DEBU 2343 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:09.727 UTC [msp] DeserializeIdentity -> DEBU 2344 Obtaining identity" +"2019-09-24 01:05:09.727 UTC [msp] DeserializeIdentity -> DEBU 2345 Obtaining identity" +"2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2346 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2347 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2348 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 2349 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 234a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:09.727 UTC [policies] Evaluate -> DEBU 234b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:09.727 UTC [cauthdsl] func1 -> DEBU 234c 0xc003a02b20 gate 1569287109727855100 evaluation starts" +"2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234d 0xc003a02b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234e 0xc003a02b20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 234f 0xc003a02b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:09.727 UTC [cauthdsl] func2 -> DEBU 2350 0xc003a02b20 principal evaluation fails" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 2351 0xc003a02b20 gate 1569287109727855100 evaluation fails" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2352 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2353 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2354 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 2355 0xc003a03360 gate 1569287109728191800 evaluation starts" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2356 0xc003a03360 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2357 0xc003a03360 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 2358 0xc003a03360 principal matched by identity 0" +"2019-09-24 01:05:09.728 UTC [msp.identity] Verify -> DEBU 2359 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:09.728 UTC [msp.identity] Verify -> DEBU 235a Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func2 -> DEBU 235b 0xc003a03360 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:09.728 UTC [cauthdsl] func1 -> DEBU 235c 0xc003a03360 gate 1569287109728191800 evaluation succeeds" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 235f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:09.728 UTC [policies] Evaluate -> DEBU 2360 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:09.728 UTC [gossip.gossip] handleMessage -> DEBU 2361 Exiting" +"2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2362 Obtaining identity" +"2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2363 Obtaining identity" +"2019-09-24 01:05:09.739 UTC [gossip.pull] Hello -> DEBU 2364 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2365 Obtaining identity" +"2019-09-24 01:05:09.739 UTC [msp] DeserializeIdentity -> DEBU 2366 Obtaining identity" +"2019-09-24 01:05:09.739 UTC [gossip.comm] Send -> DEBU 2367 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:09.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2368 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.740 UTC [gossip.comm] sendToEndpoint -> DEBU 2369 Exiting" +"2019-09-24 01:05:09.741 UTC [gossip.comm] func1 -> DEBU 236a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.741 UTC [gossip.gossip] handleMessage -> DEBU 236b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.741 UTC [gossip.pull] HandleMessage -> DEBU 236c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.741 UTC [gossip.gossip] handleMessage -> DEBU 236d Exiting" +"2019-09-24 01:05:09.876 UTC [gossip.comm] func1 -> DEBU 236e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.876 UTC [gossip.gossip] handleMessage -> DEBU 236f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.877 UTC [msp] DeserializeIdentity -> DEBU 2370 Obtaining identity" +"2019-09-24 01:05:09.877 UTC [msp] DeserializeIdentity -> DEBU 2371 Obtaining identity" +"2019-09-24 01:05:09.877 UTC [gossip.gossip] handleMessage -> DEBU 2372 Exiting" +"2019-09-24 01:05:09.893 UTC [gossip.comm] func1 -> DEBU 2373 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.893 UTC [gossip.gossip] handleMessage -> DEBU 2374 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.893 UTC [gossip.pull] HandleMessage -> DEBU 2375 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:09.893 UTC [gossip.pull] SendDigest -> DEBU 2376 Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:09.893 UTC [gossip.gossip] handleMessage -> DEBU 2377 Exiting" +"2019-09-24 01:05:10.078 UTC [gossip.comm] func1 -> DEBU 2378 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.078 UTC [gossip.gossip] handleMessage -> DEBU 2379 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237a Obtaining identity" +"2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237b Obtaining identity" +"2019-09-24 01:05:10.079 UTC [msp] DeserializeIdentity -> DEBU 237c Obtaining identity" +"2019-09-24 01:05:10.079 UTC [gossip.gossip] handleMessage -> DEBU 237d Exiting" +"2019-09-24 01:05:10.276 UTC [gossip.comm] func1 -> DEBU 237e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.276 UTC [gossip.gossip] handleMessage -> DEBU 237f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2380 Obtaining identity" +"2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2381 Obtaining identity" +"2019-09-24 01:05:10.276 UTC [msp] DeserializeIdentity -> DEBU 2382 Obtaining identity" +"2019-09-24 01:05:10.276 UTC [gossip.gossip] handleMessage -> DEBU 2383 Exiting" +"2019-09-24 01:05:10.520 UTC [gossip.comm] func1 -> DEBU 2384 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.521 UTC [gossip.comm] func1 -> DEBU 2385 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 2386 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.521 UTC [gossip.pull] HandleMessage -> DEBU 2387 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.521 UTC [gossip.pull] SendDigest -> DEBU 2388 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 2389 Exiting" +"2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 238a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.521 UTC [gossip.gossip] handleMessage -> DEBU 238b Exiting" +"2019-09-24 01:05:10.521 UTC [gossip.discovery] handleMsgFromComm -> DEBU 238c Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.522 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 238d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:10.522 UTC [msp.identity] Verify -> DEBU 238e Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +"2019-09-24 01:05:10.522 UTC [msp.identity] Verify -> DEBU 238f Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2390 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:10.523 UTC [msp.identity] Verify -> DEBU 2391 Verify: sig = 00000000 30 45 02 21 00 9c 7e a7 88 6e 19 17 b1 e8 98 69 |0E.!..~..n.....i| +00000010 30 e7 b1 28 de 23 df 55 d8 e0 26 00 95 47 6c 75 |0..(.#.U..&..Glu| +00000020 09 1b e3 cd f2 02 20 46 fc a8 d5 f4 73 a8 42 9e |...... F....s.B.| +00000030 43 45 12 eb 88 fe a1 28 2a 25 fd c1 00 6d ed 77 |CE.....(*%...m.w| +00000040 8f a5 8f 64 00 41 26 |...d.A&|" +"2019-09-24 01:05:10.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 2392 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2393 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2394 updating membership: timestamp: " +"2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2395 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:10.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2396 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:10.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2397 Exiting" +"2019-09-24 01:05:10.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 2398 Exiting" +"2019-09-24 01:05:10.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2399 Exiting" +"2019-09-24 01:05:10.524 UTC [gossip.discovery] sendMemResponse -> DEBU 239a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:10.525 UTC [msp] DeserializeIdentity -> DEBU 239b Obtaining identity" +"2019-09-24 01:05:10.525 UTC [msp] DeserializeIdentity -> DEBU 239c Obtaining identity" +"2019-09-24 01:05:10.531 UTC [gossip.comm] Send -> DEBU 239d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.532 UTC [gossip.discovery] sendMemResponse -> DEBU 239e Exiting, replying with alive: > alive: " +"2019-09-24 01:05:10.532 UTC [gossip.comm] sendToEndpoint -> DEBU 239f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.532 UTC [gossip.comm] sendToEndpoint -> DEBU 23a0 Exiting" +"2019-09-24 01:05:10.812 UTC [gossip.comm] func1 -> DEBU 23a1 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.812 UTC [gossip.gossip] handleMessage -> DEBU 23a2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.812 UTC [gossip.pull] HandleMessage -> DEBU 23a3 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.812 UTC [msp] DeserializeIdentity -> DEBU 23a4 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a5 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a6 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a7 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a8 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [msp] DeserializeIdentity -> DEBU 23a9 Obtaining identity" +"2019-09-24 01:05:10.813 UTC [gossip.pull] SendDigest -> DEBU 23aa Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:10.813 UTC [gossip.gossip] handleMessage -> DEBU 23ab Exiting" +"2019-09-24 01:05:10.819 UTC [gossip.comm] func1 -> DEBU 23ac Got message: GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.819 UTC [gossip.gossip] handleMessage -> DEBU 23ad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.819 UTC [gossip.gossip] handleMessage -> DEBU 23ae Exiting" +"2019-09-24 01:05:10.819 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23af Got message: GossipMessage: tag:EMPTY mem_req:\025\227\361\265\361\211" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.819 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 23b0 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:10.819 UTC [msp] DeserializeIdentity -> DEBU 23b1 Obtaining identity" +"2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 23b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.821 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 23b4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.821 UTC [policies] Evaluate -> DEBU 23b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:10.822 UTC [policies] Evaluate -> DEBU 23b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:10.822 UTC [policies] Evaluate -> DEBU 23b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:10.822 UTC [cauthdsl] func1 -> DEBU 23b8 0xc003943710 gate 1569287110822445100 evaluation starts" +"2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23b9 0xc003943710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23ba 0xc003943710 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23bb 0xc003943710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:10.822 UTC [cauthdsl] func2 -> DEBU 23bc 0xc003943710 principal evaluation fails" +"2019-09-24 01:05:10.823 UTC [cauthdsl] func1 -> DEBU 23bd 0xc003943710 gate 1569287110822445100 evaluation fails" +"2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23be Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.823 UTC [policies] Evaluate -> DEBU 23c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:10.823 UTC [cauthdsl] func1 -> DEBU 23c1 0xc00390c0c0 gate 1569287110823726300 evaluation starts" +"2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c2 0xc00390c0c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c3 0xc00390c0c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.824 UTC [cauthdsl] func2 -> DEBU 23c4 0xc00390c0c0 principal matched by identity 0" +"2019-09-24 01:05:10.824 UTC [msp.identity] Verify -> DEBU 23c5 Verify: digest = 00000000 2b 89 6c c2 ea e8 f3 9b 02 01 10 09 06 9d 7d 60 |+.l...........}`| +00000010 8e f4 ae 3a c6 84 89 c3 23 b1 a0 f1 45 09 cd 7b |...:....#...E..{|" +"2019-09-24 01:05:10.824 UTC [msp.identity] Verify -> DEBU 23c6 Verify: sig = 00000000 30 45 02 21 00 c9 26 4a de a5 86 e3 9e 5e b2 a2 |0E.!..&J.....^..| +00000010 fc 0a 08 9a bc 28 24 73 a3 c0 42 e4 21 96 b4 4e |.....($s..B.!..N| +00000020 58 f5 b0 6e d8 02 20 1e c2 32 41 ed 66 1e 59 56 |X..n.. ..2A.f.YV| +00000030 b1 59 6e b0 c6 90 55 c6 1d 17 0b b4 f3 46 19 86 |.Yn...U......F..| +00000040 3e 15 97 f1 b5 f1 89 |>......|" +"2019-09-24 01:05:10.825 UTC [cauthdsl] func2 -> DEBU 23c7 0xc00390c0c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:10.825 UTC [cauthdsl] func1 -> DEBU 23c8 0xc00390c0c0 gate 1569287110823726300 evaluation succeeds" +"2019-09-24 01:05:10.825 UTC [policies] Evaluate -> DEBU 23c9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.825 UTC [policies] Evaluate -> DEBU 23ca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.826 UTC [policies] Evaluate -> DEBU 23cb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:10.826 UTC [policies] Evaluate -> DEBU 23cc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:10.826 UTC [gossip.discovery] handleAliveMessage -> DEBU 23cd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:10.826 UTC [gossip.discovery] learnExistingMembers -> DEBU 23ce Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23cf updating membership: timestamp: " +"2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d0 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:10.827 UTC [gossip.discovery] learnExistingMembers -> DEBU 23d2 Exiting" +"2019-09-24 01:05:10.827 UTC [gossip.discovery] handleAliveMessage -> DEBU 23d3 Exiting" +"2019-09-24 01:05:10.827 UTC [gossip.discovery] handleMsgFromComm -> DEBU 23d4 Exiting" +"2019-09-24 01:05:10.827 UTC [gossip.discovery] sendMemResponse -> DEBU 23d5 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d6 Obtaining identity" +"2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d7 Obtaining identity" +"2019-09-24 01:05:10.828 UTC [msp] DeserializeIdentity -> DEBU 23d8 Obtaining identity" +"2019-09-24 01:05:10.829 UTC [gossip.comm] Send -> DEBU 23d9 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.829 UTC [gossip.comm] sendToEndpoint -> DEBU 23da Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.829 UTC [gossip.comm] sendToEndpoint -> DEBU 23db Exiting" +"2019-09-24 01:05:10.829 UTC [gossip.discovery] sendMemResponse -> DEBU 23dc Exiting, replying with alive: alive: alive:\025\227\361\265\361\211" > alive: " +"2019-09-24 01:05:10.866 UTC [gossip.pull] Hello -> DEBU 23dd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:10.868 UTC [gossip.comm] Send -> DEBU 23de Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.868 UTC [gossip.pull] Hello -> DEBU 23df Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:10.868 UTC [gossip.comm] Send -> DEBU 23e0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.868 UTC [gossip.pull] Hello -> DEBU 23e1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:10.870 UTC [gossip.comm] Send -> DEBU 23e2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.870 UTC [gossip.comm] sendToEndpoint -> DEBU 23e3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.870 UTC [gossip.comm] sendToEndpoint -> DEBU 23e4 Exiting" +"2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e6 Exiting" +"2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.871 UTC [gossip.comm] sendToEndpoint -> DEBU 23e8 Exiting" +"2019-09-24 01:05:10.873 UTC [gossip.comm] func1 -> DEBU 23e9 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.873 UTC [gossip.gossip] handleMessage -> DEBU 23ea Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.873 UTC [gossip.pull] HandleMessage -> DEBU 23eb GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.873 UTC [gossip.gossip] handleMessage -> DEBU 23ec Exiting" +"2019-09-24 01:05:10.874 UTC [gossip.comm] func1 -> DEBU 23ed Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.874 UTC [gossip.gossip] handleMessage -> DEBU 23ee Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.874 UTC [gossip.pull] HandleMessage -> DEBU 23ef GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.874 UTC [gossip.gossip] handleMessage -> DEBU 23f0 Exiting" +"2019-09-24 01:05:10.878 UTC [gossip.comm] func1 -> DEBU 23f1 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.878 UTC [gossip.gossip] handleMessage -> DEBU 23f2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.878 UTC [gossip.pull] HandleMessage -> DEBU 23f3 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.878 UTC [gossip.gossip] handleMessage -> DEBU 23f4 Exiting" +"2019-09-24 01:05:10.879 UTC [gossip.comm] func1 -> DEBU 23f5 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.879 UTC [gossip.gossip] handleMessage -> DEBU 23f6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.879 UTC [gossip.pull] HandleMessage -> DEBU 23f7 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.879 UTC [msp] DeserializeIdentity -> DEBU 23f8 Obtaining identity" +"2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23f9 Obtaining identity" +"2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fa Obtaining identity" +"2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fb Obtaining identity" +"2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fc Obtaining identity" +"2019-09-24 01:05:10.880 UTC [msp] DeserializeIdentity -> DEBU 23fd Obtaining identity" +"2019-09-24 01:05:10.881 UTC [gossip.pull] SendDigest -> DEBU 23fe Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:10.881 UTC [gossip.gossip] handleMessage -> DEBU 23ff Exiting" +"2019-09-24 01:05:10.888 UTC [msp] GetDefaultSigningIdentity -> DEBU 2400 Obtaining default signing identity" +"2019-09-24 01:05:10.888 UTC [msp.identity] Sign -> DEBU 2401 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151021 " +"2019-09-24 01:05:10.888 UTC [msp.identity] Sign -> DEBU 2402 Sign: digest: 36BB88EB363ACB5850D103C45B8107FB6566BCE7487AC9C172C611AC8A2B3B01 " +"2019-09-24 01:05:10.888 UTC [msp] GetDefaultSigningIdentity -> DEBU 2403 Obtaining default signing identity" +"2019-09-24 01:05:10.889 UTC [msp.identity] Sign -> DEBU 2404 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:10.889 UTC [msp.identity] Sign -> DEBU 2405 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:10.890 UTC [gossip.comm] Send -> DEBU 2406 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.890 UTC [msp] DeserializeIdentity -> DEBU 2407 Obtaining identity" +"2019-09-24 01:05:10.891 UTC [gossip.comm] Send -> DEBU 2408 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.891 UTC [msp] DeserializeIdentity -> DEBU 2409 Obtaining identity" +"2019-09-24 01:05:10.891 UTC [gossip.comm] Send -> DEBU 240a Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.891 UTC [gossip.comm] sendToEndpoint -> DEBU 240b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240c Exiting" +"2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240e Exiting" +"2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 240f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.892 UTC [gossip.comm] sendToEndpoint -> DEBU 2410 Exiting" +"2019-09-24 01:05:10.901 UTC [gossip.comm] func1 -> DEBU 2411 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2412 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2413 Exiting" +"2019-09-24 01:05:10.902 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2414 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.comm] func1 -> DEBU 2415 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.comm] func1 -> DEBU 2416 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.gossip] handleMessage -> DEBU 2417 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2418 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:10.903 UTC [msp.identity] Verify -> DEBU 2419 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +"2019-09-24 01:05:10.903 UTC [msp.identity] Verify -> DEBU 241a Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +00000040 89 d8 a3 aa 96 74 |.....t|" +"2019-09-24 01:05:10.904 UTC [gossip.comm] func1 -> DEBU 241b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 241c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:10.905 UTC [gossip.discovery] isSentByMe -> DEBU 241d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:10.905 UTC [gossip.discovery] handleAliveMessage -> DEBU 241e Exiting" +"2019-09-24 01:05:10.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 241f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:10.906 UTC [msp.identity] Verify -> DEBU 2420 Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +"2019-09-24 01:05:10.906 UTC [msp.identity] Verify -> DEBU 2421 Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2422 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:10.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 2423 Exiting" +"2019-09-24 01:05:10.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2424 Exiting" +"2019-09-24 01:05:10.907 UTC [gossip.gossip] handleMessage -> DEBU 2425 Exiting" +"2019-09-24 01:05:10.907 UTC [gossip.gossip] handleMessage -> DEBU 2426 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.908 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2427 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2428 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:10.908 UTC [msp] DeserializeIdentity -> DEBU 2429 Obtaining identity" +"2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 242a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 242b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.909 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 242c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:10.909 UTC [policies] Evaluate -> DEBU 242f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:10.910 UTC [cauthdsl] func1 -> DEBU 2430 0xc003895f60 gate 1569287110910114100 evaluation starts" +"2019-09-24 01:05:10.910 UTC [cauthdsl] func2 -> DEBU 2431 0xc003895f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.910 UTC [cauthdsl] func2 -> DEBU 2432 0xc003895f60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.911 UTC [cauthdsl] func2 -> DEBU 2433 0xc003895f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:10.912 UTC [cauthdsl] func2 -> DEBU 2434 0xc003895f60 principal evaluation fails" +"2019-09-24 01:05:10.913 UTC [cauthdsl] func1 -> DEBU 2435 0xc003895f60 gate 1569287110910114100 evaluation fails" +"2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2436 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2437 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.914 UTC [policies] Evaluate -> DEBU 2438 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:10.915 UTC [cauthdsl] func1 -> DEBU 2439 0xc0038827b0 gate 1569287110915416800 evaluation starts" +"2019-09-24 01:05:10.915 UTC [cauthdsl] func2 -> DEBU 243a 0xc0038827b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.916 UTC [cauthdsl] func2 -> DEBU 243b 0xc0038827b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.917 UTC [cauthdsl] func2 -> DEBU 243c 0xc0038827b0 principal matched by identity 0" +"2019-09-24 01:05:10.917 UTC [msp.identity] Verify -> DEBU 243d Verify: digest = 00000000 ab 80 6e 57 a1 9e 89 4a 9c 7c 20 37 cd d1 68 52 |..nW...J.| 7..hR| +00000010 9a 48 2b 16 74 d6 cf 3b 7c fb db d9 c9 4a 48 ed |.H+.t..;|....JH.|" +"2019-09-24 01:05:10.917 UTC [msp.identity] Verify -> DEBU 243e Verify: sig = 00000000 30 44 02 20 36 7e 81 86 6f 77 70 9b fc 95 f0 26 |0D. 6~..owp....&| +00000010 04 fa 44 8b f4 d9 f2 d8 f3 db 1f 6d b2 bf 98 51 |..D........m...Q| +00000020 69 0a a3 cc 02 20 1a 83 ac 40 76 08 d0 84 04 d8 |i.... ...@v.....| +00000030 10 17 4c 46 af 15 6e f3 3a bc 75 38 b5 ff 61 4d |..LF..n.:.u8..aM| +00000040 1a 61 e0 12 12 b6 |.a....|" +"2019-09-24 01:05:10.919 UTC [cauthdsl] func2 -> DEBU 243f 0xc0038827b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:10.920 UTC [cauthdsl] func1 -> DEBU 2440 0xc0038827b0 gate 1569287110915416800 evaluation succeeds" +"2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2441 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2442 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.920 UTC [policies] Evaluate -> DEBU 2443 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:10.921 UTC [policies] Evaluate -> DEBU 2444 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:10.921 UTC [gossip.discovery] handleAliveMessage -> DEBU 2445 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:10.922 UTC [gossip.discovery] learnExistingMembers -> DEBU 2446 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:10.923 UTC [gossip.discovery] learnExistingMembers -> DEBU 2447 updating membership: timestamp: " +"2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 2448 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 2449 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:10.924 UTC [gossip.discovery] learnExistingMembers -> DEBU 244a Exiting" +"2019-09-24 01:05:10.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 244b Exiting" +"2019-09-24 01:05:10.925 UTC [gossip.discovery] sendMemResponse -> DEBU 244c Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:10.925 UTC [msp] DeserializeIdentity -> DEBU 244d Obtaining identity" +"2019-09-24 01:05:10.926 UTC [msp] DeserializeIdentity -> DEBU 244e Obtaining identity" +"2019-09-24 01:05:10.926 UTC [msp] DeserializeIdentity -> DEBU 244f Obtaining identity" +"2019-09-24 01:05:10.927 UTC [gossip.comm] Send -> DEBU 2450 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:10.928 UTC [gossip.discovery] sendMemResponse -> DEBU 2451 Exiting, replying with alive: alive: alive:\025\227\361\265\361\211" > alive: " +"2019-09-24 01:05:10.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2452 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2453 Exiting" +"2019-09-24 01:05:10.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2454 Exiting" +"2019-09-24 01:05:10.931 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2455 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2457 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:10.931 UTC [gossip.gossip] handleMessage -> DEBU 2456 Exiting" +"2019-09-24 01:05:10.931 UTC [gossip.gossip] handleMessage -> DEBU 2458 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.932 UTC [msp.identity] Verify -> DEBU 2459 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +"2019-09-24 01:05:10.932 UTC [msp.identity] Verify -> DEBU 245a Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +00000040 89 d8 a3 aa 96 74 |.....t|" +"2019-09-24 01:05:10.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 245b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:10.932 UTC [gossip.discovery] isSentByMe -> DEBU 245c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:10.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 245d Exiting" +"2019-09-24 01:05:10.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 245e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:10.933 UTC [msp] DeserializeIdentity -> DEBU 245f Obtaining identity" +"2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2460 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2461 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.933 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2462 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:10.933 UTC [policies] Evaluate -> DEBU 2463 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:10.933 UTC [policies] Evaluate -> DEBU 2464 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 2465 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 2466 0xc003829370 gate 1569287110934061600 evaluation starts" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2467 0xc003829370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2468 0xc003829370 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 2469 0xc003829370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func2 -> DEBU 246a 0xc003829370 principal evaluation fails" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 246b 0xc003829370 gate 1569287110934061600 evaluation fails" +"2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:10.934 UTC [policies] Evaluate -> DEBU 246e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:10.934 UTC [cauthdsl] func1 -> DEBU 246f 0xc003829bb0 gate 1569287110934803600 evaluation starts" +"2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2470 0xc003829bb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2471 0xc003829bb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2472 0xc003829bb0 principal matched by identity 0" +"2019-09-24 01:05:10.935 UTC [msp.identity] Verify -> DEBU 2473 Verify: digest = 00000000 2b 89 6c c2 ea e8 f3 9b 02 01 10 09 06 9d 7d 60 |+.l...........}`| +00000010 8e f4 ae 3a c6 84 89 c3 23 b1 a0 f1 45 09 cd 7b |...:....#...E..{|" +"2019-09-24 01:05:10.935 UTC [msp.identity] Verify -> DEBU 2474 Verify: sig = 00000000 30 45 02 21 00 c9 26 4a de a5 86 e3 9e 5e b2 a2 |0E.!..&J.....^..| +00000010 fc 0a 08 9a bc 28 24 73 a3 c0 42 e4 21 96 b4 4e |.....($s..B.!..N| +00000020 58 f5 b0 6e d8 02 20 1e c2 32 41 ed 66 1e 59 56 |X..n.. ..2A.f.YV| +00000030 b1 59 6e b0 c6 90 55 c6 1d 17 0b b4 f3 46 19 86 |.Yn...U......F..| +00000040 3e 15 97 f1 b5 f1 89 |>......|" +"2019-09-24 01:05:10.935 UTC [cauthdsl] func2 -> DEBU 2475 0xc003829bb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:10.935 UTC [cauthdsl] func1 -> DEBU 2476 0xc003829bb0 gate 1569287110934803600 evaluation succeeds" +"2019-09-24 01:05:10.935 UTC [policies] Evaluate -> DEBU 2477 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 2478 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 2479 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:10.936 UTC [policies] Evaluate -> DEBU 247a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:10.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 247b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:10.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 247c Exiting" +"2019-09-24 01:05:10.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 247d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:10.937 UTC [msp.identity] Verify -> DEBU 247e Verify: digest = 00000000 13 d6 f9 79 96 c8 40 aa c2 69 53 df 9a 06 a1 0d |...y..@..iS.....| +00000010 0a cf 7f 93 fe 0f 32 67 7a 8b 76 9e b7 13 ad 6f |......2gz.v....o|" +"2019-09-24 01:05:10.937 UTC [msp.identity] Verify -> DEBU 247f Verify: sig = 00000000 30 45 02 21 00 82 54 3a 03 22 6c b5 b5 5b b3 44 |0E.!..T:."l..[.D| +00000010 cf 92 c9 ea 1d d1 13 cb 52 2a 21 a5 f3 dd c7 c1 |........R*!.....| +00000020 80 0a 12 64 83 02 20 53 15 31 5b c6 91 07 13 2e |...d.. S.1[.....| +00000030 47 9a 3c 4b 4d c7 ad fc 8d 46 c6 32 26 0f 07 de |G. DEBU 2480 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:10.937 UTC [gossip.discovery] handleAliveMessage -> DEBU 2481 Exiting" +"2019-09-24 01:05:10.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2482 Exiting" +"2019-09-24 01:05:10.938 UTC [gossip.gossip] handleMessage -> DEBU 2483 Exiting" +"2019-09-24 01:05:10.938 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2484 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:10.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2485 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:10.938 UTC [msp.identity] Verify -> DEBU 2486 Verify: digest = 00000000 36 bb 88 eb 36 3a cb 58 50 d1 03 c4 5b 81 07 fb |6...6:.XP...[...| +00000010 65 66 bc e7 48 7a c9 c1 72 c6 11 ac 8a 2b 3b 01 |ef..Hz..r....+;.|" +"2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2487 Verify: sig = 00000000 30 44 02 20 29 63 ed 09 8d 63 08 d7 c6 c8 c0 eb |0D. )c...c......| +00000010 c4 f0 5b f0 0a 74 de b0 f5 81 32 4b 12 d6 76 9c |..[..t....2K..v.| +00000020 b1 50 85 0a 02 20 68 e3 da 84 13 cd 14 ca 22 57 |.P... h......."W| +00000030 0f d4 3b a3 13 7b e6 30 f8 3a 83 c5 d7 87 00 65 |..;..{.0.:.....e| +00000040 89 d8 a3 aa 96 74 |.....t|" +"2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2488 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:10.939 UTC [msp.identity] Verify -> DEBU 2489 Verify: sig = 00000000 30 45 02 21 00 b0 07 88 37 ce 1e 6c 18 fc fd 22 |0E.!....7..l..."| +00000010 ee 86 70 cf a3 6e 6c c5 e5 04 42 d8 b4 ec 2a ba |..p..nl...B...*.| +00000020 c9 c8 c7 22 e2 02 20 7c af 4f 8e a5 c4 75 ae f7 |...".. |.O...u..| +00000030 de 06 e9 61 01 a1 8a cf da 8b c4 5b a3 70 a5 87 |...a.......[.p..| +00000040 fb 0e 0b f9 75 c2 56 |....u.V|" +"2019-09-24 01:05:10.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 248a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:10.940 UTC [gossip.discovery] isSentByMe -> DEBU 248b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:10.940 UTC [gossip.discovery] handleAliveMessage -> DEBU 248c Exiting" +"2019-09-24 01:05:10.940 UTC [gossip.discovery] handleMsgFromComm -> DEBU 248d Exiting" +"2019-09-24 01:05:10.990 UTC [dockercontroller] deployImage -> DEBU 248e Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4" +"2019-09-24 01:05:10.990 UTC [dockercontroller] createContainer -> DEBU 248f create container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:05:10.990 UTC [dockercontroller] getDockerHostConfig -> DEBU 2490 docker container hostconfig NetworkMode: hlf_net" +"2019-09-24 01:05:11.088 UTC [dockercontroller] createContainer -> DEBU 2491 created container" imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +"2019-09-24 01:05:11.745 UTC [gossip.election] waitForInterrupt -> DEBU 2492 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:11.745 UTC [gossip.election] IsLeader -> DEBU 2493 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:11.747 UTC [msp] GetDefaultSigningIdentity -> DEBU 2494 Obtaining default signing identity" +"2019-09-24 01:05:11.747 UTC [msp.identity] Sign -> DEBU 2495 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100A1801 " +"2019-09-24 01:05:11.748 UTC [msp.identity] Sign -> DEBU 2496 Sign: digest: 470F3468657CFB93B980914EC45013AF0AE2F3EC488A227A8F4A6A9089BB4F73 " +"2019-09-24 01:05:11.748 UTC [gossip.election] waitForInterrupt -> DEBU 2497 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 2498 Obtaining identity" +"2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 2499 Obtaining identity" +"2019-09-24 01:05:11.749 UTC [msp] DeserializeIdentity -> DEBU 249a Obtaining identity" +"2019-09-24 01:05:11.750 UTC [msp] DeserializeIdentity -> DEBU 249b Obtaining identity" +"2019-09-24 01:05:11.751 UTC [gossip.comm] Send -> DEBU 249c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:11.751 UTC [msp] DeserializeIdentity -> DEBU 249d Obtaining identity" +"2019-09-24 01:05:11.751 UTC [msp] DeserializeIdentity -> DEBU 249e Obtaining identity" +"2019-09-24 01:05:11.752 UTC [gossip.comm] sendToEndpoint -> DEBU 249f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:11.752 UTC [gossip.comm] sendToEndpoint -> DEBU 24a0 Exiting" +"2019-09-24 01:05:11.911 UTC [dockercontroller] Start -> DEBU 24a1 Started container dev-peer0.org1.example.com-exp02-1.0" +"2019-09-24 01:05:11.912 UTC [container] unlockContainer -> DEBU 24a2 container lock deleted(exp02-1.0)" +"2019-09-24 01:05:11.912 UTC [container] lockContainer -> DEBU 24a3 waiting for container(exp02-1.0) lock" +"2019-09-24 01:05:11.912 UTC [container] lockContainer -> DEBU 24a4 got container (exp02-1.0) lock" +"2019-09-24 01:05:11.912 UTC [container] unlockContainer -> DEBU 24a5 container lock deleted(exp02-1.0)" +"2019-09-24 01:05:11.948 UTC [chaincode.accesscontrol] authenticate -> DEBU 24a6 Chaincode exp02:1.0 's authentication is authorized" +"2019-09-24 01:05:11.948 UTC [chaincode] handleMessage -> DEBU 24a7 [] Fabric side handling ChaincodeMessage of type: REGISTER in state created" +"2019-09-24 01:05:11.948 UTC [chaincode] HandleRegister -> DEBU 24a8 Received REGISTER in state created" +"2019-09-24 01:05:11.949 UTC [chaincode] Register -> DEBU 24a9 registered handler complete for chaincode exp02:1.0" +"2019-09-24 01:05:11.949 UTC [chaincode] HandleRegister -> DEBU 24aa Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED" +"2019-09-24 01:05:11.950 UTC [chaincode] HandleRegister -> DEBU 24ab Changed state to established for name:"exp02:1.0" " +"2019-09-24 01:05:11.950 UTC [chaincode] sendReady -> DEBU 24ac sending READY for chaincode name:"exp02:1.0" " +"2019-09-24 01:05:11.951 UTC [chaincode] sendReady -> DEBU 24ad Changed to state ready for chaincode name:"exp02:1.0" " +"2019-09-24 01:05:11.952 UTC [chaincode] Launch -> DEBU 24ae launch complete" +"2019-09-24 01:05:11.952 UTC [chaincode] Execute -> DEBU 24af Entry" +"2019-09-24 01:05:11.954 UTC [chaincode] handleMessage -> DEBU 24b0 [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:11.954 UTC [chaincode] HandleTransaction -> DEBU 24b1 [920b3a8e] handling PUT_STATE from chaincode" +"2019-09-24 01:05:11.954 UTC [chaincode] HandleTransaction -> DEBU 24b2 [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:11.955 UTC [chaincode] handleMessage -> DEBU 24b3 [920b3a8e] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:11.956 UTC [chaincode] HandleTransaction -> DEBU 24b4 [920b3a8e] handling PUT_STATE from chaincode" +"2019-09-24 01:05:11.956 UTC [chaincode] HandleTransaction -> DEBU 24b5 [920b3a8e] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:11.957 UTC [chaincode] handleMessage -> DEBU 24b6 [920b3a8e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:11.957 UTC [chaincode] Notify -> DEBU 24b7 [920b3a8e] notifying Txid:920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, channelID:businesschannel" +"2019-09-24 01:05:11.957 UTC [chaincode] Execute -> DEBU 24b8 Exit" +"2019-09-24 01:05:11.958 UTC [endorser] callChaincode -> INFO 24b9 [businesschannel][920b3a8e] Exit chaincode: name:"lscc" (31611ms)" +"2019-09-24 01:05:11.958 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 24ba Simulation completed, getting simulation results" +"2019-09-24 01:05:11.958 UTC [lockbasedtxmgr] Done -> DEBU 24bb Done with transaction simulation / query execution [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +"2019-09-24 01:05:11.958 UTC [endorser] SimulateProposal -> DEBU 24bc [businesschannel][920b3a8e] Exit" +"2019-09-24 01:05:11.958 UTC [endorser] endorseProposal -> DEBU 24bd [businesschannel][920b3a8e] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:11.958 UTC [endorser] endorseProposal -> DEBU 24be [businesschannel][920b3a8e] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:11.958 UTC [endorser] EndorseWithPlugin -> DEBU 24bf Entering endorsement for {plugin: escc, channel: businesschannel, tx: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, chaincode: lscc}" +"2019-09-24 01:05:11.959 UTC [msp.identity] Sign -> DEBU 24c0 Sign: plaintext: 0A201A6FC0751CAAD428F774801633B9...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:11.959 UTC [msp.identity] Sign -> DEBU 24c1 Sign: digest: 283B7DE9CCFD6F00CE9D252F211CD8FE2857E676AF956918FDC7B0D7EC714F45 " +"2019-09-24 01:05:11.959 UTC [endorser] EndorseWithPlugin -> DEBU 24c2 Exiting {plugin: escc, channel: businesschannel, tx: 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, chaincode: lscc}" +"2019-09-24 01:05:11.959 UTC [endorser] endorseProposal -> DEBU 24c3 [businesschannel][920b3a8e] Exit" +"2019-09-24 01:05:11.959 UTC [lockbasedtxmgr] Done -> DEBU 24c4 Done with transaction simulation / query execution [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +"2019-09-24 01:05:11.960 UTC [endorser] func1 -> DEBU 24c5 Exit: request from 172.18.0.5:49898" +"2019-09-24 01:05:11.960 UTC [comm.grpc.server] 1 -> INFO 24c6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49898 grpc.code=OK grpc.call_duration=31.6218462s +"2019-09-24 01:05:11.980 UTC [grpc] infof -> DEBU 24c7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:11.981 UTC [grpc] infof -> DEBU 24c8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:12.425 UTC [endorser] ProcessProposal -> DEBU 24c9 Entering: request from 172.18.0.5:49906" +"2019-09-24 01:05:12.426 UTC [protoutils] ValidateProposalMessage -> DEBU 24ca ValidateProposalMessage starts for signed proposal 0xc003698730" +"2019-09-24 01:05:12.426 UTC [protoutils] validateChannelHeader -> DEBU 24cb validateChannelHeader info: header type 3" +"2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24cc begin" +"2019-09-24 01:05:12.426 UTC [msp] GetManagerForChain -> DEBU 24cd Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24ce creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:12.426 UTC [protoutils] checkSignatureFromCreator -> DEBU 24cf creator is valid" +"2019-09-24 01:05:12.426 UTC [msp.identity] Verify -> DEBU 24d0 Verify: digest = 00000000 37 41 4e c0 1f 14 a4 de fb 36 ba 03 c2 f7 af 39 |7AN......6.....9| +00000010 6c 57 bf ff da 59 6d a2 3d fc bd 20 07 fa 8d 12 |lW...Ym.=.. ....|" +"2019-09-24 01:05:12.426 UTC [msp.identity] Verify -> DEBU 24d1 Verify: sig = 00000000 30 45 02 21 00 87 48 a3 d8 a8 c7 f9 34 bd fc bd |0E.!..H.....4...| +00000010 e6 a4 91 50 a2 c8 5c e4 55 10 77 c0 6a a1 25 46 |...P..\.U.w.j.%F| +00000020 66 35 4b fb d9 02 20 38 b1 9b 44 9a b1 c8 cb 73 |f5K... 8..D....s| +00000030 26 ca b2 9f 42 26 03 80 27 3d 0e 78 46 dc 25 6f |&...B&..'=.xF.%o| +00000040 f3 70 03 37 60 23 1b |.p.7`#.|" +"2019-09-24 01:05:12.427 UTC [protoutils] checkSignatureFromCreator -> DEBU 24d2 exits successfully" +"2019-09-24 01:05:12.427 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 24d3 validateChaincodeProposalMessage starts for proposal 0xc0026eb880, header 0xc003698b40" +"2019-09-24 01:05:12.428 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 24d4 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:12.428 UTC [endorser] preProcess -> DEBU 24d5 [businesschannel][13c0b6ef] processing txid: 13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe" +"2019-09-24 01:05:12.428 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 24d6 retrieveTransactionByID() - txId = [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +"2019-09-24 01:05:12.429 UTC [aclmgmt] CheckACL -> DEBU 24d7 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:12.429 UTC [aclmgmt] CheckACL -> DEBU 24d8 acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24d9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24da This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:12.429 UTC [policies] Evaluate -> DEBU 24db == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:12.430 UTC [cauthdsl] func1 -> DEBU 24dc 0xc003562d10 gate 1569287112430509800 evaluation starts" +"2019-09-24 01:05:12.430 UTC [cauthdsl] func2 -> DEBU 24dd 0xc003562d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:12.430 UTC [cauthdsl] func2 -> DEBU 24de 0xc003562d10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:12.430 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 24df Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:12.431 UTC [msp] Validate -> DEBU 24e0 MSP Org1MSP validating identity" +"2019-09-24 01:05:12.431 UTC [msp] getCertificationChain -> DEBU 24e1 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:12.432 UTC [cauthdsl] func2 -> DEBU 24e2 0xc003562d10 principal matched by identity 0" +"2019-09-24 01:05:12.432 UTC [msp.identity] Verify -> DEBU 24e3 Verify: digest = 00000000 37 41 4e c0 1f 14 a4 de fb 36 ba 03 c2 f7 af 39 |7AN......6.....9| +00000010 6c 57 bf ff da 59 6d a2 3d fc bd 20 07 fa 8d 12 |lW...Ym.=.. ....|" +"2019-09-24 01:05:12.432 UTC [msp.identity] Verify -> DEBU 24e4 Verify: sig = 00000000 30 45 02 21 00 87 48 a3 d8 a8 c7 f9 34 bd fc bd |0E.!..H.....4...| +00000010 e6 a4 91 50 a2 c8 5c e4 55 10 77 c0 6a a1 25 46 |...P..\.U.w.j.%F| +00000020 66 35 4b fb d9 02 20 38 b1 9b 44 9a b1 c8 cb 73 |f5K... 8..D....s| +00000030 26 ca b2 9f 42 26 03 80 27 3d 0e 78 46 dc 25 6f |&...B&..'=.xF.%o| +00000040 f3 70 03 37 60 23 1b |.p.7`#.|" +"2019-09-24 01:05:12.432 UTC [cauthdsl] func2 -> DEBU 24e5 0xc003562d10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:12.432 UTC [cauthdsl] func1 -> DEBU 24e6 0xc003562d10 gate 1569287112430509800 evaluation succeeds" +"2019-09-24 01:05:12.432 UTC [policies] Evaluate -> DEBU 24e7 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:12.432 UTC [policies] Evaluate -> DEBU 24e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:12.433 UTC [policies] Evaluate -> DEBU 24e9 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:12.433 UTC [policies] Evaluate -> DEBU 24ea == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:12.434 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 24eb constructing new tx simulator" +"2019-09-24 01:05:12.434 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 24ec constructing new tx simulator txid = [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +"2019-09-24 01:05:12.434 UTC [endorser] SimulateProposal -> DEBU 24ed [businesschannel][13c0b6ef] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:12.434 UTC [stateleveldb] GetState -> DEBU 24ee GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:12.435 UTC [endorser] SimulateProposal -> DEBU 24ef [businesschannel][13c0b6ef] Exit" +"2019-09-24 01:05:12.435 UTC [lockbasedtxmgr] Done -> DEBU 24f0 Done with transaction simulation / query execution [13c0b6efbd37d94b01bdef1e715a512303ea750a1b0d8c65119e7e8cfd990efe]" +"2019-09-24 01:05:12.435 UTC [endorser] func1 -> DEBU 24f1 Exit: request from 172.18.0.5:49906" +"2019-09-24 01:05:12.436 UTC [comm.grpc.server] 1 -> INFO 24f2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49906 grpc.code=OK grpc.call_duration=10.7942ms +"2019-09-24 01:05:12.440 UTC [grpc] infof -> DEBU 24f3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:12.441 UTC [grpc] infof -> DEBU 24f4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:13.558 UTC [gossip.comm] func1 -> DEBU 24f5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.558 UTC [gossip.gossip] handleMessage -> DEBU 24f6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.558 UTC [gossip.gossip] handleMessage -> DEBU 24f7 Exiting" +"2019-09-24 01:05:13.558 UTC [gossip.discovery] handleMsgFromComm -> DEBU 24f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.559 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 24f9 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:13.559 UTC [msp.identity] Verify -> DEBU 24fa Verify: digest = 00000000 d5 0b 75 07 02 0d 2d c4 14 44 2f 8e 53 d5 a5 f8 |..u...-..D/.S...| +00000010 8f 80 d3 65 99 ce b3 71 8d 7a e6 b9 85 6e 52 9a |...e...q.z...nR.|" +"2019-09-24 01:05:13.559 UTC [msp.identity] Verify -> DEBU 24fb Verify: sig = 00000000 30 44 02 20 35 b9 5c 9d 06 ee ca 2a 94 e2 70 5f |0D. 5.\....*..p_| +00000010 0c b8 f5 7d 7f 9c 61 66 81 80 fc 55 61 3a 73 44 |...}..af...Ua:sD| +00000020 b2 91 fe 31 02 20 6d 8a 8d c0 e8 6b bc 5c fc ec |...1. m....k.\..| +00000030 0d ed aa c9 e9 84 00 49 5d 86 ff d6 1a ea 71 bc |.......I].....q.| +00000040 ab e4 ce a7 2e 78 |.....x|" +"2019-09-24 01:05:13.561 UTC [gossip.discovery] handleAliveMessage -> DEBU 24fc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24fe updating membership: timestamp: " +"2019-09-24 01:05:13.561 UTC [gossip.discovery] learnExistingMembers -> DEBU 24ff Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:13.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2500 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:13.562 UTC [gossip.discovery] learnExistingMembers -> DEBU 2501 Exiting" +"2019-09-24 01:05:13.562 UTC [gossip.discovery] handleAliveMessage -> DEBU 2502 Exiting" +"2019-09-24 01:05:13.562 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2503 Exiting" +"2019-09-24 01:05:13.567 UTC [gossip.comm] func1 -> DEBU 2504 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.567 UTC [gossip.gossip] handleMessage -> DEBU 2505 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.567 UTC [gossip.gossip] handleMessage -> DEBU 2506 Exiting" +"2019-09-24 01:05:13.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2507 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.567 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2508 Exiting" +"2019-09-24 01:05:13.568 UTC [gossip.comm] func1 -> DEBU 2509 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.568 UTC [gossip.gossip] handleMessage -> DEBU 250a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.568 UTC [gossip.gossip] handleMessage -> DEBU 250b Exiting" +"2019-09-24 01:05:13.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 250c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.568 UTC [gossip.discovery] handleMsgFromComm -> DEBU 250d Exiting" +"2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 250e Obtaining identity" +"2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 250f Obtaining identity" +"2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 2510 Obtaining identity" +"2019-09-24 01:05:13.569 UTC [gossip.comm] Send -> DEBU 2511 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:13.569 UTC [msp] DeserializeIdentity -> DEBU 2512 Obtaining identity" +"2019-09-24 01:05:13.570 UTC [gossip.comm] Send -> DEBU 2513 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:13.570 UTC [gossip.comm] sendToEndpoint -> DEBU 2514 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.570 UTC [gossip.comm] sendToEndpoint -> DEBU 2515 Exiting" +"2019-09-24 01:05:13.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2516 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:13.571 UTC [gossip.comm] sendToEndpoint -> DEBU 2517 Exiting" +"2019-09-24 01:05:13.693 UTC [msp] DeserializeIdentity -> DEBU 2518 Obtaining identity" +"2019-09-24 01:05:13.693 UTC [msp] DeserializeIdentity -> DEBU 2519 Obtaining identity" +"2019-09-24 01:05:13.694 UTC [gossip.comm] Send -> DEBU 251a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.695 UTC [gossip.comm] sendToEndpoint -> DEBU 251e Exiting" +"2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.696 UTC [gossip.comm] sendToEndpoint -> DEBU 251f Exiting" +"2019-09-24 01:05:13.694 UTC [gossip.comm] sendToEndpoint -> DEBU 251d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.697 UTC [gossip.comm] func1 -> DEBU 2520 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.697 UTC [gossip.gossip] handleMessage -> DEBU 2521 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.697 UTC [gossip.comm] sendToEndpoint -> DEBU 2522 Exiting" +"2019-09-24 01:05:13.699 UTC [gossip.comm] func1 -> DEBU 2523 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.697 UTC [msp] DeserializeIdentity -> DEBU 2524 Obtaining identity" +"2019-09-24 01:05:13.700 UTC [msp] DeserializeIdentity -> DEBU 2525 Obtaining identity" +"2019-09-24 01:05:13.701 UTC [gossip.comm] func1 -> DEBU 2526 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.701 UTC [msp] DeserializeIdentity -> DEBU 2527 Obtaining identity" +"2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2528 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2529 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 252a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.702 UTC [policies] Evaluate -> DEBU 252d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.703 UTC [cauthdsl] func1 -> DEBU 252e 0xc0034da120 gate 1569287113703609100 evaluation starts" +"2019-09-24 01:05:13.703 UTC [cauthdsl] func2 -> DEBU 252f 0xc0034da120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2530 0xc0034da120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2531 0xc0034da120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.704 UTC [cauthdsl] func2 -> DEBU 2532 0xc0034da120 principal evaluation fails" +"2019-09-24 01:05:13.704 UTC [cauthdsl] func1 -> DEBU 2533 0xc0034da120 gate 1569287113703609100 evaluation fails" +"2019-09-24 01:05:13.704 UTC [policies] Evaluate -> DEBU 2534 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.704 UTC [policies] Evaluate -> DEBU 2535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.705 UTC [policies] Evaluate -> DEBU 2536 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.705 UTC [cauthdsl] func1 -> DEBU 2537 0xc0034daaa0 gate 1569287113705540700 evaluation starts" +"2019-09-24 01:05:13.705 UTC [cauthdsl] func2 -> DEBU 2538 0xc0034daaa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.705 UTC [cauthdsl] func2 -> DEBU 2539 0xc0034daaa0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.706 UTC [cauthdsl] func2 -> DEBU 253a 0xc0034daaa0 principal matched by identity 0" +"2019-09-24 01:05:13.706 UTC [msp.identity] Verify -> DEBU 253b Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:13.706 UTC [msp.identity] Verify -> DEBU 253c Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:13.707 UTC [cauthdsl] func2 -> DEBU 253d 0xc0034daaa0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.707 UTC [cauthdsl] func1 -> DEBU 253e 0xc0034daaa0 gate 1569287113705540700 evaluation succeeds" +"2019-09-24 01:05:13.707 UTC [policies] Evaluate -> DEBU 253f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.707 UTC [policies] Evaluate -> DEBU 2540 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.708 UTC [policies] Evaluate -> DEBU 2541 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.708 UTC [policies] Evaluate -> DEBU 2542 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.708 UTC [msp.identity] Verify -> DEBU 2543 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:13.708 UTC [msp.identity] Verify -> DEBU 2544 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:13.709 UTC [msp] DeserializeIdentity -> DEBU 2545 Obtaining identity" +"2019-09-24 01:05:13.709 UTC [msp] DeserializeIdentity -> DEBU 2546 Obtaining identity" +"2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2547 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2548 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2549 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.710 UTC [policies] Evaluate -> DEBU 254c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.710 UTC [cauthdsl] func1 -> DEBU 254d 0xc0034c2a40 gate 1569287113710514700 evaluation starts" +"2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 254e 0xc0034c2a40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 254f 0xc0034c2a40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 2550 0xc0034c2a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.710 UTC [cauthdsl] func2 -> DEBU 2551 0xc0034c2a40 principal evaluation fails" +"2019-09-24 01:05:13.711 UTC [cauthdsl] func1 -> DEBU 2552 0xc0034c2a40 gate 1569287113710514700 evaluation fails" +"2019-09-24 01:05:13.715 UTC [policies] Evaluate -> DEBU 2553 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.715 UTC [policies] Evaluate -> DEBU 2554 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.716 UTC [policies] Evaluate -> DEBU 2555 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.716 UTC [cauthdsl] func1 -> DEBU 2556 0xc0034c3300 gate 1569287113716449500 evaluation starts" +"2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2557 0xc0034c3300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2558 0xc0034c3300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.716 UTC [cauthdsl] func2 -> DEBU 2559 0xc0034c3300 principal matched by identity 0" +"2019-09-24 01:05:13.717 UTC [msp.identity] Verify -> DEBU 255a Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:13.717 UTC [msp.identity] Verify -> DEBU 255b Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:13.717 UTC [cauthdsl] func2 -> DEBU 255c 0xc0034c3300 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.717 UTC [cauthdsl] func1 -> DEBU 255d 0xc0034c3300 gate 1569287113716449500 evaluation succeeds" +"2019-09-24 01:05:13.717 UTC [policies] Evaluate -> DEBU 255e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 255f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 2560 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.718 UTC [policies] Evaluate -> DEBU 2561 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.719 UTC [msp.identity] Verify -> DEBU 2562 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:13.719 UTC [msp.identity] Verify -> DEBU 2563 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:13.719 UTC [gossip.gossip] handleMessage -> DEBU 2564 Exiting" +"2019-09-24 01:05:13.719 UTC [gossip.gossip] handleMessage -> DEBU 2565 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2566 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2567 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:13.720 UTC [msp.identity] Verify -> DEBU 2568 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:13.721 UTC [msp.identity] Verify -> DEBU 2569 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:13.721 UTC [msp] DeserializeIdentity -> DEBU 256a Obtaining identity" +"2019-09-24 01:05:13.721 UTC [msp] DeserializeIdentity -> DEBU 256b Obtaining identity" +"2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 256c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 256e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.722 UTC [policies] Evaluate -> DEBU 256f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.722 UTC [policies] Evaluate -> DEBU 2570 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.723 UTC [policies] Evaluate -> DEBU 2571 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.723 UTC [cauthdsl] func1 -> DEBU 2572 0xc0034824a0 gate 1569287113723286000 evaluation starts" +"2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2573 0xc0034824a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2574 0xc0034824a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2575 0xc0034824a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.723 UTC [cauthdsl] func2 -> DEBU 2576 0xc0034824a0 principal evaluation fails" +"2019-09-24 01:05:13.724 UTC [cauthdsl] func1 -> DEBU 2577 0xc0034824a0 gate 1569287113723286000 evaluation fails" +"2019-09-24 01:05:13.724 UTC [policies] Evaluate -> DEBU 2578 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.724 UTC [policies] Evaluate -> DEBU 2579 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.725 UTC [policies] Evaluate -> DEBU 257a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.725 UTC [cauthdsl] func1 -> DEBU 257b 0xc003482ce0 gate 1569287113725101800 evaluation starts" +"2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257c 0xc003482ce0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257d 0xc003482ce0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.725 UTC [cauthdsl] func2 -> DEBU 257e 0xc003482ce0 principal matched by identity 0" +"2019-09-24 01:05:13.726 UTC [msp.identity] Verify -> DEBU 257f Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:13.726 UTC [msp.identity] Verify -> DEBU 2580 Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:13.726 UTC [cauthdsl] func2 -> DEBU 2581 0xc003482ce0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.727 UTC [cauthdsl] func1 -> DEBU 2582 0xc003482ce0 gate 1569287113725101800 evaluation succeeds" +"2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2583 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2584 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2585 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.727 UTC [policies] Evaluate -> DEBU 2586 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.727 UTC [msp] DeserializeIdentity -> DEBU 2587 Obtaining identity" +"2019-09-24 01:05:13.728 UTC [msp] DeserializeIdentity -> DEBU 2588 Obtaining identity" +"2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2589 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.728 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 258b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.729 UTC [policies] Evaluate -> DEBU 258e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func1 -> DEBU 258f 0xc0034504d0 gate 1569287113729523900 evaluation starts" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2590 0xc0034504d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2591 0xc0034504d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2592 0xc0034504d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func2 -> DEBU 2593 0xc0034504d0 principal evaluation fails" +"2019-09-24 01:05:13.729 UTC [cauthdsl] func1 -> DEBU 2594 0xc0034504d0 gate 1569287113729523900 evaluation fails" +"2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2595 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2596 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.730 UTC [policies] Evaluate -> DEBU 2597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.730 UTC [cauthdsl] func1 -> DEBU 2598 0xc003450d10 gate 1569287113730601100 evaluation starts" +"2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 2599 0xc003450d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 259a 0xc003450d10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.730 UTC [cauthdsl] func2 -> DEBU 259b 0xc003450d10 principal matched by identity 0" +"2019-09-24 01:05:13.731 UTC [msp.identity] Verify -> DEBU 259c Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:13.731 UTC [msp.identity] Verify -> DEBU 259d Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:13.731 UTC [cauthdsl] func2 -> DEBU 259e 0xc003450d10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.731 UTC [cauthdsl] func1 -> DEBU 259f 0xc003450d10 gate 1569287113730601100 evaluation succeeds" +"2019-09-24 01:05:13.731 UTC [policies] Evaluate -> DEBU 25a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.731 UTC [policies] Evaluate -> DEBU 25a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.732 UTC [policies] Evaluate -> DEBU 25a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.732 UTC [policies] Evaluate -> DEBU 25a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.732 UTC [gossip.gossip] handleMessage -> DEBU 25a4 Exiting" +"2019-09-24 01:05:13.732 UTC [gossip.gossip] handleMessage -> DEBU 25a5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 725 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.732 UTC [msp] DeserializeIdentity -> DEBU 25a6 Obtaining identity" +"2019-09-24 01:05:13.732 UTC [msp] DeserializeIdentity -> DEBU 25a7 Obtaining identity" +"2019-09-24 01:05:13.733 UTC [msp] DeserializeIdentity -> DEBU 25a8 Obtaining identity" +"2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25a9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25aa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25ab Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ac == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ad This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.733 UTC [policies] Evaluate -> DEBU 25ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.734 UTC [cauthdsl] func1 -> DEBU 25af 0xc003436830 gate 1569287113734027400 evaluation starts" +"2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b0 0xc003436830 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b1 0xc003436830 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b2 0xc003436830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.734 UTC [cauthdsl] func2 -> DEBU 25b3 0xc003436830 principal evaluation fails" +"2019-09-24 01:05:13.735 UTC [cauthdsl] func1 -> DEBU 25b4 0xc003436830 gate 1569287113734027400 evaluation fails" +"2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.735 UTC [policies] Evaluate -> DEBU 25b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.735 UTC [cauthdsl] func1 -> DEBU 25b8 0xc003437070 gate 1569287113735495200 evaluation starts" +"2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25b9 0xc003437070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25ba 0xc003437070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.735 UTC [cauthdsl] func2 -> DEBU 25bb 0xc003437070 principal matched by identity 0" +"2019-09-24 01:05:13.736 UTC [msp.identity] Verify -> DEBU 25bc Verify: digest = 00000000 be ac 62 20 13 67 54 9f c6 ce b4 51 ae c7 50 77 |..b .gT....Q..Pw| +00000010 92 48 a8 3e 82 05 39 1e cf cc 97 a7 75 a3 ea db |.H.>..9.....u...|" +"2019-09-24 01:05:13.736 UTC [msp.identity] Verify -> DEBU 25bd Verify: sig = 00000000 30 45 02 21 00 94 d8 02 a2 6f f1 a8 5f e1 8c 44 |0E.!.....o.._..D| +00000010 c3 21 35 9d 64 d7 fc 46 16 bf 75 4b 19 87 29 82 |.!5.d..F..uK..).| +00000020 35 2a 7b 4b fb 02 20 6a f7 ca 0e 9e fb 2e 5e c7 |5*{K.. j......^.| +00000030 ca 5e 2b 7c bb aa c6 4e 49 81 e7 43 bf 85 fb a2 |.^+|...NI..C....| +00000040 e8 99 f7 4b a8 27 0b |...K.'.|" +"2019-09-24 01:05:13.736 UTC [cauthdsl] func2 -> DEBU 25be 0xc003437070 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.736 UTC [cauthdsl] func1 -> DEBU 25bf 0xc003437070 gate 1569287113735495200 evaluation succeeds" +"2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.736 UTC [policies] Evaluate -> DEBU 25c2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.737 UTC [policies] Evaluate -> DEBU 25c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c4 Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c5 Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:13.737 UTC [msp.identity] Verify -> DEBU 25c6 Verify: digest = 00000000 8a 88 93 1d 3d 13 9f 94 1f 31 a9 e7 38 a0 73 e5 |....=....1..8.s.| +00000010 c0 96 91 66 14 ea 81 35 93 60 1a b0 e7 ce e6 3b |...f...5.`.....;|" +"2019-09-24 01:05:13.738 UTC [msp.identity] Verify -> DEBU 25c7 Verify: sig = 00000000 30 44 02 20 36 1b 10 59 f8 ac 52 87 fc 19 0c f0 |0D. 6..Y..R.....| +00000010 7c be d8 9e 3f e2 36 b4 e1 6a 4d 02 cf 5a a3 d2 ||...?.6..jM..Z..| +00000020 e4 8c f9 2b 02 20 3a e3 06 38 d6 51 0a b7 81 53 |...+. :..8.Q...S| +00000030 59 0c 5f 33 11 81 c4 56 0a df 8f 77 4f 24 53 1a |Y._3...V...wO$S.| +00000040 75 4a a7 55 37 8e |uJ.U7.|" +"2019-09-24 01:05:13.738 UTC [msp] DeserializeIdentity -> DEBU 25c8 Obtaining identity" +"2019-09-24 01:05:13.738 UTC [msp] DeserializeIdentity -> DEBU 25c9 Obtaining identity" +"2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 25ca Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25cb Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.740 UTC [msp] DeserializeIdentity -> DEBU 25cc Obtaining identity" +"2019-09-24 01:05:13.740 UTC [msp] DeserializeIdentity -> DEBU 25cd Obtaining identity" +"2019-09-24 01:05:13.740 UTC [gossip.pull] Hello -> DEBU 25ce Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:13.741 UTC [msp] DeserializeIdentity -> DEBU 25cf Obtaining identity" +"2019-09-24 01:05:13.741 UTC [msp] DeserializeIdentity -> DEBU 25d0 Obtaining identity" +"2019-09-24 01:05:13.741 UTC [gossip.comm] Send -> DEBU 25d1 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:13.742 UTC [gossip.comm] sendToEndpoint -> DEBU 25d2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.742 UTC [gossip.comm] sendToEndpoint -> DEBU 25d3 Exiting" +"2019-09-24 01:05:13.739 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 25d4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:13.742 UTC [policies] Evaluate -> DEBU 25d5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:13.743 UTC [gossip.comm] func1 -> DEBU 25d6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.744 UTC [policies] Evaluate -> DEBU 25d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:13.744 UTC [policies] Evaluate -> DEBU 25d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:13.744 UTC [cauthdsl] func1 -> DEBU 25d9 0xc0034037d0 gate 1569287113744331800 evaluation starts" +"2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25da 0xc0034037d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25db 0xc0034037d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25dc 0xc0034037d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:13.745 UTC [cauthdsl] func2 -> DEBU 25dd 0xc0034037d0 principal evaluation fails" +"2019-09-24 01:05:13.745 UTC [cauthdsl] func1 -> DEBU 25de 0xc0034037d0 gate 1569287113744331800 evaluation fails" +"2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25df Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25e0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:13.745 UTC [policies] Evaluate -> DEBU 25e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:13.746 UTC [cauthdsl] func1 -> DEBU 25e2 0xc0033c6010 gate 1569287113746214800 evaluation starts" +"2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e3 0xc0033c6010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e4 0xc0033c6010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:13.746 UTC [cauthdsl] func2 -> DEBU 25e5 0xc0033c6010 principal matched by identity 0" +"2019-09-24 01:05:13.746 UTC [msp.identity] Verify -> DEBU 25e6 Verify: digest = 00000000 72 9e 5d 1d 4f c7 cb 35 e1 dc f6 a1 41 bc a3 c3 |r.].O..5....A...| +00000010 12 91 2b ac 06 24 43 6a 25 31 63 6f 4b 70 6b ad |..+..$Cj%1coKpk.|" +"2019-09-24 01:05:13.747 UTC [msp.identity] Verify -> DEBU 25e7 Verify: sig = 00000000 30 44 02 20 7f 79 fa a0 c2 94 67 0e f6 b4 e3 b7 |0D. .y....g.....| +00000010 60 a3 8b 07 05 e4 cb 0f 5a 19 8d 02 43 52 36 e7 |`.......Z...CR6.| +00000020 2c 2b 2c 44 02 20 39 fc 87 2c 4c ec 3b 26 4e 89 |,+,D. 9..,L.;&N.| +00000030 6f d5 7b d8 0f 66 b2 5d e3 41 32 1a 45 29 e0 ad |o.{..f.].A2.E)..| +00000040 71 b0 09 f6 0b e3 |q.....|" +"2019-09-24 01:05:13.747 UTC [cauthdsl] func2 -> DEBU 25e8 0xc0033c6010 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:13.747 UTC [cauthdsl] func1 -> DEBU 25e9 0xc0033c6010 gate 1569287113746214800 evaluation succeeds" +"2019-09-24 01:05:13.747 UTC [policies] Evaluate -> DEBU 25ea Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.747 UTC [policies] Evaluate -> DEBU 25eb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:13.748 UTC [policies] Evaluate -> DEBU 25ec Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:13.748 UTC [policies] Evaluate -> DEBU 25ed == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25ee Exiting" +"2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25ef Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.748 UTC [gossip.pull] HandleMessage -> DEBU 25f0 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.748 UTC [gossip.gossip] handleMessage -> DEBU 25f1 Exiting" +"2019-09-24 01:05:13.878 UTC [gossip.comm] func1 -> DEBU 25f2 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.878 UTC [gossip.gossip] handleMessage -> DEBU 25f3 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.878 UTC [msp] DeserializeIdentity -> DEBU 25f4 Obtaining identity" +"2019-09-24 01:05:13.879 UTC [msp] DeserializeIdentity -> DEBU 25f5 Obtaining identity" +"2019-09-24 01:05:13.879 UTC [gossip.gossip] handleMessage -> DEBU 25f6 Exiting" +"2019-09-24 01:05:13.894 UTC [gossip.comm] func1 -> DEBU 25f7 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.894 UTC [gossip.gossip] handleMessage -> DEBU 25f8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.895 UTC [gossip.pull] HandleMessage -> DEBU 25f9 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:13.895 UTC [gossip.pull] SendDigest -> DEBU 25fa Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:13.895 UTC [gossip.gossip] handleMessage -> DEBU 25fb Exiting" +"2019-09-24 01:05:14.001 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 25fc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.002 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 25fd Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 25fe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 25ff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.003 UTC [policies] Evaluate -> DEBU 2600 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:05:14.003 UTC [msp] DeserializeIdentity -> DEBU 2601 Obtaining identity" +"2019-09-24 01:05:14.005 UTC [msp.identity] newIdentity -> DEBU 2602 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICDTCCAbOgAwIBAgIQbtQFkVUkkkK26OUHGrVwjzAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTE5MDkyNDAwNTkwMFoXDTI5MDkyMTAwNTkwMFowWTELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAEOXmodEUfAELL1I8AcNusKzM0UlzcfgTjHUq2h3yFe8tJCiVs +YGMtywBv6QrhMkApEyDQgDeVcTY3DgBWt6lt2KNNMEswDgYDVR0PAQH/BAQDAgeA +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgg1whLZo7+QC4iYtaXqEJkMJ2R4QZ +oXrvAlR4KScIoKIwCgYIKoZIzj0EAwIDSAAwRQIhAObUvHjLCmbhUxaiurtLATvU +PoFy2/NxPAiwEoFZOa7sAiAbBw0HU6nDQDtfd+M6xAWjvzctTXWNufIQNpbft+kr +fQ== +-----END CERTIFICATE-----" +"2019-09-24 01:05:14.006 UTC [cauthdsl] func1 -> DEBU 2603 0xc003372080 gate 1569287114006981400 evaluation starts" +"2019-09-24 01:05:14.007 UTC [cauthdsl] func2 -> DEBU 2604 0xc003372080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.007 UTC [cauthdsl] func2 -> DEBU 2605 0xc003372080 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.007 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2606 Checking if identity satisfies MEMBER role for OrdererMSP" +"2019-09-24 01:05:14.010 UTC [msp] Validate -> DEBU 2607 MSP OrdererMSP validating identity" +"2019-09-24 01:05:14.012 UTC [cauthdsl] func2 -> DEBU 2608 0xc003372080 principal matched by identity 0" +"2019-09-24 01:05:14.017 UTC [msp.identity] Verify -> DEBU 2609 Verify: digest = 00000000 6e df 11 bf 53 6d ce 34 a8 64 be b5 77 1b 1b 28 |n...Sm.4.d..w..(| +00000010 30 1b 6a 11 9e f4 a9 4a 7f c1 ee 32 a4 33 65 50 |0.j....J...2.3eP|" +"2019-09-24 01:05:14.017 UTC [msp.identity] Verify -> DEBU 260a Verify: sig = 00000000 30 45 02 21 00 d6 0b a8 d5 cb c9 86 ba 24 73 c0 |0E.!.........$s.| +00000010 63 ac b4 85 9d 03 52 82 a6 f1 d6 3e 88 be 52 22 |c.....R....>..R"| +00000020 83 06 12 1b c4 02 20 25 d8 c5 33 f6 ba 40 48 d8 |...... %..3..@H.| +00000030 be 44 b9 59 05 e1 49 1f fd 02 a3 0f 6c 15 fb 2d |.D.Y..I.....l..-| +00000040 fd 16 76 fc 47 04 cf |..v.G..|" +"2019-09-24 01:05:14.019 UTC [cauthdsl] func2 -> DEBU 260b 0xc003372080 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.019 UTC [cauthdsl] func1 -> DEBU 260c 0xc003372080 gate 1569287114006981400 evaluation succeeds" +"2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:14.019 UTC [policies] Evaluate -> DEBU 260f Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:14.020 UTC [policies] Evaluate -> DEBU 2610 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:14.021 UTC [blocksProvider] DeliverBlocks -> DEBU 2611 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-09-24 01:05:14.021 UTC [gossip.state] addPayload -> DEBU 2612 [businesschannel] Adding payload to local buffer, blockNum = [3]" +"2019-09-24 01:05:14.023 UTC [gossip.state] addPayload -> DEBU 2613 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:05:14.023 UTC [blocksProvider] DeliverBlocks -> DEBU 2614 [businesschannel] Gossiping block [3], peers number [3]" +"2019-09-24 01:05:14.024 UTC [gossip.channel] AddToMsgStore -> DEBU 2615 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:05:14.024 UTC [gossip.pull] Add -> DEBU 2616 Added 3, total items: 3" +"2019-09-24 01:05:14.024 UTC [gossip.state] deliverPayloads -> DEBU 2617 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3]" +"2019-09-24 01:05:14.024 UTC [gossip.state] deliverPayloads -> DEBU 2618 [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger" +"2019-09-24 01:05:14.025 UTC [gossip.privdata] StoreBlock -> INFO 2619 [businesschannel] Received block [3] from buffer" +"2019-09-24 01:05:14.025 UTC [gossip.privdata] StoreBlock -> DEBU 261a [businesschannel] Validating block [3]" +"2019-09-24 01:05:14.026 UTC [committer.txvalidator] Validate -> DEBU 261b [businesschannel] START Block Validation for block [3]" +"2019-09-24 01:05:14.026 UTC [committer.txvalidator] Validate -> DEBU 261c expecting 1 block validation responses" +"2019-09-24 01:05:14.026 UTC [committer.txvalidator] validateTx -> DEBU 261d [businesschannel] validateTx starts for block 0xc0003b3c00 env 0xc0034cc820 txn 0" +"2019-09-24 01:05:14.028 UTC [protoutils] ValidateTransaction -> DEBU 261e ValidateTransactionEnvelope starts for envelope 0xc0034cc820" +"2019-09-24 01:05:14.028 UTC [protoutils] ValidateTransaction -> DEBU 261f Header is channel_header:"\010\003\032\014\010\250\327\245\354\005\020\220\325\231\261\001\"\017businesschannel*@920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\333~ \007\222\207\n\037\005\344\201my\377z\"\013\035\275\306y@k\177" " +"2019-09-24 01:05:14.028 UTC [protoutils] validateChannelHeader -> DEBU 2620 validateChannelHeader info: header type 3" +"2019-09-24 01:05:14.028 UTC [protoutils] checkSignatureFromCreator -> DEBU 2621 begin" +"2019-09-24 01:05:14.029 UTC [msp] GetManagerForChain -> DEBU 2622 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:14.031 UTC [protoutils] checkSignatureFromCreator -> DEBU 2623 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:14.032 UTC [protoutils] checkSignatureFromCreator -> DEBU 2624 creator is valid" +"2019-09-24 01:05:14.032 UTC [msp.identity] Verify -> DEBU 2625 Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +"2019-09-24 01:05:14.034 UTC [msp.identity] Verify -> DEBU 2626 Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +00000040 cf d1 1e e6 b1 d6 |......|" +"2019-09-24 01:05:14.034 UTC [protoutils] checkSignatureFromCreator -> DEBU 2627 exits successfully" +"2019-09-24 01:05:14.035 UTC [msp] DeserializeIdentity -> DEBU 2628 Obtaining identity" +"2019-09-24 01:05:14.035 UTC [msp] DeserializeIdentity -> DEBU 2629 Obtaining identity" +"2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262a Obtaining identity" +"2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262b Obtaining identity" +"2019-09-24 01:05:14.036 UTC [gossip.comm] Send -> DEBU 262c Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262d Obtaining identity" +"2019-09-24 01:05:14.036 UTC [msp] DeserializeIdentity -> DEBU 262e Obtaining identity" +"2019-09-24 01:05:14.036 UTC [gossip.comm] sendToEndpoint -> DEBU 262f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4537 bytes, seq: 3}, Envelope: 4567 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.036 UTC [gossip.comm] sendToEndpoint -> DEBU 2630 Exiting" +"2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2631 validateEndorserTransaction starts for data 0xc0039c0000, header channel_header:"\010\003\032\014\010\250\327\245\354\005\020\220\325\231\261\001\"\017businesschannel*@920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC\nxyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP\no90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49\nBAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030\333~ \007\222\207\n\037\005\344\201my\377z\"\013\035\275\306y@k\177" " +"2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2632 validateEndorserTransaction info: there are 1 actions" +"2019-09-24 01:05:14.037 UTC [protoutils] validateEndorserTransaction -> DEBU 2633 validateEndorserTransaction info: signature header is valid" +"2019-09-24 01:05:14.037 UTC [protoutils] ValidateTransaction -> DEBU 2634 ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 01:05:14.037 UTC [committer.txvalidator] validateTx -> DEBU 2635 Transaction is for channel businesschannel" +"2019-09-24 01:05:14.037 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2636 retrieveTransactionByID() - txId = [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640]" +"2019-09-24 01:05:14.037 UTC [committer.txvalidator] validateTx -> DEBU 2637 Validating transaction vscc tx validate" +"2019-09-24 01:05:14.037 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2638 [businesschannel] VSCCValidateTx starts for bytes 0xc00397a000" +"2019-09-24 01:05:14.037 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2639 Validating Tx 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 01:05:14.037 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 263a constructing new query executor txid = [8392fa6f-05f6-49ff-962e-b5278f8eec75]" +"2019-09-24 01:05:14.037 UTC [lockbasedtxmgr] Done -> DEBU 263b Done with transaction simulation / query execution [8392fa6f-05f6-49ff-962e-b5278f8eec75]" +"2019-09-24 01:05:14.037 UTC [msp] DeserializeIdentity -> DEBU 263c Obtaining identity" +"2019-09-24 01:05:14.037 UTC [msp.identity] newIdentity -> DEBU 263d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQJ5UYoXl1ZxOj2E66JWCk1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEP1u3vJEGqYY2 +6g/8pTb90zMG88S/CUyGjJf+PADR0pook3JOUwbvoqRsWCUkOgEqpeNtqCxPnHMQ +PbvIGp7ZAKNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDRwAwRAIgbpAanlezo3yw1qqL02zfirkWl/YeTdQxer8M4yibHbkCIB9IGUUO +doG6yQnBXfyaCtfNYdpei3EL+t2aNq+jDhnO +-----END CERTIFICATE-----" +"2019-09-24 01:05:14.038 UTC [cauthdsl] func1 -> DEBU 263e 0xc003312430 gate 1569287114037998300 evaluation starts" +"2019-09-24 01:05:14.038 UTC [cauthdsl] func2 -> DEBU 263f 0xc003312430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.038 UTC [cauthdsl] func2 -> DEBU 2640 0xc003312430 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.038 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2641 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:14.038 UTC [msp] Validate -> DEBU 2642 MSP Org1MSP validating identity" +"2019-09-24 01:05:14.039 UTC [msp] getCertificationChain -> DEBU 2643 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:14.039 UTC [cauthdsl] func2 -> DEBU 2644 0xc003312430 principal matched by identity 0" +"2019-09-24 01:05:14.042 UTC [msp.identity] Verify -> DEBU 2645 Verify: digest = 00000000 28 3b 7d e9 cc fd 6f 00 ce 9d 25 2f 21 1c d8 fe |(;}...o...%/!...| +00000010 28 57 e6 76 af 95 69 18 fd c7 b0 d7 ec 71 4f 45 |(W.v..i......qOE|" +"2019-09-24 01:05:14.043 UTC [msp.identity] Verify -> DEBU 2646 Verify: sig = 00000000 30 45 02 21 00 b1 5f 76 7c f1 ba cb d9 0f 91 62 |0E.!.._v|......b| +00000010 df 74 be 01 f9 8c 93 57 3e 93 d5 00 ef b5 21 dc |.t.....W>.....!.| +00000020 a9 7b 25 c6 06 02 20 02 d8 e4 97 0b 3f 4a d4 ce |.{%... .....?J..| +00000030 8a ff 8d 3b 44 4c f3 3c 9b 9b 4e 84 c4 38 08 50 |...;DL.<..N..8.P| +00000040 d9 d8 7a c5 c6 fd 0c |..z....|" +"2019-09-24 01:05:14.045 UTC [cauthdsl] func2 -> DEBU 2647 0xc003312430 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 2648 0xc003312430 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 2649 0xc003312430 skipping identity 0 because it has already been used" +"2019-09-24 01:05:14.046 UTC [cauthdsl] func2 -> DEBU 264a 0xc003312430 principal evaluation fails" +"2019-09-24 01:05:14.046 UTC [cauthdsl] func1 -> DEBU 264b 0xc003312430 gate 1569287114037998300 evaluation succeeds" +"2019-09-24 01:05:14.047 UTC [vscc] Validate -> DEBU 264c VSCC info: doing special validation for LSCC" +"2019-09-24 01:05:14.048 UTC [vscc] ValidateLSCCInvocation -> DEBU 264d VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-09-24 01:05:14.049 UTC [vscc] ValidateLSCCInvocation -> DEBU 264e VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}}" +"2019-09-24 01:05:14.050 UTC [vscc] ValidateLSCCInvocation -> DEBU 264f Namespace exp02" +"2019-09-24 01:05:14.050 UTC [vscc] ValidateLSCCInvocation -> DEBU 2650 Namespace lscc" +"2019-09-24 01:05:14.051 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2651 constructing new query executor txid = [cc7dabd2-2cf5-40c1-9697-ebf10d333b77]" +"2019-09-24 01:05:14.051 UTC [stateleveldb] GetState -> DEBU 2652 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.051 UTC [lockbasedtxmgr] Done -> DEBU 2653 Done with transaction simulation / query execution [cc7dabd2-2cf5-40c1-9697-ebf10d333b77]" +"2019-09-24 01:05:14.051 UTC [vscc] ValidateLSCCInvocation -> DEBU 2654 Validating deploy for cc exp02 version 1.0" +"2019-09-24 01:05:14.052 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2655 constructing new query executor txid = [80b8b37c-bf02-4d17-8ba4-13025b921e75]" +"2019-09-24 01:05:14.052 UTC [stateleveldb] GetState -> DEBU 2656 GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 01:05:14.053 UTC [lockbasedtxmgr] Done -> DEBU 2657 Done with transaction simulation / query execution [80b8b37c-bf02-4d17-8ba4-13025b921e75]" +"2019-09-24 01:05:14.053 UTC [cauthdsl] func1 -> DEBU 2658 0xc0032be750 gate 1569287114053420500 evaluation starts" +"2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 2659 0xc0032be750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 265a 0xc0032be750 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.053 UTC [cauthdsl] func2 -> DEBU 265b 0xc0032be750 principal matched by identity 0" +"2019-09-24 01:05:14.054 UTC [msp.identity] Verify -> DEBU 265c Verify: digest = 00000000 62 74 e7 78 09 4c 39 f4 9c 73 e6 11 8a 02 cf ae |bt.x.L9..s......| +00000010 ee 62 17 2f 38 80 35 e4 dd dc 6e 7d f0 07 93 e2 |.b./8.5...n}....|" +"2019-09-24 01:05:14.054 UTC [msp.identity] Verify -> DEBU 265d Verify: sig = 00000000 30 44 02 20 12 88 3a a1 21 35 9a 31 69 ea fe d1 |0D. ..:.!5.1i...| +00000010 11 00 60 ce f6 b1 9f e0 c1 1c 70 ae ec 5e 1e 67 |..`.......p..^.g| +00000020 2b ac ae 1a 02 20 34 d6 5d ec 9a b1 51 59 07 31 |+.... 4.]...QY.1| +00000030 21 1d a7 ed 87 88 a4 e2 c4 a2 d0 3d 3a 67 57 d6 |!..........=:gW.| +00000040 cf d1 1e e6 b1 d6 |......|" +"2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 265e 0xc0032be750 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 265f 0xc0032be750 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 2660 0xc0032be750 skipping identity 0 because it has already been used" +"2019-09-24 01:05:14.055 UTC [cauthdsl] func2 -> DEBU 2661 0xc0032be750 principal evaluation fails" +"2019-09-24 01:05:14.056 UTC [cauthdsl] func1 -> DEBU 2662 0xc0032be750 gate 1569287114053420500 evaluation succeeds" +"2019-09-24 01:05:14.056 UTC [vscc] Validate -> DEBU 2663 block 3, namespace: lscc, tx 0 validation results is: " +"2019-09-24 01:05:14.056 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2664 Transaction 920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 appears to be valid" +"2019-09-24 01:05:14.057 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2665 [businesschannel] VSCCValidateTx completes env bytes 0xc00397a000" +"2019-09-24 01:05:14.057 UTC [committer.txvalidator] Validate -> DEBU 2666 got result for idx 0, code 0" +"2019-09-24 01:05:14.057 UTC [committer.txvalidator] Validate -> INFO 2667 [businesschannel] Validated block [3] in 31ms" +"2019-09-24 01:05:14.058 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2668 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:05:14.058 UTC [gossip.privdata] StoreBlock -> DEBU 2669 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:05:14.058 UTC [kvledger] CommitWithPvtData -> DEBU 266a [businesschannel] Validating state for block [3]" +"2019-09-24 01:05:14.058 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266b Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:05:14.058 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266c lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:05:14.059 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 266d Validating new block with num trans = [1]" +"2019-09-24 01:05:14.059 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 266e ValidateAndPrepareBatch() for block number = [3]" +"2019-09-24 01:05:14.059 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 266f preprocessing ProtoBlock..." +"2019-09-24 01:05:14.059 UTC [valimpl] preprocessProtoBlock -> DEBU 2670 txType=ENDORSER_TRANSACTION" +"2019-09-24 01:05:14.060 UTC [stateleveldb] GetState -> DEBU 2671 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.060 UTC [statebasedval] validateKVRead -> DEBU 2672 Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil)" +"2019-09-24 01:05:14.060 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2673 Block [3] Transaction index [0] TxId [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] marked as valid by state validator" +"2019-09-24 01:05:14.061 UTC [valinternal] ApplyWriteSet -> DEBU 2674 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00258a500), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00258a540), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00258a580)}" +"2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2675 validating rwset..." +"2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2676 postprocessing ProtoBlock..." +"2019-09-24 01:05:14.061 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2677 ValidateAndPrepareBatch() complete" +"2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleStateUpdates -> DEBU 2678 Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0034ced70)}}" +"2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleStateUpdates -> INFO 2679 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-09-24 01:05:14.061 UTC [stateleveldb] GetState -> DEBU 267a GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 01:05:14.061 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 267b Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-09-24 01:05:14.062 UTC [chaincode.platform.metadata] GetMetadataAsTarEntries -> DEBU 267c Created metadata tar" +"2019-09-24 01:05:14.062 UTC [discovery.lifecycle] HandleChaincodeDeploy -> DEBU 267d Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}" +"2019-09-24 01:05:14.062 UTC [cceventmgmt] HandleChaincodeDeploy -> DEBU 267e Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]]" +"2019-09-24 01:05:14.062 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 267f Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})}" +"2019-09-24 01:05:14.062 UTC [stateleveldb] GetState -> DEBU 2680 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.063 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2681 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{{[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 74 53 85 89 111 88 108 49 90 120 79 106 50 69 54 54 74 87 67 107 49 84 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 120 79 84 65 53 77 106 81 119 77 68 85 53 77 68 66 97 70 119 48 121 79 84 65 53 77 106 69 119 77 68 85 53 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 67 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 80 49 117 51 118 74 69 71 113 89 89 50 10 54 103 47 56 112 84 98 57 48 122 77 71 56 56 83 47 67 85 121 71 106 74 102 43 80 65 68 82 48 112 111 111 107 51 74 79 85 119 98 118 111 113 82 115 87 67 85 107 79 103 69 113 112 101 78 116 113 67 120 80 110 72 77 81 10 80 98 118 73 71 112 55 90 65 75 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 118 86 82 65 48 65 115 74 77 112 121 101 68 116 109 67 72 106 110 86 79 70 67 69 102 65 70 119 100 84 57 57 51 65 53 82 103 76 51 77 109 66 52 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 98 112 65 97 110 108 101 122 111 51 121 119 49 113 113 76 48 50 122 102 105 114 107 87 108 47 89 101 84 100 81 120 101 114 56 77 52 121 105 98 72 98 107 67 73 66 57 73 71 85 85 79 10 100 111 71 54 121 81 110 66 88 102 121 97 67 116 102 78 89 100 112 101 105 51 69 76 43 116 50 97 78 113 43 106 68 104 110 79 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 52 58 144 240 110 207 56 101 78 202 52 49 57 223 134 6 123 34 173 95 237 156 185 141 51 29 190 63 231 47 70 30 2 32 66 224 77 177 176 27 188 75 228 104 123 24 87 128 51 157 226 182 180 248 196 248 125 250 44 190 102 227 160 241 180 195]} 0x1527e30}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002957380 0xc0027c1500 {{0 0} 0 0 0 0} {false}})]}" +"2019-09-24 01:05:14.063 UTC [stateleveldb] GetState -> DEBU 2682 GetState(). ns=lscc, key=exp02~collection" +"2019-09-24 01:05:14.063 UTC [lockbasedtxmgr] invokeNamespaceListeners -> DEBU 2683 Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc000191f40})}" +"2019-09-24 01:05:14.063 UTC [kvledger] CommitWithPvtData -> DEBU 2684 [businesschannel] Adding CommitHash to the block [3]" +"2019-09-24 01:05:14.063 UTC [kvledger] CommitWithPvtData -> DEBU 2685 [businesschannel] Committing block [3] to storage" +"2019-09-24 01:05:14.063 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2686 Writing block [3] to pvt block store" +"2019-09-24 01:05:14.057 UTC [committer.txvalidator] validateTx -> DEBU 2687 [businesschannel] validateTx completes for block 0xc0003b3c00 env 0xc0034cc820 txn 0" +"2019-09-24 01:05:14.065 UTC [pvtdatastorage] Prepare -> DEBU 2688 Saved 0 private data write sets for block [3]" +"2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 2689 Indexing block [blockNum=3, blockHash=[]byte{0x7b, 0xa8, 0x45, 0xce, 0x5d, 0x8d, 0x8, 0x76, 0x56, 0x78, 0x91, 0xdb, 0x7d, 0x1c, 0x31, 0x7b, 0xf2, 0x8, 0x34, 0xf4, 0xa9, 0x92, 0xfe, 0x49, 0x2f, 0x65, 0x4, 0x9f, 0x10, 0x2b, 0x3a, 0x80} txOffsets= +txId=920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640 locPointer=offset=70, bytesLength=3516 +]" +"2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 268a Adding txLoc [fileSuffixNum=0, offset=76909, bytesLength=3516] for tx ID: [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] to txid-index" +"2019-09-24 01:05:14.067 UTC [fsblkstorage] indexBlock -> DEBU 268b Adding txLoc [fileSuffixNum=0, offset=76909, bytesLength=3516] for tx number:[0] ID: [920b3a8ec40f362e24c71a4b81771dba6e26a3ba6eb68765b903b6a1d3494640] to blockNumTranNum index" +"2019-09-24 01:05:14.068 UTC [fsblkstorage] updateCheckpoint -> DEBU 268c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[81398], isChainEmpty=[false], lastBlockNumber=[3]" +"2019-09-24 01:05:14.068 UTC [pvtdatastorage] Commit -> DEBU 268d Committing private data for block [3]" +"2019-09-24 01:05:14.069 UTC [pvtdatastorage] Commit -> DEBU 268e Committed private data for block [3]" +"2019-09-24 01:05:14.070 UTC [kvledger] CommitWithPvtData -> DEBU 268f [businesschannel] Committing block [3] transactions to state database" +"2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2690 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2691 Committing updates to state database" +"2019-09-24 01:05:14.070 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2692 Building the expiry schedules based on the update batch" +"2019-09-24 01:05:14.070 UTC [lockbasedtxmgr] Commit -> DEBU 2693 Write lock acquired for committing updates to state database" +"2019-09-24 01:05:14.070 UTC [stateleveldb] ApplyUpdates -> DEBU 2694 Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}]" +"2019-09-24 01:05:14.070 UTC [stateleveldb] ApplyUpdates -> DEBU 2695 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 01:05:14.071 UTC [stateleveldb] ApplyUpdates -> DEBU 2696 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 01:05:14.072 UTC [lockbasedtxmgr] Commit -> DEBU 2697 Updates committed to state database and the write lock is released" +"2019-09-24 01:05:14.072 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2698 Preparing potential purge list working-set for expiringAtBlk [4]" +"2019-09-24 01:05:14.072 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2699 constructing new query executor txid = [b530097f-370c-4efd-87a7-fac3c5269d57]" +"2019-09-24 01:05:14.073 UTC [discovery.lifecycle] queryChaincodeDefinitions -> DEBU 269a Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]" +"2019-09-24 01:05:14.073 UTC [stateleveldb] GetState -> DEBU 269b GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.073 UTC [discovery.lifecycle] DeployedChaincodes -> DEBU 269c Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}]" +"2019-09-24 01:05:14.073 UTC [lockbasedtxmgr] Done -> DEBU 269d Done with transaction simulation / query execution [b530097f-370c-4efd-87a7-fac3c5269d57]" +"2019-09-24 01:05:14.073 UTC [discovery.lifecycle] processPendingUpdate -> DEBU 269e Updating channel businesschannel with [name:"exp02" version:"1.0" ]" +"2019-09-24 01:05:14.073 UTC [msp] GetDefaultSigningIdentity -> DEBU 269f Obtaining default signing identity" +"2019-09-24 01:05:14.074 UTC [msp.identity] Sign -> DEBU 26a0 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08031A0C0A0565787030321203312E30 " +"2019-09-24 01:05:14.074 UTC [msp.identity] Sign -> DEBU 26a1 Sign: digest: D6196EB0D8CB159321B6858FE3AACF325F0D9FB789F5C4F42AEC7B36ED3C91E2 " +"2019-09-24 01:05:14.074 UTC [discovery.lifecycle] fireChangeListeners -> DEBU 26a2 Listeners for channel businesschannel invoked" +"2019-09-24 01:05:14.079 UTC [gossip.comm] func1 -> DEBU 26a3 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.079 UTC [gossip.comm] func1 -> DEBU 26a4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.079 UTC [gossip.gossip] handleMessage -> DEBU 26a5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a6 Obtaining identity" +"2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a7 Obtaining identity" +"2019-09-24 01:05:14.080 UTC [msp] DeserializeIdentity -> DEBU 26a8 Obtaining identity" +"2019-09-24 01:05:14.080 UTC [gossip.gossip] handleMessage -> DEBU 26a9 Exiting" +"2019-09-24 01:05:14.081 UTC [gossip.gossip] handleMessage -> DEBU 26aa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.081 UTC [msp] DeserializeIdentity -> DEBU 26ab Obtaining identity" +"2019-09-24 01:05:14.081 UTC [leveldbhelper] GetIterator -> DEBU 26ac Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}]" +"2019-09-24 01:05:14.081 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 26ad No expiry entry found for expiringAtBlk [4]" +"2019-09-24 01:05:14.082 UTC [lockbasedtxmgr] func1 -> DEBU 26ae launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26b0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.082 UTC [kvledger] CommitWithPvtData -> DEBU 26b1 [businesschannel] Committing block [3] transactions to history database" +"2019-09-24 01:05:14.084 UTC [historyleveldb] Commit -> DEBU 26b3 Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions" +"2019-09-24 01:05:14.082 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26b2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.085 UTC [policies] Evaluate -> DEBU 26b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.086 UTC [cauthdsl] func1 -> DEBU 26b7 0xc003193330 gate 1569287114086273600 evaluation starts" +"2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26b8 0xc003193330 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26b9 0xc003193330 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.086 UTC [cauthdsl] func2 -> DEBU 26ba 0xc003193330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.087 UTC [cauthdsl] func2 -> DEBU 26bb 0xc003193330 principal evaluation fails" +"2019-09-24 01:05:14.087 UTC [historyleveldb] Commit -> DEBU 26bc Channel [businesschannel]: Updates committed to history database for blockNo [3]" +"2019-09-24 01:05:14.087 UTC [kvledger] CommitWithPvtData -> INFO 26bd [businesschannel] Committed block [3] with 1 transaction(s) in 28ms (state_validation=5ms block_and_pvtdata_commit=6ms state_commit=12ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81]" +"2019-09-24 01:05:14.087 UTC [msp] GetDefaultSigningIdentity -> DEBU 26be Obtaining default signing identity" +"2019-09-24 01:05:14.087 UTC [msp.identity] Sign -> DEBU 26bf Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08041A0C0A0565787030321203312E30 " +"2019-09-24 01:05:14.087 UTC [msp.identity] Sign -> DEBU 26c0 Sign: digest: C4FCA78480FEC28F1EF4F1368F7E94E2E41904024E55EB327DE5C37E2854E90F " +"2019-09-24 01:05:14.087 UTC [cauthdsl] func1 -> DEBU 26c1 0xc003193330 gate 1569287114086273600 evaluation fails" +"2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.088 UTC [policies] Evaluate -> DEBU 26c4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.088 UTC [gossip.state] commitBlock -> DEBU 26c5 [businesschannel] Committed block [3] with 1 transaction(s)" +"2019-09-24 01:05:14.089 UTC [cauthdsl] func1 -> DEBU 26c6 0xc003193b80 gate 1569287114088713500 evaluation starts" +"2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26c7 0xc003193b80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.089 UTC [gossip.comm] func1 -> DEBU 26c8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26c9 0xc003193b80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.089 UTC [cauthdsl] func2 -> DEBU 26ca 0xc003193b80 principal matched by identity 0" +"2019-09-24 01:05:14.090 UTC [msp.identity] Verify -> DEBU 26cb Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:14.090 UTC [gossip.comm] func1 -> DEBU 26cc Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.091 UTC [msp.identity] Verify -> DEBU 26cd Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:14.092 UTC [cauthdsl] func2 -> DEBU 26ce 0xc003193b80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.092 UTC [cauthdsl] func1 -> DEBU 26cf 0xc003193b80 gate 1569287114088713500 evaluation succeeds" +"2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.093 UTC [policies] Evaluate -> DEBU 26d2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.094 UTC [policies] Evaluate -> DEBU 26d3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.094 UTC [msp] DeserializeIdentity -> DEBU 26d4 Obtaining identity" +"2019-09-24 01:05:14.095 UTC [msp] DeserializeIdentity -> DEBU 26d5 Obtaining identity" +"2019-09-24 01:05:14.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d6 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.095 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26d7 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26d8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26d9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.095 UTC [policies] Evaluate -> DEBU 26da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.096 UTC [cauthdsl] func1 -> DEBU 26db 0xc00304cd90 gate 1569287114096038400 evaluation starts" +"2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26dc 0xc00304cd90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26dd 0xc00304cd90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26de 0xc00304cd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.096 UTC [cauthdsl] func2 -> DEBU 26df 0xc00304cd90 principal evaluation fails" +"2019-09-24 01:05:14.097 UTC [cauthdsl] func1 -> DEBU 26e0 0xc00304cd90 gate 1569287114096038400 evaluation fails" +"2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.097 UTC [policies] Evaluate -> DEBU 26e3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.097 UTC [cauthdsl] func1 -> DEBU 26e4 0xc00304d5d0 gate 1569287114097709000 evaluation starts" +"2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e5 0xc00304d5d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e6 0xc00304d5d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.100 UTC [cauthdsl] func2 -> DEBU 26e7 0xc00304d5d0 principal matched by identity 0" +"2019-09-24 01:05:14.101 UTC [msp.identity] Verify -> DEBU 26e8 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:14.101 UTC [msp.identity] Verify -> DEBU 26e9 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:14.101 UTC [cauthdsl] func2 -> DEBU 26ea 0xc00304d5d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.101 UTC [cauthdsl] func1 -> DEBU 26eb 0xc00304d5d0 gate 1569287114097709000 evaluation succeeds" +"2019-09-24 01:05:14.101 UTC [policies] Evaluate -> DEBU 26ec Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.101 UTC [policies] Evaluate -> DEBU 26ed == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.102 UTC [policies] Evaluate -> DEBU 26ee Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.102 UTC [policies] Evaluate -> DEBU 26ef == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.102 UTC [gossip.gossip] handleMessage -> DEBU 26f0 Exiting" +"2019-09-24 01:05:14.102 UTC [gossip.gossip] handleMessage -> DEBU 26f1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.104 UTC [msp] DeserializeIdentity -> DEBU 26f2 Obtaining identity" +"2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 26f3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26f4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.104 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 26f5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.104 UTC [policies] Evaluate -> DEBU 26f6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.104 UTC [policies] Evaluate -> DEBU 26f7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 26f8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func1 -> DEBU 26f9 0xc00303aea0 gate 1569287114105043000 evaluation starts" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fa 0xc00303aea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fb 0xc00303aea0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fc 0xc00303aea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func2 -> DEBU 26fd 0xc00303aea0 principal evaluation fails" +"2019-09-24 01:05:14.105 UTC [cauthdsl] func1 -> DEBU 26fe 0xc00303aea0 gate 1569287114105043000 evaluation fails" +"2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 26ff Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.105 UTC [policies] Evaluate -> DEBU 2700 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 2701 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func1 -> DEBU 2702 0xc00303b6e0 gate 1569287114106187800 evaluation starts" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2703 0xc00303b6e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2704 0xc00303b6e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2705 0xc00303b6e0 principal matched by identity 0" +"2019-09-24 01:05:14.106 UTC [msp.identity] Verify -> DEBU 2706 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:14.106 UTC [msp.identity] Verify -> DEBU 2707 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func2 -> DEBU 2708 0xc00303b6e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.106 UTC [cauthdsl] func1 -> DEBU 2709 0xc00303b6e0 gate 1569287114106187800 evaluation succeeds" +"2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 270a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.106 UTC [policies] Evaluate -> DEBU 270b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 270c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 270d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.107 UTC [msp] DeserializeIdentity -> DEBU 270e Obtaining identity" +"2019-09-24 01:05:14.107 UTC [gossip.gossip] handleMessage -> DEBU 270f Exiting" +"2019-09-24 01:05:14.107 UTC [gossip.gossip] handleMessage -> DEBU 2710 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.107 UTC [msp] DeserializeIdentity -> DEBU 2711 Obtaining identity" +"2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2712 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2713 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.107 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2714 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.107 UTC [policies] Evaluate -> DEBU 2715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 2718 0xc002a630e0 gate 1569287114108170800 evaluation starts" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2719 0xc002a630e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271a 0xc002a630e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271b 0xc002a630e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 271c 0xc002a630e0 principal evaluation fails" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 271d 0xc002a630e0 gate 1569287114108170800 evaluation fails" +"2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 271e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 271f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.108 UTC [policies] Evaluate -> DEBU 2720 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func1 -> DEBU 2721 0xc002a63920 gate 1569287114108612900 evaluation starts" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2722 0xc002a63920 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2723 0xc002a63920 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.108 UTC [cauthdsl] func2 -> DEBU 2724 0xc002a63920 principal matched by identity 0" +"2019-09-24 01:05:14.108 UTC [msp.identity] Verify -> DEBU 2725 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:14.108 UTC [msp.identity] Verify -> DEBU 2726 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:14.109 UTC [cauthdsl] func2 -> DEBU 2727 0xc002a63920 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.109 UTC [cauthdsl] func1 -> DEBU 2728 0xc002a63920 gate 1569287114108612900 evaluation succeeds" +"2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 2729 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.109 UTC [policies] Evaluate -> DEBU 272c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.109 UTC [gossip.gossip] handleMessage -> DEBU 272d Exiting" +"2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 272e Obtaining identity" +"2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 272f Obtaining identity" +"2019-09-24 01:05:14.112 UTC [gossip.comm] Send -> DEBU 2730 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers" +"2019-09-24 01:05:14.112 UTC [msp] DeserializeIdentity -> DEBU 2731 Obtaining identity" +"2019-09-24 01:05:14.113 UTC [msp] DeserializeIdentity -> DEBU 2732 Obtaining identity" +"2019-09-24 01:05:14.113 UTC [gossip.comm] sendToEndpoint -> DEBU 2733 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.113 UTC [gossip.comm] sendToEndpoint -> DEBU 2734 Exiting" +"2019-09-24 01:05:14.114 UTC [gossip.comm] sendToEndpoint -> DEBU 2735 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.114 UTC [gossip.comm] sendToEndpoint -> DEBU 2736 Exiting" +"2019-09-24 01:05:14.171 UTC [gossip.comm] func1 -> DEBU 2737 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.171 UTC [gossip.gossip] handleMessage -> DEBU 2738 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.171 UTC [gossip.gossip] handleMessage -> DEBU 2739 Exiting" +"2019-09-24 01:05:14.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 273a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 273b Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:14.171 UTC [msp] DeserializeIdentity -> DEBU 273c Obtaining identity" +"2019-09-24 01:05:14.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 273d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 273e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 273f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2740 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2741 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2742 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 2743 0xc0030d3670 gate 1569287114172238900 evaluation starts" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2744 0xc0030d3670 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2745 0xc0030d3670 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2746 0xc0030d3670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2747 0xc0030d3670 principal evaluation fails" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 2748 0xc0030d3670 gate 1569287114172238900 evaluation fails" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 2749 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 274a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.172 UTC [policies] Evaluate -> DEBU 274b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func1 -> DEBU 274c 0xc0030d3eb0 gate 1569287114172602100 evaluation starts" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274d 0xc0030d3eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274e 0xc0030d3eb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 274f 0xc0030d3eb0 principal matched by identity 0" +"2019-09-24 01:05:14.172 UTC [msp.identity] Verify -> DEBU 2750 Verify: digest = 00000000 cf 45 bf 69 5f a5 14 5c 01 a0 a5 16 73 8e 23 56 |.E.i_..\....s.#V| +00000010 7e 6e 03 31 12 25 18 57 ff 41 84 af c8 30 ba 29 |~n.1.%.W.A...0.)|" +"2019-09-24 01:05:14.172 UTC [msp.identity] Verify -> DEBU 2751 Verify: sig = 00000000 30 45 02 21 00 ad a3 03 57 7c 93 dc 86 cd bd a9 |0E.!....W|......| +00000010 6a c3 43 68 7f da 41 a7 45 94 28 dc b1 ef 4f 2a |j.Ch..A.E.(...O*| +00000020 d2 ab e4 f1 23 02 20 6b 09 29 9f 65 79 af 17 99 |....#. k.).ey...| +00000030 a7 3f 70 3b e0 85 ca b0 bc c7 3f 34 5c b7 73 ea |.?p;......?4\.s.| +00000040 0a c5 4e 94 b9 7c 83 |..N..|.|" +"2019-09-24 01:05:14.172 UTC [cauthdsl] func2 -> DEBU 2752 0xc0030d3eb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.173 UTC [cauthdsl] func1 -> DEBU 2753 0xc0030d3eb0 gate 1569287114172602100 evaluation succeeds" +"2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2754 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2755 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2756 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.173 UTC [policies] Evaluate -> DEBU 2757 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 2758 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 2759 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275a updating membership: timestamp: " +"2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275b Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:14.173 UTC [gossip.discovery] learnExistingMembers -> DEBU 275d Exiting" +"2019-09-24 01:05:14.173 UTC [gossip.discovery] handleAliveMessage -> DEBU 275e Exiting" +"2019-09-24 01:05:14.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 275f Exiting" +"2019-09-24 01:05:14.174 UTC [gossip.comm] func1 -> DEBU 2760 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.174 UTC [gossip.gossip] handleMessage -> DEBU 2761 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.174 UTC [gossip.gossip] handleMessage -> DEBU 2762 Exiting" +"2019-09-24 01:05:14.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2763 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.174 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2764 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:14.174 UTC [msp] DeserializeIdentity -> DEBU 2765 Obtaining identity" +"2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2766 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2767 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.175 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2768 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 2769 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 276a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.175 UTC [policies] Evaluate -> DEBU 276b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.175 UTC [cauthdsl] func1 -> DEBU 276c 0xc00035e390 gate 1569287114175891200 evaluation starts" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276d 0xc00035e390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276e 0xc00035e390 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 276f 0xc00035e390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2770 0xc00035e390 principal evaluation fails" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 2771 0xc00035e390 gate 1569287114175891200 evaluation fails" +"2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2772 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2773 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.176 UTC [policies] Evaluate -> DEBU 2774 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 2775 0xc00035ebd0 gate 1569287114176603400 evaluation starts" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2776 0xc00035ebd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2777 0xc00035ebd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func2 -> DEBU 2778 0xc00035ebd0 principal matched by identity 0" +"2019-09-24 01:05:14.176 UTC [msp.identity] Verify -> DEBU 2779 Verify: digest = 00000000 79 08 38 28 d2 f8 5d 64 36 65 5d 27 38 e0 bb 51 |y.8(..]d6e]'8..Q| +00000010 73 f1 0d a8 0e 24 a3 7a 05 66 ac 19 00 de fc a0 |s....$.z.f......|" +"2019-09-24 01:05:14.176 UTC [msp.identity] Verify -> DEBU 277a Verify: sig = 00000000 30 45 02 21 00 fd ad 28 1e 9e 0c b5 a9 cb e4 f4 |0E.!...(........| +00000010 2c 37 15 c7 96 70 57 30 fe 0d 45 2e d3 fa 7a bc |,7...pW0..E...z.| +00000020 ad 5b 73 17 d3 02 20 3e 93 52 61 68 b5 09 e8 b5 |.[s... >.Rah....| +00000030 8b f7 80 19 3c 50 d6 79 15 df d0 2c 13 89 03 0d |.... DEBU 277b 0xc00035ebd0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.176 UTC [cauthdsl] func1 -> DEBU 277c 0xc00035ebd0 gate 1569287114176603400 evaluation succeeds" +"2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 277f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.177 UTC [policies] Evaluate -> DEBU 2780 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 2781 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2782 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2783 updating membership: timestamp: " +"2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2784 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2785 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] learnExistingMembers -> DEBU 2786 Exiting" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] handleAliveMessage -> DEBU 2787 Exiting" +"2019-09-24 01:05:14.177 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2788 Exiting" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 2789 Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278a Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278b Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278c Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278d Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278e Obtaining identity" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 278f Obtaining identity" +"2019-09-24 01:05:14.178 UTC [gossip.comm] Send -> DEBU 2790 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:14.178 UTC [msp] DeserializeIdentity -> DEBU 2791 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 2792 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2793 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2794 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2795 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2796 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2797 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 2798 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:14.179 UTC [msp] DeserializeIdentity -> DEBU 2799 Obtaining identity" +"2019-09-24 01:05:14.179 UTC [gossip.comm] Send -> DEBU 279a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279c Exiting" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279e Exiting" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 279f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.179 UTC [gossip.comm] sendToEndpoint -> DEBU 27a0 Exiting" +"2019-09-24 01:05:14.181 UTC [gossip.comm] sendToEndpoint -> DEBU 27a1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.181 UTC [gossip.comm] sendToEndpoint -> DEBU 27a2 Exiting" +"2019-09-24 01:05:14.184 UTC [gossip.comm] func1 -> DEBU 27a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.184 UTC [gossip.gossip] handleMessage -> DEBU 27a4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.184 UTC [gossip.gossip] handleMessage -> DEBU 27a5 Exiting" +"2019-09-24 01:05:14.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27a6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27a7 Exiting" +"2019-09-24 01:05:14.185 UTC [gossip.comm] func1 -> DEBU 27a8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.185 UTC [gossip.gossip] handleMessage -> DEBU 27a9 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.185 UTC [gossip.gossip] handleMessage -> DEBU 27aa Exiting" +"2019-09-24 01:05:14.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ab Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.185 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27ac Exiting" +"2019-09-24 01:05:14.196 UTC [gossip.comm] func1 -> DEBU 27ad Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.196 UTC [gossip.comm] func1 -> DEBU 27ae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27af Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27b0 Exiting" +"2019-09-24 01:05:14.196 UTC [gossip.gossip] handleMessage -> DEBU 27b1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b3 Exiting" +"2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 27b5 Exiting" +"2019-09-24 01:05:14.197 UTC [gossip.gossip] handleMessage -> DEBU 27b6 Exiting" +"2019-09-24 01:05:14.241 UTC [msp] GetDefaultSigningIdentity -> DEBU 27b7 Obtaining default signing identity" +"2019-09-24 01:05:14.241 UTC [msp.identity] Sign -> DEBU 27b8 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151022 " +"2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27b9 Sign: digest: A9708982081846BD972466CE3DD8153F0E812057135182833B45DED116E5B8FB " +"2019-09-24 01:05:14.242 UTC [msp] GetDefaultSigningIdentity -> DEBU 27ba Obtaining default signing identity" +"2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27bb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:14.242 UTC [msp.identity] Sign -> DEBU 27bc Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:14.243 UTC [gossip.discovery] periodicalSendAlive -> DEBU 27bd Sleeping 5s" +"2019-09-24 01:05:14.252 UTC [msp] DeserializeIdentity -> DEBU 27be Obtaining identity" +"2019-09-24 01:05:14.253 UTC [msp] DeserializeIdentity -> DEBU 27bf Obtaining identity" +"2019-09-24 01:05:14.255 UTC [msp] DeserializeIdentity -> DEBU 27c0 Obtaining identity" +"2019-09-24 01:05:14.256 UTC [gossip.comm] Send -> DEBU 27c1 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:14.258 UTC [gossip.comm] sendToEndpoint -> DEBU 27c2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.258 UTC [gossip.comm] sendToEndpoint -> DEBU 27c3 Exiting" +"2019-09-24 01:05:14.258 UTC [gossip.comm] Send -> DEBU 27c4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:14.258 UTC [msp] DeserializeIdentity -> DEBU 27c5 Obtaining identity" +"2019-09-24 01:05:14.259 UTC [gossip.comm] Send -> DEBU 27c6 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:14.259 UTC [gossip.comm] sendToEndpoint -> DEBU 27c7 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.263 UTC [gossip.comm] sendToEndpoint -> DEBU 27c9 Exiting" +"2019-09-24 01:05:14.263 UTC [gossip.comm] sendToEndpoint -> DEBU 27c8 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.264 UTC [gossip.comm] sendToEndpoint -> DEBU 27ca Exiting" +"2019-09-24 01:05:14.278 UTC [gossip.comm] func1 -> DEBU 27cb Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.278 UTC [gossip.comm] func1 -> DEBU 27cc Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.278 UTC [gossip.gossip] handleMessage -> DEBU 27cd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.278 UTC [msp] DeserializeIdentity -> DEBU 27ce Obtaining identity" +"2019-09-24 01:05:14.280 UTC [msp] DeserializeIdentity -> DEBU 27cf Obtaining identity" +"2019-09-24 01:05:14.280 UTC [msp] DeserializeIdentity -> DEBU 27d0 Obtaining identity" +"2019-09-24 01:05:14.280 UTC [gossip.gossip] handleMessage -> DEBU 27d1 Exiting" +"2019-09-24 01:05:14.280 UTC [gossip.gossip] handleMessage -> DEBU 27d2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.281 UTC [msp] DeserializeIdentity -> DEBU 27d3 Obtaining identity" +"2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 27d4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27d5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.281 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27d6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.281 UTC [policies] Evaluate -> DEBU 27d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.281 UTC [cauthdsl] func1 -> DEBU 27da 0xc00039e0c0 gate 1569287114281946700 evaluation starts" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27db 0xc00039e0c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27dc 0xc00039e0c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27dd 0xc00039e0c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27de 0xc00039e0c0 principal evaluation fails" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func1 -> DEBU 27df 0xc00039e0c0 gate 1569287114281946700 evaluation fails" +"2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.282 UTC [policies] Evaluate -> DEBU 27e2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func1 -> DEBU 27e3 0xc00039ea20 gate 1569287114282436300 evaluation starts" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e4 0xc00039ea20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e5 0xc00039ea20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.282 UTC [cauthdsl] func2 -> DEBU 27e6 0xc00039ea20 principal matched by identity 0" +"2019-09-24 01:05:14.282 UTC [msp.identity] Verify -> DEBU 27e7 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +"2019-09-24 01:05:14.282 UTC [msp.identity] Verify -> DEBU 27e8 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +"2019-09-24 01:05:14.283 UTC [cauthdsl] func2 -> DEBU 27e9 0xc00039ea20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.284 UTC [cauthdsl] func1 -> DEBU 27ea 0xc00039ea20 gate 1569287114282436300 evaluation succeeds" +"2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27eb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ec == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ed Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.284 UTC [policies] Evaluate -> DEBU 27ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.285 UTC [msp] DeserializeIdentity -> DEBU 27ef Obtaining identity" +"2019-09-24 01:05:14.285 UTC [msp] DeserializeIdentity -> DEBU 27f0 Obtaining identity" +"2019-09-24 01:05:14.285 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27f1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.285 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 27f2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27f5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func1 -> DEBU 27f6 0xc00039fed0 gate 1569287114285559600 evaluation starts" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f7 0xc00039fed0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f8 0xc00039fed0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27f9 0xc00039fed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func2 -> DEBU 27fa 0xc00039fed0 principal evaluation fails" +"2019-09-24 01:05:14.285 UTC [cauthdsl] func1 -> DEBU 27fb 0xc00039fed0 gate 1569287114285559600 evaluation fails" +"2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27fc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.285 UTC [policies] Evaluate -> DEBU 27fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.286 UTC [policies] Evaluate -> DEBU 27fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.286 UTC [cauthdsl] func1 -> DEBU 27ff 0xc0003ca730 gate 1569287114286263500 evaluation starts" +"2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2800 0xc0003ca730 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2801 0xc0003ca730 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.286 UTC [cauthdsl] func2 -> DEBU 2802 0xc0003ca730 principal matched by identity 0" +"2019-09-24 01:05:14.286 UTC [msp.identity] Verify -> DEBU 2803 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +"2019-09-24 01:05:14.286 UTC [msp.identity] Verify -> DEBU 2804 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +"2019-09-24 01:05:14.287 UTC [cauthdsl] func2 -> DEBU 2805 0xc0003ca730 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.287 UTC [cauthdsl] func1 -> DEBU 2806 0xc0003ca730 gate 1569287114286263500 evaluation succeeds" +"2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2807 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2808 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 2809 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.287 UTC [policies] Evaluate -> DEBU 280a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.287 UTC [gossip.gossip] handleMessage -> DEBU 280b Exiting" +"2019-09-24 01:05:14.288 UTC [gossip.comm] func1 -> DEBU 280c Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 280d Obtaining identity" +"2019-09-24 01:05:14.288 UTC [gossip.gossip] handleMessage -> DEBU 280e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 280f Obtaining identity" +"2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2810 Obtaining identity" +"2019-09-24 01:05:14.288 UTC [gossip.comm] Send -> DEBU 2811 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers" +"2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2812 Obtaining identity" +"2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2813 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2814 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.288 UTC [msp] DeserializeIdentity -> DEBU 2815 Obtaining identity" +"2019-09-24 01:05:14.288 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2816 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2817 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2818 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.288 UTC [policies] Evaluate -> DEBU 2819 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.288 UTC [cauthdsl] func1 -> DEBU 281b 0xc0003f80c0 gate 1569287114288541200 evaluation starts" +"2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281c Exiting" +"2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 281d 0xc0003f80c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 281e 0xc0003f80c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 281f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:14.288 UTC [gossip.comm] sendToEndpoint -> DEBU 2820 Exiting" +"2019-09-24 01:05:14.288 UTC [cauthdsl] func2 -> DEBU 2821 0xc0003f80c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.294 UTC [cauthdsl] func2 -> DEBU 2822 0xc0003f80c0 principal evaluation fails" +"2019-09-24 01:05:14.295 UTC [cauthdsl] func1 -> DEBU 2823 0xc0003f80c0 gate 1569287114288541200 evaluation fails" +"2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2824 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2825 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.295 UTC [policies] Evaluate -> DEBU 2826 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.295 UTC [cauthdsl] func1 -> DEBU 2827 0xc0003f8910 gate 1569287114295837900 evaluation starts" +"2019-09-24 01:05:14.296 UTC [cauthdsl] func2 -> DEBU 2828 0xc0003f8910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.296 UTC [cauthdsl] func2 -> DEBU 2829 0xc0003f8910 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.297 UTC [cauthdsl] func2 -> DEBU 282a 0xc0003f8910 principal matched by identity 0" +"2019-09-24 01:05:14.297 UTC [msp.identity] Verify -> DEBU 282b Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +"2019-09-24 01:05:14.297 UTC [msp.identity] Verify -> DEBU 282c Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +"2019-09-24 01:05:14.298 UTC [cauthdsl] func2 -> DEBU 282d 0xc0003f8910 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.298 UTC [cauthdsl] func1 -> DEBU 282e 0xc0003f8910 gate 1569287114295837900 evaluation succeeds" +"2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 282f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2830 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2831 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.299 UTC [policies] Evaluate -> DEBU 2832 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.300 UTC [gossip.gossip] handleMessage -> DEBU 2833 Exiting" +"2019-09-24 01:05:14.514 UTC [gossip.comm] func1 -> DEBU 2834 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.514 UTC [gossip.comm] func1 -> DEBU 2835 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.515 UTC [gossip.gossip] handleMessage -> DEBU 2836 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.515 UTC [gossip.pull] HandleMessage -> DEBU 2837 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.515 UTC [gossip.pull] SendDigest -> DEBU 2838 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:14.515 UTC [gossip.gossip] handleMessage -> DEBU 2839 Exiting" +"2019-09-24 01:05:14.516 UTC [gossip.gossip] handleMessage -> DEBU 283a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.516 UTC [gossip.gossip] handleMessage -> DEBU 283b Exiting" +"2019-09-24 01:05:14.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 283c Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 283d Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:14.516 UTC [msp.identity] Verify -> DEBU 283e Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +"2019-09-24 01:05:14.516 UTC [msp.identity] Verify -> DEBU 283f Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +00000040 09 f7 2d 8a ed 68 |..-..h|" +"2019-09-24 01:05:14.517 UTC [msp.identity] Verify -> DEBU 2840 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:14.517 UTC [msp.identity] Verify -> DEBU 2841 Verify: sig = 00000000 30 45 02 21 00 d9 d7 8b 46 94 bd be 85 85 77 8e |0E.!....F.....w.| +00000010 1f 68 59 91 6c 0f a5 88 80 e2 3d e2 55 88 69 44 |.hY.l.....=.U.iD| +00000020 51 69 9e d7 08 02 20 08 f1 78 14 91 75 91 f4 e6 |Qi.... ..x..u...| +00000030 58 c3 7e 0f f4 02 bc 79 80 41 41 eb e1 e3 17 25 |X.~....y.AA....%| +00000040 ce 01 87 c6 39 7d c9 |....9}.|" +"2019-09-24 01:05:14.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 2842 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2843 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2844 updating membership: timestamp: " +"2019-09-24 01:05:14.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 2845 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:14.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 2846 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:14.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 2847 Exiting" +"2019-09-24 01:05:14.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 2848 Exiting" +"2019-09-24 01:05:14.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2849 Exiting" +"2019-09-24 01:05:14.520 UTC [gossip.discovery] sendMemResponse -> DEBU 284a Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:14.520 UTC [msp] DeserializeIdentity -> DEBU 284b Obtaining identity" +"2019-09-24 01:05:14.520 UTC [msp] DeserializeIdentity -> DEBU 284c Obtaining identity" +"2019-09-24 01:05:14.520 UTC [gossip.comm] Send -> DEBU 284d Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.520 UTC [gossip.discovery] sendMemResponse -> DEBU 284e Exiting, replying with alive: > alive: " +"2019-09-24 01:05:14.521 UTC [gossip.comm] sendToEndpoint -> DEBU 284f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.521 UTC [gossip.comm] sendToEndpoint -> DEBU 2850 Exiting" +"2019-09-24 01:05:14.620 UTC [endorser] ProcessProposal -> DEBU 2851 Entering: request from 172.18.0.5:49910" +"2019-09-24 01:05:14.620 UTC [protoutils] ValidateProposalMessage -> DEBU 2852 ValidateProposalMessage starts for signed proposal 0xc003341c70" +"2019-09-24 01:05:14.620 UTC [protoutils] validateChannelHeader -> DEBU 2853 validateChannelHeader info: header type 3" +"2019-09-24 01:05:14.620 UTC [protoutils] checkSignatureFromCreator -> DEBU 2854 begin" +"2019-09-24 01:05:14.621 UTC [msp] GetManagerForChain -> DEBU 2855 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:14.621 UTC [protoutils] checkSignatureFromCreator -> DEBU 2856 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:14.621 UTC [protoutils] checkSignatureFromCreator -> DEBU 2857 creator is valid" +"2019-09-24 01:05:14.621 UTC [msp.identity] Verify -> DEBU 2858 Verify: digest = 00000000 5c 9a ec a3 b3 10 47 f0 2f 90 f2 16 5e 02 3a 22 |\.....G./...^.:"| +00000010 d6 ad cb 1c 1d 80 cb a0 ff 3a f8 f8 17 5b 55 9c |.........:...[U.|" +"2019-09-24 01:05:14.621 UTC [msp.identity] Verify -> DEBU 2859 Verify: sig = 00000000 30 44 02 20 73 fc 51 23 aa 0f 9c 14 6a 0a 40 e4 |0D. s.Q#....j.@.| +00000010 4f 8e 11 1c 2b b2 42 68 f8 1a 60 46 d3 72 e5 4c |O...+.Bh..`F.r.L| +00000020 b7 f3 f9 94 02 20 5c 75 78 99 bd 0e 75 d6 9a 10 |..... \ux...u...| +00000030 bd 19 95 97 fa 58 42 0b 3e 44 6f a3 45 b6 9b a3 |.....XB.>Do.E...| +00000040 95 85 31 b2 e7 18 |..1...|" +"2019-09-24 01:05:14.622 UTC [protoutils] checkSignatureFromCreator -> DEBU 285a exits successfully" +"2019-09-24 01:05:14.622 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285b validateChaincodeProposalMessage starts for proposal 0xc0027a5e30, header 0xc0032220a0" +"2019-09-24 01:05:14.622 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 285c validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:14.622 UTC [endorser] preProcess -> DEBU 285d [businesschannel][db9c2a8d] processing txid: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad" +"2019-09-24 01:05:14.622 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 285e retrieveTransactionByID() - txId = [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +"2019-09-24 01:05:14.623 UTC [aclmgmt] CheckACL -> DEBU 285f acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:14.623 UTC [aclmgmt] CheckACL -> DEBU 2860 acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:14.623 UTC [policies] Evaluate -> DEBU 2861 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:14.623 UTC [policies] Evaluate -> DEBU 2862 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.624 UTC [policies] Evaluate -> DEBU 2863 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:14.624 UTC [cauthdsl] func1 -> DEBU 2864 0xc000396e80 gate 1569287114624215100 evaluation starts" +"2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2865 0xc000396e80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2866 0xc000396e80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.624 UTC [cauthdsl] func2 -> DEBU 2867 0xc000396e80 principal matched by identity 0" +"2019-09-24 01:05:14.625 UTC [msp.identity] Verify -> DEBU 2868 Verify: digest = 00000000 5c 9a ec a3 b3 10 47 f0 2f 90 f2 16 5e 02 3a 22 |\.....G./...^.:"| +00000010 d6 ad cb 1c 1d 80 cb a0 ff 3a f8 f8 17 5b 55 9c |.........:...[U.|" +"2019-09-24 01:05:14.625 UTC [msp.identity] Verify -> DEBU 2869 Verify: sig = 00000000 30 44 02 20 73 fc 51 23 aa 0f 9c 14 6a 0a 40 e4 |0D. s.Q#....j.@.| +00000010 4f 8e 11 1c 2b b2 42 68 f8 1a 60 46 d3 72 e5 4c |O...+.Bh..`F.r.L| +00000020 b7 f3 f9 94 02 20 5c 75 78 99 bd 0e 75 d6 9a 10 |..... \ux...u...| +00000030 bd 19 95 97 fa 58 42 0b 3e 44 6f a3 45 b6 9b a3 |.....XB.>Do.E...| +00000040 95 85 31 b2 e7 18 |..1...|" +"2019-09-24 01:05:14.625 UTC [cauthdsl] func2 -> DEBU 286a 0xc000396e80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.625 UTC [cauthdsl] func1 -> DEBU 286b 0xc000396e80 gate 1569287114624215100 evaluation succeeds" +"2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286c Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286e Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:14.626 UTC [policies] Evaluate -> DEBU 286f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:14.626 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2870 constructing new tx simulator" +"2019-09-24 01:05:14.627 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2871 constructing new tx simulator txid = [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +"2019-09-24 01:05:14.627 UTC [endorser] SimulateProposal -> DEBU 2872 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.627 UTC [stateleveldb] GetState -> DEBU 2873 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.627 UTC [ccprovider] GetChaincodeData -> DEBU 2874 Getting chaincode data for from cache" +"2019-09-24 01:05:14.628 UTC [endorser] callChaincode -> INFO 2875 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.628 UTC [chaincode] Execute -> DEBU 2876 Entry" +"2019-09-24 01:05:14.630 UTC [chaincode] handleMessage -> DEBU 2877 [db9c2a8d] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:14.630 UTC [chaincode] HandleTransaction -> DEBU 2878 [db9c2a8d] handling GET_STATE from chaincode" +"2019-09-24 01:05:14.630 UTC [chaincode] HandleGetState -> DEBU 2879 [db9c2a8d] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:14.630 UTC [stateleveldb] GetState -> DEBU 287a GetState(). ns=exp02, key=a" +"2019-09-24 01:05:14.630 UTC [chaincode] HandleTransaction -> DEBU 287b [db9c2a8d] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:14.631 UTC [chaincode] handleMessage -> DEBU 287c [db9c2a8d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:14.631 UTC [chaincode] Notify -> DEBU 287d [db9c2a8d] notifying Txid:db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, channelID:businesschannel" +"2019-09-24 01:05:14.631 UTC [chaincode] Execute -> DEBU 287e Exit" +"2019-09-24 01:05:14.632 UTC [endorser] callChaincode -> INFO 287f [businesschannel][db9c2a8d] Exit chaincode: name:"exp02" (4ms)" +"2019-09-24 01:05:14.632 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2880 Simulation completed, getting simulation results" +"2019-09-24 01:05:14.632 UTC [lockbasedtxmgr] Done -> DEBU 2881 Done with transaction simulation / query execution [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +"2019-09-24 01:05:14.632 UTC [endorser] SimulateProposal -> DEBU 2882 [businesschannel][db9c2a8d] Exit" +"2019-09-24 01:05:14.632 UTC [endorser] endorseProposal -> DEBU 2883 [businesschannel][db9c2a8d] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.632 UTC [endorser] endorseProposal -> DEBU 2884 [businesschannel][db9c2a8d] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:14.632 UTC [endorser] EndorseWithPlugin -> DEBU 2885 Entering endorsement for {plugin: escc, channel: businesschannel, tx: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, chaincode: exp02}" +"2019-09-24 01:05:14.633 UTC [msp.identity] Sign -> DEBU 2886 Sign: plaintext: 0A2083E09D1B77BB658A57904AE57E31...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:14.633 UTC [msp.identity] Sign -> DEBU 2887 Sign: digest: 4D8304D5D73060BF98371DEC109738F22FD1C034F6C5BE63B90EB5B86568C741 " +"2019-09-24 01:05:14.633 UTC [endorser] EndorseWithPlugin -> DEBU 2888 Exiting {plugin: escc, channel: businesschannel, tx: db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad, chaincode: exp02}" +"2019-09-24 01:05:14.633 UTC [endorser] endorseProposal -> DEBU 2889 [businesschannel][db9c2a8d] Exit" +"2019-09-24 01:05:14.633 UTC [lockbasedtxmgr] Done -> DEBU 288a Done with transaction simulation / query execution [db9c2a8dff9e31324619b241c556df910b3dc9316e09cb5c4117e64a9098d8ad]" +"2019-09-24 01:05:14.634 UTC [endorser] func1 -> DEBU 288b Exit: request from 172.18.0.5:49910" +"2019-09-24 01:05:14.634 UTC [comm.grpc.server] 1 -> INFO 288c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49910 grpc.code=OK grpc.call_duration=14.217ms +"2019-09-24 01:05:14.637 UTC [grpc] infof -> DEBU 288d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:14.638 UTC [grpc] infof -> DEBU 288e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:14.813 UTC [gossip.comm] func1 -> DEBU 288f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.814 UTC [gossip.gossip] handleMessage -> DEBU 2890 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.815 UTC [gossip.pull] HandleMessage -> DEBU 2891 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.816 UTC [msp] DeserializeIdentity -> DEBU 2892 Obtaining identity" +"2019-09-24 01:05:14.817 UTC [msp] DeserializeIdentity -> DEBU 2893 Obtaining identity" +"2019-09-24 01:05:14.820 UTC [msp] DeserializeIdentity -> DEBU 2894 Obtaining identity" +"2019-09-24 01:05:14.820 UTC [msp] DeserializeIdentity -> DEBU 2895 Obtaining identity" +"2019-09-24 01:05:14.821 UTC [msp] DeserializeIdentity -> DEBU 2896 Obtaining identity" +"2019-09-24 01:05:14.822 UTC [msp] DeserializeIdentity -> DEBU 2897 Obtaining identity" +"2019-09-24 01:05:14.823 UTC [gossip.pull] SendDigest -> DEBU 2898 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:14.823 UTC [gossip.gossip] handleMessage -> DEBU 2899 Exiting" +"2019-09-24 01:05:14.831 UTC [gossip.comm] func1 -> DEBU 289a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.831 UTC [gossip.gossip] handleMessage -> DEBU 289b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.832 UTC [gossip.gossip] handleMessage -> DEBU 289c Exiting" +"2019-09-24 01:05:14.833 UTC [gossip.discovery] handleMsgFromComm -> DEBU 289d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.833 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 289e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:14.833 UTC [msp] DeserializeIdentity -> DEBU 289f Obtaining identity" +"2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 28a0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28a1 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.835 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 28a2 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.835 UTC [policies] Evaluate -> DEBU 28a3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.836 UTC [policies] Evaluate -> DEBU 28a4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.836 UTC [policies] Evaluate -> DEBU 28a5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.836 UTC [cauthdsl] func1 -> DEBU 28a6 0xc0003e7230 gate 1569287114836210800 evaluation starts" +"2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a7 0xc0003e7230 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a8 0xc0003e7230 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.836 UTC [cauthdsl] func2 -> DEBU 28a9 0xc0003e7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.837 UTC [cauthdsl] func2 -> DEBU 28aa 0xc0003e7230 principal evaluation fails" +"2019-09-24 01:05:14.837 UTC [cauthdsl] func1 -> DEBU 28ab 0xc0003e7230 gate 1569287114836210800 evaluation fails" +"2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ac Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ad == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.837 UTC [policies] Evaluate -> DEBU 28ae == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.838 UTC [cauthdsl] func1 -> DEBU 28af 0xc0003e7b50 gate 1569287114838186400 evaluation starts" +"2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b0 0xc0003e7b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b1 0xc0003e7b50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.838 UTC [cauthdsl] func2 -> DEBU 28b2 0xc0003e7b50 principal matched by identity 0" +"2019-09-24 01:05:14.839 UTC [msp.identity] Verify -> DEBU 28b3 Verify: digest = 00000000 56 e1 81 a1 3f b7 25 79 70 a1 9b 27 fa 99 ab d1 |V...?.%yp..'....| +00000010 81 45 2c ae aa 4f 38 dd 30 77 d9 b2 36 19 7b 3e |.E,..O8.0w..6.{>|" +"2019-09-24 01:05:14.839 UTC [msp.identity] Verify -> DEBU 28b4 Verify: sig = 00000000 30 44 02 20 20 4c 28 46 28 69 40 0a ff 46 4c fa |0D. L(F(i@..FL.| +00000010 4a 3c d5 2f a0 d6 29 72 a5 a1 13 87 1e fa 8a 6b |J<./..)r.......k| +00000020 36 b3 23 31 02 20 18 bc 7a dd 76 d7 6a b4 c3 90 |6.#1. ..z.v.j...| +00000030 db a7 fe 22 2a 04 5d d0 a2 f9 f8 4c c3 b0 44 06 |..."*.]....L..D.| +00000040 64 57 dd f6 01 c9 |dW....|" +"2019-09-24 01:05:14.839 UTC [cauthdsl] func2 -> DEBU 28b5 0xc0003e7b50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.839 UTC [cauthdsl] func1 -> DEBU 28b6 0xc0003e7b50 gate 1569287114838186400 evaluation succeeds" +"2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b7 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.839 UTC [policies] Evaluate -> DEBU 28b9 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.840 UTC [policies] Evaluate -> DEBU 28ba == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.840 UTC [gossip.discovery] handleAliveMessage -> DEBU 28bb Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bd updating membership: timestamp: " +"2019-09-24 01:05:14.840 UTC [gossip.discovery] learnExistingMembers -> DEBU 28be Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:14.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 28bf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:14.841 UTC [gossip.discovery] learnExistingMembers -> DEBU 28c0 Exiting" +"2019-09-24 01:05:14.841 UTC [gossip.discovery] handleAliveMessage -> DEBU 28c1 Exiting" +"2019-09-24 01:05:14.841 UTC [gossip.discovery] sendMemResponse -> DEBU 28c2 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:14.841 UTC [msp] DeserializeIdentity -> DEBU 28c3 Obtaining identity" +"2019-09-24 01:05:14.841 UTC [msp] DeserializeIdentity -> DEBU 28c4 Obtaining identity" +"2019-09-24 01:05:14.842 UTC [msp] DeserializeIdentity -> DEBU 28c5 Obtaining identity" +"2019-09-24 01:05:14.842 UTC [gossip.comm] Send -> DEBU 28c6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.842 UTC [gossip.discovery] sendMemResponse -> DEBU 28c7 Exiting, replying with alive: alive:\223Rah\265\t\350\265\213\367\200\031 alive: alive: " +"2019-09-24 01:05:14.842 UTC [gossip.comm] sendToEndpoint -> DEBU 28c8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.842 UTC [gossip.comm] sendToEndpoint -> DEBU 28c9 Exiting" +"2019-09-24 01:05:14.844 UTC [gossip.discovery] handleMsgFromComm -> DEBU 28ca Exiting" +"2019-09-24 01:05:14.859 UTC [endorser] ProcessProposal -> DEBU 28cb Entering: request from 172.18.0.5:49914" +"2019-09-24 01:05:14.859 UTC [protoutils] ValidateProposalMessage -> DEBU 28cc ValidateProposalMessage starts for signed proposal 0xc003160f50" +"2019-09-24 01:05:14.859 UTC [protoutils] validateChannelHeader -> DEBU 28cd validateChannelHeader info: header type 3" +"2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28ce begin" +"2019-09-24 01:05:14.860 UTC [msp] GetManagerForChain -> DEBU 28cf Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d0 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:14.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d1 creator is valid" +"2019-09-24 01:05:14.860 UTC [msp.identity] Verify -> DEBU 28d2 Verify: digest = 00000000 c5 7e 04 77 13 db 12 87 d5 88 16 96 2b 26 d8 72 |.~.w........+&.r| +00000010 58 25 e8 f2 bc 90 4d b8 10 61 cd 35 e1 82 db 54 |X%....M..a.5...T|" +"2019-09-24 01:05:14.861 UTC [msp.identity] Verify -> DEBU 28d3 Verify: sig = 00000000 30 45 02 21 00 ab ea 55 58 6d 67 1e b1 6a 91 e8 |0E.!...UXmg..j..| +00000010 c4 c8 9a 6a 7d 94 53 42 22 93 92 5c 44 56 44 28 |...j}.SB"..\DVD(| +00000020 06 68 15 9a 97 02 20 0c df 99 c9 a8 ce f3 4c 76 |.h.... .......Lv| +00000030 17 32 73 93 4b ab 42 52 4d 45 76 84 72 af ee fa |.2s.K.BRMEv.r...| +00000040 8b f0 ab 13 15 67 00 |.....g.|" +"2019-09-24 01:05:14.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 28d4 exits successfully" +"2019-09-24 01:05:14.861 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28d5 validateChaincodeProposalMessage starts for proposal 0xc00298a070, header 0xc003161360" +"2019-09-24 01:05:14.861 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 28d6 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:14.861 UTC [endorser] preProcess -> DEBU 28d7 [businesschannel][716eee82] processing txid: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b" +"2019-09-24 01:05:14.862 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 28d8 retrieveTransactionByID() - txId = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +"2019-09-24 01:05:14.862 UTC [aclmgmt] CheckACL -> DEBU 28d9 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:14.862 UTC [aclmgmt] CheckACL -> DEBU 28da acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28db == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28dc This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.862 UTC [policies] Evaluate -> DEBU 28dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:14.862 UTC [cauthdsl] func1 -> DEBU 28de 0xc0024c4600 gate 1569287114862626400 evaluation starts" +"2019-09-24 01:05:14.862 UTC [cauthdsl] func2 -> DEBU 28df 0xc0024c4600 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.862 UTC [cauthdsl] func2 -> DEBU 28e0 0xc0024c4600 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.863 UTC [cauthdsl] func2 -> DEBU 28e1 0xc0024c4600 principal matched by identity 0" +"2019-09-24 01:05:14.863 UTC [msp.identity] Verify -> DEBU 28e2 Verify: digest = 00000000 c5 7e 04 77 13 db 12 87 d5 88 16 96 2b 26 d8 72 |.~.w........+&.r| +00000010 58 25 e8 f2 bc 90 4d b8 10 61 cd 35 e1 82 db 54 |X%....M..a.5...T|" +"2019-09-24 01:05:14.863 UTC [msp.identity] Verify -> DEBU 28e3 Verify: sig = 00000000 30 45 02 21 00 ab ea 55 58 6d 67 1e b1 6a 91 e8 |0E.!...UXmg..j..| +00000010 c4 c8 9a 6a 7d 94 53 42 22 93 92 5c 44 56 44 28 |...j}.SB"..\DVD(| +00000020 06 68 15 9a 97 02 20 0c df 99 c9 a8 ce f3 4c 76 |.h.... .......Lv| +00000030 17 32 73 93 4b ab 42 52 4d 45 76 84 72 af ee fa |.2s.K.BRMEv.r...| +00000040 8b f0 ab 13 15 67 00 |.....g.|" +"2019-09-24 01:05:14.864 UTC [cauthdsl] func2 -> DEBU 28e4 0xc0024c4600 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.864 UTC [cauthdsl] func1 -> DEBU 28e5 0xc0024c4600 gate 1569287114862626400 evaluation succeeds" +"2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e6 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e8 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:14.864 UTC [policies] Evaluate -> DEBU 28e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:14.865 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 28ea constructing new tx simulator" +"2019-09-24 01:05:14.865 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 28eb constructing new tx simulator txid = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +"2019-09-24 01:05:14.866 UTC [endorser] SimulateProposal -> DEBU 28ec [businesschannel][716eee82] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.866 UTC [stateleveldb] GetState -> DEBU 28ed GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:14.867 UTC [ccprovider] GetChaincodeData -> DEBU 28ee Getting chaincode data for from cache" +"2019-09-24 01:05:14.867 UTC [endorser] callChaincode -> INFO 28ef [businesschannel][716eee82] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.867 UTC [chaincode] Execute -> DEBU 28f0 Entry" +"2019-09-24 01:05:14.869 UTC [chaincode] handleMessage -> DEBU 28f1 [716eee82] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:14.869 UTC [chaincode] HandleTransaction -> DEBU 28f2 [716eee82] handling GET_STATE from chaincode" +"2019-09-24 01:05:14.870 UTC [chaincode] HandleGetState -> DEBU 28f3 [716eee82] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:14.870 UTC [stateleveldb] GetState -> DEBU 28f4 GetState(). ns=exp02, key=a" +"2019-09-24 01:05:14.870 UTC [chaincode] HandleTransaction -> DEBU 28f5 [716eee82] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28f6 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28f7 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28f8 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28f9 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.871 UTC [gossip.pull] Hello -> DEBU 28fa Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:14.871 UTC [gossip.comm] Send -> DEBU 28fb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.871 UTC [gossip.comm] sendToEndpoint -> DEBU 28fc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.871 UTC [gossip.comm] sendToEndpoint -> DEBU 28fd Exiting" +"2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 28fe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 28ff Exiting" +"2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 2900 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.872 UTC [gossip.comm] sendToEndpoint -> DEBU 2901 Exiting" +"2019-09-24 01:05:14.874 UTC [gossip.comm] func1 -> DEBU 2902 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2903 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.874 UTC [gossip.pull] HandleMessage -> DEBU 2904 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2905 Exiting" +"2019-09-24 01:05:14.874 UTC [gossip.comm] func1 -> DEBU 2906 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.874 UTC [gossip.gossip] handleMessage -> DEBU 2907 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.875 UTC [gossip.pull] HandleMessage -> DEBU 2908 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 2909 Exiting" +"2019-09-24 01:05:14.875 UTC [gossip.comm] func1 -> DEBU 290a Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 290b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.875 UTC [gossip.pull] HandleMessage -> DEBU 290c GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.875 UTC [gossip.gossip] handleMessage -> DEBU 290d Exiting" +"2019-09-24 01:05:14.878 UTC [gossip.comm] func1 -> DEBU 290e Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.879 UTC [gossip.gossip] handleMessage -> DEBU 290f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.879 UTC [gossip.pull] HandleMessage -> DEBU 2910 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2911 Obtaining identity" +"2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2912 Obtaining identity" +"2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2913 Obtaining identity" +"2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2914 Obtaining identity" +"2019-09-24 01:05:14.879 UTC [msp] DeserializeIdentity -> DEBU 2915 Obtaining identity" +"2019-09-24 01:05:14.880 UTC [msp] DeserializeIdentity -> DEBU 2916 Obtaining identity" +"2019-09-24 01:05:14.880 UTC [gossip.pull] SendDigest -> DEBU 2917 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:14.880 UTC [gossip.gossip] handleMessage -> DEBU 2918 Exiting" +"2019-09-24 01:05:14.881 UTC [chaincode] handleMessage -> DEBU 2919 [716eee82] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:14.881 UTC [chaincode] HandleTransaction -> DEBU 291a [716eee82] handling GET_STATE from chaincode" +"2019-09-24 01:05:14.882 UTC [chaincode] HandleGetState -> DEBU 291b [716eee82] getting state for chaincode exp02, key b, channel businesschannel" +"2019-09-24 01:05:14.882 UTC [stateleveldb] GetState -> DEBU 291c GetState(). ns=exp02, key=b" +"2019-09-24 01:05:14.882 UTC [chaincode] HandleTransaction -> DEBU 291d [716eee82] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:14.883 UTC [chaincode] handleMessage -> DEBU 291e [716eee82] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:14.883 UTC [chaincode] HandleTransaction -> DEBU 291f [716eee82] handling PUT_STATE from chaincode" +"2019-09-24 01:05:14.884 UTC [chaincode] HandleTransaction -> DEBU 2920 [716eee82] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:14.885 UTC [chaincode] handleMessage -> DEBU 2921 [716eee82] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:14.885 UTC [chaincode] HandleTransaction -> DEBU 2922 [716eee82] handling PUT_STATE from chaincode" +"2019-09-24 01:05:14.885 UTC [chaincode] HandleTransaction -> DEBU 2923 [716eee82] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:14.886 UTC [chaincode] handleMessage -> DEBU 2924 [716eee82] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:14.887 UTC [chaincode] Notify -> DEBU 2925 [716eee82] notifying Txid:716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, channelID:businesschannel" +"2019-09-24 01:05:14.887 UTC [chaincode] Execute -> DEBU 2926 Exit" +"2019-09-24 01:05:14.887 UTC [endorser] callChaincode -> INFO 2927 [businesschannel][716eee82] Exit chaincode: name:"exp02" (20ms)" +"2019-09-24 01:05:14.888 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2928 Simulation completed, getting simulation results" +"2019-09-24 01:05:14.888 UTC [lockbasedtxmgr] Done -> DEBU 2929 Done with transaction simulation / query execution [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +"2019-09-24 01:05:14.888 UTC [endorser] SimulateProposal -> DEBU 292a [businesschannel][716eee82] Exit" +"2019-09-24 01:05:14.888 UTC [endorser] endorseProposal -> DEBU 292b [businesschannel][716eee82] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:14.888 UTC [endorser] endorseProposal -> DEBU 292c [businesschannel][716eee82] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:14.888 UTC [endorser] EndorseWithPlugin -> DEBU 292d Entering endorsement for {plugin: escc, channel: businesschannel, tx: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, chaincode: exp02}" +"2019-09-24 01:05:14.888 UTC [msp.identity] Sign -> DEBU 292e Sign: plaintext: 0A2029029BB3FE80ED07C0E2550F2AAF...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:14.888 UTC [msp.identity] Sign -> DEBU 292f Sign: digest: BCB20F877BF7B6CBF3E3ECD39C7F7ECE2D6EF5807B7B0EE760F1568620D9C8EF " +"2019-09-24 01:05:14.889 UTC [endorser] EndorseWithPlugin -> DEBU 2930 Exiting {plugin: escc, channel: businesschannel, tx: 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, chaincode: exp02}" +"2019-09-24 01:05:14.889 UTC [endorser] endorseProposal -> DEBU 2931 [businesschannel][716eee82] Exit" +"2019-09-24 01:05:14.889 UTC [lockbasedtxmgr] Done -> DEBU 2932 Done with transaction simulation / query execution [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +"2019-09-24 01:05:14.889 UTC [endorser] func1 -> DEBU 2933 Exit: request from 172.18.0.5:49914" +"2019-09-24 01:05:14.889 UTC [comm.grpc.server] 1 -> INFO 2934 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49914 grpc.code=OK grpc.call_duration=31.0969ms +"2019-09-24 01:05:14.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 2935 Obtaining default signing identity" +"2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2936 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151023 " +"2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2937 Sign: digest: 7E3CFC56FE448402E2D163CF8CF8351350DC9CC0C372EFB174707551CA1146FF " +"2019-09-24 01:05:14.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 2938 Obtaining default signing identity" +"2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 2939 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:14.892 UTC [msp.identity] Sign -> DEBU 293a Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:14.893 UTC [gossip.comm] Send -> DEBU 293b Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.893 UTC [msp] DeserializeIdentity -> DEBU 293c Obtaining identity" +"2019-09-24 01:05:14.893 UTC [gossip.comm] Send -> DEBU 293d Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.893 UTC [msp] DeserializeIdentity -> DEBU 293e Obtaining identity" +"2019-09-24 01:05:14.894 UTC [gossip.comm] Send -> DEBU 293f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 2940 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.901 UTC [gossip.comm] sendToEndpoint -> DEBU 2941 Exiting" +"2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2942 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2943 Exiting" +"2019-09-24 01:05:14.902 UTC [gossip.comm] sendToEndpoint -> DEBU 2944 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.903 UTC [gossip.comm] sendToEndpoint -> DEBU 2945 Exiting" +"2019-09-24 01:05:14.905 UTC [gossip.comm] func1 -> DEBU 2946 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.906 UTC [gossip.comm] func1 -> DEBU 2947 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.906 UTC [gossip.gossip] handleMessage -> DEBU 2948 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.907 UTC [gossip.gossip] handleMessage -> DEBU 2949 Exiting" +"2019-09-24 01:05:14.907 UTC [gossip.gossip] handleMessage -> DEBU 294c Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.907 UTC [gossip.discovery] handleMsgFromComm -> DEBU 294a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 294d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:14.907 UTC [gossip.comm] func1 -> DEBU 294b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.909 UTC [gossip.comm] func1 -> DEBU 294e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.909 UTC [msp] DeserializeIdentity -> DEBU 294f Obtaining identity" +"2019-09-24 01:05:14.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2950 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2951 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2952 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 2953 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.913 UTC [policies] Evaluate -> DEBU 2954 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.914 UTC [policies] Evaluate -> DEBU 2955 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.914 UTC [cauthdsl] func1 -> DEBU 2956 0xc00256e170 gate 1569287114914746800 evaluation starts" +"2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2957 0xc00256e170 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2958 0xc00256e170 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.915 UTC [cauthdsl] func2 -> DEBU 2959 0xc00256e170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.921 UTC [cauthdsl] func2 -> DEBU 295c 0xc00256e170 principal evaluation fails" +"2019-09-24 01:05:14.921 UTC [cauthdsl] func1 -> DEBU 295d 0xc00256e170 gate 1569287114914746800 evaluation fails" +"2019-09-24 01:05:14.920 UTC [grpc] infof -> DEBU 295a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:14.920 UTC [grpc] infof -> DEBU 295b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:14.922 UTC [policies] Evaluate -> DEBU 295e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.924 UTC [policies] Evaluate -> DEBU 295f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.926 UTC [policies] Evaluate -> DEBU 2960 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.926 UTC [cauthdsl] func1 -> DEBU 2961 0xc00256e9e0 gate 1569287114926932000 evaluation starts" +"2019-09-24 01:05:14.927 UTC [cauthdsl] func2 -> DEBU 2962 0xc00256e9e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.928 UTC [cauthdsl] func2 -> DEBU 2963 0xc00256e9e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.929 UTC [cauthdsl] func2 -> DEBU 2964 0xc00256e9e0 principal matched by identity 0" +"2019-09-24 01:05:14.929 UTC [msp.identity] Verify -> DEBU 2965 Verify: digest = 00000000 ce 49 3c 39 ac 26 4c 4e 52 26 86 52 73 9c fa e6 |.I<9.&LNR&.Rs...| +00000010 cd 4f 90 1d 12 b0 de 53 ba 4f 32 80 aa 3f bd 37 |.O.....S.O2..?.7|" +"2019-09-24 01:05:14.930 UTC [msp.identity] Verify -> DEBU 2966 Verify: sig = 00000000 30 44 02 20 22 1b 33 d3 c5 1c 78 7e 66 86 34 21 |0D. ".3...x~f.4!| +00000010 2b 90 4f df ca 9d d5 dd 0c 8b 18 97 18 38 9c 26 |+.O..........8.&| +00000020 b9 15 70 4c 02 20 02 55 00 ca 1a c6 97 0e 74 94 |..pL. .U......t.| +00000030 71 8e ea 96 00 85 78 a5 3c 43 c3 b6 85 ae 2d 8f |q.....x. DEBU 2967 0xc00256e9e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.931 UTC [cauthdsl] func1 -> DEBU 2968 0xc00256e9e0 gate 1569287114926932000 evaluation succeeds" +"2019-09-24 01:05:14.931 UTC [policies] Evaluate -> DEBU 2969 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.931 UTC [policies] Evaluate -> DEBU 296a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.932 UTC [policies] Evaluate -> DEBU 296b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.932 UTC [policies] Evaluate -> DEBU 296c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 296d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.933 UTC [gossip.discovery] learnExistingMembers -> DEBU 296e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 296f updating membership: timestamp: " +"2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 2970 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:14.934 UTC [gossip.discovery] learnExistingMembers -> DEBU 2971 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:14.935 UTC [gossip.discovery] learnExistingMembers -> DEBU 2972 Exiting" +"2019-09-24 01:05:14.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 2973 Exiting" +"2019-09-24 01:05:14.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2974 Exiting" +"2019-09-24 01:05:14.936 UTC [gossip.discovery] sendMemResponse -> DEBU 2975 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:14.936 UTC [msp] DeserializeIdentity -> DEBU 2977 Obtaining identity" +"2019-09-24 01:05:14.937 UTC [msp] DeserializeIdentity -> DEBU 2978 Obtaining identity" +"2019-09-24 01:05:14.936 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2976 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 297b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:14.937 UTC [msp] DeserializeIdentity -> DEBU 2979 Obtaining identity" +"2019-09-24 01:05:14.939 UTC [msp.identity] Verify -> DEBU 297c Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +"2019-09-24 01:05:14.940 UTC [msp.identity] Verify -> DEBU 297d Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +00000040 6b 69 ff ea 4b e8 |ki..K.|" +"2019-09-24 01:05:14.940 UTC [gossip.comm] Send -> DEBU 297e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:14.941 UTC [gossip.discovery] sendMemResponse -> DEBU 297f Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:14.941 UTC [gossip.discovery] handleAliveMessage -> DEBU 2980 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.942 UTC [gossip.discovery] isSentByMe -> DEBU 2982 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.943 UTC [gossip.discovery] handleAliveMessage -> DEBU 2983 Exiting" +"2019-09-24 01:05:14.941 UTC [gossip.comm] sendToEndpoint -> DEBU 2981 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.937 UTC [gossip.gossip] handleMessage -> DEBU 297a Exiting" +"2019-09-24 01:05:14.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2984 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:14.944 UTC [msp] DeserializeIdentity -> DEBU 2987 Obtaining identity" +"2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2988 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2989 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.944 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 298a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.944 UTC [policies] Evaluate -> DEBU 298b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.945 UTC [policies] Evaluate -> DEBU 298c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.945 UTC [policies] Evaluate -> DEBU 298d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.945 UTC [cauthdsl] func1 -> DEBU 298e 0xc002593100 gate 1569287114945479400 evaluation starts" +"2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 298f 0xc002593100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2990 0xc002593100 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2991 0xc002593100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.945 UTC [cauthdsl] func2 -> DEBU 2992 0xc002593100 principal evaluation fails" +"2019-09-24 01:05:14.946 UTC [cauthdsl] func1 -> DEBU 2993 0xc002593100 gate 1569287114945479400 evaluation fails" +"2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2994 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2995 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.946 UTC [policies] Evaluate -> DEBU 2996 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.947 UTC [cauthdsl] func1 -> DEBU 2997 0xc002593ad0 gate 1569287114947213300 evaluation starts" +"2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 2998 0xc002593ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 2999 0xc002593ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.948 UTC [cauthdsl] func2 -> DEBU 299a 0xc002593ad0 principal matched by identity 0" +"2019-09-24 01:05:14.949 UTC [msp.identity] Verify -> DEBU 299b Verify: digest = 00000000 56 e1 81 a1 3f b7 25 79 70 a1 9b 27 fa 99 ab d1 |V...?.%yp..'....| +00000010 81 45 2c ae aa 4f 38 dd 30 77 d9 b2 36 19 7b 3e |.E,..O8.0w..6.{>|" +"2019-09-24 01:05:14.949 UTC [msp.identity] Verify -> DEBU 299c Verify: sig = 00000000 30 44 02 20 20 4c 28 46 28 69 40 0a ff 46 4c fa |0D. L(F(i@..FL.| +00000010 4a 3c d5 2f a0 d6 29 72 a5 a1 13 87 1e fa 8a 6b |J<./..)r.......k| +00000020 36 b3 23 31 02 20 18 bc 7a dd 76 d7 6a b4 c3 90 |6.#1. ..z.v.j...| +00000030 db a7 fe 22 2a 04 5d d0 a2 f9 f8 4c c3 b0 44 06 |..."*.]....L..D.| +00000040 64 57 dd f6 01 c9 |dW....|" +"2019-09-24 01:05:14.950 UTC [cauthdsl] func2 -> DEBU 299d 0xc002593ad0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.950 UTC [cauthdsl] func1 -> DEBU 299e 0xc002593ad0 gate 1569287114947213300 evaluation succeeds" +"2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 299f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 29a0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.950 UTC [policies] Evaluate -> DEBU 29a1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.951 UTC [policies] Evaluate -> DEBU 29a2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a4 Exiting" +"2019-09-24 01:05:14.951 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29a5 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:14.951 UTC [msp.identity] Verify -> DEBU 29a6 Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +"2019-09-24 01:05:14.951 UTC [msp.identity] Verify -> DEBU 29a7 Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +00000040 09 f7 2d 8a ed 68 |..-..h|" +"2019-09-24 01:05:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.952 UTC [gossip.discovery] handleAliveMessage -> DEBU 29a9 Exiting" +"2019-09-24 01:05:14.952 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29aa Exiting" +"2019-09-24 01:05:14.943 UTC [gossip.comm] sendToEndpoint -> DEBU 2985 Exiting" +"2019-09-24 01:05:14.944 UTC [gossip.gossip] handleMessage -> DEBU 2986 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.952 UTC [gossip.gossip] handleMessage -> DEBU 29ab Exiting" +"2019-09-24 01:05:14.953 UTC [gossip.gossip] handleMessage -> DEBU 29ac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.953 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29ad Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29ae Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29af Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +"2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b0 Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +00000040 6b 69 ff ea 4b e8 |ki..K.|" +"2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b1 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:14.954 UTC [msp.identity] Verify -> DEBU 29b2 Verify: sig = 00000000 30 45 02 21 00 d0 b1 45 a7 b5 cc e8 3c 51 31 17 |0E.!...E.... DEBU 29b3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:14.955 UTC [gossip.discovery] isSentByMe -> DEBU 29b4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:14.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 29b5 Exiting" +"2019-09-24 01:05:14.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b6 Exiting" +"2019-09-24 01:05:14.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29b7 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:14.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29b9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:14.955 UTC [gossip.gossip] handleMessage -> DEBU 29b8 Exiting" +"2019-09-24 01:05:14.956 UTC [msp.identity] Verify -> DEBU 29ba Verify: digest = 00000000 7e 3c fc 56 fe 44 84 02 e2 d1 63 cf 8c f8 35 13 |~<.V.D....c...5.| +00000010 50 dc 9c c0 c3 72 ef b1 74 70 75 51 ca 11 46 ff |P....r..tpuQ..F.|" +"2019-09-24 01:05:14.956 UTC [msp.identity] Verify -> DEBU 29bb Verify: sig = 00000000 30 44 02 20 0e 0d c7 07 a7 14 6c ef 9c aa 12 a5 |0D. ......l.....| +00000010 e8 19 a5 92 c6 21 d6 47 b6 de 28 e1 15 20 7d de |.....!.G..(.. }.| +00000020 0f 40 e2 8e 02 20 5d 23 ca c3 2b 39 c6 66 50 92 |.@... ]#..+9.fP.| +00000030 c3 57 c2 62 2f b0 e7 f3 8b ae ec 82 f7 47 63 fd |.W.b/........Gc.| +00000040 6b 69 ff ea 4b e8 |ki..K.|" +"2019-09-24 01:05:14.956 UTC [gossip.discovery] handleAliveMessage -> DEBU 29bc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.956 UTC [gossip.discovery] isSentByMe -> DEBU 29bd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.957 UTC [gossip.discovery] handleAliveMessage -> DEBU 29be Exiting" +"2019-09-24 01:05:14.957 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29bf Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:14.957 UTC [msp] DeserializeIdentity -> DEBU 29c0 Obtaining identity" +"2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 29c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.958 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 29c3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func1 -> DEBU 29c7 0xc002612430 gate 1569287114959338900 evaluation starts" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29c8 0xc002612430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29c9 0xc002612430 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29ca 0xc002612430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func2 -> DEBU 29cb 0xc002612430 principal evaluation fails" +"2019-09-24 01:05:14.959 UTC [cauthdsl] func1 -> DEBU 29cc 0xc002612430 gate 1569287114959338900 evaluation fails" +"2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29cd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.959 UTC [policies] Evaluate -> DEBU 29ce == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:14.960 UTC [policies] Evaluate -> DEBU 29cf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:14.960 UTC [cauthdsl] func1 -> DEBU 29d0 0xc002612cb0 gate 1569287114960145200 evaluation starts" +"2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d1 0xc002612cb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d2 0xc002612cb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:14.960 UTC [cauthdsl] func2 -> DEBU 29d3 0xc002612cb0 principal matched by identity 0" +"2019-09-24 01:05:14.960 UTC [msp.identity] Verify -> DEBU 29d4 Verify: digest = 00000000 ce 49 3c 39 ac 26 4c 4e 52 26 86 52 73 9c fa e6 |.I<9.&LNR&.Rs...| +00000010 cd 4f 90 1d 12 b0 de 53 ba 4f 32 80 aa 3f bd 37 |.O.....S.O2..?.7|" +"2019-09-24 01:05:14.960 UTC [msp.identity] Verify -> DEBU 29d5 Verify: sig = 00000000 30 44 02 20 22 1b 33 d3 c5 1c 78 7e 66 86 34 21 |0D. ".3...x~f.4!| +00000010 2b 90 4f df ca 9d d5 dd 0c 8b 18 97 18 38 9c 26 |+.O..........8.&| +00000020 b9 15 70 4c 02 20 02 55 00 ca 1a c6 97 0e 74 94 |..pL. .U......t.| +00000030 71 8e ea 96 00 85 78 a5 3c 43 c3 b6 85 ae 2d 8f |q.....x. DEBU 29d6 0xc002612cb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:14.961 UTC [cauthdsl] func1 -> DEBU 29d7 0xc002612cb0 gate 1569287114960145200 evaluation succeeds" +"2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29d8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29da Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:14.961 UTC [policies] Evaluate -> DEBU 29db == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:14.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 29dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.961 UTC [gossip.discovery] handleAliveMessage -> DEBU 29dd Exiting" +"2019-09-24 01:05:14.961 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 29de Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:14.962 UTC [msp.identity] Verify -> DEBU 29df Verify: digest = 00000000 3f 44 60 d0 f2 3c 5c 5f 1f 13 ec cf db b5 4d 23 |?D`..<\_......M#| +00000010 cf 71 a6 ad 34 b9 0b 96 8d 10 4c bf fc e7 7c 3e |.q..4.....L...|>|" +"2019-09-24 01:05:14.962 UTC [msp.identity] Verify -> DEBU 29e0 Verify: sig = 00000000 30 44 02 20 05 85 f8 af c3 8e f3 61 ae ea 7a 5e |0D. .......a..z^| +00000010 a2 ff 20 ee 8d 7e 95 7b a5 d2 39 01 01 f7 53 bf |.. ..~.{..9...S.| +00000020 8e d9 99 b1 02 20 21 d4 9d f7 f8 e9 18 37 e0 1b |..... !......7..| +00000030 96 af b5 19 af c4 a3 1e b0 46 78 61 f7 fd 11 cf |.........Fxa....| +00000040 09 f7 2d 8a ed 68 |..-..h|" +"2019-09-24 01:05:14.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 29e1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:14.963 UTC [gossip.discovery] handleAliveMessage -> DEBU 29e2 Exiting" +"2019-09-24 01:05:14.963 UTC [gossip.discovery] handleMsgFromComm -> DEBU 29e3 Exiting" +"2019-09-24 01:05:15.108 UTC [endorser] ProcessProposal -> DEBU 29e4 Entering: request from 172.18.0.5:49920" +"2019-09-24 01:05:15.108 UTC [protoutils] ValidateProposalMessage -> DEBU 29e5 ValidateProposalMessage starts for signed proposal 0xc0001f7540" +"2019-09-24 01:05:15.108 UTC [protoutils] validateChannelHeader -> DEBU 29e6 validateChannelHeader info: header type 3" +"2019-09-24 01:05:15.109 UTC [protoutils] checkSignatureFromCreator -> DEBU 29e7 begin" +"2019-09-24 01:05:15.109 UTC [msp] GetManagerForChain -> DEBU 29e8 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:15.110 UTC [msp] DeserializeIdentity -> DEBU 29e9 Obtaining identity" +"2019-09-24 01:05:15.111 UTC [msp.identity] newIdentity -> DEBU 29ea Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIRAISSDWIzo8yOl7zIj6tQX9wwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT/lmk7kbPo +8XNf6tmMXceLWf7jCOzizDW2L4U0/zNJ4hKIKhdm68Z+sKmWyIITpvMhVwlWtUHJ +nvAi9JKDnng6o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCOa5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjO +PQQDAgNIADBFAiEAzvIOQ7kVaRxjucnfD9PBii2syGhIpsaW5DVUvyzDT6YCIHsn +VdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t +-----END CERTIFICATE-----" +"2019-09-24 01:05:15.112 UTC [protoutils] checkSignatureFromCreator -> DEBU 29eb creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +"2019-09-24 01:05:15.112 UTC [msp] Validate -> DEBU 29ec MSP Org2MSP validating identity" +"2019-09-24 01:05:15.113 UTC [msp] getCertificationChain -> DEBU 29ed MSP Org2MSP getting certification chain" +"2019-09-24 01:05:15.113 UTC [protoutils] checkSignatureFromCreator -> DEBU 29ee creator is valid" +"2019-09-24 01:05:15.114 UTC [msp.identity] Verify -> DEBU 29ef Verify: digest = 00000000 a4 b4 4a ca 5c b0 e7 30 cf 9f f2 6f 43 a3 11 e7 |..J.\..0...oC...| +00000010 9e 82 f9 f2 a4 bd 1f eb a6 fa 5a ff 52 c0 b7 08 |..........Z.R...|" +"2019-09-24 01:05:15.114 UTC [msp.identity] Verify -> DEBU 29f0 Verify: sig = 00000000 30 45 02 21 00 d4 fb 5f 00 13 b7 ce eb 53 1f 94 |0E.!..._.....S..| +00000010 a2 78 c9 bc 1e 4e 49 bc f4 a5 9b 93 d5 7f 9f bc |.x...NI.........| +00000020 88 5d 99 6d 53 02 20 76 e9 8c 9f 44 4c fb 2a 6a |.].mS. v...DL.*j| +00000030 46 fb 2c 43 7f a7 ff 2f 9e fd c8 dd 83 0c bc 03 |F.,C.../........| +00000040 f5 23 ff d4 ac 0c 03 |.#.....|" +"2019-09-24 01:05:15.115 UTC [protoutils] checkSignatureFromCreator -> DEBU 29f1 exits successfully" +"2019-09-24 01:05:15.115 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29f2 validateChaincodeProposalMessage starts for proposal 0xc00298b110, header 0xc0001f7950" +"2019-09-24 01:05:15.115 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 29f3 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:15.116 UTC [endorser] preProcess -> DEBU 29f4 [businesschannel][8cf30482] processing txid: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd" +"2019-09-24 01:05:15.116 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 29f5 retrieveTransactionByID() - txId = [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +"2019-09-24 01:05:15.117 UTC [aclmgmt] CheckACL -> DEBU 29f6 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:15.117 UTC [aclmgmt] CheckACL -> DEBU 29f7 acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29f8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29f9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:15.118 UTC [policies] Evaluate -> DEBU 29fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:15.119 UTC [cauthdsl] func1 -> DEBU 29fb 0xc002641550 gate 1569287115119126700 evaluation starts" +"2019-09-24 01:05:15.119 UTC [cauthdsl] func2 -> DEBU 29fc 0xc002641550 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:15.120 UTC [cauthdsl] func2 -> DEBU 29fd 0xc002641550 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:15.121 UTC [cauthdsl] func2 -> DEBU 29fe 0xc002641550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:15.121 UTC [cauthdsl] func2 -> DEBU 29ff 0xc002641550 principal evaluation fails" +"2019-09-24 01:05:15.121 UTC [cauthdsl] func1 -> DEBU 2a00 0xc002641550 gate 1569287115119126700 evaluation fails" +"2019-09-24 01:05:15.121 UTC [policies] Evaluate -> DEBU 2a01 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:15.122 UTC [policies] Evaluate -> DEBU 2a02 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:15.122 UTC [policies] Evaluate -> DEBU 2a03 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:05:15.122 UTC [cauthdsl] func1 -> DEBU 2a04 0xc002641db0 gate 1569287115122507700 evaluation starts" +"2019-09-24 01:05:15.122 UTC [cauthdsl] func2 -> DEBU 2a05 0xc002641db0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:15.123 UTC [cauthdsl] func2 -> DEBU 2a06 0xc002641db0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:15.123 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 2a07 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:05:15.123 UTC [msp] Validate -> DEBU 2a08 MSP Org2MSP validating identity" +"2019-09-24 01:05:15.124 UTC [msp] getCertificationChain -> DEBU 2a09 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:15.124 UTC [cauthdsl] func2 -> DEBU 2a0a 0xc002641db0 principal matched by identity 0" +"2019-09-24 01:05:15.124 UTC [msp.identity] Verify -> DEBU 2a0b Verify: digest = 00000000 a4 b4 4a ca 5c b0 e7 30 cf 9f f2 6f 43 a3 11 e7 |..J.\..0...oC...| +00000010 9e 82 f9 f2 a4 bd 1f eb a6 fa 5a ff 52 c0 b7 08 |..........Z.R...|" +"2019-09-24 01:05:15.124 UTC [msp.identity] Verify -> DEBU 2a0c Verify: sig = 00000000 30 45 02 21 00 d4 fb 5f 00 13 b7 ce eb 53 1f 94 |0E.!..._.....S..| +00000010 a2 78 c9 bc 1e 4e 49 bc f4 a5 9b 93 d5 7f 9f bc |.x...NI.........| +00000020 88 5d 99 6d 53 02 20 76 e9 8c 9f 44 4c fb 2a 6a |.].mS. v...DL.*j| +00000030 46 fb 2c 43 7f a7 ff 2f 9e fd c8 dd 83 0c bc 03 |F.,C.../........| +00000040 f5 23 ff d4 ac 0c 03 |.#.....|" +"2019-09-24 01:05:15.125 UTC [cauthdsl] func2 -> DEBU 2a0d 0xc002641db0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:15.125 UTC [cauthdsl] func1 -> DEBU 2a0e 0xc002641db0 gate 1569287115122507700 evaluation succeeds" +"2019-09-24 01:05:15.125 UTC [policies] Evaluate -> DEBU 2a0f Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:15.125 UTC [policies] Evaluate -> DEBU 2a10 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:15.126 UTC [policies] Evaluate -> DEBU 2a11 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:15.126 UTC [policies] Evaluate -> DEBU 2a12 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:15.126 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2a13 constructing new tx simulator" +"2019-09-24 01:05:15.126 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2a14 constructing new tx simulator txid = [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +"2019-09-24 01:05:15.127 UTC [endorser] SimulateProposal -> DEBU 2a15 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:15.127 UTC [stateleveldb] GetState -> DEBU 2a16 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:15.127 UTC [ccprovider] GetChaincodeData -> DEBU 2a17 Getting chaincode data for from cache" +"2019-09-24 01:05:15.127 UTC [endorser] callChaincode -> INFO 2a18 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:15.128 UTC [chaincode] Execute -> DEBU 2a19 Entry" +"2019-09-24 01:05:15.129 UTC [chaincode] handleMessage -> DEBU 2a1a [8cf30482] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:15.129 UTC [chaincode] HandleTransaction -> DEBU 2a1b [8cf30482] handling GET_STATE from chaincode" +"2019-09-24 01:05:15.129 UTC [chaincode] HandleGetState -> DEBU 2a1c [8cf30482] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:15.129 UTC [stateleveldb] GetState -> DEBU 2a1d GetState(). ns=exp02, key=a" +"2019-09-24 01:05:15.129 UTC [chaincode] HandleTransaction -> DEBU 2a1e [8cf30482] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:15.130 UTC [chaincode] handleMessage -> DEBU 2a1f [8cf30482] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:15.130 UTC [chaincode] Notify -> DEBU 2a20 [8cf30482] notifying Txid:8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, channelID:businesschannel" +"2019-09-24 01:05:15.130 UTC [chaincode] Execute -> DEBU 2a21 Exit" +"2019-09-24 01:05:15.131 UTC [endorser] callChaincode -> INFO 2a22 [businesschannel][8cf30482] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 01:05:15.131 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2a23 Simulation completed, getting simulation results" +"2019-09-24 01:05:15.131 UTC [lockbasedtxmgr] Done -> DEBU 2a24 Done with transaction simulation / query execution [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +"2019-09-24 01:05:15.131 UTC [endorser] SimulateProposal -> DEBU 2a25 [businesschannel][8cf30482] Exit" +"2019-09-24 01:05:15.131 UTC [endorser] endorseProposal -> DEBU 2a26 [businesschannel][8cf30482] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:15.131 UTC [endorser] endorseProposal -> DEBU 2a27 [businesschannel][8cf30482] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:15.131 UTC [endorser] EndorseWithPlugin -> DEBU 2a28 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, chaincode: exp02}" +"2019-09-24 01:05:15.131 UTC [msp.identity] Sign -> DEBU 2a29 Sign: plaintext: 0A20CD0EABB6EACD5F2CE03697735873...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:15.131 UTC [msp.identity] Sign -> DEBU 2a2a Sign: digest: A02ABC76B437A62CD5756B29DB8C421E046EE5F4537770C618A8D9D77B45426B " +"2019-09-24 01:05:15.132 UTC [endorser] EndorseWithPlugin -> DEBU 2a2b Exiting {plugin: escc, channel: businesschannel, tx: 8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd, chaincode: exp02}" +"2019-09-24 01:05:15.132 UTC [endorser] endorseProposal -> DEBU 2a2c [businesschannel][8cf30482] Exit" +"2019-09-24 01:05:15.132 UTC [lockbasedtxmgr] Done -> DEBU 2a2d Done with transaction simulation / query execution [8cf30482870944451a5ce57490cfba4b6330e74399d56262514b07a5cfa0d2cd]" +"2019-09-24 01:05:15.132 UTC [endorser] func1 -> DEBU 2a2e Exit: request from 172.18.0.5:49920" +"2019-09-24 01:05:15.132 UTC [comm.grpc.server] 1 -> INFO 2a2f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49920 grpc.code=OK grpc.call_duration=24.5015ms +"2019-09-24 01:05:15.135 UTC [grpc] infof -> DEBU 2a30 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:15.135 UTC [grpc] infof -> DEBU 2a31 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:16.749 UTC [gossip.election] waitForInterrupt -> DEBU 2a32 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:16.749 UTC [gossip.election] IsLeader -> DEBU 2a33 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:16.750 UTC [msp] GetDefaultSigningIdentity -> DEBU 2a34 Obtaining default signing identity" +"2019-09-24 01:05:16.750 UTC [msp.identity] Sign -> DEBU 2a35 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100B1801 " +"2019-09-24 01:05:16.750 UTC [msp.identity] Sign -> DEBU 2a36 Sign: digest: A6B786DF365C0444A92D4C8CE193485F028FAEABA23974F36B8647661A6D46C7 " +"2019-09-24 01:05:16.751 UTC [gossip.election] waitForInterrupt -> DEBU 2a37 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:16.752 UTC [msp] DeserializeIdentity -> DEBU 2a38 Obtaining identity" +"2019-09-24 01:05:16.752 UTC [msp] DeserializeIdentity -> DEBU 2a39 Obtaining identity" +"2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3a Obtaining identity" +"2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3b Obtaining identity" +"2019-09-24 01:05:16.753 UTC [gossip.comm] Send -> DEBU 2a3c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:16.753 UTC [msp] DeserializeIdentity -> DEBU 2a3d Obtaining identity" +"2019-09-24 01:05:16.754 UTC [msp] DeserializeIdentity -> DEBU 2a3e Obtaining identity" +"2019-09-24 01:05:16.754 UTC [gossip.comm] sendToEndpoint -> DEBU 2a3f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:16.754 UTC [gossip.comm] sendToEndpoint -> DEBU 2a40 Exiting" +"2019-09-24 01:05:16.903 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2a41 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:16.903 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2a42 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a43 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a44 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:16.903 UTC [policies] Evaluate -> DEBU 2a45 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:05:16.903 UTC [cauthdsl] func1 -> DEBU 2a46 0xc00266a8d0 gate 1569287116903754200 evaluation starts" +"2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a47 0xc00266a8d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a48 0xc00266a8d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:16.904 UTC [cauthdsl] func2 -> DEBU 2a49 0xc00266a8d0 principal matched by identity 0" +"2019-09-24 01:05:16.904 UTC [msp.identity] Verify -> DEBU 2a4a Verify: digest = 00000000 60 c7 29 52 d5 a6 fa 99 3a 3f 20 8c 1d 4e cd 66 |`.)R....:? ..N.f| +00000010 5e d3 dd 46 06 cb 16 2f 9d dd 26 3d 52 fc a5 65 |^..F.../..&=R..e|" +"2019-09-24 01:05:16.904 UTC [msp.identity] Verify -> DEBU 2a4b Verify: sig = 00000000 30 44 02 20 11 b8 5a b1 07 b2 a4 7d c7 63 2e 86 |0D. ..Z....}.c..| +00000010 e0 93 5e 1b 0e 23 a7 f2 c9 a4 c7 1b 59 90 de c3 |..^..#......Y...| +00000020 43 50 e9 6d 02 20 11 31 c7 a5 7a 03 bc bd 7f e7 |CP.m. .1..z.....| +00000030 93 f6 e8 38 db 7e bd 0b 55 da e3 29 32 29 4d b4 |...8.~..U..)2)M.| +00000040 62 f1 f3 09 94 fc |b.....|" +"2019-09-24 01:05:16.905 UTC [cauthdsl] func2 -> DEBU 2a4c 0xc00266a8d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:16.905 UTC [cauthdsl] func1 -> DEBU 2a4d 0xc00266a8d0 gate 1569287116903754200 evaluation succeeds" +"2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a4e Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a4f == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a50 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:16.905 UTC [policies] Evaluate -> DEBU 2a51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:16.906 UTC [blocksProvider] DeliverBlocks -> DEBU 2a52 [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-09-24 01:05:16.906 UTC [gossip.state] addPayload -> DEBU 2a53 [businesschannel] Adding payload to local buffer, blockNum = [4]" +"2019-09-24 01:05:16.906 UTC [gossip.state] addPayload -> DEBU 2a54 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:05:16.906 UTC [blocksProvider] DeliverBlocks -> DEBU 2a55 [businesschannel] Gossiping block [4], peers number [3]" +"2019-09-24 01:05:16.906 UTC [gossip.channel] AddToMsgStore -> DEBU 2a56 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:05:16.906 UTC [gossip.pull] Add -> DEBU 2a57 Added 4, total items: 4" +"2019-09-24 01:05:16.907 UTC [gossip.state] deliverPayloads -> DEBU 2a58 [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4]" +"2019-09-24 01:05:16.907 UTC [gossip.state] deliverPayloads -> DEBU 2a59 [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger" +"2019-09-24 01:05:16.907 UTC [gossip.privdata] StoreBlock -> INFO 2a5a [businesschannel] Received block [4] from buffer" +"2019-09-24 01:05:16.911 UTC [gossip.privdata] StoreBlock -> DEBU 2a5b [businesschannel] Validating block [4]" +"2019-09-24 01:05:16.911 UTC [committer.txvalidator] Validate -> DEBU 2a5c [businesschannel] START Block Validation for block [4]" +"2019-09-24 01:05:16.913 UTC [committer.txvalidator] Validate -> DEBU 2a5d expecting 1 block validation responses" +"2019-09-24 01:05:16.913 UTC [committer.txvalidator] validateTx -> DEBU 2a5e [businesschannel] validateTx starts for block 0xc0027d7580 env 0xc0003e23c0 txn 0" +"2019-09-24 01:05:16.913 UTC [protoutils] ValidateTransaction -> DEBU 2a5f ValidateTransactionEnvelope starts for envelope 0xc0003e23c0" +"2019-09-24 01:05:16.913 UTC [protoutils] ValidateTransaction -> DEBU 2a60 Header is channel_header:"\010\003\032\014\010\312\327\245\354\005\020\310\302\256\230\003\"\017businesschannel*@716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030TV\350\321\243L:\343\305fX\373\202\351\222\225\033\270\230\240\207\022$\230" " +"2019-09-24 01:05:16.913 UTC [protoutils] validateChannelHeader -> DEBU 2a61 validateChannelHeader info: header type 3" +"2019-09-24 01:05:16.913 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a62 begin" +"2019-09-24 01:05:16.914 UTC [msp] GetManagerForChain -> DEBU 2a63 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:16.914 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a64 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:16.915 UTC [protoutils] checkSignatureFromCreator -> DEBU 2a65 creator is valid" +"2019-09-24 01:05:16.915 UTC [msp.identity] Verify -> DEBU 2a66 Verify: digest = 00000000 e0 f8 35 ad 30 51 bb 43 c2 4a 4f 91 93 18 65 36 |..5.0Q.C.JO...e6| +00000010 82 ac 95 13 d5 cc b4 10 07 64 48 79 81 43 d0 07 |.........dHy.C..|" +"2019-09-24 01:05:16.915 UTC [msp.identity] Verify -> DEBU 2a67 Verify: sig = 00000000 30 45 02 21 00 f0 75 11 1d c1 3c 4c 4e df 7f cd |0E.!..u... DEBU 2a68 exits successfully" +"2019-09-24 01:05:16.917 UTC [protoutils] validateEndorserTransaction -> DEBU 2a69 validateEndorserTransaction starts for data 0xc0039dd800, header channel_header:"\010\003\032\014\010\312\327\245\354\005\020\310\302\256\230\003\"\017businesschannel*@716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\n3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg==\n-----END CERTIFICATE-----\n\022\030TV\350\321\243L:\343\305fX\373\202\351\222\225\033\270\230\240\207\022$\230" " +"2019-09-24 01:05:16.917 UTC [protoutils] validateEndorserTransaction -> DEBU 2a6a validateEndorserTransaction info: there are 1 actions" +"2019-09-24 01:05:16.918 UTC [protoutils] validateEndorserTransaction -> DEBU 2a6b validateEndorserTransaction info: signature header is valid" +"2019-09-24 01:05:16.918 UTC [protoutils] ValidateTransaction -> DEBU 2a6c ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 01:05:16.918 UTC [committer.txvalidator] validateTx -> DEBU 2a6d Transaction is for channel businesschannel" +"2019-09-24 01:05:16.918 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2a6e retrieveTransactionByID() - txId = [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b]" +"2019-09-24 01:05:16.920 UTC [committer.txvalidator] validateTx -> DEBU 2a6f Validating transaction vscc tx validate" +"2019-09-24 01:05:16.920 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2a70 [businesschannel] VSCCValidateTx starts for bytes 0xc000241c00" +"2019-09-24 01:05:16.921 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a71 constructing new query executor txid = [3c66d60d-3283-4029-9f60-c4ebc8987425]" +"2019-09-24 01:05:16.921 UTC [stateleveldb] GetState -> DEBU 2a72 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:16.921 UTC [lockbasedtxmgr] Done -> DEBU 2a73 Done with transaction simulation / query execution [3c66d60d-3283-4029-9f60-c4ebc8987425]" +"2019-09-24 01:05:16.922 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2a74 Validating Tx 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 01:05:16.922 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a75 constructing new query executor txid = [64ca7b1f-8493-450a-b6cf-a660a421ac14]" +"2019-09-24 01:05:16.922 UTC [lockbasedtxmgr] Done -> DEBU 2a76 Done with transaction simulation / query execution [64ca7b1f-8493-450a-b6cf-a660a421ac14]" +"2019-09-24 01:05:16.922 UTC [cauthdsl] func1 -> DEBU 2a77 0xc002675980 gate 1569287116922765200 evaluation starts" +"2019-09-24 01:05:16.922 UTC [cauthdsl] func2 -> DEBU 2a78 0xc002675980 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:16.923 UTC [cauthdsl] func2 -> DEBU 2a79 0xc002675980 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:16.924 UTC [cauthdsl] func2 -> DEBU 2a7a 0xc002675980 principal matched by identity 0" +"2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7b Obtaining identity" +"2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7c Obtaining identity" +"2019-09-24 01:05:16.925 UTC [msp] DeserializeIdentity -> DEBU 2a7d Obtaining identity" +"2019-09-24 01:05:16.926 UTC [msp] DeserializeIdentity -> DEBU 2a7e Obtaining identity" +"2019-09-24 01:05:16.926 UTC [gossip.comm] Send -> DEBU 2a7f Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:16.927 UTC [msp] DeserializeIdentity -> DEBU 2a80 Obtaining identity" +"2019-09-24 01:05:16.927 UTC [msp] DeserializeIdentity -> DEBU 2a81 Obtaining identity" +"2019-09-24 01:05:16.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a82 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3997 bytes, seq: 4}, Envelope: 4027 bytes, Signature: 0 bytes" +"2019-09-24 01:05:16.928 UTC [gossip.comm] sendToEndpoint -> DEBU 2a83 Exiting" +"2019-09-24 01:05:16.925 UTC [msp.identity] Verify -> DEBU 2a84 Verify: digest = 00000000 bc b2 0f 87 7b f7 b6 cb f3 e3 ec d3 9c 7f 7e ce |....{.........~.| +00000010 2d 6e f5 80 7b 7b 0e e7 60 f1 56 86 20 d9 c8 ef |-n..{{..`.V. ...|" +"2019-09-24 01:05:16.934 UTC [msp.identity] Verify -> DEBU 2a85 Verify: sig = 00000000 30 44 02 20 71 46 df 0b 1a c9 03 c3 87 96 64 65 |0D. qF........de| +00000010 4e da b0 f6 3c dc 42 94 57 9b d4 65 d4 70 9c 92 |N...<.B.W..e.p..| +00000020 cb d4 52 66 02 20 1e 3a 0d e6 e2 db c6 e1 a8 96 |..Rf. .:........| +00000030 52 37 bd 6c c6 18 44 d1 6b 00 e6 b3 a4 72 18 ea |R7.l..D.k....r..| +00000040 81 f4 4b 6d 6a aa |..Kmj.|" +"2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a86 0xc002675980 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a87 0xc002675980 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a88 0xc002675980 skipping identity 0 because it has already been used" +"2019-09-24 01:05:16.936 UTC [cauthdsl] func2 -> DEBU 2a89 0xc002675980 principal evaluation fails" +"2019-09-24 01:05:16.937 UTC [cauthdsl] func1 -> DEBU 2a8a 0xc002675980 gate 1569287116922765200 evaluation succeeds" +"2019-09-24 01:05:16.937 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2a8b constructing new query executor txid = [6f6cb0ba-df17-4a5d-b069-312cc98f488a]" +"2019-09-24 01:05:16.937 UTC [lockbasedtxmgr] Done -> DEBU 2a8c Done with transaction simulation / query execution [6f6cb0ba-df17-4a5d-b069-312cc98f488a]" +"2019-09-24 01:05:16.938 UTC [vscc] Validate -> DEBU 2a8d block 4, namespace: exp02, tx 0 validation results is: " +"2019-09-24 01:05:16.938 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2a8e Transaction 716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b appears to be valid" +"2019-09-24 01:05:16.938 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2a8f [businesschannel] VSCCValidateTx completes env bytes 0xc000241c00" +"2019-09-24 01:05:16.940 UTC [committer.txvalidator] validateTx -> DEBU 2a90 [businesschannel] validateTx completes for block 0xc0027d7580 env 0xc0003e23c0 txn 0" +"2019-09-24 01:05:16.940 UTC [committer.txvalidator] Validate -> DEBU 2a91 got result for idx 0, code 0" +"2019-09-24 01:05:16.940 UTC [committer.txvalidator] Validate -> INFO 2a92 [businesschannel] Validated block [4] in 29ms" +"2019-09-24 01:05:16.942 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2a93 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:05:16.942 UTC [gossip.privdata] StoreBlock -> DEBU 2a94 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:05:16.942 UTC [kvledger] CommitWithPvtData -> DEBU 2a95 [businesschannel] Validating state for block [4]" +"2019-09-24 01:05:16.942 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a96 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:05:16.943 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a97 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:05:16.943 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2a98 Validating new block with num trans = [1]" +"2019-09-24 01:05:16.943 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2a99 ValidateAndPrepareBatch() for block number = [4]" +"2019-09-24 01:05:16.943 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2a9a preprocessing ProtoBlock..." +"2019-09-24 01:05:16.943 UTC [valimpl] preprocessProtoBlock -> DEBU 2a9b txType=ENDORSER_TRANSACTION" +"2019-09-24 01:05:16.943 UTC [stateleveldb] GetState -> DEBU 2a9c GetState(). ns=exp02, key=a" +"2019-09-24 01:05:16.943 UTC [statebasedval] validateKVRead -> DEBU 2a9d Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 01:05:16.943 UTC [stateleveldb] GetState -> DEBU 2a9e GetState(). ns=exp02, key=b" +"2019-09-24 01:05:16.944 UTC [statebasedval] validateKVRead -> DEBU 2a9f Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 01:05:16.944 UTC [stateleveldb] GetState -> DEBU 2aa0 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:16.944 UTC [statebasedval] validateKVRead -> DEBU 2aa1 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 01:05:16.944 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2aa2 Block [4] Transaction index [0] TxId [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] marked as valid by state validator" +"2019-09-24 01:05:16.944 UTC [valinternal] ApplyWriteSet -> DEBU 2aa3 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc002af2800), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002af2a00)}" +"2019-09-24 01:05:16.944 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa4 validating rwset..." +"2019-09-24 01:05:16.945 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa5 postprocessing ProtoBlock..." +"2019-09-24 01:05:16.945 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2aa6 ValidateAndPrepareBatch() complete" +"2019-09-24 01:05:16.945 UTC [kvledger] CommitWithPvtData -> DEBU 2aa7 [businesschannel] Adding CommitHash to the block [4]" +"2019-09-24 01:05:16.945 UTC [kvledger] CommitWithPvtData -> DEBU 2aa8 [businesschannel] Committing block [4] to storage" +"2019-09-24 01:05:16.945 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2aa9 Writing block [4] to pvt block store" +"2019-09-24 01:05:16.947 UTC [pvtdatastorage] Prepare -> DEBU 2aaa Saved 0 private data write sets for block [4]" +"2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aab Indexing block [blockNum=4, blockHash=[]byte{0xd5, 0x57, 0x9e, 0x19, 0x63, 0x67, 0xd5, 0xdc, 0x86, 0xc, 0xd2, 0x55, 0xe5, 0x72, 0x46, 0xfe, 0x75, 0x52, 0x23, 0xda, 0x1f, 0xf6, 0x6, 0xd2, 0x79, 0xa1, 0xba, 0xeb, 0x15, 0x73, 0xde, 0xe2} txOffsets= +txId=716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b locPointer=offset=70, bytesLength=2977 +]" +"2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aac Adding txLoc [fileSuffixNum=0, offset=81468, bytesLength=2977] for tx ID: [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] to txid-index" +"2019-09-24 01:05:16.949 UTC [fsblkstorage] indexBlock -> DEBU 2aad Adding txLoc [fileSuffixNum=0, offset=81468, bytesLength=2977] for tx number:[0] ID: [716eee82e8025baa7edf8889ea390236edd475ed6b8c7df2b37e98b2b042015b] to blockNumTranNum index" +"2019-09-24 01:05:16.951 UTC [fsblkstorage] updateCheckpoint -> DEBU 2aae Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[85417], isChainEmpty=[false], lastBlockNumber=[4]" +"2019-09-24 01:05:16.951 UTC [pvtdatastorage] Commit -> DEBU 2aaf Committing private data for block [4]" +"2019-09-24 01:05:16.953 UTC [pvtdatastorage] Commit -> DEBU 2ab0 Committed private data for block [4]" +"2019-09-24 01:05:16.953 UTC [kvledger] CommitWithPvtData -> DEBU 2ab1 [businesschannel] Committing block [4] transactions to state database" +"2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab2 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab3 Committing updates to state database" +"2019-09-24 01:05:16.953 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2ab4 Building the expiry schedules based on the update batch" +"2019-09-24 01:05:16.953 UTC [lockbasedtxmgr] Commit -> DEBU 2ab5 Write lock acquired for committing updates to state database" +"2019-09-24 01:05:16.953 UTC [stateleveldb] ApplyUpdates -> DEBU 2ab6 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 01:05:16.954 UTC [stateleveldb] ApplyUpdates -> DEBU 2ab7 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 01:05:16.955 UTC [lockbasedtxmgr] Commit -> DEBU 2ab8 Updates committed to state database and the write lock is released" +"2019-09-24 01:05:16.955 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2ab9 Preparing potential purge list working-set for expiringAtBlk [5]" +"2019-09-24 01:05:16.955 UTC [leveldbhelper] GetIterator -> DEBU 2aba Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}]" +"2019-09-24 01:05:16.955 UTC [lockbasedtxmgr] func1 -> DEBU 2abb launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:05:16.956 UTC [kvledger] CommitWithPvtData -> DEBU 2abc [businesschannel] Committing block [4] transactions to history database" +"2019-09-24 01:05:16.956 UTC [historyleveldb] Commit -> DEBU 2abd Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions" +"2019-09-24 01:05:16.956 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2abe No expiry entry found for expiringAtBlk [5]" +"2019-09-24 01:05:16.957 UTC [historyleveldb] Commit -> DEBU 2abf Channel [businesschannel]: Updates committed to history database for blockNo [4]" +"2019-09-24 01:05:16.957 UTC [kvledger] CommitWithPvtData -> INFO 2ac0 [businesschannel] Committed block [4] with 1 transaction(s) in 15ms (state_validation=2ms block_and_pvtdata_commit=8ms state_commit=2ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710]" +"2019-09-24 01:05:16.958 UTC [msp] GetDefaultSigningIdentity -> DEBU 2ac1 Obtaining default signing identity" +"2019-09-24 01:05:16.958 UTC [msp.identity] Sign -> DEBU 2ac2 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08051A0C0A0565787030321203312E30 " +"2019-09-24 01:05:16.958 UTC [msp.identity] Sign -> DEBU 2ac3 Sign: digest: 7CB01B921624145970E96A8D83599CD130C4E51B48EC5BF52A9E4743C7F7E8E1 " +"2019-09-24 01:05:16.958 UTC [gossip.state] commitBlock -> DEBU 2ac4 [businesschannel] Committed block [4] with 1 transaction(s)" +"2019-09-24 01:05:17.272 UTC [endorser] ProcessProposal -> DEBU 2ac5 Entering: request from 172.18.0.5:49924" +"2019-09-24 01:05:17.272 UTC [protoutils] ValidateProposalMessage -> DEBU 2ac6 ValidateProposalMessage starts for signed proposal 0xc0024826e0" +"2019-09-24 01:05:17.272 UTC [protoutils] validateChannelHeader -> DEBU 2ac7 validateChannelHeader info: header type 3" +"2019-09-24 01:05:17.272 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ac8 begin" +"2019-09-24 01:05:17.273 UTC [msp] GetManagerForChain -> DEBU 2ac9 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:17.273 UTC [protoutils] checkSignatureFromCreator -> DEBU 2aca creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +"2019-09-24 01:05:17.273 UTC [protoutils] checkSignatureFromCreator -> DEBU 2acb creator is valid" +"2019-09-24 01:05:17.273 UTC [msp.identity] Verify -> DEBU 2acc Verify: digest = 00000000 11 ec 72 44 b9 26 f3 c3 66 7d 20 6e 35 2e 0f 59 |..rD.&..f} n5..Y| +00000010 bf 0e e1 10 81 dc 87 ab a4 c1 80 54 bb 99 e2 8b |...........T....|" +"2019-09-24 01:05:17.273 UTC [msp.identity] Verify -> DEBU 2acd Verify: sig = 00000000 30 44 02 20 79 5a 9f 6a 1c fe d1 d7 1d 17 d8 6a |0D. yZ.j.......j| +00000010 3a 16 17 ae f4 93 d9 0a 80 c7 94 6d 6f a5 da 42 |:..........mo..B| +00000020 c9 a2 57 cf 02 20 07 7b 7a a1 5b e7 22 93 29 5e |..W.. .{z.[.".)^| +00000030 2c 12 ae ea e9 8d 02 d2 70 a6 a0 b3 5e b8 25 30 |,.......p...^.%0| +00000040 36 1d 23 83 b1 a8 |6.#...|" +"2019-09-24 01:05:17.274 UTC [protoutils] checkSignatureFromCreator -> DEBU 2ace exits successfully" +"2019-09-24 01:05:17.274 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2acf validateChaincodeProposalMessage starts for proposal 0xc002a280e0, header 0xc002482b90" +"2019-09-24 01:05:17.274 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2ad0 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:17.274 UTC [endorser] preProcess -> DEBU 2ad1 [businesschannel][853b34c6] processing txid: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c" +"2019-09-24 01:05:17.275 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2ad2 retrieveTransactionByID() - txId = [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +"2019-09-24 01:05:17.275 UTC [aclmgmt] CheckACL -> DEBU 2ad3 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:17.275 UTC [aclmgmt] CheckACL -> DEBU 2ad4 acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.275 UTC [policies] Evaluate -> DEBU 2ad7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:17.276 UTC [cauthdsl] func1 -> DEBU 2ad8 0xc0027f4b30 gate 1569287117276165700 evaluation starts" +"2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2ad9 0xc0027f4b30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2ada 0xc0027f4b30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.276 UTC [cauthdsl] func2 -> DEBU 2adb 0xc0027f4b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.277 UTC [cauthdsl] func2 -> DEBU 2adc 0xc0027f4b30 principal evaluation fails" +"2019-09-24 01:05:17.277 UTC [cauthdsl] func1 -> DEBU 2add 0xc0027f4b30 gate 1569287117276165700 evaluation fails" +"2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2ade Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2adf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.277 UTC [policies] Evaluate -> DEBU 2ae0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:05:17.277 UTC [cauthdsl] func1 -> DEBU 2ae1 0xc0027f53a0 gate 1569287117277878100 evaluation starts" +"2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae2 0xc0027f53a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae3 0xc0027f53a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.278 UTC [cauthdsl] func2 -> DEBU 2ae4 0xc0027f53a0 principal matched by identity 0" +"2019-09-24 01:05:17.278 UTC [msp.identity] Verify -> DEBU 2ae5 Verify: digest = 00000000 11 ec 72 44 b9 26 f3 c3 66 7d 20 6e 35 2e 0f 59 |..rD.&..f} n5..Y| +00000010 bf 0e e1 10 81 dc 87 ab a4 c1 80 54 bb 99 e2 8b |...........T....|" +"2019-09-24 01:05:17.279 UTC [msp.identity] Verify -> DEBU 2ae6 Verify: sig = 00000000 30 44 02 20 79 5a 9f 6a 1c fe d1 d7 1d 17 d8 6a |0D. yZ.j.......j| +00000010 3a 16 17 ae f4 93 d9 0a 80 c7 94 6d 6f a5 da 42 |:..........mo..B| +00000020 c9 a2 57 cf 02 20 07 7b 7a a1 5b e7 22 93 29 5e |..W.. .{z.[.".)^| +00000030 2c 12 ae ea e9 8d 02 d2 70 a6 a0 b3 5e b8 25 30 |,.......p...^.%0| +00000040 36 1d 23 83 b1 a8 |6.#...|" +"2019-09-24 01:05:17.279 UTC [cauthdsl] func2 -> DEBU 2ae7 0xc0027f53a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.279 UTC [cauthdsl] func1 -> DEBU 2ae8 0xc0027f53a0 gate 1569287117277878100 evaluation succeeds" +"2019-09-24 01:05:17.279 UTC [policies] Evaluate -> DEBU 2ae9 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.279 UTC [policies] Evaluate -> DEBU 2aea == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.280 UTC [policies] Evaluate -> DEBU 2aeb Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:17.280 UTC [policies] Evaluate -> DEBU 2aec == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:17.280 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2aed constructing new tx simulator" +"2019-09-24 01:05:17.280 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2aee constructing new tx simulator txid = [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +"2019-09-24 01:05:17.281 UTC [endorser] SimulateProposal -> DEBU 2aef [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.281 UTC [stateleveldb] GetState -> DEBU 2af0 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:17.282 UTC [ccprovider] GetChaincodeData -> DEBU 2af1 Getting chaincode data for from cache" +"2019-09-24 01:05:17.282 UTC [endorser] callChaincode -> INFO 2af2 [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.283 UTC [chaincode] Execute -> DEBU 2af3 Entry" +"2019-09-24 01:05:17.284 UTC [chaincode] handleMessage -> DEBU 2af4 [853b34c6] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:17.284 UTC [chaincode] HandleTransaction -> DEBU 2af5 [853b34c6] handling GET_STATE from chaincode" +"2019-09-24 01:05:17.284 UTC [chaincode] HandleGetState -> DEBU 2af6 [853b34c6] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:17.285 UTC [stateleveldb] GetState -> DEBU 2af7 GetState(). ns=exp02, key=a" +"2019-09-24 01:05:17.285 UTC [chaincode] HandleTransaction -> DEBU 2af8 [853b34c6] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.286 UTC [chaincode] handleMessage -> DEBU 2af9 [853b34c6] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:17.286 UTC [chaincode] Notify -> DEBU 2afa [853b34c6] notifying Txid:853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, channelID:businesschannel" +"2019-09-24 01:05:17.286 UTC [chaincode] Execute -> DEBU 2afb Exit" +"2019-09-24 01:05:17.286 UTC [endorser] callChaincode -> INFO 2afc [businesschannel][853b34c6] Exit chaincode: name:"exp02" (3ms)" +"2019-09-24 01:05:17.286 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2afd Simulation completed, getting simulation results" +"2019-09-24 01:05:17.286 UTC [lockbasedtxmgr] Done -> DEBU 2afe Done with transaction simulation / query execution [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +"2019-09-24 01:05:17.287 UTC [endorser] SimulateProposal -> DEBU 2aff [businesschannel][853b34c6] Exit" +"2019-09-24 01:05:17.287 UTC [endorser] endorseProposal -> DEBU 2b00 [businesschannel][853b34c6] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.287 UTC [endorser] endorseProposal -> DEBU 2b01 [businesschannel][853b34c6] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:17.287 UTC [endorser] EndorseWithPlugin -> DEBU 2b02 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, chaincode: exp02}" +"2019-09-24 01:05:17.287 UTC [msp.identity] Sign -> DEBU 2b03 Sign: plaintext: 0A2020931FDD4BFC044CAE8AC5435AD7...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:17.287 UTC [msp.identity] Sign -> DEBU 2b04 Sign: digest: 91D18328D7171F43B1A076E38620EEA4007DAB68806DC59F12A60DB19DC4A9E8 " +"2019-09-24 01:05:17.288 UTC [endorser] EndorseWithPlugin -> DEBU 2b05 Exiting {plugin: escc, channel: businesschannel, tx: 853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c, chaincode: exp02}" +"2019-09-24 01:05:17.288 UTC [endorser] endorseProposal -> DEBU 2b06 [businesschannel][853b34c6] Exit" +"2019-09-24 01:05:17.288 UTC [lockbasedtxmgr] Done -> DEBU 2b07 Done with transaction simulation / query execution [853b34c6bea2114cb98d55552a74f1381657e7e1dc678842b4122816f035532c]" +"2019-09-24 01:05:17.288 UTC [endorser] func1 -> DEBU 2b08 Exit: request from 172.18.0.5:49924" +"2019-09-24 01:05:17.288 UTC [comm.grpc.server] 1 -> INFO 2b09 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49924 grpc.code=OK grpc.call_duration=16.2646ms +"2019-09-24 01:05:17.292 UTC [grpc] infof -> DEBU 2b0a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.293 UTC [grpc] infof -> DEBU 2b0b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.444 UTC [endorser] ProcessProposal -> DEBU 2b0c Entering: request from 172.18.0.5:49928" +"2019-09-24 01:05:17.444 UTC [protoutils] ValidateProposalMessage -> DEBU 2b0d ValidateProposalMessage starts for signed proposal 0xc002483590" +"2019-09-24 01:05:17.444 UTC [protoutils] validateChannelHeader -> DEBU 2b0e validateChannelHeader info: header type 3" +"2019-09-24 01:05:17.445 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b0f begin" +"2019-09-24 01:05:17.445 UTC [msp] GetManagerForChain -> DEBU 2b10 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:17.445 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b11 creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +"2019-09-24 01:05:17.446 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b12 creator is valid" +"2019-09-24 01:05:17.447 UTC [msp.identity] Verify -> DEBU 2b13 Verify: digest = 00000000 42 1d 0f 8b ed 7d 9a 6e f3 03 86 44 50 63 d8 1a |B....}.n...DPc..| +00000010 d7 de 10 13 b8 4a dc 42 d2 f1 d2 03 1d 13 51 d1 |.....J.B......Q.|" +"2019-09-24 01:05:17.447 UTC [msp.identity] Verify -> DEBU 2b14 Verify: sig = 00000000 30 44 02 20 09 77 25 67 5e 6f 51 9f 3c e9 73 e7 |0D. .w%g^oQ.<.s.| +00000010 80 55 97 e5 f5 47 77 75 17 23 66 d2 1b 8c a8 f3 |.U...Gwu.#f.....| +00000020 9d b8 fb 68 02 20 6b d0 f1 cb ce d7 da 96 f5 49 |...h. k........I| +00000030 b5 a2 b2 04 24 78 12 97 0e 69 7f 16 9a 29 96 63 |....$x...i...).c| +00000040 6a 2e 92 10 f9 55 |j....U|" +"2019-09-24 01:05:17.448 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b15 exits successfully" +"2019-09-24 01:05:17.448 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b16 validateChaincodeProposalMessage starts for proposal 0xc002a28620, header 0xc0024839a0" +"2019-09-24 01:05:17.448 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b17 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:17.448 UTC [endorser] preProcess -> DEBU 2b18 [businesschannel][074b5311] processing txid: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5" +"2019-09-24 01:05:17.449 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b19 retrieveTransactionByID() - txId = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +"2019-09-24 01:05:17.449 UTC [aclmgmt] CheckACL -> DEBU 2b1a acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:17.449 UTC [aclmgmt] CheckACL -> DEBU 2b1b acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:17.449 UTC [policies] Evaluate -> DEBU 2b1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:17.450 UTC [policies] Evaluate -> DEBU 2b1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.450 UTC [policies] Evaluate -> DEBU 2b1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:17.450 UTC [cauthdsl] func1 -> DEBU 2b1f 0xc002872710 gate 1569287117450463000 evaluation starts" +"2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b20 0xc002872710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b21 0xc002872710 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.450 UTC [cauthdsl] func2 -> DEBU 2b22 0xc002872710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.451 UTC [cauthdsl] func2 -> DEBU 2b23 0xc002872710 principal evaluation fails" +"2019-09-24 01:05:17.451 UTC [cauthdsl] func1 -> DEBU 2b24 0xc002872710 gate 1569287117450463000 evaluation fails" +"2019-09-24 01:05:17.451 UTC [policies] Evaluate -> DEBU 2b25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.452 UTC [policies] Evaluate -> DEBU 2b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.452 UTC [policies] Evaluate -> DEBU 2b27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2019-09-24 01:05:17.452 UTC [cauthdsl] func1 -> DEBU 2b28 0xc002872f50 gate 1569287117452257400 evaluation starts" +"2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b29 0xc002872f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b2a 0xc002872f50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.452 UTC [cauthdsl] func2 -> DEBU 2b2b 0xc002872f50 principal matched by identity 0" +"2019-09-24 01:05:17.453 UTC [msp.identity] Verify -> DEBU 2b2c Verify: digest = 00000000 42 1d 0f 8b ed 7d 9a 6e f3 03 86 44 50 63 d8 1a |B....}.n...DPc..| +00000010 d7 de 10 13 b8 4a dc 42 d2 f1 d2 03 1d 13 51 d1 |.....J.B......Q.|" +"2019-09-24 01:05:17.453 UTC [msp.identity] Verify -> DEBU 2b2d Verify: sig = 00000000 30 44 02 20 09 77 25 67 5e 6f 51 9f 3c e9 73 e7 |0D. .w%g^oQ.<.s.| +00000010 80 55 97 e5 f5 47 77 75 17 23 66 d2 1b 8c a8 f3 |.U...Gwu.#f.....| +00000020 9d b8 fb 68 02 20 6b d0 f1 cb ce d7 da 96 f5 49 |...h. k........I| +00000030 b5 a2 b2 04 24 78 12 97 0e 69 7f 16 9a 29 96 63 |....$x...i...).c| +00000040 6a 2e 92 10 f9 55 |j....U|" +"2019-09-24 01:05:17.453 UTC [cauthdsl] func2 -> DEBU 2b2e 0xc002872f50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.453 UTC [cauthdsl] func1 -> DEBU 2b2f 0xc002872f50 gate 1569287117452257400 evaluation succeeds" +"2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b30 Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b32 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:17.454 UTC [policies] Evaluate -> DEBU 2b33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:17.454 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b34 constructing new tx simulator" +"2019-09-24 01:05:17.455 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b35 constructing new tx simulator txid = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +"2019-09-24 01:05:17.455 UTC [endorser] SimulateProposal -> DEBU 2b36 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.455 UTC [stateleveldb] GetState -> DEBU 2b37 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:17.455 UTC [ccprovider] GetChaincodeData -> DEBU 2b38 Getting chaincode data for from cache" +"2019-09-24 01:05:17.455 UTC [endorser] callChaincode -> INFO 2b39 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.456 UTC [chaincode] Execute -> DEBU 2b3a Entry" +"2019-09-24 01:05:17.457 UTC [chaincode] handleMessage -> DEBU 2b3b [074b5311] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:17.457 UTC [chaincode] HandleTransaction -> DEBU 2b3c [074b5311] handling GET_STATE from chaincode" +"2019-09-24 01:05:17.458 UTC [chaincode] HandleGetState -> DEBU 2b3d [074b5311] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:17.458 UTC [stateleveldb] GetState -> DEBU 2b3e GetState(). ns=exp02, key=a" +"2019-09-24 01:05:17.458 UTC [chaincode] HandleTransaction -> DEBU 2b3f [074b5311] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.459 UTC [chaincode] handleMessage -> DEBU 2b40 [074b5311] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:17.460 UTC [chaincode] HandleTransaction -> DEBU 2b41 [074b5311] handling GET_STATE from chaincode" +"2019-09-24 01:05:17.460 UTC [chaincode] HandleGetState -> DEBU 2b42 [074b5311] getting state for chaincode exp02, key b, channel businesschannel" +"2019-09-24 01:05:17.460 UTC [stateleveldb] GetState -> DEBU 2b43 GetState(). ns=exp02, key=b" +"2019-09-24 01:05:17.460 UTC [chaincode] HandleTransaction -> DEBU 2b44 [074b5311] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.461 UTC [chaincode] handleMessage -> DEBU 2b45 [074b5311] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:17.462 UTC [chaincode] HandleTransaction -> DEBU 2b46 [074b5311] handling PUT_STATE from chaincode" +"2019-09-24 01:05:17.462 UTC [chaincode] HandleTransaction -> DEBU 2b47 [074b5311] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.463 UTC [chaincode] handleMessage -> DEBU 2b48 [074b5311] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready" +"2019-09-24 01:05:17.463 UTC [chaincode] HandleTransaction -> DEBU 2b49 [074b5311] handling PUT_STATE from chaincode" +"2019-09-24 01:05:17.463 UTC [chaincode] HandleTransaction -> DEBU 2b4a [074b5311] Completed PUT_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.464 UTC [chaincode] handleMessage -> DEBU 2b4b [074b5311] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:17.464 UTC [chaincode] Notify -> DEBU 2b4c [074b5311] notifying Txid:074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, channelID:businesschannel" +"2019-09-24 01:05:17.464 UTC [chaincode] Execute -> DEBU 2b4d Exit" +"2019-09-24 01:05:17.464 UTC [endorser] callChaincode -> INFO 2b4e [businesschannel][074b5311] Exit chaincode: name:"exp02" (9ms)" +"2019-09-24 01:05:17.464 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2b4f Simulation completed, getting simulation results" +"2019-09-24 01:05:17.464 UTC [lockbasedtxmgr] Done -> DEBU 2b50 Done with transaction simulation / query execution [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +"2019-09-24 01:05:17.465 UTC [endorser] SimulateProposal -> DEBU 2b51 [businesschannel][074b5311] Exit" +"2019-09-24 01:05:17.465 UTC [endorser] endorseProposal -> DEBU 2b52 [businesschannel][074b5311] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.465 UTC [endorser] endorseProposal -> DEBU 2b53 [businesschannel][074b5311] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:17.465 UTC [endorser] EndorseWithPlugin -> DEBU 2b54 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, chaincode: exp02}" +"2019-09-24 01:05:17.465 UTC [msp.identity] Sign -> DEBU 2b55 Sign: plaintext: 0A20000E0A109C8AAC49E4731E7FE19E...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:17.466 UTC [msp.identity] Sign -> DEBU 2b56 Sign: digest: CC694F418907FBB35A81AF28EC3903AEB6210BD00D716833C1F086E586731F7B " +"2019-09-24 01:05:17.467 UTC [endorser] EndorseWithPlugin -> DEBU 2b57 Exiting {plugin: escc, channel: businesschannel, tx: 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, chaincode: exp02}" +"2019-09-24 01:05:17.467 UTC [endorser] endorseProposal -> DEBU 2b58 [businesschannel][074b5311] Exit" +"2019-09-24 01:05:17.467 UTC [lockbasedtxmgr] Done -> DEBU 2b59 Done with transaction simulation / query execution [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +"2019-09-24 01:05:17.467 UTC [endorser] func1 -> DEBU 2b5a Exit: request from 172.18.0.5:49928" +"2019-09-24 01:05:17.467 UTC [comm.grpc.server] 1 -> INFO 2b5b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49928 grpc.code=OK grpc.call_duration=24.4528ms +"2019-09-24 01:05:17.481 UTC [grpc] infof -> DEBU 2b5c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.481 UTC [grpc] infof -> DEBU 2b5d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.642 UTC [endorser] ProcessProposal -> DEBU 2b5e Entering: request from 172.18.0.5:49934" +"2019-09-24 01:05:17.642 UTC [protoutils] ValidateProposalMessage -> DEBU 2b5f ValidateProposalMessage starts for signed proposal 0xc0024d1270" +"2019-09-24 01:05:17.643 UTC [protoutils] validateChannelHeader -> DEBU 2b60 validateChannelHeader info: header type 3" +"2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b61 begin" +"2019-09-24 01:05:17.644 UTC [msp] GetManagerForChain -> DEBU 2b62 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b63 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:17.644 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b64 creator is valid" +"2019-09-24 01:05:17.644 UTC [msp.identity] Verify -> DEBU 2b65 Verify: digest = 00000000 1c ea bc 17 96 ea cd 37 74 96 b4 c5 51 bd cf 87 |.......7t...Q...| +00000010 e4 41 e3 38 ee 7c 17 48 2b fe 13 d8 7d 34 69 e6 |.A.8.|.H+...}4i.|" +"2019-09-24 01:05:17.644 UTC [msp.identity] Verify -> DEBU 2b66 Verify: sig = 00000000 30 44 02 20 3e 5f 66 77 68 af 8f 77 3e 2c 52 5c |0D. >_fwh..w>,R\| +00000010 88 22 8d ea ab 9b 6e b5 8b 04 14 9a 04 6c 48 a7 |."....n......lH.| +00000020 18 0a ca 12 02 20 18 fc 89 9e 9f e4 bc dc 45 80 |..... ........E.| +00000030 0b fe cb b6 61 5a 6a 5b 5d 9f b3 25 ea 58 9b 90 |....aZj[]..%.X..| +00000040 62 54 84 b0 2c b4 |bT..,.|" +"2019-09-24 01:05:17.645 UTC [protoutils] checkSignatureFromCreator -> DEBU 2b67 exits successfully" +"2019-09-24 01:05:17.645 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b68 validateChaincodeProposalMessage starts for proposal 0xc0029411f0, header 0xc0024d16d0" +"2019-09-24 01:05:17.645 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2b69 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:17.645 UTC [endorser] preProcess -> DEBU 2b6a [businesschannel][12e43181] processing txid: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8" +"2019-09-24 01:05:17.646 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2b6b retrieveTransactionByID() - txId = [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +"2019-09-24 01:05:17.646 UTC [aclmgmt] CheckACL -> DEBU 2b6c acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:17.646 UTC [aclmgmt] CheckACL -> DEBU 2b6d acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:17.646 UTC [policies] Evaluate -> DEBU 2b6e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:17.646 UTC [policies] Evaluate -> DEBU 2b6f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.647 UTC [policies] Evaluate -> DEBU 2b70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:17.647 UTC [cauthdsl] func1 -> DEBU 2b71 0xc00293f770 gate 1569287117647205300 evaluation starts" +"2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b72 0xc00293f770 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b73 0xc00293f770 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.647 UTC [cauthdsl] func2 -> DEBU 2b74 0xc00293f770 principal matched by identity 0" +"2019-09-24 01:05:17.648 UTC [msp.identity] Verify -> DEBU 2b75 Verify: digest = 00000000 1c ea bc 17 96 ea cd 37 74 96 b4 c5 51 bd cf 87 |.......7t...Q...| +00000010 e4 41 e3 38 ee 7c 17 48 2b fe 13 d8 7d 34 69 e6 |.A.8.|.H+...}4i.|" +"2019-09-24 01:05:17.648 UTC [msp.identity] Verify -> DEBU 2b76 Verify: sig = 00000000 30 44 02 20 3e 5f 66 77 68 af 8f 77 3e 2c 52 5c |0D. >_fwh..w>,R\| +00000010 88 22 8d ea ab 9b 6e b5 8b 04 14 9a 04 6c 48 a7 |."....n......lH.| +00000020 18 0a ca 12 02 20 18 fc 89 9e 9f e4 bc dc 45 80 |..... ........E.| +00000030 0b fe cb b6 61 5a 6a 5b 5d 9f b3 25 ea 58 9b 90 |....aZj[]..%.X..| +00000040 62 54 84 b0 2c b4 |bT..,.|" +"2019-09-24 01:05:17.648 UTC [cauthdsl] func2 -> DEBU 2b77 0xc00293f770 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.649 UTC [cauthdsl] func1 -> DEBU 2b78 0xc00293f770 gate 1569287117647205300 evaluation succeeds" +"2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b79 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7b Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:17.649 UTC [policies] Evaluate -> DEBU 2b7c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:17.650 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2b7d constructing new tx simulator" +"2019-09-24 01:05:17.650 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2b7e constructing new tx simulator txid = [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +"2019-09-24 01:05:17.650 UTC [endorser] SimulateProposal -> DEBU 2b7f [businesschannel][12e43181] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.651 UTC [stateleveldb] GetState -> DEBU 2b80 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:17.651 UTC [ccprovider] GetChaincodeData -> DEBU 2b81 Getting chaincode data for from cache" +"2019-09-24 01:05:17.651 UTC [endorser] callChaincode -> INFO 2b82 [businesschannel][12e43181] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.651 UTC [chaincode] Execute -> DEBU 2b83 Entry" +"2019-09-24 01:05:17.656 UTC [msp] DeserializeIdentity -> DEBU 2b84 Obtaining identity" +"2019-09-24 01:05:17.656 UTC [msp] DeserializeIdentity -> DEBU 2b85 Obtaining identity" +"2019-09-24 01:05:17.656 UTC [chaincode] handleMessage -> DEBU 2b86 [12e43181] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:17.656 UTC [gossip.comm] Send -> DEBU 2b87 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b88 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.656 UTC [chaincode] HandleTransaction -> DEBU 2b89 [12e43181] handling GET_STATE from chaincode" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8a Exiting" +"2019-09-24 01:05:17.656 UTC [chaincode] HandleGetState -> DEBU 2b8b [12e43181] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:17.656 UTC [stateleveldb] GetState -> DEBU 2b8c GetState(). ns=exp02, key=a" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b8e Exiting" +"2019-09-24 01:05:17.656 UTC [chaincode] HandleTransaction -> DEBU 2b8f [12e43181] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b90 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.656 UTC [gossip.comm] sendToEndpoint -> DEBU 2b91 Exiting" +"2019-09-24 01:05:17.657 UTC [chaincode] handleMessage -> DEBU 2b92 [12e43181] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:17.657 UTC [chaincode] Notify -> DEBU 2b93 [12e43181] notifying Txid:12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, channelID:businesschannel" +"2019-09-24 01:05:17.658 UTC [chaincode] Execute -> DEBU 2b94 Exit" +"2019-09-24 01:05:17.658 UTC [endorser] callChaincode -> INFO 2b95 [businesschannel][12e43181] Exit chaincode: name:"exp02" (7ms)" +"2019-09-24 01:05:17.658 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2b96 Simulation completed, getting simulation results" +"2019-09-24 01:05:17.659 UTC [lockbasedtxmgr] Done -> DEBU 2b97 Done with transaction simulation / query execution [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +"2019-09-24 01:05:17.659 UTC [endorser] SimulateProposal -> DEBU 2b98 [businesschannel][12e43181] Exit" +"2019-09-24 01:05:17.659 UTC [endorser] endorseProposal -> DEBU 2b99 [businesschannel][12e43181] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:17.660 UTC [endorser] endorseProposal -> DEBU 2b9a [businesschannel][12e43181] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:17.660 UTC [endorser] EndorseWithPlugin -> DEBU 2b9b Entering endorsement for {plugin: escc, channel: businesschannel, tx: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, chaincode: exp02}" +"2019-09-24 01:05:17.661 UTC [msp.identity] Sign -> DEBU 2b9c Sign: plaintext: 0A20C8B48950C3E0E8AF2938B290353B...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:17.661 UTC [msp.identity] Sign -> DEBU 2b9f Sign: digest: E5321B63C343224543AF972FDB8EF7317E853F3CADC176D395860AA9F8DC4062 " +"2019-09-24 01:05:17.661 UTC [gossip.comm] func1 -> DEBU 2b9e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.662 UTC [gossip.gossip] handleMessage -> DEBU 2ba0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.662 UTC [endorser] EndorseWithPlugin -> DEBU 2ba1 Exiting {plugin: escc, channel: businesschannel, tx: 12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8, chaincode: exp02}" +"2019-09-24 01:05:17.662 UTC [endorser] endorseProposal -> DEBU 2ba3 [businesschannel][12e43181] Exit" +"2019-09-24 01:05:17.662 UTC [lockbasedtxmgr] Done -> DEBU 2ba4 Done with transaction simulation / query execution [12e4318106b4eea8c20f586008662a8e624c64a56fcf247e8d9c9e17d7babae8]" +"2019-09-24 01:05:17.662 UTC [endorser] func1 -> DEBU 2ba5 Exit: request from 172.18.0.5:49934" +"2019-09-24 01:05:17.663 UTC [comm.grpc.server] 1 -> INFO 2ba7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49934 grpc.code=OK grpc.call_duration=20.9171ms +"2019-09-24 01:05:17.661 UTC [msp] DeserializeIdentity -> DEBU 2b9d Obtaining identity" +"2019-09-24 01:05:17.663 UTC [msp] DeserializeIdentity -> DEBU 2ba8 Obtaining identity" +"2019-09-24 01:05:17.664 UTC [gossip.comm] Send -> DEBU 2ba9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers" +"2019-09-24 01:05:17.664 UTC [msp] DeserializeIdentity -> DEBU 2baa Obtaining identity" +"2019-09-24 01:05:17.664 UTC [msp] DeserializeIdentity -> DEBU 2bab Obtaining identity" +"2019-09-24 01:05:17.665 UTC [gossip.comm] sendToEndpoint -> DEBU 2bac Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.665 UTC [gossip.comm] sendToEndpoint -> DEBU 2bad Exiting" +"2019-09-24 01:05:17.662 UTC [msp] DeserializeIdentity -> DEBU 2ba2 Obtaining identity" +"2019-09-24 01:05:17.665 UTC [msp.identity] Verify -> DEBU 2bae Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2baf Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +"2019-09-24 01:05:17.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bb0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bb1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.666 UTC [policies] Evaluate -> DEBU 2bb2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.667 UTC [policies] Evaluate -> DEBU 2bb3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.667 UTC [policies] Evaluate -> DEBU 2bb4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.667 UTC [cauthdsl] func1 -> DEBU 2bb5 0xc0029f39d0 gate 1569287117667656400 evaluation starts" +"2019-09-24 01:05:17.668 UTC [cauthdsl] func2 -> DEBU 2bb6 0xc0029f39d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.668 UTC [cauthdsl] func2 -> DEBU 2bb7 0xc0029f39d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.669 UTC [cauthdsl] func2 -> DEBU 2bb8 0xc0029f39d0 principal matched by identity 0" +"2019-09-24 01:05:17.669 UTC [msp.identity] Verify -> DEBU 2bb9 Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2bba Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +"2019-09-24 01:05:17.670 UTC [cauthdsl] func2 -> DEBU 2bbb 0xc0029f39d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.670 UTC [cauthdsl] func1 -> DEBU 2bbc 0xc0029f39d0 gate 1569287117667656400 evaluation succeeds" +"2019-09-24 01:05:17.670 UTC [policies] Evaluate -> DEBU 2bbd Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.670 UTC [policies] Evaluate -> DEBU 2bbe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.671 UTC [policies] Evaluate -> DEBU 2bbf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.671 UTC [policies] Evaluate -> DEBU 2bc0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.671 UTC [msp] DeserializeIdentity -> DEBU 2bc1 Obtaining identity" +"2019-09-24 01:05:17.671 UTC [msp] DeserializeIdentity -> DEBU 2bc2 Obtaining identity" +"2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2bc3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bc4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bc5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.672 UTC [gossip.comm] func1 -> DEBU 2bc6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 768 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.662 UTC [gossip.comm] func1 -> DEBU 2ba6 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.672 UTC [policies] Evaluate -> DEBU 2bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.673 UTC [policies] Evaluate -> DEBU 2bca This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.673 UTC [policies] Evaluate -> DEBU 2bcb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.673 UTC [cauthdsl] func1 -> DEBU 2bcc 0xc002a781d0 gate 1569287117673900900 evaluation starts" +"2019-09-24 01:05:17.673 UTC [gossip.comm] sendToEndpoint -> DEBU 2bc8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.682 UTC [gossip.comm] sendToEndpoint -> DEBU 2bcd Exiting" +"2019-09-24 01:05:17.673 UTC [gossip.comm] sendToEndpoint -> DEBU 2bc9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.682 UTC [gossip.comm] sendToEndpoint -> DEBU 2bce Exiting" +"2019-09-24 01:05:17.674 UTC [cauthdsl] func2 -> DEBU 2bcf 0xc002a781d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd2 0xc002a781d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd3 0xc002a781d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.688 UTC [cauthdsl] func2 -> DEBU 2bd4 0xc002a781d0 principal evaluation fails" +"2019-09-24 01:05:17.688 UTC [cauthdsl] func1 -> DEBU 2bd5 0xc002a781d0 gate 1569287117673900900 evaluation fails" +"2019-09-24 01:05:17.688 UTC [gossip.comm] func1 -> DEBU 2bd0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.688 UTC [gossip.comm] func1 -> DEBU 2bd1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.688 UTC [policies] Evaluate -> DEBU 2bd6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.689 UTC [policies] Evaluate -> DEBU 2bd7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.690 UTC [policies] Evaluate -> DEBU 2bd8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.690 UTC [grpc] infof -> DEBU 2bd9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.690 UTC [cauthdsl] func1 -> DEBU 2bda 0xc002af18b0 gate 1569287117690223000 evaluation starts" +"2019-09-24 01:05:17.690 UTC [cauthdsl] func2 -> DEBU 2bdb 0xc002af18b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.691 UTC [cauthdsl] func2 -> DEBU 2bdd 0xc002af18b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.693 UTC [cauthdsl] func2 -> DEBU 2bde 0xc002af18b0 principal matched by identity 0" +"2019-09-24 01:05:17.693 UTC [msp.identity] Verify -> DEBU 2bdf Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +"2019-09-24 01:05:17.690 UTC [grpc] infof -> DEBU 2bdc transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:17.693 UTC [msp.identity] Verify -> DEBU 2be0 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +"2019-09-24 01:05:17.695 UTC [cauthdsl] func2 -> DEBU 2be1 0xc002af18b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.696 UTC [cauthdsl] func1 -> DEBU 2be2 0xc002af18b0 gate 1569287117690223000 evaluation succeeds" +"2019-09-24 01:05:17.696 UTC [policies] Evaluate -> DEBU 2be3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.697 UTC [policies] Evaluate -> DEBU 2be6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.698 UTC [msp.identity] Verify -> DEBU 2be7 Verify: digest = 00000000 d6 19 6e b0 d8 cb 15 93 21 b6 85 8f e3 aa cf 32 |..n.....!......2| +00000010 5f 0d 9f b7 89 f5 c4 f4 2a ec 7b 36 ed 3c 91 e2 |_.......*.{6.<..|" +"2019-09-24 01:05:17.701 UTC [msp.identity] Verify -> DEBU 2be8 Verify: sig = 00000000 30 45 02 21 00 ce 16 8c 88 7a 5d 7c f2 be bc 67 |0E.!.....z]|...g| +00000010 3d bc 97 fa e3 af 2a b1 49 ae b2 a5 6f 04 8e e5 |=.....*.I...o...| +00000020 90 b8 63 73 9c 02 20 6d 6d 97 76 19 b3 a9 38 92 |..cs.. mm.v...8.| +00000030 6b be 77 b0 46 8c f1 ca 5d 49 da d6 e9 6a bd 8a |k.w.F...]I...j..| +00000040 12 80 03 43 5a cd b8 |...CZ..|" +"2019-09-24 01:05:17.703 UTC [msp] DeserializeIdentity -> DEBU 2be9 Obtaining identity" +"2019-09-24 01:05:17.704 UTC [msp] DeserializeIdentity -> DEBU 2bea Obtaining identity" +"2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2beb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bec Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.704 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2bed Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bee == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bef This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.705 UTC [policies] Evaluate -> DEBU 2bf0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.705 UTC [cauthdsl] func1 -> DEBU 2bf1 0xc0030fb7b0 gate 1569287117705937000 evaluation starts" +"2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf2 0xc0030fb7b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf3 0xc0030fb7b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf4 0xc0030fb7b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.706 UTC [cauthdsl] func2 -> DEBU 2bf5 0xc0030fb7b0 principal evaluation fails" +"2019-09-24 01:05:17.707 UTC [cauthdsl] func1 -> DEBU 2bf6 0xc0030fb7b0 gate 1569287117705937000 evaluation fails" +"2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.707 UTC [policies] Evaluate -> DEBU 2bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.708 UTC [cauthdsl] func1 -> DEBU 2bfa 0xc003102000 gate 1569287117708088500 evaluation starts" +"2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfc 0xc003102000 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfd 0xc003102000 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.708 UTC [cauthdsl] func2 -> DEBU 2bfe 0xc003102000 principal matched by identity 0" +"2019-09-24 01:05:17.709 UTC [msp.identity] Verify -> DEBU 2bff Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:17.709 UTC [msp.identity] Verify -> DEBU 2c00 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:17.708 UTC [msp] DeserializeIdentity -> DEBU 2bfb Obtaining identity" +"2019-09-24 01:05:17.709 UTC [msp] DeserializeIdentity -> DEBU 2c01 Obtaining identity" +"2019-09-24 01:05:17.709 UTC [cauthdsl] func2 -> DEBU 2c03 0xc003102000 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.710 UTC [cauthdsl] func1 -> DEBU 2c04 0xc003102000 gate 1569287117708088500 evaluation succeeds" +"2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c05 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c06 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.710 UTC [policies] Evaluate -> DEBU 2c07 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.711 UTC [policies] Evaluate -> DEBU 2c08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.711 UTC [msp] DeserializeIdentity -> DEBU 2c09 Obtaining identity" +"2019-09-24 01:05:17.710 UTC [gossip.pull] Hello -> DEBU 2c02 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:17.711 UTC [msp] DeserializeIdentity -> DEBU 2c0b Obtaining identity" +"2019-09-24 01:05:17.711 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.712 UTC [msp] DeserializeIdentity -> DEBU 2c0c Obtaining identity" +"2019-09-24 01:05:17.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c0d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.713 UTC [policies] Evaluate -> DEBU 2c0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.713 UTC [policies] Evaluate -> DEBU 2c10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.712 UTC [gossip.comm] Send -> DEBU 2c0e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:17.714 UTC [policies] Evaluate -> DEBU 2c11 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.715 UTC [cauthdsl] func1 -> DEBU 2c12 0xc0031030f0 gate 1569287117715048000 evaluation starts" +"2019-09-24 01:05:17.715 UTC [gossip.comm] sendToEndpoint -> DEBU 2c13 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.715 UTC [cauthdsl] func2 -> DEBU 2c14 0xc0031030f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.715 UTC [cauthdsl] func2 -> DEBU 2c16 0xc0031030f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.716 UTC [cauthdsl] func2 -> DEBU 2c17 0xc0031030f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.716 UTC [cauthdsl] func2 -> DEBU 2c18 0xc0031030f0 principal evaluation fails" +"2019-09-24 01:05:17.716 UTC [cauthdsl] func1 -> DEBU 2c19 0xc0031030f0 gate 1569287117715048000 evaluation fails" +"2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.717 UTC [policies] Evaluate -> DEBU 2c1c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.718 UTC [cauthdsl] func1 -> DEBU 2c1d 0xc003103930 gate 1569287117718764500 evaluation starts" +"2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c1f 0xc003103930 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c20 0xc003103930 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.719 UTC [cauthdsl] func2 -> DEBU 2c21 0xc003103930 principal matched by identity 0" +"2019-09-24 01:05:17.719 UTC [gossip.comm] func1 -> DEBU 2c1e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.715 UTC [gossip.comm] sendToEndpoint -> DEBU 2c15 Exiting" +"2019-09-24 01:05:17.720 UTC [msp.identity] Verify -> DEBU 2c22 Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:17.720 UTC [msp.identity] Verify -> DEBU 2c23 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:17.720 UTC [cauthdsl] func2 -> DEBU 2c24 0xc003103930 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.721 UTC [cauthdsl] func1 -> DEBU 2c25 0xc003103930 gate 1569287117718764500 evaluation succeeds" +"2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.721 UTC [policies] Evaluate -> DEBU 2c28 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.722 UTC [policies] Evaluate -> DEBU 2c29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.722 UTC [gossip.gossip] handleMessage -> DEBU 2c2a Exiting" +"2019-09-24 01:05:17.722 UTC [gossip.gossip] handleMessage -> DEBU 2c2b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 768 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.723 UTC [msp.identity] Verify -> DEBU 2c2c Verify: digest = 00000000 05 86 2c 91 30 3e f1 f3 fe ae a3 c4 b6 52 04 b4 |..,.0>.......R..| +00000010 cc 64 94 81 6f bf 71 11 7f 02 4f 54 6f 20 b1 74 |.d..o.q...OTo .t|" +"2019-09-24 01:05:17.723 UTC [msp.identity] Verify -> DEBU 2c2d Verify: sig = 00000000 30 45 02 21 00 da 32 f9 7f a1 56 7f fe 63 a8 40 |0E.!..2...V..c.@| +00000010 77 e1 2d b4 e2 b4 44 a9 31 04 b0 7d 4c e7 95 92 |w.-...D.1..}L...| +00000020 f0 7e 33 3d 32 02 20 28 6b 23 7a 51 33 a2 c1 69 |.~3=2. (k#zQ3..i| +00000030 99 10 ef 65 b3 0a e1 24 26 29 25 fd b2 bc 50 66 |...e...$&)%...Pf| +00000040 87 b1 df 46 37 73 8c |...F7s.|" +"2019-09-24 01:05:17.724 UTC [msp] DeserializeIdentity -> DEBU 2c2e Obtaining identity" +"2019-09-24 01:05:17.724 UTC [msp] DeserializeIdentity -> DEBU 2c2f Obtaining identity" +"2019-09-24 01:05:17.724 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c30 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.724 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c31 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.725 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c32 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c33 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c34 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.725 UTC [policies] Evaluate -> DEBU 2c35 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.725 UTC [cauthdsl] func1 -> DEBU 2c36 0xc00033ba90 gate 1569287117725765100 evaluation starts" +"2019-09-24 01:05:17.725 UTC [cauthdsl] func2 -> DEBU 2c37 0xc00033ba90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c38 0xc00033ba90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c39 0xc00033ba90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.726 UTC [cauthdsl] func2 -> DEBU 2c3a 0xc00033ba90 principal evaluation fails" +"2019-09-24 01:05:17.726 UTC [cauthdsl] func1 -> DEBU 2c3b 0xc00033ba90 gate 1569287117725765100 evaluation fails" +"2019-09-24 01:05:17.726 UTC [policies] Evaluate -> DEBU 2c3c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.727 UTC [policies] Evaluate -> DEBU 2c3d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.727 UTC [policies] Evaluate -> DEBU 2c3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.727 UTC [cauthdsl] func1 -> DEBU 2c3f 0xc0027ae2d0 gate 1569287117727598400 evaluation starts" +"2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c40 0xc0027ae2d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c41 0xc0027ae2d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c42 0xc0027ae2d0 principal matched by identity 0" +"2019-09-24 01:05:17.728 UTC [msp.identity] Verify -> DEBU 2c43 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:17.728 UTC [msp.identity] Verify -> DEBU 2c44 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:17.728 UTC [cauthdsl] func2 -> DEBU 2c45 0xc0027ae2d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.728 UTC [cauthdsl] func1 -> DEBU 2c46 0xc0027ae2d0 gate 1569287117727598400 evaluation succeeds" +"2019-09-24 01:05:17.729 UTC [policies] Evaluate -> DEBU 2c47 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.729 UTC [policies] Evaluate -> DEBU 2c48 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.730 UTC [policies] Evaluate -> DEBU 2c49 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.730 UTC [policies] Evaluate -> DEBU 2c4a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.731 UTC [msp] DeserializeIdentity -> DEBU 2c4b Obtaining identity" +"2019-09-24 01:05:17.732 UTC [msp] DeserializeIdentity -> DEBU 2c4c Obtaining identity" +"2019-09-24 01:05:17.732 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c4d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.733 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c4f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c50 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c51 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.733 UTC [policies] Evaluate -> DEBU 2c52 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func1 -> DEBU 2c53 0xc0027afab0 gate 1569287117734099200 evaluation starts" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c54 0xc0027afab0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c55 0xc0027afab0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c56 0xc0027afab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func2 -> DEBU 2c57 0xc0027afab0 principal evaluation fails" +"2019-09-24 01:05:17.734 UTC [cauthdsl] func1 -> DEBU 2c58 0xc0027afab0 gate 1569287117734099200 evaluation fails" +"2019-09-24 01:05:17.734 UTC [policies] Evaluate -> DEBU 2c59 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.735 UTC [policies] Evaluate -> DEBU 2c5a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.735 UTC [policies] Evaluate -> DEBU 2c5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.735 UTC [cauthdsl] func1 -> DEBU 2c5c 0xc003cf22f0 gate 1569287117735305800 evaluation starts" +"2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5d 0xc003cf22f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5e 0xc003cf22f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.735 UTC [cauthdsl] func2 -> DEBU 2c5f 0xc003cf22f0 principal matched by identity 0" +"2019-09-24 01:05:17.735 UTC [msp.identity] Verify -> DEBU 2c60 Verify: digest = 00000000 1c 23 b9 dd b6 78 19 f7 7c 40 0b bc 15 9a b7 68 |.#...x..|@.....h| +00000010 0e 3f be 84 59 a5 56 d6 b8 67 4e 3e 4f 7e eb 32 |.?..Y.V..gN>O~.2|" +"2019-09-24 01:05:17.736 UTC [msp.identity] Verify -> DEBU 2c61 Verify: sig = 00000000 30 45 02 21 00 e8 0f 63 a5 f1 44 99 63 2e ed 00 |0E.!...c..D.c...| +00000010 c7 b6 62 09 7a 4d 14 36 c5 da c7 30 b1 c7 71 7e |..b.zM.6...0..q~| +00000020 92 05 fd 7b 4a 02 20 57 ba 4a 31 fb 33 2b f5 b9 |...{J. W.J1.3+..| +00000030 d0 07 21 0a bb 77 f0 5e 71 c0 90 40 2b 1b 60 31 |..!..w.^q..@+.`1| +00000040 04 34 6c 8a 3c 96 0e |.4l.<..|" +"2019-09-24 01:05:17.736 UTC [cauthdsl] func2 -> DEBU 2c62 0xc003cf22f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.736 UTC [cauthdsl] func1 -> DEBU 2c63 0xc003cf22f0 gate 1569287117735305800 evaluation succeeds" +"2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c64 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c65 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c66 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.736 UTC [policies] Evaluate -> DEBU 2c67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.737 UTC [msp.identity] Verify -> DEBU 2c68 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:17.737 UTC [msp.identity] Verify -> DEBU 2c69 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:17.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c6a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.737 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c6b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.738 UTC [policies] Evaluate -> DEBU 2c6e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.738 UTC [cauthdsl] func1 -> DEBU 2c6f 0xc003cf3a00 gate 1569287117738430000 evaluation starts" +"2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c70 0xc003cf3a00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c71 0xc003cf3a00 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.738 UTC [cauthdsl] func2 -> DEBU 2c72 0xc003cf3a00 principal matched by identity 0" +"2019-09-24 01:05:17.739 UTC [msp.identity] Verify -> DEBU 2c73 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:17.739 UTC [msp.identity] Verify -> DEBU 2c74 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:17.739 UTC [cauthdsl] func2 -> DEBU 2c75 0xc003cf3a00 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.739 UTC [cauthdsl] func1 -> DEBU 2c76 0xc003cf3a00 gate 1569287117738430000 evaluation succeeds" +"2019-09-24 01:05:17.739 UTC [policies] Evaluate -> DEBU 2c77 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.739 UTC [policies] Evaluate -> DEBU 2c78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.740 UTC [policies] Evaluate -> DEBU 2c79 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.740 UTC [policies] Evaluate -> DEBU 2c7a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.740 UTC [gossip.gossip] handleMessage -> DEBU 2c7b Exiting" +"2019-09-24 01:05:17.740 UTC [gossip.gossip] handleMessage -> DEBU 2c7c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.740 UTC [msp] DeserializeIdentity -> DEBU 2c7d Obtaining identity" +"2019-09-24 01:05:17.740 UTC [msp] DeserializeIdentity -> DEBU 2c7e Obtaining identity" +"2019-09-24 01:05:17.741 UTC [msp] DeserializeIdentity -> DEBU 2c7f Obtaining identity" +"2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2c80 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c81 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.741 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2c82 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.741 UTC [policies] Evaluate -> DEBU 2c83 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.741 UTC [policies] Evaluate -> DEBU 2c84 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.742 UTC [policies] Evaluate -> DEBU 2c85 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.742 UTC [cauthdsl] func1 -> DEBU 2c86 0xc00295d520 gate 1569287117742339000 evaluation starts" +"2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c87 0xc00295d520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c88 0xc00295d520 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.742 UTC [cauthdsl] func2 -> DEBU 2c89 0xc00295d520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.743 UTC [cauthdsl] func2 -> DEBU 2c8a 0xc00295d520 principal evaluation fails" +"2019-09-24 01:05:17.743 UTC [cauthdsl] func1 -> DEBU 2c8b 0xc00295d520 gate 1569287117742339000 evaluation fails" +"2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.743 UTC [policies] Evaluate -> DEBU 2c8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.743 UTC [cauthdsl] func1 -> DEBU 2c8f 0xc00295dd60 gate 1569287117743984200 evaluation starts" +"2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c90 0xc00295dd60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c91 0xc00295dd60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.744 UTC [cauthdsl] func2 -> DEBU 2c92 0xc00295dd60 principal matched by identity 0" +"2019-09-24 01:05:17.744 UTC [msp.identity] Verify -> DEBU 2c93 Verify: digest = 00000000 37 08 46 7c 72 6a b5 20 f0 37 0e a5 53 32 e9 29 |7.F|rj. .7..S2.)| +00000010 cb 15 52 ab b2 3e 6e e1 c5 12 2a 7f 66 8d d4 9c |..R..>n...*.f...|" +"2019-09-24 01:05:17.744 UTC [msp.identity] Verify -> DEBU 2c94 Verify: sig = 00000000 30 44 02 20 06 26 45 96 75 61 f2 ff ab 29 fb a5 |0D. .&E.ua...)..| +00000010 95 c3 d7 11 fe 2b 51 39 19 01 5d c5 61 d4 18 0c |.....+Q9..].a...| +00000020 da 32 e5 cf 02 20 26 ba ba b1 5c fd 5a ca 27 14 |.2... &...\.Z.'.| +00000030 c4 82 0b f4 3a a6 26 cf 4f 41 82 9d 52 10 0b f7 |....:.&.OA..R...| +00000040 8d 8b 6c 6d ac b1 |..lm..|" +"2019-09-24 01:05:17.745 UTC [cauthdsl] func2 -> DEBU 2c95 0xc00295dd60 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.745 UTC [cauthdsl] func1 -> DEBU 2c96 0xc00295dd60 gate 1569287117743984200 evaluation succeeds" +"2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c97 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c98 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.745 UTC [policies] Evaluate -> DEBU 2c99 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.746 UTC [policies] Evaluate -> DEBU 2c9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.746 UTC [msp.identity] Verify -> DEBU 2c9b Verify: digest = 00000000 aa 78 80 d5 6f 81 a0 c8 01 24 29 17 1c 9d 90 6a |.x..o....$)....j| +00000010 ff f9 11 54 36 e4 34 21 6c 4a 32 40 f0 6a 3c 6c |...T6.4!lJ2@.j DEBU 2c9c Verify: sig = 00000000 30 45 02 21 00 9f 24 b8 09 ff 37 01 14 22 6e b8 |0E.!..$...7.."n.| +00000010 60 5f 1a 31 3f c6 4f 22 d1 e3 76 c2 a8 a2 73 69 |`_.1?.O"..v...si| +00000020 22 dc 33 97 53 02 20 02 23 18 62 c6 3a c4 88 80 |".3.S. .#.b.:...| +00000030 a3 7a a7 f1 02 69 9c 68 4e 64 4e dd d7 81 0f 4d |.z...i.hNdN....M| +00000040 fa 9f 6e 53 c9 56 f7 |..nS.V.|" +"2019-09-24 01:05:17.747 UTC [msp.identity] Verify -> DEBU 2c9d Verify: digest = 00000000 c4 fc a7 84 80 fe c2 8f 1e f4 f1 36 8f 7e 94 e2 |...........6.~..| +00000010 e4 19 04 02 4e 55 eb 32 7d e5 c3 7e 28 54 e9 0f |....NU.2}..~(T..|" +"2019-09-24 01:05:17.747 UTC [msp.identity] Verify -> DEBU 2c9e Verify: sig = 00000000 30 45 02 21 00 85 44 6f 7f 79 6b 7c de a0 c6 98 |0E.!..Do.yk|....| +00000010 ff dd a1 dc af f5 71 0f cd a6 52 02 a0 6e 29 3a |......q...R..n):| +00000020 25 6b 9d 9a 6f 02 20 7d bf 30 71 59 90 38 08 86 |%k..o. }.0qY.8..| +00000030 90 ad 0d a5 22 86 4d f0 4c f6 fd 43 19 e7 95 23 |....".M.L..C...#| +00000040 55 18 ac c5 dd 9f d8 |U......|" +"2019-09-24 01:05:17.748 UTC [msp] DeserializeIdentity -> DEBU 2c9f Obtaining identity" +"2019-09-24 01:05:17.748 UTC [msp] DeserializeIdentity -> DEBU 2ca0 Obtaining identity" +"2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2ca1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ca2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.748 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ca3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.749 UTC [policies] Evaluate -> DEBU 2ca6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.749 UTC [cauthdsl] func1 -> DEBU 2ca7 0xc003208390 gate 1569287117749473300 evaluation starts" +"2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2ca8 0xc003208390 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2ca9 0xc003208390 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2caa 0xc003208390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.749 UTC [cauthdsl] func2 -> DEBU 2cab 0xc003208390 principal evaluation fails" +"2019-09-24 01:05:17.750 UTC [cauthdsl] func1 -> DEBU 2cac 0xc003208390 gate 1569287117749473300 evaluation fails" +"2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2cad Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2cae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.750 UTC [policies] Evaluate -> DEBU 2caf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.750 UTC [cauthdsl] func1 -> DEBU 2cb0 0xc003208be0 gate 1569287117750770000 evaluation starts" +"2019-09-24 01:05:17.750 UTC [cauthdsl] func2 -> DEBU 2cb1 0xc003208be0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb2 0xc003208be0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb3 0xc003208be0 principal matched by identity 0" +"2019-09-24 01:05:17.751 UTC [msp.identity] Verify -> DEBU 2cb4 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +"2019-09-24 01:05:17.751 UTC [msp.identity] Verify -> DEBU 2cb5 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +00000040 b6 66 27 b7 81 6b |.f'..k|" +"2019-09-24 01:05:17.751 UTC [cauthdsl] func2 -> DEBU 2cb6 0xc003208be0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.751 UTC [cauthdsl] func1 -> DEBU 2cb7 0xc003208be0 gate 1569287117750770000 evaluation succeeds" +"2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cb8 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cb9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cba Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.752 UTC [policies] Evaluate -> DEBU 2cbb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.753 UTC [msp] DeserializeIdentity -> DEBU 2cbc Obtaining identity" +"2019-09-24 01:05:17.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cbd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.753 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2cbe Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:17.753 UTC [policies] Evaluate -> DEBU 2cbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:17.753 UTC [policies] Evaluate -> DEBU 2cc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:17.754 UTC [policies] Evaluate -> DEBU 2cc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:17.754 UTC [cauthdsl] func1 -> DEBU 2cc2 0xc003209cc0 gate 1569287117754340000 evaluation starts" +"2019-09-24 01:05:17.754 UTC [cauthdsl] func2 -> DEBU 2cc3 0xc003209cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.754 UTC [cauthdsl] func2 -> DEBU 2cc4 0xc003209cc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.755 UTC [cauthdsl] func2 -> DEBU 2cc5 0xc003209cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:17.755 UTC [cauthdsl] func2 -> DEBU 2cc6 0xc003209cc0 principal evaluation fails" +"2019-09-24 01:05:17.755 UTC [cauthdsl] func1 -> DEBU 2cc7 0xc003209cc0 gate 1569287117754340000 evaluation fails" +"2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:17.755 UTC [policies] Evaluate -> DEBU 2cca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:17.756 UTC [cauthdsl] func1 -> DEBU 2ccb 0xc0026ae500 gate 1569287117756094500 evaluation starts" +"2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2ccc 0xc0026ae500 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2ccd 0xc0026ae500 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:17.756 UTC [cauthdsl] func2 -> DEBU 2cce 0xc0026ae500 principal matched by identity 0" +"2019-09-24 01:05:17.756 UTC [msp.identity] Verify -> DEBU 2ccf Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +"2019-09-24 01:05:17.757 UTC [msp.identity] Verify -> DEBU 2cd0 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +00000040 b6 66 27 b7 81 6b |.f'..k|" +"2019-09-24 01:05:17.757 UTC [cauthdsl] func2 -> DEBU 2cd1 0xc0026ae500 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:17.757 UTC [cauthdsl] func1 -> DEBU 2cd2 0xc0026ae500 gate 1569287117756094500 evaluation succeeds" +"2019-09-24 01:05:17.757 UTC [policies] Evaluate -> DEBU 2cd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.757 UTC [policies] Evaluate -> DEBU 2cd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:17.758 UTC [policies] Evaluate -> DEBU 2cd5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:17.758 UTC [policies] Evaluate -> DEBU 2cd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:17.758 UTC [gossip.gossip] handleMessage -> DEBU 2cd7 Exiting" +"2019-09-24 01:05:17.758 UTC [gossip.gossip] handleMessage -> DEBU 2cd8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.758 UTC [msp.identity] Verify -> DEBU 2cd9 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +"2019-09-24 01:05:17.759 UTC [msp.identity] Verify -> DEBU 2cda Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +"2019-09-24 01:05:17.759 UTC [gossip.gossip] handleMessage -> DEBU 2cdb Exiting" +"2019-09-24 01:05:17.759 UTC [gossip.gossip] handleMessage -> DEBU 2cdc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.759 UTC [msp.identity] Verify -> DEBU 2cdd Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +"2019-09-24 01:05:17.760 UTC [msp.identity] Verify -> DEBU 2cde Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +"2019-09-24 01:05:17.760 UTC [msp] DeserializeIdentity -> DEBU 2cdf Obtaining identity" +"2019-09-24 01:05:17.760 UTC [gossip.gossip] handleMessage -> DEBU 2ce0 Exiting" +"2019-09-24 01:05:17.760 UTC [gossip.gossip] handleMessage -> DEBU 2ce1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.761 UTC [gossip.pull] HandleMessage -> DEBU 2ce2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 45 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.761 UTC [gossip.gossip] handleMessage -> DEBU 2ce3 Exiting" +"2019-09-24 01:05:17.848 UTC [gossip.comm] func1 -> DEBU 2ce4 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.848 UTC [gossip.gossip] handleMessage -> DEBU 2ce5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce7 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.849 UTC [gossip.comm] func1 -> DEBU 2ce8 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.851 UTC [msp.identity] Verify -> DEBU 2ce9 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:17.851 UTC [msp.identity] Verify -> DEBU 2cea Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:17.852 UTC [msp] DeserializeIdentity -> DEBU 2ceb Obtaining identity" +"2019-09-24 01:05:17.852 UTC [gossip.gossip] handleMessage -> DEBU 2cec Exiting" +"2019-09-24 01:05:17.852 UTC [gossip.gossip] handleMessage -> DEBU 2ced Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.853 UTC [msp.identity] Verify -> DEBU 2cee Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:17.853 UTC [msp.identity] Verify -> DEBU 2cef Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:17.854 UTC [msp] DeserializeIdentity -> DEBU 2cf0 Obtaining identity" +"2019-09-24 01:05:17.854 UTC [gossip.gossip] handleMessage -> DEBU 2cf1 Exiting" +"2019-09-24 01:05:17.855 UTC [gossip.gossip] handleMessage -> DEBU 2cf2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.855 UTC [msp] DeserializeIdentity -> DEBU 2cf3 Obtaining identity" +"2019-09-24 01:05:17.856 UTC [msp] DeserializeIdentity -> DEBU 2cf4 Obtaining identity" +"2019-09-24 01:05:17.856 UTC [gossip.gossip] handleMessage -> DEBU 2cf5 Exiting" +"2019-09-24 01:05:17.856 UTC [gossip.gossip] handleMessage -> DEBU 2cf6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:17.857 UTC [msp.identity] Verify -> DEBU 2cf7 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:17.857 UTC [msp.identity] Verify -> DEBU 2cf8 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:17.859 UTC [gossip.comm] func1 -> DEBU 2cf9 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.860 UTC [gossip.gossip] handleMessage -> DEBU 2cfa Exiting" +"2019-09-24 01:05:17.861 UTC [gossip.gossip] handleMessage -> DEBU 2cfb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.862 UTC [gossip.pull] HandleMessage -> DEBU 2cfc GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:17.862 UTC [gossip.pull] SendDigest -> DEBU 2cfd Sending BLOCK_MSG digest: [4 1 2 3] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:17.862 UTC [gossip.gossip] handleMessage -> DEBU 2cfe Exiting" +"2019-09-24 01:05:18.049 UTC [gossip.comm] func1 -> DEBU 2cff Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.049 UTC [gossip.gossip] handleMessage -> DEBU 2d00 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.049 UTC [msp] DeserializeIdentity -> DEBU 2d01 Obtaining identity" +"2019-09-24 01:05:18.050 UTC [msp] DeserializeIdentity -> DEBU 2d02 Obtaining identity" +"2019-09-24 01:05:18.050 UTC [msp] DeserializeIdentity -> DEBU 2d03 Obtaining identity" +"2019-09-24 01:05:18.050 UTC [gossip.gossip] handleMessage -> DEBU 2d04 Exiting" +"2019-09-24 01:05:18.056 UTC [gossip.comm] func1 -> DEBU 2d05 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.056 UTC [gossip.gossip] handleMessage -> DEBU 2d06 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.056 UTC [msp] DeserializeIdentity -> DEBU 2d07 Obtaining identity" +"2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d08 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d09 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.057 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d0a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.057 UTC [policies] Evaluate -> DEBU 2d0b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.058 UTC [policies] Evaluate -> DEBU 2d0c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.058 UTC [policies] Evaluate -> DEBU 2d0d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.058 UTC [cauthdsl] func1 -> DEBU 2d0e 0xc0035e9030 gate 1569287118058305900 evaluation starts" +"2019-09-24 01:05:18.058 UTC [cauthdsl] func2 -> DEBU 2d0f 0xc0035e9030 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.058 UTC [cauthdsl] func2 -> DEBU 2d10 0xc0035e9030 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.059 UTC [cauthdsl] func2 -> DEBU 2d11 0xc0035e9030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.060 UTC [cauthdsl] func2 -> DEBU 2d12 0xc0035e9030 principal evaluation fails" +"2019-09-24 01:05:18.060 UTC [cauthdsl] func1 -> DEBU 2d13 0xc0035e9030 gate 1569287118058305900 evaluation fails" +"2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d14 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d15 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.061 UTC [policies] Evaluate -> DEBU 2d16 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.061 UTC [cauthdsl] func1 -> DEBU 2d17 0xc0035e9870 gate 1569287118061626900 evaluation starts" +"2019-09-24 01:05:18.061 UTC [cauthdsl] func2 -> DEBU 2d18 0xc0035e9870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.061 UTC [cauthdsl] func2 -> DEBU 2d19 0xc0035e9870 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.062 UTC [cauthdsl] func2 -> DEBU 2d1a 0xc0035e9870 principal matched by identity 0" +"2019-09-24 01:05:18.062 UTC [msp.identity] Verify -> DEBU 2d1b Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:18.062 UTC [msp.identity] Verify -> DEBU 2d1c Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:18.064 UTC [cauthdsl] func2 -> DEBU 2d1d 0xc0035e9870 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.064 UTC [cauthdsl] func1 -> DEBU 2d1e 0xc0035e9870 gate 1569287118061626900 evaluation succeeds" +"2019-09-24 01:05:18.064 UTC [gossip.comm] func1 -> DEBU 2d1f Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.064 UTC [policies] Evaluate -> DEBU 2d20 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.065 UTC [policies] Evaluate -> DEBU 2d21 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.065 UTC [policies] Evaluate -> DEBU 2d22 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.066 UTC [policies] Evaluate -> DEBU 2d23 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.066 UTC [msp] DeserializeIdentity -> DEBU 2d24 Obtaining identity" +"2019-09-24 01:05:18.066 UTC [gossip.gossip] handleMessage -> DEBU 2d25 Exiting" +"2019-09-24 01:05:18.066 UTC [gossip.gossip] handleMessage -> DEBU 2d26 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.067 UTC [msp] DeserializeIdentity -> DEBU 2d27 Obtaining identity" +"2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d28 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d29 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.068 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d2a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.068 UTC [policies] Evaluate -> DEBU 2d2b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.068 UTC [policies] Evaluate -> DEBU 2d2c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.069 UTC [policies] Evaluate -> DEBU 2d2d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.069 UTC [cauthdsl] func1 -> DEBU 2d2e 0xc0036a7230 gate 1569287118069487300 evaluation starts" +"2019-09-24 01:05:18.069 UTC [cauthdsl] func2 -> DEBU 2d2f 0xc0036a7230 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.070 UTC [cauthdsl] func2 -> DEBU 2d30 0xc0036a7230 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.072 UTC [cauthdsl] func2 -> DEBU 2d31 0xc0036a7230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.073 UTC [cauthdsl] func2 -> DEBU 2d32 0xc0036a7230 principal evaluation fails" +"2019-09-24 01:05:18.074 UTC [cauthdsl] func1 -> DEBU 2d33 0xc0036a7230 gate 1569287118069487300 evaluation fails" +"2019-09-24 01:05:18.074 UTC [policies] Evaluate -> DEBU 2d34 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.075 UTC [policies] Evaluate -> DEBU 2d35 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.075 UTC [policies] Evaluate -> DEBU 2d36 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.075 UTC [cauthdsl] func1 -> DEBU 2d37 0xc0036a7a70 gate 1569287118075518800 evaluation starts" +"2019-09-24 01:05:18.075 UTC [cauthdsl] func2 -> DEBU 2d38 0xc0036a7a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.076 UTC [cauthdsl] func2 -> DEBU 2d39 0xc0036a7a70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.076 UTC [cauthdsl] func2 -> DEBU 2d3a 0xc0036a7a70 principal matched by identity 0" +"2019-09-24 01:05:18.076 UTC [msp.identity] Verify -> DEBU 2d3b Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:18.076 UTC [msp.identity] Verify -> DEBU 2d3c Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:18.077 UTC [cauthdsl] func2 -> DEBU 2d3d 0xc0036a7a70 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.077 UTC [cauthdsl] func1 -> DEBU 2d3e 0xc0036a7a70 gate 1569287118075518800 evaluation succeeds" +"2019-09-24 01:05:18.077 UTC [policies] Evaluate -> DEBU 2d3f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d40 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d41 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.078 UTC [policies] Evaluate -> DEBU 2d42 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.078 UTC [msp] DeserializeIdentity -> DEBU 2d43 Obtaining identity" +"2019-09-24 01:05:18.079 UTC [gossip.gossip] handleMessage -> DEBU 2d44 Exiting" +"2019-09-24 01:05:18.240 UTC [gossip.comm] func1 -> DEBU 2d45 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.241 UTC [gossip.gossip] handleMessage -> DEBU 2d46 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.241 UTC [msp] DeserializeIdentity -> DEBU 2d47 Obtaining identity" +"2019-09-24 01:05:18.242 UTC [msp] DeserializeIdentity -> DEBU 2d48 Obtaining identity" +"2019-09-24 01:05:18.242 UTC [msp] DeserializeIdentity -> DEBU 2d49 Obtaining identity" +"2019-09-24 01:05:18.242 UTC [gossip.gossip] handleMessage -> DEBU 2d4a Exiting" +"2019-09-24 01:05:18.249 UTC [gossip.comm] func1 -> DEBU 2d4b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.250 UTC [gossip.gossip] handleMessage -> DEBU 2d4c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.250 UTC [msp] DeserializeIdentity -> DEBU 2d4d Obtaining identity" +"2019-09-24 01:05:18.250 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2d4e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.250 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d4f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.251 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2d50 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.251 UTC [policies] Evaluate -> DEBU 2d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func1 -> DEBU 2d54 0xc003a18130 gate 1569287118251932600 evaluation starts" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d55 0xc003a18130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d56 0xc003a18130 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d57 0xc003a18130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func2 -> DEBU 2d58 0xc003a18130 principal evaluation fails" +"2019-09-24 01:05:18.252 UTC [cauthdsl] func1 -> DEBU 2d59 0xc003a18130 gate 1569287118251932600 evaluation fails" +"2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.253 UTC [policies] Evaluate -> DEBU 2d5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.253 UTC [cauthdsl] func1 -> DEBU 2d5d 0xc003a18970 gate 1569287118253671800 evaluation starts" +"2019-09-24 01:05:18.253 UTC [cauthdsl] func2 -> DEBU 2d5e 0xc003a18970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.254 UTC [cauthdsl] func2 -> DEBU 2d5f 0xc003a18970 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.254 UTC [cauthdsl] func2 -> DEBU 2d60 0xc003a18970 principal matched by identity 0" +"2019-09-24 01:05:18.254 UTC [msp.identity] Verify -> DEBU 2d61 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +"2019-09-24 01:05:18.254 UTC [msp.identity] Verify -> DEBU 2d62 Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +00000040 b6 66 27 b7 81 6b |.f'..k|" +"2019-09-24 01:05:18.255 UTC [cauthdsl] func2 -> DEBU 2d63 0xc003a18970 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.255 UTC [cauthdsl] func1 -> DEBU 2d64 0xc003a18970 gate 1569287118253671800 evaluation succeeds" +"2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d65 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d66 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.255 UTC [policies] Evaluate -> DEBU 2d67 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.256 UTC [policies] Evaluate -> DEBU 2d68 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.256 UTC [msp] DeserializeIdentity -> DEBU 2d69 Obtaining identity" +"2019-09-24 01:05:18.256 UTC [gossip.gossip] handleMessage -> DEBU 2d6a Exiting" +"2019-09-24 01:05:18.475 UTC [gossip.comm] func1 -> DEBU 2d6b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.476 UTC [gossip.gossip] handleMessage -> DEBU 2d6c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.476 UTC [gossip.pull] HandleMessage -> DEBU 2d6d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.477 UTC [gossip.pull] SendDigest -> DEBU 2d6e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:18.477 UTC [gossip.gossip] handleMessage -> DEBU 2d6f Exiting" +"2019-09-24 01:05:18.483 UTC [gossip.comm] func1 -> DEBU 2d70 Got message: GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.483 UTC [gossip.gossip] handleMessage -> DEBU 2d71 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.483 UTC [gossip.gossip] handleMessage -> DEBU 2d72 Exiting" +"2019-09-24 01:05:18.486 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d73 Got message: GossipMessage: tag:EMPTY mem_req:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.486 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d74 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d75 Verify: digest = 00000000 f2 63 51 48 3f 00 a2 09 39 c0 76 ca 13 92 2f 33 |.cQH?...9.v.../3| +00000010 f9 a7 6a 1b cb e0 11 ea b1 39 f6 ee 46 b3 f2 8e |..j......9..F...|" +"2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d76 Verify: sig = 00000000 30 44 02 20 6e 64 d7 33 d8 94 d9 85 bd 76 20 ed |0D. nd.3.....v .| +00000010 39 ac 76 26 0e d6 ed 61 db de 84 b3 8f 27 52 90 |9.v&...a.....'R.| +00000020 06 9d 57 af 02 20 20 19 2a 3b 6c d3 33 e2 b2 69 |..W.. .*;l.3..i| +00000030 b8 c6 13 e1 89 c0 d5 72 50 23 99 01 77 cf 3b 84 |.......rP#..w.;.| +00000040 91 4b fe 1b 35 b8 |.K..5.|" +"2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d77 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:18.487 UTC [msp.identity] Verify -> DEBU 2d78 Verify: sig = 00000000 30 44 02 20 5c b6 56 8c 56 f0 c9 d3 64 8e 9a 4f |0D. \.V.V...d..O| +00000010 e5 81 8f 3c c7 1b 12 38 77 29 9e 3e 8c b9 9c 32 |...<...8w).>...2| +00000020 74 e0 69 b7 02 20 28 56 5e 9e 0f 79 25 20 6c 02 |t.i.. (V^..y% l.| +00000030 63 1f e5 28 d6 14 8e 38 0f 57 7f a8 fa c8 d3 57 |c..(...8.W.....W| +00000040 9d 37 e9 66 67 ba |.7.fg.|" +"2019-09-24 01:05:18.488 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d79 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7b updating membership: timestamp: " +"2019-09-24 01:05:18.488 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7c Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:18.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:18.490 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d7e Exiting" +"2019-09-24 01:05:18.490 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d7f Exiting" +"2019-09-24 01:05:18.490 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d80 Exiting" +"2019-09-24 01:05:18.490 UTC [gossip.discovery] sendMemResponse -> DEBU 2d81 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:18.490 UTC [msp] DeserializeIdentity -> DEBU 2d82 Obtaining identity" +"2019-09-24 01:05:18.491 UTC [msp] DeserializeIdentity -> DEBU 2d83 Obtaining identity" +"2019-09-24 01:05:18.491 UTC [gossip.comm] Send -> DEBU 2d84 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.491 UTC [gossip.discovery] sendMemResponse -> DEBU 2d85 Exiting, replying with alive:\214\271\2342t\340i\267\002 (V^\236\017y% l\002c\037\345(\326\024\2168\017W\177\250\372\310\323W\2357\351fg\272" > > alive: " +"2019-09-24 01:05:18.491 UTC [gossip.comm] sendToEndpoint -> DEBU 2d86 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.491 UTC [gossip.comm] sendToEndpoint -> DEBU 2d87 Exiting" +"2019-09-24 01:05:18.519 UTC [gossip.comm] func1 -> DEBU 2d88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.519 UTC [gossip.gossip] handleMessage -> DEBU 2d89 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d8a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.521 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2d8b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:18.521 UTC [msp.identity] Verify -> DEBU 2d8c Verify: digest = 00000000 d1 dd 61 b5 e5 e7 32 3d 70 eb 38 ec f1 64 6e 8c |..a...2=p.8..dn.| +00000010 6c 1a 3a 05 f1 44 fe d6 88 fb a6 56 86 77 fd 4e |l.:..D.....V.w.N|" +"2019-09-24 01:05:18.521 UTC [msp.identity] Verify -> DEBU 2d8d Verify: sig = 00000000 30 45 02 21 00 a5 f7 da d7 59 e1 6e fb 21 97 a6 |0E.!.....Y.n.!..| +00000010 b0 e3 2b 5d b2 21 ce 97 91 c3 56 f9 b2 19 9d bd |..+].!....V.....| +00000020 be 08 c4 b3 a0 02 20 5e 1a 6d 0d 34 33 ad 94 86 |...... ^.m.43...| +00000030 5f 8c 02 07 91 38 b3 2a 8d 99 95 28 5e f9 da 44 |_....8.*...(^..D| +00000040 4a 66 44 c3 be 5d 42 |JfD..]B|" +"2019-09-24 01:05:18.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d8e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d8f Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:18.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d90 updating membership: timestamp: " +"2019-09-24 01:05:18.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d91 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:18.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d92 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:18.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 2d93 Exiting" +"2019-09-24 01:05:18.524 UTC [gossip.discovery] handleAliveMessage -> DEBU 2d94 Exiting" +"2019-09-24 01:05:18.524 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2d95 Exiting" +"2019-09-24 01:05:18.519 UTC [gossip.gossip] handleMessage -> DEBU 2d96 Exiting" +"2019-09-24 01:05:18.525 UTC [msp] DeserializeIdentity -> DEBU 2d97 Obtaining identity" +"2019-09-24 01:05:18.526 UTC [msp] DeserializeIdentity -> DEBU 2d98 Obtaining identity" +"2019-09-24 01:05:18.528 UTC [msp] DeserializeIdentity -> DEBU 2d99 Obtaining identity" +"2019-09-24 01:05:18.528 UTC [gossip.comm] Send -> DEBU 2d9a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:18.528 UTC [msp] DeserializeIdentity -> DEBU 2d9d Obtaining identity" +"2019-09-24 01:05:18.529 UTC [gossip.comm] Send -> DEBU 2d9e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:18.528 UTC [gossip.comm] func1 -> DEBU 2d9b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.529 UTC [gossip.gossip] handleMessage -> DEBU 2d9f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.529 UTC [gossip.gossip] handleMessage -> DEBU 2da0 Exiting" +"2019-09-24 01:05:18.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da2 Exiting" +"2019-09-24 01:05:18.528 UTC [gossip.comm] func1 -> DEBU 2d9c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.530 UTC [gossip.gossip] handleMessage -> DEBU 2da3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.530 UTC [gossip.gossip] handleMessage -> DEBU 2da5 Exiting" +"2019-09-24 01:05:18.530 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.531 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2da7 Exiting" +"2019-09-24 01:05:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2da4 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.531 UTC [gossip.comm] sendToEndpoint -> DEBU 2da8 Exiting" +"2019-09-24 01:05:18.530 UTC [gossip.comm] sendToEndpoint -> DEBU 2da9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:18.532 UTC [gossip.comm] sendToEndpoint -> DEBU 2daa Exiting" +"2019-09-24 01:05:18.784 UTC [gossip.comm] func1 -> DEBU 2dab Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.784 UTC [gossip.gossip] handleMessage -> DEBU 2dac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.784 UTC [gossip.pull] HandleMessage -> DEBU 2dad GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2dae Obtaining identity" +"2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2daf Obtaining identity" +"2019-09-24 01:05:18.785 UTC [msp] DeserializeIdentity -> DEBU 2db0 Obtaining identity" +"2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db1 Obtaining identity" +"2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db2 Obtaining identity" +"2019-09-24 01:05:18.786 UTC [msp] DeserializeIdentity -> DEBU 2db3 Obtaining identity" +"2019-09-24 01:05:18.787 UTC [gossip.pull] SendDigest -> DEBU 2db4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:18.787 UTC [gossip.gossip] handleMessage -> DEBU 2db5 Exiting" +"2019-09-24 01:05:18.798 UTC [gossip.comm] func1 -> DEBU 2db6 Got message: GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.799 UTC [gossip.gossip] handleMessage -> DEBU 2db7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.799 UTC [gossip.gossip] handleMessage -> DEBU 2db8 Exiting" +"2019-09-24 01:05:18.799 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2db9 Got message: GossipMessage: tag:EMPTY mem_req:j9\2346\2219r\345m" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.800 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2dba Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:18.800 UTC [msp] DeserializeIdentity -> DEBU 2dbb Obtaining identity" +"2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2dbc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.801 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2dbe Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.801 UTC [policies] Evaluate -> DEBU 2dc1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.803 UTC [cauthdsl] func1 -> DEBU 2dc2 0xc0029904d0 gate 1569287118803096700 evaluation starts" +"2019-09-24 01:05:18.803 UTC [cauthdsl] func2 -> DEBU 2dc3 0xc0029904d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.803 UTC [cauthdsl] func2 -> DEBU 2dc4 0xc0029904d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dc5 0xc0029904d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dc6 0xc0029904d0 principal evaluation fails" +"2019-09-24 01:05:18.804 UTC [cauthdsl] func1 -> DEBU 2dc7 0xc0029904d0 gate 1569287118803096700 evaluation fails" +"2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dc8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dc9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.804 UTC [policies] Evaluate -> DEBU 2dca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.804 UTC [cauthdsl] func1 -> DEBU 2dcb 0xc002990d10 gate 1569287118804833400 evaluation starts" +"2019-09-24 01:05:18.804 UTC [cauthdsl] func2 -> DEBU 2dcc 0xc002990d10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dcd 0xc002990d10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dce 0xc002990d10 principal matched by identity 0" +"2019-09-24 01:05:18.805 UTC [msp.identity] Verify -> DEBU 2dcf Verify: digest = 00000000 5e e9 43 b7 4d 33 89 fe 53 81 aa 3b 4a eb 7a 40 |^.C.M3..S..;J.z@| +00000010 23 82 30 c3 a2 a2 a9 4a 72 08 2c 39 38 06 73 71 |#.0....Jr.,98.sq|" +"2019-09-24 01:05:18.805 UTC [msp.identity] Verify -> DEBU 2dd0 Verify: sig = 00000000 30 44 02 20 1f c0 c8 98 87 fd c0 51 50 6c 39 aa |0D. .......QPl9.| +00000010 6b 0b b4 f3 1d 76 70 58 58 82 b2 1c 77 94 2a 2f |k....vpXX...w.*/| +00000020 45 f0 11 d5 02 20 25 27 35 b7 0c 89 41 b8 e9 53 |E.... %'5...A..S| +00000030 c4 b8 94 b6 1e 8c 13 e8 12 8d 62 ab 3e 6a 39 9c |..........b.>j9.| +00000040 36 91 39 72 e5 6d |6.9r.m|" +"2019-09-24 01:05:18.805 UTC [cauthdsl] func2 -> DEBU 2dd1 0xc002990d10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.805 UTC [cauthdsl] func1 -> DEBU 2dd2 0xc002990d10 gate 1569287118804833400 evaluation succeeds" +"2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.806 UTC [policies] Evaluate -> DEBU 2dd6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.806 UTC [gossip.discovery] handleAliveMessage -> DEBU 2dd7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dd8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dd9 updating membership: timestamp: " +"2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2dda Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:18.807 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ddb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:18.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ddc Exiting" +"2019-09-24 01:05:18.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ddd Exiting" +"2019-09-24 01:05:18.809 UTC [gossip.discovery] sendMemResponse -> DEBU 2dde Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:18.809 UTC [msp] DeserializeIdentity -> DEBU 2ddf Obtaining identity" +"2019-09-24 01:05:18.810 UTC [msp] DeserializeIdentity -> DEBU 2de0 Obtaining identity" +"2019-09-24 01:05:18.810 UTC [msp] DeserializeIdentity -> DEBU 2de1 Obtaining identity" +"2019-09-24 01:05:18.812 UTC [gossip.comm] Send -> DEBU 2de2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.812 UTC [gossip.discovery] sendMemResponse -> DEBU 2de3 Exiting, replying with alive: alive:j9\2346\2219r\345m" > alive: alive: " +"2019-09-24 01:05:18.812 UTC [gossip.comm] sendToEndpoint -> DEBU 2de4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.812 UTC [gossip.comm] sendToEndpoint -> DEBU 2de5 Exiting" +"2019-09-24 01:05:18.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2de6 Exiting" +"2019-09-24 01:05:18.836 UTC [gossip.pull] Hello -> DEBU 2de7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2de8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.837 UTC [gossip.pull] Hello -> DEBU 2de9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2dea Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2deb Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.837 UTC [gossip.pull] Hello -> DEBU 2dec Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2ded Exiting" +"2019-09-24 01:05:18.837 UTC [gossip.comm] Send -> DEBU 2dee Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2def Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df0 Exiting" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.837 UTC [gossip.comm] sendToEndpoint -> DEBU 2df2 Exiting" +"2019-09-24 01:05:18.839 UTC [gossip.comm] func1 -> DEBU 2df3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.839 UTC [gossip.gossip] handleMessage -> DEBU 2df4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.839 UTC [gossip.pull] HandleMessage -> DEBU 2df5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.840 UTC [gossip.gossip] handleMessage -> DEBU 2df6 Exiting" +"2019-09-24 01:05:18.843 UTC [gossip.comm] func1 -> DEBU 2df7 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.843 UTC [gossip.gossip] handleMessage -> DEBU 2df8 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.843 UTC [gossip.pull] HandleMessage -> DEBU 2df9 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.845 UTC [gossip.comm] func1 -> DEBU 2dfa Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.844 UTC [gossip.gossip] handleMessage -> DEBU 2dfb Exiting" +"2019-09-24 01:05:18.846 UTC [gossip.gossip] handleMessage -> DEBU 2dfc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.846 UTC [gossip.pull] HandleMessage -> DEBU 2dfd GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.846 UTC [msp] DeserializeIdentity -> DEBU 2dfe Obtaining identity" +"2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e00 Obtaining identity" +"2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e01 Obtaining identity" +"2019-09-24 01:05:18.847 UTC [msp] DeserializeIdentity -> DEBU 2e02 Obtaining identity" +"2019-09-24 01:05:18.845 UTC [gossip.comm] func1 -> DEBU 2dff Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.848 UTC [msp] DeserializeIdentity -> DEBU 2e03 Obtaining identity" +"2019-09-24 01:05:18.848 UTC [msp] DeserializeIdentity -> DEBU 2e04 Obtaining identity" +"2019-09-24 01:05:18.848 UTC [gossip.pull] SendDigest -> DEBU 2e05 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e06 Exiting" +"2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e07 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.848 UTC [gossip.pull] HandleMessage -> DEBU 2e08 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.848 UTC [gossip.gossip] handleMessage -> DEBU 2e09 Exiting" +"2019-09-24 01:05:18.864 UTC [gossip.comm] func1 -> DEBU 2e0a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.864 UTC [gossip.gossip] handleMessage -> DEBU 2e0b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.864 UTC [gossip.gossip] handleMessage -> DEBU 2e0c Exiting" +"2019-09-24 01:05:18.864 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e0d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.864 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e0e Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:18.864 UTC [msp] DeserializeIdentity -> DEBU 2e0f Obtaining identity" +"2019-09-24 01:05:18.868 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e10 Obtaining default signing identity" +"2019-09-24 01:05:18.868 UTC [msp.identity] Sign -> DEBU 2e11 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151024 " +"2019-09-24 01:05:18.868 UTC [msp.identity] Sign -> DEBU 2e12 Sign: digest: C56AD14F37A626D908FA426BED596602BC39B36575A9388AFEA2F7B1B3BBE6F0 " +"2019-09-24 01:05:18.869 UTC [msp] GetDefaultSigningIdentity -> DEBU 2e13 Obtaining default signing identity" +"2019-09-24 01:05:18.869 UTC [msp.identity] Sign -> DEBU 2e14 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:18.869 UTC [msp.identity] Sign -> DEBU 2e15 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:18.870 UTC [gossip.comm] Send -> DEBU 2e16 Entering, sending GossipMessage: tag:EMPTY mem_req:\036!\255\231\213{M\005\344\247\252\354\375\020y\276\376\273|\005\002 ,\256\320\026H\215\365\035\223\254\336m\267\334,u\253\202%t\257\3065\324\374\315\262\227l\001\360\272" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.870 UTC [msp] DeserializeIdentity -> DEBU 2e17 Obtaining identity" +"2019-09-24 01:05:18.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e18 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e19 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e1a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.871 UTC [gossip.comm] Send -> DEBU 2e1b Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.872 UTC [policies] Evaluate -> DEBU 2e1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.873 UTC [cauthdsl] func1 -> DEBU 2e22 0xc003163fe0 gate 1569287118873775800 evaluation starts" +"2019-09-24 01:05:18.873 UTC [cauthdsl] func2 -> DEBU 2e23 0xc003163fe0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.872 UTC [msp] DeserializeIdentity -> DEBU 2e1f Obtaining identity" +"2019-09-24 01:05:18.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2e20 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.874 UTC [gossip.comm] sendToEndpoint -> DEBU 2e25 Exiting" +"2019-09-24 01:05:18.875 UTC [gossip.comm] Send -> DEBU 2e26 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.873 UTC [gossip.comm] sendToEndpoint -> DEBU 2e21 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\036!\255\231\213{M\005\344\247\252\354\375\020y\276\376\273|\005\002 ,\256\320\026H\215\365\035\223\254\336m\267\334,u\253\202%t\257\3065\324\374\315\262\227l\001\360\272" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.873 UTC [cauthdsl] func2 -> DEBU 2e24 0xc003163fe0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2e27 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.876 UTC [gossip.comm] sendToEndpoint -> DEBU 2e2a Exiting" +"2019-09-24 01:05:18.875 UTC [gossip.comm] sendToEndpoint -> DEBU 2e28 Exiting" +"2019-09-24 01:05:18.875 UTC [cauthdsl] func2 -> DEBU 2e29 0xc003163fe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.879 UTC [gossip.comm] func1 -> DEBU 2e2b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.879 UTC [gossip.gossip] handleMessage -> DEBU 2e2c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.879 UTC [gossip.comm] func1 -> DEBU 2e2d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.876 UTC [cauthdsl] func2 -> DEBU 2e2e 0xc003163fe0 principal evaluation fails" +"2019-09-24 01:05:18.880 UTC [cauthdsl] func1 -> DEBU 2e2f 0xc003163fe0 gate 1569287118873775800 evaluation fails" +"2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e30 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.880 UTC [policies] Evaluate -> DEBU 2e32 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.881 UTC [cauthdsl] func1 -> DEBU 2e33 0xc0038caa70 gate 1569287118881193300 evaluation starts" +"2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e34 0xc0038caa70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e35 0xc0038caa70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.881 UTC [cauthdsl] func2 -> DEBU 2e36 0xc0038caa70 principal matched by identity 0" +"2019-09-24 01:05:18.881 UTC [msp.identity] Verify -> DEBU 2e37 Verify: digest = 00000000 bb c6 0c 0e 04 ce ed 43 4d 2b 49 e5 8c 93 bb 8c |.......CM+I.....| +00000010 97 74 84 4b d5 4d 3e b5 f3 ae b6 52 75 ea 81 22 |.t.K.M>....Ru.."|" +"2019-09-24 01:05:18.881 UTC [msp.identity] Verify -> DEBU 2e38 Verify: sig = 00000000 30 44 02 20 74 9a 21 21 e9 6f 00 3c 21 df 4d 51 |0D. t.!!.o. DEBU 2e39 0xc0038caa70 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.882 UTC [cauthdsl] func1 -> DEBU 2e3a 0xc0038caa70 gate 1569287118881193300 evaluation succeeds" +"2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.882 UTC [policies] Evaluate -> DEBU 2e3e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.883 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e3f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e40 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e41 updating membership: timestamp: " +"2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e42 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:18.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e43 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:18.884 UTC [gossip.discovery] learnExistingMembers -> DEBU 2e44 Exiting" +"2019-09-24 01:05:18.884 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e45 Exiting" +"2019-09-24 01:05:18.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e46 Exiting" +"2019-09-24 01:05:18.885 UTC [gossip.discovery] sendMemResponse -> DEBU 2e48 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4a Obtaining identity" +"2019-09-24 01:05:18.885 UTC [gossip.gossip] handleMessage -> DEBU 2e49 Exiting" +"2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4b Obtaining identity" +"2019-09-24 01:05:18.885 UTC [msp] DeserializeIdentity -> DEBU 2e4d Obtaining identity" +"2019-09-24 01:05:18.886 UTC [gossip.comm] Send -> DEBU 2e4e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:18.885 UTC [gossip.gossip] handleMessage -> DEBU 2e4c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.885 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e47 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.886 UTC [gossip.discovery] sendMemResponse -> DEBU 2e4f Exiting, replying with alive: alive:j9\2346\2219r\345m" > alive: alive: " +"2019-09-24 01:05:18.886 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e50 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:18.886 UTC [gossip.comm] sendToEndpoint -> DEBU 2e51 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.887 UTC [gossip.comm] sendToEndpoint -> DEBU 2e52 Exiting" +"2019-09-24 01:05:18.887 UTC [msp.identity] Verify -> DEBU 2e53 Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +"2019-09-24 01:05:18.887 UTC [msp.identity] Verify -> DEBU 2e54 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +00000040 c9 99 3a 05 66 4a |..:.fJ|" +"2019-09-24 01:05:18.888 UTC [msp.identity] Verify -> DEBU 2e55 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:18.888 UTC [msp.identity] Verify -> DEBU 2e56 Verify: sig = 00000000 30 45 02 21 00 e7 a4 86 21 8c 27 43 82 ba 7d 8f |0E.!....!.'C..}.| +00000010 3e 1e 21 ad 99 8b 7b 4d 05 e4 a7 aa ec fd 10 79 |>.!...{M.......y| +00000020 be fe bb 7c 05 02 20 2c ae d0 16 48 8d f5 1d 93 |...|.. ,...H....| +00000030 ac de 6d b7 dc 2c 75 ab 82 25 74 af c6 35 d4 fc |..m..,u..%t..5..| +00000040 cd b2 97 6c 01 f0 ba |...l...|" +"2019-09-24 01:05:18.890 UTC [gossip.comm] func1 -> DEBU 2e57 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e58 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:18.890 UTC [gossip.discovery] isSentByMe -> DEBU 2e59 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:18.890 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e5a Exiting" +"2019-09-24 01:05:18.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5b Exiting" +"2019-09-24 01:05:18.891 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e5c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.891 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e5d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:18.891 UTC [gossip.gossip] handleMessage -> DEBU 2e5e Exiting" +"2019-09-24 01:05:18.891 UTC [msp.identity] Verify -> DEBU 2e5f Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +"2019-09-24 01:05:18.891 UTC [msp.identity] Verify -> DEBU 2e60 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +00000040 c9 99 3a 05 66 4a |..:.fJ|" +"2019-09-24 01:05:18.891 UTC [gossip.gossip] handleMessage -> DEBU 2e61 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e62 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.892 UTC [gossip.discovery] isSentByMe -> DEBU 2e63 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.892 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e64 Exiting" +"2019-09-24 01:05:18.892 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e65 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:18.892 UTC [msp] DeserializeIdentity -> DEBU 2e66 Obtaining identity" +"2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e67 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e68 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.893 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e69 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.893 UTC [policies] Evaluate -> DEBU 2e6c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.893 UTC [cauthdsl] func1 -> DEBU 2e6d 0xc003b94c80 gate 1569287118893869700 evaluation starts" +"2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e6e 0xc003b94c80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e6f 0xc003b94c80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e70 0xc003b94c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.894 UTC [cauthdsl] func2 -> DEBU 2e71 0xc003b94c80 principal evaluation fails" +"2019-09-24 01:05:18.894 UTC [cauthdsl] func1 -> DEBU 2e72 0xc003b94c80 gate 1569287118893869700 evaluation fails" +"2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.895 UTC [policies] Evaluate -> DEBU 2e75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.895 UTC [cauthdsl] func1 -> DEBU 2e76 0xc003b954c0 gate 1569287118895903300 evaluation starts" +"2019-09-24 01:05:18.895 UTC [cauthdsl] func2 -> DEBU 2e77 0xc003b954c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.895 UTC [cauthdsl] func2 -> DEBU 2e78 0xc003b954c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.896 UTC [cauthdsl] func2 -> DEBU 2e79 0xc003b954c0 principal matched by identity 0" +"2019-09-24 01:05:18.896 UTC [msp.identity] Verify -> DEBU 2e7a Verify: digest = 00000000 bb c6 0c 0e 04 ce ed 43 4d 2b 49 e5 8c 93 bb 8c |.......CM+I.....| +00000010 97 74 84 4b d5 4d 3e b5 f3 ae b6 52 75 ea 81 22 |.t.K.M>....Ru.."|" +"2019-09-24 01:05:18.896 UTC [msp.identity] Verify -> DEBU 2e7b Verify: sig = 00000000 30 44 02 20 74 9a 21 21 e9 6f 00 3c 21 df 4d 51 |0D. t.!!.o. DEBU 2e7c 0xc003b954c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.897 UTC [cauthdsl] func1 -> DEBU 2e7d 0xc003b954c0 gate 1569287118895903300 evaluation succeeds" +"2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e7e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e7f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e80 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.897 UTC [policies] Evaluate -> DEBU 2e81 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e82 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 2e83 Exiting" +"2019-09-24 01:05:18.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e84 Exiting" +"2019-09-24 01:05:18.897 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2e85 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:18.897 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2e86 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:18.897 UTC [msp] DeserializeIdentity -> DEBU 2e87 Obtaining identity" +"2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2e88 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e89 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.898 UTC [gossip.gossip] handleMessage -> DEBU 2e8a Exiting" +"2019-09-24 01:05:18.898 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2e8b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:18.898 UTC [policies] Evaluate -> DEBU 2e8c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:18.899 UTC [policies] Evaluate -> DEBU 2e8d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:18.899 UTC [policies] Evaluate -> DEBU 2e8e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:18.899 UTC [cauthdsl] func1 -> DEBU 2e8f 0xc003c7d090 gate 1569287118899451200 evaluation starts" +"2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e90 0xc003c7d090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e91 0xc003c7d090 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.899 UTC [cauthdsl] func2 -> DEBU 2e92 0xc003c7d090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e93 0xc003c7d090 principal evaluation fails" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func1 -> DEBU 2e94 0xc003c7d090 gate 1569287118899451200 evaluation fails" +"2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e95 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e96 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:18.900 UTC [policies] Evaluate -> DEBU 2e97 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func1 -> DEBU 2e98 0xc003c7d8d0 gate 1569287118900759200 evaluation starts" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e99 0xc003c7d8d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e9a 0xc003c7d8d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:18.900 UTC [cauthdsl] func2 -> DEBU 2e9b 0xc003c7d8d0 principal matched by identity 0" +"2019-09-24 01:05:18.900 UTC [msp.identity] Verify -> DEBU 2e9c Verify: digest = 00000000 5e e9 43 b7 4d 33 89 fe 53 81 aa 3b 4a eb 7a 40 |^.C.M3..S..;J.z@| +00000010 23 82 30 c3 a2 a2 a9 4a 72 08 2c 39 38 06 73 71 |#.0....Jr.,98.sq|" +"2019-09-24 01:05:18.901 UTC [msp.identity] Verify -> DEBU 2e9d Verify: sig = 00000000 30 44 02 20 1f c0 c8 98 87 fd c0 51 50 6c 39 aa |0D. .......QPl9.| +00000010 6b 0b b4 f3 1d 76 70 58 58 82 b2 1c 77 94 2a 2f |k....vpXX...w.*/| +00000020 45 f0 11 d5 02 20 25 27 35 b7 0c 89 41 b8 e9 53 |E.... %'5...A..S| +00000030 c4 b8 94 b6 1e 8c 13 e8 12 8d 62 ab 3e 6a 39 9c |..........b.>j9.| +00000040 36 91 39 72 e5 6d |6.9r.m|" +"2019-09-24 01:05:18.901 UTC [cauthdsl] func2 -> DEBU 2e9e 0xc003c7d8d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:18.901 UTC [cauthdsl] func1 -> DEBU 2e9f 0xc003c7d8d0 gate 1569287118900759200 evaluation succeeds" +"2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:18.901 UTC [policies] Evaluate -> DEBU 2ea2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:18.902 UTC [policies] Evaluate -> DEBU 2ea3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:18.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea5 Exiting" +"2019-09-24 01:05:18.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2ea6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:18.903 UTC [msp.identity] Verify -> DEBU 2ea7 Verify: digest = 00000000 c5 6a d1 4f 37 a6 26 d9 08 fa 42 6b ed 59 66 02 |.j.O7.&...Bk.Yf.| +00000010 bc 39 b3 65 75 a9 38 8a fe a2 f7 b1 b3 bb e6 f0 |.9.eu.8.........|" +"2019-09-24 01:05:18.903 UTC [msp.identity] Verify -> DEBU 2ea8 Verify: sig = 00000000 30 44 02 20 5b 02 36 f4 6c a2 ce eb 98 c9 92 94 |0D. [.6.l.......| +00000010 96 81 13 31 a6 10 ae e8 bc 3c 3d a1 1e 50 7b 3c |...1.....<=..P{<| +00000020 d8 ea 1b e8 02 20 1e 00 45 80 62 30 97 d4 86 9a |..... ..E.b0....| +00000030 8a ef 63 73 3a 06 03 b1 d9 2f 0c f1 99 1f 2f 5a |..cs:..../..../Z| +00000040 c9 99 3a 05 66 4a |..:.fJ|" +"2019-09-24 01:05:18.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ea9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.904 UTC [gossip.discovery] isSentByMe -> DEBU 2eaa Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:18.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 2eab Exiting" +"2019-09-24 01:05:18.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eac Exiting" +"2019-09-24 01:05:19.144 UTC [gossip.comm] func1 -> DEBU 2ead Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.144 UTC [gossip.comm] func1 -> DEBU 2eae Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.145 UTC [gossip.comm] func1 -> DEBU 2eaf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb1 Exiting" +"2019-09-24 01:05:19.146 UTC [gossip.gossip] handleMessage -> DEBU 2eb2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.147 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2eb3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.147 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eb4 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:19.147 UTC [msp] DeserializeIdentity -> DEBU 2eb5 Obtaining identity" +"2019-09-24 01:05:19.147 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2eb6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:19.147 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2eb8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2eb9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2eba This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:19.148 UTC [policies] Evaluate -> DEBU 2ebb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:19.148 UTC [cauthdsl] func1 -> DEBU 2ebc 0xc003e30070 gate 1569287119148831500 evaluation starts" +"2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebd 0xc003e30070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebe 0xc003e30070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ebf 0xc003e30070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:19.149 UTC [cauthdsl] func2 -> DEBU 2ec0 0xc003e30070 principal evaluation fails" +"2019-09-24 01:05:19.149 UTC [cauthdsl] func1 -> DEBU 2ec1 0xc003e30070 gate 1569287119148831500 evaluation fails" +"2019-09-24 01:05:19.149 UTC [policies] Evaluate -> DEBU 2ec2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:19.150 UTC [policies] Evaluate -> DEBU 2ec3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:19.150 UTC [policies] Evaluate -> DEBU 2ec4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:19.150 UTC [cauthdsl] func1 -> DEBU 2ec5 0xc003e308b0 gate 1569287119150642100 evaluation starts" +"2019-09-24 01:05:19.150 UTC [cauthdsl] func2 -> DEBU 2ec6 0xc003e308b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.150 UTC [cauthdsl] func2 -> DEBU 2ec7 0xc003e308b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.151 UTC [cauthdsl] func2 -> DEBU 2ec8 0xc003e308b0 principal matched by identity 0" +"2019-09-24 01:05:19.151 UTC [msp.identity] Verify -> DEBU 2ec9 Verify: digest = 00000000 06 65 21 7b a0 1b 81 0c c4 9f 4d 27 77 9a 91 4c |.e!{......M'w..L| +00000010 48 f3 0a 0b 3c 74 33 c5 6c 83 7b 98 32 e6 b3 93 |H... DEBU 2eca Verify: sig = 00000000 30 45 02 21 00 bf b6 9c ee 01 80 c8 07 cd 3d 19 |0E.!..........=.| +00000010 1f 8f 62 77 95 35 f8 cd 78 cb 99 d6 48 57 e8 24 |..bw.5..x...HW.$| +00000020 3c 8f 4d 78 6e 02 20 57 2f 08 25 fc 43 8f cc f2 |<.Mxn. W/.%.C...| +00000030 52 4d f2 2f 57 0b b7 d2 2a 38 00 e5 df c7 ed 98 |RM./W...*8......| +00000040 73 fd 9c de c1 db 81 |s......|" +"2019-09-24 01:05:19.152 UTC [cauthdsl] func2 -> DEBU 2ecb 0xc003e308b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:19.152 UTC [cauthdsl] func1 -> DEBU 2ecc 0xc003e308b0 gate 1569287119150642100 evaluation succeeds" +"2019-09-24 01:05:19.152 UTC [policies] Evaluate -> DEBU 2ecd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:19.152 UTC [policies] Evaluate -> DEBU 2ece == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:19.153 UTC [policies] Evaluate -> DEBU 2ecf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:19.153 UTC [policies] Evaluate -> DEBU 2ed0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:19.153 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ed1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.154 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed3 updating membership: timestamp: " +"2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed4 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:19.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 2ed6 Exiting" +"2019-09-24 01:05:19.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 2ed7 Exiting" +"2019-09-24 01:05:19.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed8 Exiting" +"2019-09-24 01:05:19.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2ed9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 2eda Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:19.156 UTC [msp] DeserializeIdentity -> DEBU 2edb Obtaining identity" +"2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 2edc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2edd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.157 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 2ede Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2edf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2ee0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:19.157 UTC [policies] Evaluate -> DEBU 2ee1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:19.158 UTC [cauthdsl] func1 -> DEBU 2ee2 0xc003e96900 gate 1569287119158098600 evaluation starts" +"2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee3 0xc003e96900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee4 0xc003e96900 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.158 UTC [cauthdsl] func2 -> DEBU 2ee5 0xc003e96900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:19.159 UTC [cauthdsl] func2 -> DEBU 2ee6 0xc003e96900 principal evaluation fails" +"2019-09-24 01:05:19.159 UTC [cauthdsl] func1 -> DEBU 2ee7 0xc003e96900 gate 1569287119158098600 evaluation fails" +"2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2ee8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2ee9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:19.159 UTC [policies] Evaluate -> DEBU 2eea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:19.160 UTC [cauthdsl] func1 -> DEBU 2eeb 0xc003e97140 gate 1569287119159997800 evaluation starts" +"2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eec 0xc003e97140 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eed 0xc003e97140 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.160 UTC [cauthdsl] func2 -> DEBU 2eee 0xc003e97140 principal matched by identity 0" +"2019-09-24 01:05:19.160 UTC [msp.identity] Verify -> DEBU 2eef Verify: digest = 00000000 09 bb ce e1 fe 1f ac f1 08 54 c2 47 ec 18 d5 20 |.........T.G... | +00000010 5e 68 14 ce 7f c1 e9 ae bd b8 04 e6 9f 2c 0a 25 |^h...........,.%|" +"2019-09-24 01:05:19.160 UTC [msp.identity] Verify -> DEBU 2ef0 Verify: sig = 00000000 30 45 02 21 00 a9 0d c9 89 d6 94 da 6c 65 6c ec |0E.!........lel.| +00000010 76 2e 7a 18 9c 3e c1 b1 ef 0e 3f e4 bb eb a1 63 |v.z..>....?....c| +00000020 a7 2d af 0e de 02 20 78 d6 0a fb 5e fa 92 16 26 |.-.... x...^...&| +00000030 09 16 e0 d6 86 a5 ca be df 41 56 c1 ea d1 8b e3 |.........AV.....| +00000040 d0 e4 c3 b7 83 86 36 |......6|" +"2019-09-24 01:05:19.161 UTC [gossip.gossip] handleMessage -> DEBU 2ef1 Exiting" +"2019-09-24 01:05:19.161 UTC [cauthdsl] func2 -> DEBU 2ef2 0xc003e97140 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:19.161 UTC [cauthdsl] func1 -> DEBU 2ef3 0xc003e97140 gate 1569287119159997800 evaluation succeeds" +"2019-09-24 01:05:19.161 UTC [gossip.comm] func1 -> DEBU 2ef4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.162 UTC [gossip.comm] func1 -> DEBU 2ef5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.161 UTC [policies] Evaluate -> DEBU 2ef6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:19.162 UTC [policies] Evaluate -> DEBU 2ef9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:19.162 UTC [gossip.discovery] handleAliveMessage -> DEBU 2efa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2efc Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:19.163 UTC [msp] DeserializeIdentity -> DEBU 2efd Obtaining identity" +"2019-09-24 01:05:19.161 UTC [gossip.gossip] handleMessage -> DEBU 2eff Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2efe updating membership: timestamp: " +"2019-09-24 01:05:19.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f01 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:19.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f02 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:19.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 2f03 Exiting" +"2019-09-24 01:05:19.164 UTC [gossip.discovery] handleAliveMessage -> DEBU 2f04 Exiting" +"2019-09-24 01:05:19.163 UTC [msp] DeserializeIdentity -> DEBU 2f00 Obtaining identity" +"2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f05 Obtaining identity" +"2019-09-24 01:05:19.162 UTC [gossip.comm] func1 -> DEBU 2efb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f06 Obtaining identity" +"2019-09-24 01:05:19.165 UTC [msp] DeserializeIdentity -> DEBU 2f07 Obtaining identity" +"2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f08 Obtaining identity" +"2019-09-24 01:05:19.166 UTC [gossip.comm] Send -> DEBU 2f09 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f0a Obtaining identity" +"2019-09-24 01:05:19.166 UTC [gossip.comm] sendToEndpoint -> DEBU 2f0c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.166 UTC [gossip.comm] sendToEndpoint -> DEBU 2f0d Exiting" +"2019-09-24 01:05:19.166 UTC [msp] DeserializeIdentity -> DEBU 2f0b Obtaining identity" +"2019-09-24 01:05:19.167 UTC [gossip.comm] Send -> DEBU 2f0e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f0f Exiting" +"2019-09-24 01:05:19.167 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f10 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.168 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f11 Exiting" +"2019-09-24 01:05:19.168 UTC [gossip.gossip] handleMessage -> DEBU 2f12 Exiting" +"2019-09-24 01:05:19.168 UTC [gossip.comm] sendToEndpoint -> DEBU 2f13 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.168 UTC [gossip.comm] sendToEndpoint -> DEBU 2f14 Exiting" +"2019-09-24 01:05:19.168 UTC [gossip.gossip] handleMessage -> DEBU 2f15 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.169 UTC [gossip.gossip] handleMessage -> DEBU 2f16 Exiting" +"2019-09-24 01:05:19.169 UTC [gossip.gossip] handleMessage -> DEBU 2f17 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f18 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f19 Exiting" +"2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.170 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1b Exiting" +"2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1c Exiting" +"2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.171 UTC [gossip.gossip] handleMessage -> DEBU 2f1e Exiting" +"2019-09-24 01:05:19.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f1f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 2f20 Exiting" +"2019-09-24 01:05:19.181 UTC [msp] DeserializeIdentity -> DEBU 2f21 Obtaining identity" +"2019-09-24 01:05:19.181 UTC [msp] DeserializeIdentity -> DEBU 2f22 Obtaining identity" +"2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f23 Obtaining identity" +"2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f24 Obtaining identity" +"2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f25 Obtaining identity" +"2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f26 Obtaining identity" +"2019-09-24 01:05:19.182 UTC [msp] DeserializeIdentity -> DEBU 2f27 Obtaining identity" +"2019-09-24 01:05:19.183 UTC [gossip.comm] Send -> DEBU 2f28 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.183 UTC [msp] DeserializeIdentity -> DEBU 2f29 Obtaining identity" +"2019-09-24 01:05:19.183 UTC [gossip.comm] Send -> DEBU 2f2a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2d Exiting" +"2019-09-24 01:05:19.183 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.184 UTC [gossip.comm] sendToEndpoint -> DEBU 2f2e Exiting" +"2019-09-24 01:05:19.211 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f2f Obtaining default signing identity" +"2019-09-24 01:05:19.211 UTC [msp.identity] Sign -> DEBU 2f30 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151025 " +"2019-09-24 01:05:19.211 UTC [msp.identity] Sign -> DEBU 2f31 Sign: digest: 331F27B99631837C1617889BF2C3534BAFCDB816E1AEA13EF3C3B0E26937A848 " +"2019-09-24 01:05:19.213 UTC [msp] GetDefaultSigningIdentity -> DEBU 2f32 Obtaining default signing identity" +"2019-09-24 01:05:19.213 UTC [msp.identity] Sign -> DEBU 2f33 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:19.213 UTC [msp.identity] Sign -> DEBU 2f34 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:19.213 UTC [gossip.discovery] periodicalSendAlive -> DEBU 2f35 Sleeping 5s" +"2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f36 Obtaining identity" +"2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f37 Obtaining identity" +"2019-09-24 01:05:19.216 UTC [msp] DeserializeIdentity -> DEBU 2f38 Obtaining identity" +"2019-09-24 01:05:19.217 UTC [gossip.comm] Send -> DEBU 2f39 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.217 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.218 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3c Exiting" +"2019-09-24 01:05:19.217 UTC [gossip.comm] Send -> DEBU 2f3b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.218 UTC [msp] DeserializeIdentity -> DEBU 2f3d Obtaining identity" +"2019-09-24 01:05:19.219 UTC [gossip.comm] Send -> DEBU 2f3e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:19.220 UTC [gossip.comm] sendToEndpoint -> DEBU 2f3f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.220 UTC [gossip.comm] sendToEndpoint -> DEBU 2f40 Exiting" +"2019-09-24 01:05:19.221 UTC [gossip.comm] sendToEndpoint -> DEBU 2f41 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:19.221 UTC [gossip.comm] sendToEndpoint -> DEBU 2f42 Exiting" +"2019-09-24 01:05:19.503 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2f43 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.503 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 2f44 Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f45 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f46 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:19.503 UTC [policies] Evaluate -> DEBU 2f47 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:05:19.503 UTC [cauthdsl] func1 -> DEBU 2f48 0xc0027e8ef0 gate 1569287119503494700 evaluation starts" +"2019-09-24 01:05:19.503 UTC [cauthdsl] func2 -> DEBU 2f49 0xc0027e8ef0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.503 UTC [cauthdsl] func2 -> DEBU 2f4a 0xc0027e8ef0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.504 UTC [cauthdsl] func2 -> DEBU 2f4b 0xc0027e8ef0 principal matched by identity 0" +"2019-09-24 01:05:19.504 UTC [msp.identity] Verify -> DEBU 2f4c Verify: digest = 00000000 d3 71 04 c7 3d c3 26 0b 70 90 17 6e 4a 7e d5 4c |.q..=.&.p..nJ~.L| +00000010 01 f9 6e f5 b4 d5 27 ea 70 97 4d 21 49 6b a3 18 |..n...'.p.M!Ik..|" +"2019-09-24 01:05:19.505 UTC [msp.identity] Verify -> DEBU 2f4d Verify: sig = 00000000 30 45 02 21 00 d5 95 55 36 54 5a 06 5c af 7d da |0E.!...U6TZ.\.}.| +00000010 12 0a a6 f7 4b 97 af bc a2 43 4f cc d0 99 8b 68 |....K....CO....h| +00000020 80 e1 a1 01 ce 02 20 00 e1 ff ec d3 e6 41 eb a4 |...... ......A..| +00000030 dc 54 5c bb e3 14 4a ca dd bc 38 63 08 8d dd b1 |.T\...J...8c....| +00000040 5a c7 95 49 ce b9 c5 |Z..I...|" +"2019-09-24 01:05:19.505 UTC [cauthdsl] func2 -> DEBU 2f4e 0xc0027e8ef0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:19.505 UTC [cauthdsl] func1 -> DEBU 2f4f 0xc0027e8ef0 gate 1569287119503494700 evaluation succeeds" +"2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f50 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f51 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:19.505 UTC [policies] Evaluate -> DEBU 2f52 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:19.506 UTC [policies] Evaluate -> DEBU 2f53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:19.506 UTC [blocksProvider] DeliverBlocks -> DEBU 2f54 [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-09-24 01:05:19.506 UTC [gossip.state] addPayload -> DEBU 2f55 [businesschannel] Adding payload to local buffer, blockNum = [5]" +"2019-09-24 01:05:19.506 UTC [gossip.state] addPayload -> DEBU 2f56 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:05:19.506 UTC [blocksProvider] DeliverBlocks -> DEBU 2f57 [businesschannel] Gossiping block [5], peers number [3]" +"2019-09-24 01:05:19.506 UTC [gossip.channel] AddToMsgStore -> DEBU 2f58 Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:05:19.507 UTC [gossip.pull] Add -> DEBU 2f59 Added 5, total items: 5" +"2019-09-24 01:05:19.507 UTC [gossip.state] deliverPayloads -> DEBU 2f5a [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5]" +"2019-09-24 01:05:19.507 UTC [gossip.state] deliverPayloads -> DEBU 2f5b [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger" +"2019-09-24 01:05:19.507 UTC [gossip.privdata] StoreBlock -> INFO 2f5c [businesschannel] Received block [5] from buffer" +"2019-09-24 01:05:19.507 UTC [gossip.privdata] StoreBlock -> DEBU 2f5d [businesschannel] Validating block [5]" +"2019-09-24 01:05:19.507 UTC [committer.txvalidator] Validate -> DEBU 2f5e [businesschannel] START Block Validation for block [5]" +"2019-09-24 01:05:19.508 UTC [committer.txvalidator] Validate -> DEBU 2f5f expecting 1 block validation responses" +"2019-09-24 01:05:19.508 UTC [committer.txvalidator] validateTx -> DEBU 2f60 [businesschannel] validateTx starts for block 0xc003156280 env 0xc00290c230 txn 0" +"2019-09-24 01:05:19.508 UTC [protoutils] ValidateTransaction -> DEBU 2f61 ValidateTransactionEnvelope starts for envelope 0xc00290c230" +"2019-09-24 01:05:19.508 UTC [protoutils] ValidateTransaction -> DEBU 2f62 Header is channel_header:"\010\003\032\014\010\315\327\245\354\005\020\364\262\307\322\001\"\017businesschannel*@074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\333\364\177K\347\263Z\271\201\264\263|\350\305\0245\320\277\331\301\216\315\264\220" " +"2019-09-24 01:05:19.508 UTC [protoutils] validateChannelHeader -> DEBU 2f63 validateChannelHeader info: header type 3" +"2019-09-24 01:05:19.508 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f64 begin" +"2019-09-24 01:05:19.508 UTC [msp] GetManagerForChain -> DEBU 2f65 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:19.509 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f66 creator is &{Org2MSP 2b71c029da312075d88e14bdbc373e953bd593e53541e9aff26e9d4453d88baa}" +"2019-09-24 01:05:19.509 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f67 creator is valid" +"2019-09-24 01:05:19.509 UTC [msp.identity] Verify -> DEBU 2f68 Verify: digest = 00000000 3b bb 85 c9 b1 26 4d ef 06 5d 74 71 84 51 0c ba |;....&M..]tq.Q..| +00000010 f4 ff 97 a0 9a 74 75 1a ed 57 e9 f4 fa ce 55 e2 |.....tu..W....U.|" +"2019-09-24 01:05:19.509 UTC [msp.identity] Verify -> DEBU 2f69 Verify: sig = 00000000 30 45 02 21 00 fd a1 0a 41 10 34 78 b2 35 ea a0 |0E.!....A.4x.5..| +00000010 60 94 c5 01 ae e7 b2 c3 4c 4b 69 d7 03 98 bc 0b |`.......LKi.....| +00000020 7e c4 d0 f1 d9 02 20 7f 1b dd 4e f3 da c9 03 62 |~..... ...N....b| +00000030 53 08 49 fd d9 f2 bf 57 e1 37 ab 5a 24 b4 00 f2 |S.I....W.7.Z$...| +00000040 c0 bb be fd e2 be ad |.......|" +"2019-09-24 01:05:19.510 UTC [protoutils] checkSignatureFromCreator -> DEBU 2f6a exits successfully" +"2019-09-24 01:05:19.511 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6b validateEndorserTransaction starts for data 0xc003046000, header channel_header:"\010\003\032\014\010\315\327\245\354\005\020\364\262\307\322\001\"\017businesschannel*@074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nVdlUK3jBqdMRaE4rE0ZufktR3OAyD35CZIugJ79t\n-----END CERTIFICATE-----\n\022\030\333\364\177K\347\263Z\271\201\264\263|\350\305\0245\320\277\331\301\216\315\264\220" " +"2019-09-24 01:05:19.512 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6c validateEndorserTransaction info: there are 1 actions" +"2019-09-24 01:05:19.512 UTC [protoutils] validateEndorserTransaction -> DEBU 2f6d validateEndorserTransaction info: signature header is valid" +"2019-09-24 01:05:19.512 UTC [protoutils] ValidateTransaction -> DEBU 2f6e ValidateTransactionEnvelope returns err %!s()" +"2019-09-24 01:05:19.514 UTC [committer.txvalidator] validateTx -> DEBU 2f6f Transaction is for channel businesschannel" +"2019-09-24 01:05:19.514 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2f70 retrieveTransactionByID() - txId = [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5]" +"2019-09-24 01:05:19.527 UTC [committer.txvalidator] validateTx -> DEBU 2f71 Validating transaction vscc tx validate" +"2019-09-24 01:05:19.529 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2f72 [businesschannel] VSCCValidateTx starts for bytes 0xc002a30c00" +"2019-09-24 01:05:19.530 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f73 constructing new query executor txid = [22ab09a7-fd84-45ca-a049-99e8c4c44a45]" +"2019-09-24 01:05:19.531 UTC [stateleveldb] GetState -> DEBU 2f74 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:19.533 UTC [lockbasedtxmgr] Done -> DEBU 2f75 Done with transaction simulation / query execution [22ab09a7-fd84-45ca-a049-99e8c4c44a45]" +"2019-09-24 01:05:19.534 UTC [committer.txvalidator] VSCCValidateTxForCC -> DEBU 2f76 Validating Tx 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin" +"2019-09-24 01:05:19.536 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f77 constructing new query executor txid = [d3391cab-bac4-4f76-8424-76c23014b1ff]" +"2019-09-24 01:05:19.536 UTC [lockbasedtxmgr] Done -> DEBU 2f78 Done with transaction simulation / query execution [d3391cab-bac4-4f76-8424-76c23014b1ff]" +"2019-09-24 01:05:19.537 UTC [cauthdsl] func1 -> DEBU 2f79 0xc003043ee0 gate 1569287119537196000 evaluation starts" +"2019-09-24 01:05:19.537 UTC [cauthdsl] func2 -> DEBU 2f7a 0xc003043ee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.538 UTC [cauthdsl] func2 -> DEBU 2f7b 0xc003043ee0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.540 UTC [cauthdsl] func2 -> DEBU 2f7d 0xc003043ee0 principal matched by identity 0" +"2019-09-24 01:05:19.539 UTC [msp] DeserializeIdentity -> DEBU 2f7c Obtaining identity" +"2019-09-24 01:05:19.541 UTC [msp] DeserializeIdentity -> DEBU 2f7e Obtaining identity" +"2019-09-24 01:05:19.542 UTC [msp] DeserializeIdentity -> DEBU 2f7f Obtaining identity" +"2019-09-24 01:05:19.542 UTC [msp] DeserializeIdentity -> DEBU 2f81 Obtaining identity" +"2019-09-24 01:05:19.542 UTC [msp.identity] Verify -> DEBU 2f80 Verify: digest = 00000000 cc 69 4f 41 89 07 fb b3 5a 81 af 28 ec 39 03 ae |.iOA....Z..(.9..| +00000010 b6 21 0b d0 0d 71 68 33 c1 f0 86 e5 86 73 1f 7b |.!...qh3.....s.{|" +"2019-09-24 01:05:19.543 UTC [msp.identity] Verify -> DEBU 2f82 Verify: sig = 00000000 30 45 02 21 00 bd 00 da 09 1c 11 a0 2b 51 87 59 |0E.!........+Q.Y| +00000010 c6 2f 68 ee b6 ce 9c 36 71 27 5e 0a aa 2f 2a f8 |./h....6q'^../*.| +00000020 c3 2e 82 82 23 02 20 7e 64 5c c5 0f d5 a7 c3 93 |....#. ~d\......| +00000030 91 7a 80 54 b5 cf 14 34 6e 51 e6 42 c6 96 96 6c |.z.T...4nQ.B...l| +00000040 eb 9d 1c 67 82 f5 91 |...g...|" +"2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f83 0xc003043ee0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f84 0xc003043ee0 signed by 1 principal evaluation starts (used [true])" +"2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f85 0xc003043ee0 skipping identity 0 because it has already been used" +"2019-09-24 01:05:19.544 UTC [gossip.comm] Send -> DEBU 2f86 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:19.544 UTC [cauthdsl] func2 -> DEBU 2f87 0xc003043ee0 principal evaluation fails" +"2019-09-24 01:05:19.544 UTC [cauthdsl] func1 -> DEBU 2f88 0xc003043ee0 gate 1569287119537196000 evaluation succeeds" +"2019-09-24 01:05:19.545 UTC [lockbasedtxmgr] newQueryExecutor -> DEBU 2f8b constructing new query executor txid = [b70c3402-77a4-4aa2-830d-470852de653d]" +"2019-09-24 01:05:19.545 UTC [lockbasedtxmgr] Done -> DEBU 2f8c Done with transaction simulation / query execution [b70c3402-77a4-4aa2-830d-470852de653d]" +"2019-09-24 01:05:19.545 UTC [vscc] Validate -> DEBU 2f8d block 5, namespace: exp02, tx 0 validation results is: " +"2019-09-24 01:05:19.545 UTC [msp] DeserializeIdentity -> DEBU 2f89 Obtaining identity" +"2019-09-24 01:05:19.546 UTC [msp] DeserializeIdentity -> DEBU 2f8e Obtaining identity" +"2019-09-24 01:05:19.545 UTC [gossip.comm] sendToEndpoint -> DEBU 2f8a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 3999 bytes, seq: 5}, Envelope: 4029 bytes, Signature: 0 bytes" +"2019-09-24 01:05:19.546 UTC [gossip.comm] sendToEndpoint -> DEBU 2f8f Exiting" +"2019-09-24 01:05:19.545 UTC [committer.txvalidator] ValidateWithPlugin -> DEBU 2f90 Transaction 074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 appears to be valid" +"2019-09-24 01:05:19.546 UTC [committer.txvalidator] VSCCValidateTx -> DEBU 2f91 [businesschannel] VSCCValidateTx completes env bytes 0xc002a30c00" +"2019-09-24 01:05:19.547 UTC [committer.txvalidator] validateTx -> DEBU 2f92 [businesschannel] validateTx completes for block 0xc003156280 env 0xc00290c230 txn 0" +"2019-09-24 01:05:19.547 UTC [committer.txvalidator] Validate -> DEBU 2f93 got result for idx 0, code 0" +"2019-09-24 01:05:19.547 UTC [committer.txvalidator] Validate -> INFO 2f94 [businesschannel] Validated block [5] in 39ms" +"2019-09-24 01:05:19.551 UTC [gossip.privdata] listMissingPrivateData -> DEBU 2f95 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:05:19.551 UTC [gossip.privdata] StoreBlock -> DEBU 2f96 [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:05:19.553 UTC [kvledger] CommitWithPvtData -> DEBU 2f97 [businesschannel] Validating state for block [5]" +"2019-09-24 01:05:19.553 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f98 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:05:19.554 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f99 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:05:19.555 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 2f9a Validating new block with num trans = [1]" +"2019-09-24 01:05:19.555 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2f9b ValidateAndPrepareBatch() for block number = [5]" +"2019-09-24 01:05:19.556 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2f9c preprocessing ProtoBlock..." +"2019-09-24 01:05:19.556 UTC [valimpl] preprocessProtoBlock -> DEBU 2f9d txType=ENDORSER_TRANSACTION" +"2019-09-24 01:05:19.557 UTC [stateleveldb] GetState -> DEBU 2f9e GetState(). ns=exp02, key=a" +"2019-09-24 01:05:19.558 UTC [statebasedval] validateKVRead -> DEBU 2f9f Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-09-24 01:05:19.558 UTC [stateleveldb] GetState -> DEBU 2fa0 GetState(). ns=exp02, key=b" +"2019-09-24 01:05:19.559 UTC [statebasedval] validateKVRead -> DEBU 2fa1 Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0}" +"2019-09-24 01:05:19.559 UTC [stateleveldb] GetState -> DEBU 2fa2 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:19.560 UTC [statebasedval] validateKVRead -> DEBU 2fa3 Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0}" +"2019-09-24 01:05:19.560 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 2fa4 Block [5] Transaction index [0] TxId [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] marked as valid by state validator" +"2019-09-24 01:05:19.560 UTC [valinternal] ApplyWriteSet -> DEBU 2fa5 txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0032ee200), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0032ee240)}" +"2019-09-24 01:05:19.560 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa6 validating rwset..." +"2019-09-24 01:05:19.561 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa7 postprocessing ProtoBlock..." +"2019-09-24 01:05:19.561 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 2fa8 ValidateAndPrepareBatch() complete" +"2019-09-24 01:05:19.561 UTC [kvledger] CommitWithPvtData -> DEBU 2fa9 [businesschannel] Adding CommitHash to the block [5]" +"2019-09-24 01:05:19.561 UTC [kvledger] CommitWithPvtData -> DEBU 2faa [businesschannel] Committing block [5] to storage" +"2019-09-24 01:05:19.561 UTC [ledgerstorage] CommitWithPvtData -> DEBU 2fab Writing block [5] to pvt block store" +"2019-09-24 01:05:19.563 UTC [pvtdatastorage] Prepare -> DEBU 2fac Saved 0 private data write sets for block [5]" +"2019-09-24 01:05:19.565 UTC [fsblkstorage] indexBlock -> DEBU 2fad Indexing block [blockNum=5, blockHash=[]byte{0x2, 0x38, 0x9e, 0x59, 0xf8, 0xbb, 0xfc, 0xc, 0x7e, 0x52, 0x39, 0x78, 0x2b, 0xad, 0x5f, 0x4b, 0x3f, 0x3f, 0x8b, 0x94, 0xc6, 0x52, 0x18, 0x85, 0x20, 0x20, 0xfd, 0x31, 0xe0, 0x3f, 0x7c, 0xb2} txOffsets= +txId=074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5 locPointer=offset=70, bytesLength=2978 +]" +"2019-09-24 01:05:19.565 UTC [fsblkstorage] indexBlock -> DEBU 2fae Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2978] for tx ID: [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] to txid-index" +"2019-09-24 01:05:19.566 UTC [fsblkstorage] indexBlock -> DEBU 2faf Adding txLoc [fileSuffixNum=0, offset=85487, bytesLength=2978] for tx number:[0] ID: [074b53118ff54809f18d1e7ae4cf233d164bef6aba461b6f746949390d2797c5] to blockNumTranNum index" +"2019-09-24 01:05:19.568 UTC [fsblkstorage] updateCheckpoint -> DEBU 2fb0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89438], isChainEmpty=[false], lastBlockNumber=[5]" +"2019-09-24 01:05:19.568 UTC [pvtdatastorage] Commit -> DEBU 2fb1 Committing private data for block [5]" +"2019-09-24 01:05:19.571 UTC [pvtdatastorage] Commit -> DEBU 2fb2 Committed private data for block [5]" +"2019-09-24 01:05:19.572 UTC [kvledger] CommitWithPvtData -> DEBU 2fb3 [businesschannel] Committing block [5] transactions to state database" +"2019-09-24 01:05:19.572 UTC [lockbasedtxmgr] Commit -> DEBU 2fb4 lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:05:19.573 UTC [lockbasedtxmgr] Commit -> DEBU 2fb5 Committing updates to state database" +"2019-09-24 01:05:19.573 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 2fb6 Building the expiry schedules based on the update batch" +"2019-09-24 01:05:19.574 UTC [lockbasedtxmgr] Commit -> DEBU 2fb7 Write lock acquired for committing updates to state database" +"2019-09-24 01:05:19.574 UTC [stateleveldb] ApplyUpdates -> DEBU 2fb8 Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}]" +"2019-09-24 01:05:19.574 UTC [stateleveldb] ApplyUpdates -> DEBU 2fb9 Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}]" +"2019-09-24 01:05:19.577 UTC [lockbasedtxmgr] Commit -> DEBU 2fba Updates committed to state database and the write lock is released" +"2019-09-24 01:05:19.577 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2fbb Preparing potential purge list working-set for expiringAtBlk [6]" +"2019-09-24 01:05:19.577 UTC [lockbasedtxmgr] func1 -> DEBU 2fbc launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:05:19.578 UTC [kvledger] CommitWithPvtData -> DEBU 2fbd [businesschannel] Committing block [5] transactions to history database" +"2019-09-24 01:05:19.578 UTC [historyleveldb] Commit -> DEBU 2fbe Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions" +"2019-09-24 01:05:19.579 UTC [leveldbhelper] GetIterator -> DEBU 2fbf Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}]" +"2019-09-24 01:05:19.579 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 2fc0 No expiry entry found for expiringAtBlk [6]" +"2019-09-24 01:05:19.580 UTC [historyleveldb] Commit -> DEBU 2fc1 Channel [businesschannel]: Updates committed to history database for blockNo [5]" +"2019-09-24 01:05:19.580 UTC [kvledger] CommitWithPvtData -> INFO 2fc2 [businesschannel] Committed block [5] with 1 transaction(s) in 28ms (state_validation=8ms block_and_pvtdata_commit=10ms state_commit=5ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489]" +"2019-09-24 01:05:19.581 UTC [msp] GetDefaultSigningIdentity -> DEBU 2fc3 Obtaining default signing identity" +"2019-09-24 01:05:19.581 UTC [msp.identity] Sign -> DEBU 2fc4 Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08061A0C0A0565787030321203312E30 " +"2019-09-24 01:05:19.581 UTC [msp.identity] Sign -> DEBU 2fc5 Sign: digest: 810F2CBA538FA6975E1660120DFFD82B522CC04EB0782A0EF140C1DE3868EBEA " +"2019-09-24 01:05:19.582 UTC [gossip.state] commitBlock -> DEBU 2fc6 [businesschannel] Committed block [5] with 1 transaction(s)" +"2019-09-24 01:05:19.858 UTC [endorser] ProcessProposal -> DEBU 2fc7 Entering: request from 172.18.0.5:49938" +"2019-09-24 01:05:19.858 UTC [protoutils] ValidateProposalMessage -> DEBU 2fc8 ValidateProposalMessage starts for signed proposal 0xc0029aa8c0" +"2019-09-24 01:05:19.858 UTC [protoutils] validateChannelHeader -> DEBU 2fc9 validateChannelHeader info: header type 3" +"2019-09-24 01:05:19.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fca begin" +"2019-09-24 01:05:19.858 UTC [msp] GetManagerForChain -> DEBU 2fcb Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:19.858 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fcc creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:19.859 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fcd creator is valid" +"2019-09-24 01:05:19.859 UTC [msp.identity] Verify -> DEBU 2fce Verify: digest = 00000000 4d b6 9e 09 46 b0 bd 6f c1 fe 16 71 56 6b 8f 62 |M...F..o...qVk.b| +00000010 5b 5f 04 4f 03 97 0b b9 af 6c be d3 cd c4 19 91 |[_.O.....l......|" +"2019-09-24 01:05:19.859 UTC [msp.identity] Verify -> DEBU 2fcf Verify: sig = 00000000 30 45 02 21 00 ef 3e e2 28 27 c9 05 30 d0 7e c0 |0E.!..>.('..0.~.| +00000010 d4 75 77 5c 75 95 c5 ca 85 55 2e 40 7f fe 05 37 |.uw\u....U.@...7| +00000020 d3 0c 77 2e e4 02 20 16 c9 6b 43 9b bc a2 1c f3 |..w... ..kC.....| +00000030 89 59 7a db 76 27 03 7d bb 56 18 aa 39 87 1c 53 |.Yz.v'.}.V..9..S| +00000040 24 9f 5d 98 22 8d 69 |$.].".i|" +"2019-09-24 01:05:19.860 UTC [protoutils] checkSignatureFromCreator -> DEBU 2fd0 exits successfully" +"2019-09-24 01:05:19.860 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2fd1 validateChaincodeProposalMessage starts for proposal 0xc002af9180, header 0xc0029aacd0" +"2019-09-24 01:05:19.860 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 2fd2 validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" " +"2019-09-24 01:05:19.860 UTC [endorser] preProcess -> DEBU 2fd3 [businesschannel][ed0f3f8c] processing txid: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065" +"2019-09-24 01:05:19.861 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 2fd4 retrieveTransactionByID() - txId = [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +"2019-09-24 01:05:19.861 UTC [aclmgmt] CheckACL -> DEBU 2fd5 acl policy /Channel/Application/Writers found in config for resource peer/Propose" +"2019-09-24 01:05:19.861 UTC [aclmgmt] CheckACL -> DEBU 2fd6 acl check(/Channel/Application/Writers)" +"2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:19.862 UTC [policies] Evaluate -> DEBU 2fd9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2019-09-24 01:05:19.863 UTC [cauthdsl] func1 -> DEBU 2fda 0xc0039c7a80 gate 1569287119863427200 evaluation starts" +"2019-09-24 01:05:19.863 UTC [cauthdsl] func2 -> DEBU 2fdb 0xc0039c7a80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:19.863 UTC [cauthdsl] func2 -> DEBU 2fdc 0xc0039c7a80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:19.864 UTC [cauthdsl] func2 -> DEBU 2fdd 0xc0039c7a80 principal matched by identity 0" +"2019-09-24 01:05:19.864 UTC [msp.identity] Verify -> DEBU 2fde Verify: digest = 00000000 4d b6 9e 09 46 b0 bd 6f c1 fe 16 71 56 6b 8f 62 |M...F..o...qVk.b| +00000010 5b 5f 04 4f 03 97 0b b9 af 6c be d3 cd c4 19 91 |[_.O.....l......|" +"2019-09-24 01:05:19.864 UTC [msp.identity] Verify -> DEBU 2fdf Verify: sig = 00000000 30 45 02 21 00 ef 3e e2 28 27 c9 05 30 d0 7e c0 |0E.!..>.('..0.~.| +00000010 d4 75 77 5c 75 95 c5 ca 85 55 2e 40 7f fe 05 37 |.uw\u....U.@...7| +00000020 d3 0c 77 2e e4 02 20 16 c9 6b 43 9b bc a2 1c f3 |..w... ..kC.....| +00000030 89 59 7a db 76 27 03 7d bb 56 18 aa 39 87 1c 53 |.Yz.v'.}.V..9..S| +00000040 24 9f 5d 98 22 8d 69 |$.].".i|" +"2019-09-24 01:05:19.865 UTC [cauthdsl] func2 -> DEBU 2fe0 0xc0039c7a80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:19.865 UTC [cauthdsl] func1 -> DEBU 2fe1 0xc0039c7a80 gate 1569287119863427200 evaluation succeeds" +"2019-09-24 01:05:19.865 UTC [policies] Evaluate -> DEBU 2fe2 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe4 Signature set satisfies policy /Channel/Application/Writers" +"2019-09-24 01:05:19.866 UTC [policies] Evaluate -> DEBU 2fe5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2019-09-24 01:05:19.866 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 2fe6 constructing new tx simulator" +"2019-09-24 01:05:19.866 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 2fe7 constructing new tx simulator txid = [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +"2019-09-24 01:05:19.867 UTC [endorser] SimulateProposal -> DEBU 2fe8 [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:19.867 UTC [stateleveldb] GetState -> DEBU 2fe9 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:19.867 UTC [ccprovider] GetChaincodeData -> DEBU 2fea Getting chaincode data for from cache" +"2019-09-24 01:05:19.868 UTC [endorser] callChaincode -> INFO 2feb [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:19.868 UTC [chaincode] Execute -> DEBU 2fec Entry" +"2019-09-24 01:05:19.869 UTC [chaincode] handleMessage -> DEBU 2fed [ed0f3f8c] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:19.870 UTC [chaincode] HandleTransaction -> DEBU 2fee [ed0f3f8c] handling GET_STATE from chaincode" +"2019-09-24 01:05:19.870 UTC [chaincode] HandleGetState -> DEBU 2fef [ed0f3f8c] getting state for chaincode exp02, key a, channel businesschannel" +"2019-09-24 01:05:19.870 UTC [stateleveldb] GetState -> DEBU 2ff0 GetState(). ns=exp02, key=a" +"2019-09-24 01:05:19.870 UTC [chaincode] HandleTransaction -> DEBU 2ff1 [ed0f3f8c] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:19.871 UTC [chaincode] handleMessage -> DEBU 2ff2 [ed0f3f8c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:19.871 UTC [chaincode] Notify -> DEBU 2ff3 [ed0f3f8c] notifying Txid:ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, channelID:businesschannel" +"2019-09-24 01:05:19.872 UTC [chaincode] Execute -> DEBU 2ff4 Exit" +"2019-09-24 01:05:19.872 UTC [endorser] callChaincode -> INFO 2ff5 [businesschannel][ed0f3f8c] Exit chaincode: name:"exp02" (4ms)" +"2019-09-24 01:05:19.872 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 2ff6 Simulation completed, getting simulation results" +"2019-09-24 01:05:19.872 UTC [lockbasedtxmgr] Done -> DEBU 2ff7 Done with transaction simulation / query execution [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +"2019-09-24 01:05:19.873 UTC [endorser] SimulateProposal -> DEBU 2ff8 [businesschannel][ed0f3f8c] Exit" +"2019-09-24 01:05:19.873 UTC [endorser] endorseProposal -> DEBU 2ff9 [businesschannel][ed0f3f8c] Entry chaincode: name:"exp02" " +"2019-09-24 01:05:19.873 UTC [endorser] endorseProposal -> DEBU 2ffa [businesschannel][ed0f3f8c] escc for chaincode name:"exp02" is escc" +"2019-09-24 01:05:19.874 UTC [endorser] EndorseWithPlugin -> DEBU 2ffb Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, chaincode: exp02}" +"2019-09-24 01:05:19.874 UTC [msp.identity] Sign -> DEBU 2ffc Sign: plaintext: 0A20C3D903405A88BE10665DC49331A5...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:19.874 UTC [msp.identity] Sign -> DEBU 2ffd Sign: digest: 97E99B0967D2BA5008C1566C920C893C0988011221F545ED7584BB22DB90DEE9 " +"2019-09-24 01:05:19.874 UTC [endorser] EndorseWithPlugin -> DEBU 2ffe Exiting {plugin: escc, channel: businesschannel, tx: ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065, chaincode: exp02}" +"2019-09-24 01:05:19.874 UTC [endorser] endorseProposal -> DEBU 2fff [businesschannel][ed0f3f8c] Exit" +"2019-09-24 01:05:19.875 UTC [lockbasedtxmgr] Done -> DEBU 3000 Done with transaction simulation / query execution [ed0f3f8c068705c32b9c022670b545524870f060d5d39e8614b0c51cb9269065]" +"2019-09-24 01:05:19.875 UTC [endorser] func1 -> DEBU 3001 Exit: request from 172.18.0.5:49938" +"2019-09-24 01:05:19.876 UTC [comm.grpc.server] 1 -> INFO 3002 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49938 grpc.code=OK grpc.call_duration=18.2578ms +"2019-09-24 01:05:19.879 UTC [grpc] warningf -> DEBU 3003 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49938: read: connection reset by peer" +"2019-09-24 01:05:19.880 UTC [grpc] infof -> DEBU 3004 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:19.881 UTC [grpc] infof -> DEBU 3005 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.300 UTC [endorser] ProcessProposal -> DEBU 3006 Entering: request from 172.18.0.5:49942" +"2019-09-24 01:05:20.300 UTC [protoutils] ValidateProposalMessage -> DEBU 3007 ValidateProposalMessage starts for signed proposal 0xc002aee1e0" +"2019-09-24 01:05:20.300 UTC [protoutils] validateChannelHeader -> DEBU 3008 validateChannelHeader info: header type 3" +"2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 3009 begin" +"2019-09-24 01:05:20.301 UTC [msp] GetManagerForChain -> DEBU 300a Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 300b creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:20.301 UTC [protoutils] checkSignatureFromCreator -> DEBU 300c creator is valid" +"2019-09-24 01:05:20.302 UTC [msp.identity] Verify -> DEBU 300d Verify: digest = 00000000 fe ec a9 fd 65 7a 3b 1a d1 9f e4 b4 4f d2 d6 6f |....ez;.....O..o| +00000010 23 1b 4c 74 97 ad fb 10 b5 8f f5 be 59 f0 aa ff |#.Lt........Y...|" +"2019-09-24 01:05:20.302 UTC [msp.identity] Verify -> DEBU 300e Verify: sig = 00000000 30 45 02 21 00 ad 5d 28 02 50 f7 a6 99 0a e6 c5 |0E.!..](.P......| +00000010 b6 2c ae 13 d8 03 f0 9e 72 a4 f5 9a 58 66 4a b1 |.,......r...XfJ.| +00000020 d8 2e f2 a1 d7 02 20 7a 25 f1 49 c2 03 71 2b 31 |...... z%.I..q+1| +00000030 ef 0f cd d7 ad 0c a9 15 46 dd 03 f4 2a 6b 07 3f |........F...*k.?| +00000040 80 61 f0 dc 14 36 18 |.a...6.|" +"2019-09-24 01:05:20.302 UTC [protoutils] checkSignatureFromCreator -> DEBU 300f exits successfully" +"2019-09-24 01:05:20.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3010 validateChaincodeProposalMessage starts for proposal 0xc000244620, header 0xc002aee690" +"2019-09-24 01:05:20.302 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3011 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:05:20.303 UTC [endorser] preProcess -> DEBU 3012 [businesschannel][69107929] processing txid: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803" +"2019-09-24 01:05:20.303 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3013 retrieveTransactionByID() - txId = [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +"2019-09-24 01:05:20.303 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3014 constructing new tx simulator" +"2019-09-24 01:05:20.303 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3015 constructing new tx simulator txid = [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +"2019-09-24 01:05:20.303 UTC [endorser] SimulateProposal -> DEBU 3016 [businesschannel][69107929] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.304 UTC [endorser] callChaincode -> INFO 3017 [businesschannel][69107929] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.304 UTC [chaincode] Execute -> DEBU 3018 Entry" +"2019-09-24 01:05:20.304 UTC [aclmgmt] CheckACL -> DEBU 3019 acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists" +"2019-09-24 01:05:20.304 UTC [aclmgmt] CheckACL -> DEBU 301a acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:20.304 UTC [policies] Evaluate -> DEBU 301b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:20.304 UTC [policies] Evaluate -> DEBU 301c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:20.305 UTC [policies] Evaluate -> DEBU 301d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:20.305 UTC [cauthdsl] func1 -> DEBU 301e 0xc003e247e0 gate 1569287120305354800 evaluation starts" +"2019-09-24 01:05:20.305 UTC [cauthdsl] func2 -> DEBU 301f 0xc003e247e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3020 0xc003e247e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3021 0xc003e247e0 principal matched by identity 0" +"2019-09-24 01:05:20.306 UTC [msp.identity] Verify -> DEBU 3022 Verify: digest = 00000000 fe ec a9 fd 65 7a 3b 1a d1 9f e4 b4 4f d2 d6 6f |....ez;.....O..o| +00000010 23 1b 4c 74 97 ad fb 10 b5 8f f5 be 59 f0 aa ff |#.Lt........Y...|" +"2019-09-24 01:05:20.306 UTC [msp.identity] Verify -> DEBU 3023 Verify: sig = 00000000 30 45 02 21 00 ad 5d 28 02 50 f7 a6 99 0a e6 c5 |0E.!..](.P......| +00000010 b6 2c ae 13 d8 03 f0 9e 72 a4 f5 9a 58 66 4a b1 |.,......r...XfJ.| +00000020 d8 2e f2 a1 d7 02 20 7a 25 f1 49 c2 03 71 2b 31 |...... z%.I..q+1| +00000030 ef 0f cd d7 ad 0c a9 15 46 dd 03 f4 2a 6b 07 3f |........F...*k.?| +00000040 80 61 f0 dc 14 36 18 |.a...6.|" +"2019-09-24 01:05:20.306 UTC [cauthdsl] func2 -> DEBU 3024 0xc003e247e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:20.306 UTC [cauthdsl] func1 -> DEBU 3025 0xc003e247e0 gate 1569287120305354800 evaluation succeeds" +"2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3026 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3027 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3028 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:20.307 UTC [policies] Evaluate -> DEBU 3029 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:20.307 UTC [chaincode] handleMessage -> DEBU 302a [69107929] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:20.307 UTC [chaincode] HandleTransaction -> DEBU 302b [69107929] handling GET_STATE from chaincode" +"2019-09-24 01:05:20.308 UTC [chaincode] HandleGetState -> DEBU 302c [69107929] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 01:05:20.308 UTC [stateleveldb] GetState -> DEBU 302d GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:20.308 UTC [chaincode] HandleTransaction -> DEBU 302e [69107929] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:20.308 UTC [chaincode] handleMessage -> DEBU 302f [69107929] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:20.308 UTC [chaincode] Notify -> DEBU 3030 [69107929] notifying Txid:69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, channelID:businesschannel" +"2019-09-24 01:05:20.308 UTC [chaincode] Execute -> DEBU 3031 Exit" +"2019-09-24 01:05:20.309 UTC [endorser] callChaincode -> INFO 3032 [businesschannel][69107929] Exit chaincode: name:"lscc" (5ms)" +"2019-09-24 01:05:20.309 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3033 Simulation completed, getting simulation results" +"2019-09-24 01:05:20.309 UTC [lockbasedtxmgr] Done -> DEBU 3034 Done with transaction simulation / query execution [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +"2019-09-24 01:05:20.309 UTC [endorser] SimulateProposal -> DEBU 3035 [businesschannel][69107929] Exit" +"2019-09-24 01:05:20.309 UTC [endorser] endorseProposal -> DEBU 3036 [businesschannel][69107929] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.309 UTC [endorser] endorseProposal -> DEBU 3037 [businesschannel][69107929] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:20.310 UTC [endorser] EndorseWithPlugin -> DEBU 3038 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, chaincode: lscc}" +"2019-09-24 01:05:20.310 UTC [msp.identity] Sign -> DEBU 3039 Sign: plaintext: 0A201CCDCB180894C1BCE7C0B8CABB82...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:20.310 UTC [msp.identity] Sign -> DEBU 303a Sign: digest: 7CC02B5440B53FF9B3A5A9B8F3153933F717B7069B7CA2ABE0786044315F3748 " +"2019-09-24 01:05:20.311 UTC [endorser] EndorseWithPlugin -> DEBU 303b Exiting {plugin: escc, channel: businesschannel, tx: 69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803, chaincode: lscc}" +"2019-09-24 01:05:20.311 UTC [endorser] endorseProposal -> DEBU 303c [businesschannel][69107929] Exit" +"2019-09-24 01:05:20.311 UTC [lockbasedtxmgr] Done -> DEBU 303d Done with transaction simulation / query execution [69107929fc2784f9ef18fc0036e401a6be9d7ece479cbb06dfd19a40d5d89803]" +"2019-09-24 01:05:20.312 UTC [endorser] func1 -> DEBU 303e Exit: request from 172.18.0.5:49942" +"2019-09-24 01:05:20.312 UTC [comm.grpc.server] 1 -> INFO 303f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49942 grpc.code=OK grpc.call_duration=11.8406ms +"2019-09-24 01:05:20.316 UTC [grpc] infof -> DEBU 3040 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.316 UTC [grpc] warningf -> DEBU 3041 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49942: read: connection reset by peer" +"2019-09-24 01:05:20.316 UTC [grpc] infof -> DEBU 3042 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.480 UTC [endorser] ProcessProposal -> DEBU 3043 Entering: request from 172.18.0.5:49946" +"2019-09-24 01:05:20.480 UTC [protoutils] ValidateProposalMessage -> DEBU 3044 ValidateProposalMessage starts for signed proposal 0xc002b243c0" +"2019-09-24 01:05:20.480 UTC [protoutils] validateChannelHeader -> DEBU 3045 validateChannelHeader info: header type 3" +"2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3046 begin" +"2019-09-24 01:05:20.480 UTC [msp] GetManagerForChain -> DEBU 3047 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3048 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:20.480 UTC [protoutils] checkSignatureFromCreator -> DEBU 3049 creator is valid" +"2019-09-24 01:05:20.481 UTC [msp.identity] Verify -> DEBU 304a Verify: digest = 00000000 d8 e1 a5 77 01 dd 6f f6 ec 58 33 e8 ec c4 5a 91 |...w..o..X3...Z.| +00000010 3c b3 af 30 b4 0f 11 8b 65 73 34 d1 c3 99 30 e2 |<..0....es4...0.|" +"2019-09-24 01:05:20.481 UTC [msp.identity] Verify -> DEBU 304b Verify: sig = 00000000 30 45 02 21 00 c7 a5 64 bd 95 4e 1a a7 00 2c a6 |0E.!...d..N...,.| +00000010 2e af 68 20 d7 d1 84 12 c6 77 bc 50 5f 88 65 c0 |..h .....w.P_.e.| +00000020 09 1a 49 a4 ff 02 20 23 70 1f 39 67 0d bd 1a cc |..I... #p.9g....| +00000030 ee 7f 9a fb 11 dd be 3b 25 4e d1 d0 e5 9e fb 63 |.......;%N.....c| +00000040 1b 06 a2 f5 f5 5f 0f |....._.|" +"2019-09-24 01:05:20.482 UTC [protoutils] checkSignatureFromCreator -> DEBU 304c exits successfully" +"2019-09-24 01:05:20.482 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304d validateChaincodeProposalMessage starts for proposal 0xc002af9810, header 0xc002b247d0" +"2019-09-24 01:05:20.482 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 304e validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:05:20.483 UTC [endorser] preProcess -> DEBU 304f [businesschannel][16316b13] processing txid: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376" +"2019-09-24 01:05:20.484 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3050 retrieveTransactionByID() - txId = [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +"2019-09-24 01:05:20.484 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3051 constructing new tx simulator" +"2019-09-24 01:05:20.484 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3052 constructing new tx simulator txid = [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +"2019-09-24 01:05:20.484 UTC [endorser] SimulateProposal -> DEBU 3053 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.485 UTC [endorser] callChaincode -> INFO 3054 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.485 UTC [chaincode] Execute -> DEBU 3055 Entry" +"2019-09-24 01:05:20.485 UTC [aclmgmt] CheckACL -> DEBU 3056 acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec" +"2019-09-24 01:05:20.485 UTC [aclmgmt] CheckACL -> DEBU 3057 acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 3058 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 3059 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:20.486 UTC [policies] Evaluate -> DEBU 305a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:20.486 UTC [cauthdsl] func1 -> DEBU 305b 0xc002833c20 gate 1569287120486470900 evaluation starts" +"2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305c 0xc002833c20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305d 0xc002833c20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:20.486 UTC [cauthdsl] func2 -> DEBU 305e 0xc002833c20 principal matched by identity 0" +"2019-09-24 01:05:20.487 UTC [msp.identity] Verify -> DEBU 305f Verify: digest = 00000000 d8 e1 a5 77 01 dd 6f f6 ec 58 33 e8 ec c4 5a 91 |...w..o..X3...Z.| +00000010 3c b3 af 30 b4 0f 11 8b 65 73 34 d1 c3 99 30 e2 |<..0....es4...0.|" +"2019-09-24 01:05:20.487 UTC [msp.identity] Verify -> DEBU 3060 Verify: sig = 00000000 30 45 02 21 00 c7 a5 64 bd 95 4e 1a a7 00 2c a6 |0E.!...d..N...,.| +00000010 2e af 68 20 d7 d1 84 12 c6 77 bc 50 5f 88 65 c0 |..h .....w.P_.e.| +00000020 09 1a 49 a4 ff 02 20 23 70 1f 39 67 0d bd 1a cc |..I... #p.9g....| +00000030 ee 7f 9a fb 11 dd be 3b 25 4e d1 d0 e5 9e fb 63 |.......;%N.....c| +00000040 1b 06 a2 f5 f5 5f 0f |....._.|" +"2019-09-24 01:05:20.487 UTC [cauthdsl] func2 -> DEBU 3061 0xc002833c20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:20.487 UTC [cauthdsl] func1 -> DEBU 3062 0xc002833c20 gate 1569287120486470900 evaluation succeeds" +"2019-09-24 01:05:20.487 UTC [policies] Evaluate -> DEBU 3063 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3064 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3065 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:20.488 UTC [policies] Evaluate -> DEBU 3066 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:20.488 UTC [chaincode] handleMessage -> DEBU 3067 [16316b13] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:20.488 UTC [chaincode] HandleTransaction -> DEBU 3068 [16316b13] handling GET_STATE from chaincode" +"2019-09-24 01:05:20.489 UTC [chaincode] HandleGetState -> DEBU 3069 [16316b13] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 01:05:20.490 UTC [stateleveldb] GetState -> DEBU 306a GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:20.490 UTC [chaincode] HandleTransaction -> DEBU 306b [16316b13] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:20.490 UTC [chaincode] handleMessage -> DEBU 306c [16316b13] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:20.491 UTC [chaincode] Notify -> DEBU 306d [16316b13] notifying Txid:16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, channelID:businesschannel" +"2019-09-24 01:05:20.491 UTC [chaincode] Execute -> DEBU 306e Exit" +"2019-09-24 01:05:20.491 UTC [endorser] callChaincode -> INFO 306f [businesschannel][16316b13] Exit chaincode: name:"lscc" (6ms)" +"2019-09-24 01:05:20.492 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3070 Simulation completed, getting simulation results" +"2019-09-24 01:05:20.492 UTC [lockbasedtxmgr] Done -> DEBU 3071 Done with transaction simulation / query execution [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +"2019-09-24 01:05:20.492 UTC [endorser] SimulateProposal -> DEBU 3072 [businesschannel][16316b13] Exit" +"2019-09-24 01:05:20.492 UTC [endorser] endorseProposal -> DEBU 3073 [businesschannel][16316b13] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.492 UTC [endorser] endorseProposal -> DEBU 3074 [businesschannel][16316b13] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:20.493 UTC [endorser] EndorseWithPlugin -> DEBU 3075 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, chaincode: lscc}" +"2019-09-24 01:05:20.493 UTC [msp.identity] Sign -> DEBU 3076 Sign: plaintext: 0A20EFCC11FE0B3CC76D1599E2889F7E...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:20.493 UTC [msp.identity] Sign -> DEBU 3077 Sign: digest: E3BA4759F793AFA02B25E29545094F90D26753B0A2ECAFE6DA0C2F48BB5B6C2B " +"2019-09-24 01:05:20.494 UTC [endorser] EndorseWithPlugin -> DEBU 3078 Exiting {plugin: escc, channel: businesschannel, tx: 16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376, chaincode: lscc}" +"2019-09-24 01:05:20.494 UTC [endorser] endorseProposal -> DEBU 3079 [businesschannel][16316b13] Exit" +"2019-09-24 01:05:20.494 UTC [lockbasedtxmgr] Done -> DEBU 307a Done with transaction simulation / query execution [16316b1362ff52a8a44b381e5e0ec87ac9473728efd3437ffce442cc1f04b376]" +"2019-09-24 01:05:20.494 UTC [endorser] func1 -> DEBU 307b Exit: request from 172.18.0.5:49946" +"2019-09-24 01:05:20.495 UTC [comm.grpc.server] 1 -> INFO 307c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49946 grpc.code=OK grpc.call_duration=15.2356ms +"2019-09-24 01:05:20.497 UTC [grpc] warningf -> DEBU 307d transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49946: read: connection reset by peer" +"2019-09-24 01:05:20.498 UTC [grpc] infof -> DEBU 307e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.498 UTC [grpc] infof -> DEBU 307f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.658 UTC [endorser] ProcessProposal -> DEBU 3080 Entering: request from 172.18.0.5:49950" +"2019-09-24 01:05:20.658 UTC [protoutils] ValidateProposalMessage -> DEBU 3081 ValidateProposalMessage starts for signed proposal 0xc002aef680" +"2019-09-24 01:05:20.658 UTC [protoutils] validateChannelHeader -> DEBU 3082 validateChannelHeader info: header type 3" +"2019-09-24 01:05:20.659 UTC [protoutils] checkSignatureFromCreator -> DEBU 3083 begin" +"2019-09-24 01:05:20.659 UTC [msp] GetManagerForChain -> DEBU 3084 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:20.659 UTC [protoutils] checkSignatureFromCreator -> DEBU 3085 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:20.660 UTC [protoutils] checkSignatureFromCreator -> DEBU 3086 creator is valid" +"2019-09-24 01:05:20.660 UTC [msp.identity] Verify -> DEBU 3087 Verify: digest = 00000000 25 96 67 53 0a 19 e6 68 7c 37 fc 1e 61 f5 9b d2 |%.gS...h|7..a...| +00000010 57 e8 53 fa 7f 5e 66 b8 ce e3 ec a3 13 a4 23 36 |W.S..^f.......#6|" +"2019-09-24 01:05:20.660 UTC [msp.identity] Verify -> DEBU 3088 Verify: sig = 00000000 30 45 02 21 00 8d f2 97 dc 4f 98 52 02 51 81 97 |0E.!.....O.R.Q..| +00000010 31 12 2d 07 45 8a 26 3c 7d ca 16 06 66 f0 88 a0 |1.-.E.&<}...f...| +00000020 1b f3 44 7c 8b 02 20 14 2e 38 f2 7e 85 ed 0b 70 |..D|.. ..8.~...p| +00000030 16 26 58 fd ab e1 b6 f1 0a c8 f1 08 d2 10 ad f6 |.&X.............| +00000040 46 a7 e5 4e 45 37 e0 |F..NE7.|" +"2019-09-24 01:05:20.661 UTC [protoutils] checkSignatureFromCreator -> DEBU 3089 exits successfully" +"2019-09-24 01:05:20.661 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 308a validateChaincodeProposalMessage starts for proposal 0xc000244bd0, header 0xc002aefae0" +"2019-09-24 01:05:20.661 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 308b validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:05:20.662 UTC [endorser] preProcess -> DEBU 308c [businesschannel][ed81ee94] processing txid: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab" +"2019-09-24 01:05:20.662 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 308d retrieveTransactionByID() - txId = [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +"2019-09-24 01:05:20.662 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 308e constructing new tx simulator" +"2019-09-24 01:05:20.662 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 308f constructing new tx simulator txid = [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +"2019-09-24 01:05:20.663 UTC [endorser] SimulateProposal -> DEBU 3090 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.663 UTC [endorser] callChaincode -> INFO 3091 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.664 UTC [chaincode] Execute -> DEBU 3092 Entry" +"2019-09-24 01:05:20.664 UTC [aclmgmt] CheckACL -> DEBU 3093 acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData" +"2019-09-24 01:05:20.664 UTC [aclmgmt] CheckACL -> DEBU 3094 acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3095 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3096 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:20.665 UTC [policies] Evaluate -> DEBU 3097 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:20.665 UTC [cauthdsl] func1 -> DEBU 3098 0xc003dda880 gate 1569287120665852600 evaluation starts" +"2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 3099 0xc003dda880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 309a 0xc003dda880 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:20.666 UTC [cauthdsl] func2 -> DEBU 309b 0xc003dda880 principal matched by identity 0" +"2019-09-24 01:05:20.666 UTC [msp.identity] Verify -> DEBU 309c Verify: digest = 00000000 25 96 67 53 0a 19 e6 68 7c 37 fc 1e 61 f5 9b d2 |%.gS...h|7..a...| +00000010 57 e8 53 fa 7f 5e 66 b8 ce e3 ec a3 13 a4 23 36 |W.S..^f.......#6|" +"2019-09-24 01:05:20.667 UTC [msp.identity] Verify -> DEBU 309d Verify: sig = 00000000 30 45 02 21 00 8d f2 97 dc 4f 98 52 02 51 81 97 |0E.!.....O.R.Q..| +00000010 31 12 2d 07 45 8a 26 3c 7d ca 16 06 66 f0 88 a0 |1.-.E.&<}...f...| +00000020 1b f3 44 7c 8b 02 20 14 2e 38 f2 7e 85 ed 0b 70 |..D|.. ..8.~...p| +00000030 16 26 58 fd ab e1 b6 f1 0a c8 f1 08 d2 10 ad f6 |.&X.............| +00000040 46 a7 e5 4e 45 37 e0 |F..NE7.|" +"2019-09-24 01:05:20.667 UTC [cauthdsl] func2 -> DEBU 309e 0xc003dda880 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:20.667 UTC [cauthdsl] func1 -> DEBU 309f 0xc003dda880 gate 1569287120665852600 evaluation succeeds" +"2019-09-24 01:05:20.667 UTC [policies] Evaluate -> DEBU 30a0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:20.668 UTC [policies] Evaluate -> DEBU 30a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:20.668 UTC [chaincode] handleMessage -> DEBU 30a4 [ed81ee94] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready" +"2019-09-24 01:05:20.669 UTC [chaincode] HandleTransaction -> DEBU 30a5 [ed81ee94] handling GET_STATE from chaincode" +"2019-09-24 01:05:20.669 UTC [chaincode] HandleGetState -> DEBU 30a6 [ed81ee94] getting state for chaincode lscc, key exp02, channel businesschannel" +"2019-09-24 01:05:20.670 UTC [stateleveldb] GetState -> DEBU 30a7 GetState(). ns=lscc, key=exp02" +"2019-09-24 01:05:20.670 UTC [chaincode] HandleTransaction -> DEBU 30a8 [ed81ee94] Completed GET_STATE. Sending RESPONSE" +"2019-09-24 01:05:20.671 UTC [chaincode] handleMessage -> DEBU 30a9 [ed81ee94] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:20.671 UTC [chaincode] Notify -> DEBU 30aa [ed81ee94] notifying Txid:ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, channelID:businesschannel" +"2019-09-24 01:05:20.671 UTC [chaincode] Execute -> DEBU 30ab Exit" +"2019-09-24 01:05:20.671 UTC [endorser] callChaincode -> INFO 30ac [businesschannel][ed81ee94] Exit chaincode: name:"lscc" (8ms)" +"2019-09-24 01:05:20.672 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 30ad Simulation completed, getting simulation results" +"2019-09-24 01:05:20.672 UTC [lockbasedtxmgr] Done -> DEBU 30ae Done with transaction simulation / query execution [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +"2019-09-24 01:05:20.672 UTC [endorser] SimulateProposal -> DEBU 30af [businesschannel][ed81ee94] Exit" +"2019-09-24 01:05:20.672 UTC [endorser] endorseProposal -> DEBU 30b0 [businesschannel][ed81ee94] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.672 UTC [endorser] endorseProposal -> DEBU 30b1 [businesschannel][ed81ee94] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:20.672 UTC [endorser] EndorseWithPlugin -> DEBU 30b2 Entering endorsement for {plugin: escc, channel: businesschannel, tx: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, chaincode: lscc}" +"2019-09-24 01:05:20.673 UTC [msp.identity] Sign -> DEBU 30b3 Sign: plaintext: 0A20A31DD82FD6C5645C384F7B126293...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:20.673 UTC [msp.identity] Sign -> DEBU 30b4 Sign: digest: EBAA872D3F2FD8E72CF24B01155D15B33669267008AA4CCB1A0D6E48AEB0C0C5 " +"2019-09-24 01:05:20.673 UTC [endorser] EndorseWithPlugin -> DEBU 30b5 Exiting {plugin: escc, channel: businesschannel, tx: ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab, chaincode: lscc}" +"2019-09-24 01:05:20.673 UTC [endorser] endorseProposal -> DEBU 30b6 [businesschannel][ed81ee94] Exit" +"2019-09-24 01:05:20.673 UTC [lockbasedtxmgr] Done -> DEBU 30b7 Done with transaction simulation / query execution [ed81ee94ef6ad1aea19db92bc8d9c71f06957599f4a982e3884a84369cedebab]" +"2019-09-24 01:05:20.674 UTC [endorser] func1 -> DEBU 30b8 Exit: request from 172.18.0.5:49950" +"2019-09-24 01:05:20.674 UTC [comm.grpc.server] 1 -> INFO 30b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49950 grpc.code=OK grpc.call_duration=16.2876ms +"2019-09-24 01:05:20.683 UTC [grpc] infof -> DEBU 30ba transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.683 UTC [grpc] infof -> DEBU 30bb transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.861 UTC [endorser] ProcessProposal -> DEBU 30bc Entering: request from 172.18.0.5:49954" +"2019-09-24 01:05:20.861 UTC [protoutils] ValidateProposalMessage -> DEBU 30bd ValidateProposalMessage starts for signed proposal 0xc002a7a4b0" +"2019-09-24 01:05:20.861 UTC [protoutils] validateChannelHeader -> DEBU 30be validateChannelHeader info: header type 3" +"2019-09-24 01:05:20.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 30bf begin" +"2019-09-24 01:05:20.861 UTC [msp] GetManagerForChain -> DEBU 30c0 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:20.861 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c1 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:20.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c2 creator is valid" +"2019-09-24 01:05:20.862 UTC [msp.identity] Verify -> DEBU 30c3 Verify: digest = 00000000 bd ce cf 31 4d be 2b 1b 24 33 ae d2 4a cd 6f 97 |...1M.+.$3..J.o.| +00000010 14 c6 a5 b9 7b e5 63 6b da 54 13 b9 7f b0 c1 42 |....{.ck.T.....B|" +"2019-09-24 01:05:20.862 UTC [msp.identity] Verify -> DEBU 30c4 Verify: sig = 00000000 30 44 02 20 3a a7 8b 0f f6 bb d0 19 2f fc 2b ae |0D. :......./.+.| +00000010 8d 26 3b bb 86 b0 76 cc 75 79 ad f8 f3 2e 6b 49 |.&;...v.uy....kI| +00000020 af b3 08 9d 02 20 2e f3 33 f3 b4 81 34 8f b2 2f |..... ..3...4../| +00000030 e1 2d 87 6a c4 63 c3 f6 52 77 a7 d5 a5 e9 25 9e |.-.j.c..Rw....%.| +00000040 1e cb 2f 70 d1 c7 |../p..|" +"2019-09-24 01:05:20.862 UTC [protoutils] checkSignatureFromCreator -> DEBU 30c5 exits successfully" +"2019-09-24 01:05:20.863 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30c6 validateChaincodeProposalMessage starts for proposal 0xc0002451f0, header 0xc002a7a8c0" +"2019-09-24 01:05:20.863 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30c7 validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:05:20.863 UTC [endorser] preProcess -> DEBU 30c8 [businesschannel][f9c24047] processing txid: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf" +"2019-09-24 01:05:20.863 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30c9 retrieveTransactionByID() - txId = [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +"2019-09-24 01:05:20.864 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30ca constructing new tx simulator" +"2019-09-24 01:05:20.864 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30cb constructing new tx simulator txid = [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +"2019-09-24 01:05:20.864 UTC [endorser] SimulateProposal -> DEBU 30cc [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.864 UTC [endorser] callChaincode -> INFO 30cd [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.865 UTC [chaincode] Execute -> DEBU 30ce Entry" +"2019-09-24 01:05:20.865 UTC [msp.identity] Verify -> DEBU 30cf Verify: digest = 00000000 bd ce cf 31 4d be 2b 1b 24 33 ae d2 4a cd 6f 97 |...1M.+.$3..J.o.| +00000010 14 c6 a5 b9 7b e5 63 6b da 54 13 b9 7f b0 c1 42 |....{.ck.T.....B|" +"2019-09-24 01:05:20.865 UTC [msp.identity] Verify -> DEBU 30d0 Verify: sig = 00000000 30 44 02 20 3a a7 8b 0f f6 bb d0 19 2f fc 2b ae |0D. :......./.+.| +00000010 8d 26 3b bb 86 b0 76 cc 75 79 ad f8 f3 2e 6b 49 |.&;...v.uy....kI| +00000020 af b3 08 9d 02 20 2e f3 33 f3 b4 81 34 8f b2 2f |..... ..3...4../| +00000030 e1 2d 87 6a c4 63 c3 f6 52 77 a7 d5 a5 e9 25 9e |.-.j.c..Rw....%.| +00000040 1e cb 2f 70 d1 c7 |../p..|" +"2019-09-24 01:05:20.867 UTC [chaincode] handleMessage -> DEBU 30d1 [f9c24047] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:20.867 UTC [chaincode] Notify -> DEBU 30d2 [f9c24047] notifying Txid:f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, channelID:businesschannel" +"2019-09-24 01:05:20.867 UTC [chaincode] Execute -> DEBU 30d3 Exit" +"2019-09-24 01:05:20.867 UTC [endorser] callChaincode -> INFO 30d4 [businesschannel][f9c24047] Exit chaincode: name:"lscc" (2ms)" +"2019-09-24 01:05:20.867 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 30d5 Simulation completed, getting simulation results" +"2019-09-24 01:05:20.867 UTC [lockbasedtxmgr] Done -> DEBU 30d6 Done with transaction simulation / query execution [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +"2019-09-24 01:05:20.868 UTC [endorser] SimulateProposal -> DEBU 30d7 [businesschannel][f9c24047] Exit" +"2019-09-24 01:05:20.868 UTC [endorser] endorseProposal -> DEBU 30d8 [businesschannel][f9c24047] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:20.868 UTC [endorser] endorseProposal -> DEBU 30d9 [businesschannel][f9c24047] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:20.869 UTC [endorser] EndorseWithPlugin -> DEBU 30da Entering endorsement for {plugin: escc, channel: businesschannel, tx: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, chaincode: lscc}" +"2019-09-24 01:05:20.869 UTC [msp.identity] Sign -> DEBU 30db Sign: plaintext: 0A209F91F8F8AA9A4C4625650E37F83E...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:20.869 UTC [msp.identity] Sign -> DEBU 30dc Sign: digest: 1D7D464611905C91C1A144674B60248BF5D2C2F1699723E77BDE442C2E37A1A6 " +"2019-09-24 01:05:20.870 UTC [endorser] EndorseWithPlugin -> DEBU 30dd Exiting {plugin: escc, channel: businesschannel, tx: f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf, chaincode: lscc}" +"2019-09-24 01:05:20.870 UTC [endorser] endorseProposal -> DEBU 30de [businesschannel][f9c24047] Exit" +"2019-09-24 01:05:20.870 UTC [lockbasedtxmgr] Done -> DEBU 30df Done with transaction simulation / query execution [f9c24047c801fc281a1b16b68daec523d9412be890b9b707f7b10f147269dabf]" +"2019-09-24 01:05:20.871 UTC [endorser] func1 -> DEBU 30e0 Exit: request from 172.18.0.5:49954" +"2019-09-24 01:05:20.871 UTC [comm.grpc.server] 1 -> INFO 30e1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49954 grpc.code=OK grpc.call_duration=10.5897ms +"2019-09-24 01:05:20.875 UTC [grpc] infof -> DEBU 30e2 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:20.875 UTC [grpc] infof -> DEBU 30e3 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.034 UTC [endorser] ProcessProposal -> DEBU 30e4 Entering: request from 172.18.0.5:49958" +"2019-09-24 01:05:21.034 UTC [protoutils] ValidateProposalMessage -> DEBU 30e5 ValidateProposalMessage starts for signed proposal 0xc002a7bea0" +"2019-09-24 01:05:21.034 UTC [protoutils] validateChannelHeader -> DEBU 30e6 validateChannelHeader info: header type 3" +"2019-09-24 01:05:21.034 UTC [protoutils] checkSignatureFromCreator -> DEBU 30e7 begin" +"2019-09-24 01:05:21.034 UTC [msp] GetManagerForChain -> DEBU 30e8 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:21.035 UTC [protoutils] checkSignatureFromCreator -> DEBU 30e9 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:21.035 UTC [protoutils] checkSignatureFromCreator -> DEBU 30ea creator is valid" +"2019-09-24 01:05:21.035 UTC [msp.identity] Verify -> DEBU 30eb Verify: digest = 00000000 06 66 21 92 72 42 8d 11 a4 46 6e 00 45 af 32 54 |.f!.rB...Fn.E.2T| +00000010 55 e5 07 20 ee 0e c9 a9 a2 3c 88 c8 86 e8 7c f5 |U.. .....<....|.|" +"2019-09-24 01:05:21.035 UTC [msp.identity] Verify -> DEBU 30ec Verify: sig = 00000000 30 45 02 21 00 f1 93 be 07 32 67 fe 6c 91 20 6a |0E.!.....2g.l. j| +00000010 1b ff 6a 1d f1 a0 7d 6e ec 3d 2c 66 e3 4c 14 2b |..j...}n.=,f.L.+| +00000020 97 06 f0 e5 35 02 20 4e 58 f1 87 f1 f5 1b d7 45 |....5. NX......E| +00000030 63 a6 65 d0 d1 40 46 15 72 ca 26 88 10 bc 6a 65 |c.e..@F.r.&...je| +00000040 0b 15 5f 96 f7 b4 d4 |.._....|" +"2019-09-24 01:05:21.036 UTC [protoutils] checkSignatureFromCreator -> DEBU 30ed exits successfully" +"2019-09-24 01:05:21.036 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30ee validateChaincodeProposalMessage starts for proposal 0xc0001f20e0, header 0xc003c742d0" +"2019-09-24 01:05:21.036 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 30ef validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" " +"2019-09-24 01:05:21.036 UTC [endorser] preProcess -> DEBU 30f0 [businesschannel][f531e761] processing txid: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4" +"2019-09-24 01:05:21.036 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 30f1 retrieveTransactionByID() - txId = [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +"2019-09-24 01:05:21.036 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 30f2 constructing new tx simulator" +"2019-09-24 01:05:21.037 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 30f3 constructing new tx simulator txid = [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +"2019-09-24 01:05:21.037 UTC [endorser] SimulateProposal -> DEBU 30f4 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:21.037 UTC [endorser] callChaincode -> INFO 30f5 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:21.038 UTC [chaincode] Execute -> DEBU 30f6 Entry" +"2019-09-24 01:05:21.039 UTC [aclmgmt] CheckACL -> DEBU 30f7 acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes" +"2019-09-24 01:05:21.039 UTC [aclmgmt] CheckACL -> DEBU 30f8 acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:21.039 UTC [policies] Evaluate -> DEBU 30f9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.040 UTC [policies] Evaluate -> DEBU 30fa This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.040 UTC [policies] Evaluate -> DEBU 30fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.040 UTC [cauthdsl] func1 -> DEBU 30fc 0xc0037726a0 gate 1569287121040274500 evaluation starts" +"2019-09-24 01:05:21.040 UTC [cauthdsl] func2 -> DEBU 30fd 0xc0037726a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.041 UTC [cauthdsl] func2 -> DEBU 30fe 0xc0037726a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.041 UTC [cauthdsl] func2 -> DEBU 30ff 0xc0037726a0 principal matched by identity 0" +"2019-09-24 01:05:21.041 UTC [msp.identity] Verify -> DEBU 3100 Verify: digest = 00000000 06 66 21 92 72 42 8d 11 a4 46 6e 00 45 af 32 54 |.f!.rB...Fn.E.2T| +00000010 55 e5 07 20 ee 0e c9 a9 a2 3c 88 c8 86 e8 7c f5 |U.. .....<....|.|" +"2019-09-24 01:05:21.041 UTC [msp.identity] Verify -> DEBU 3101 Verify: sig = 00000000 30 45 02 21 00 f1 93 be 07 32 67 fe 6c 91 20 6a |0E.!.....2g.l. j| +00000010 1b ff 6a 1d f1 a0 7d 6e ec 3d 2c 66 e3 4c 14 2b |..j...}n.=,f.L.+| +00000020 97 06 f0 e5 35 02 20 4e 58 f1 87 f1 f5 1b d7 45 |....5. NX......E| +00000030 63 a6 65 d0 d1 40 46 15 72 ca 26 88 10 bc 6a 65 |c.e..@F.r.&...je| +00000040 0b 15 5f 96 f7 b4 d4 |.._....|" +"2019-09-24 01:05:21.042 UTC [cauthdsl] func2 -> DEBU 3102 0xc0037726a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.042 UTC [cauthdsl] func1 -> DEBU 3103 0xc0037726a0 gate 1569287121040274500 evaluation succeeds" +"2019-09-24 01:05:21.042 UTC [policies] Evaluate -> DEBU 3104 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.042 UTC [policies] Evaluate -> DEBU 3105 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.043 UTC [policies] Evaluate -> DEBU 3106 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.043 UTC [policies] Evaluate -> DEBU 3107 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.043 UTC [chaincode] handleMessage -> DEBU 3108 [f531e761] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready" +"2019-09-24 01:05:21.043 UTC [chaincode] HandleTransaction -> DEBU 3109 [f531e761] handling GET_STATE_BY_RANGE from chaincode" +"2019-09-24 01:05:21.044 UTC [leveldbhelper] GetIterator -> DEBU 310a Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}]" +"2019-09-24 01:05:21.044 UTC [rwsetutil] AddResult -> DEBU 310b Adding a result" +"2019-09-24 01:05:21.045 UTC [chaincode] HandleGetStateByRange -> DEBU 310c Got keys and values. Sending RESPONSE" +"2019-09-24 01:05:21.045 UTC [chaincode] HandleTransaction -> DEBU 310d [f531e761] Completed GET_STATE_BY_RANGE. Sending RESPONSE" +"2019-09-24 01:05:21.045 UTC [chaincode] handleMessage -> DEBU 310e [f531e761] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready" +"2019-09-24 01:05:21.046 UTC [chaincode] HandleTransaction -> DEBU 310f [f531e761] handling QUERY_STATE_CLOSE from chaincode" +"2019-09-24 01:05:21.046 UTC [chaincode] HandleTransaction -> DEBU 3110 [f531e761] Completed QUERY_STATE_CLOSE. Sending RESPONSE" +"2019-09-24 01:05:21.047 UTC [chaincode] handleMessage -> DEBU 3111 [f531e761] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:21.047 UTC [chaincode] Notify -> DEBU 3112 [f531e761] notifying Txid:f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, channelID:businesschannel" +"2019-09-24 01:05:21.047 UTC [chaincode] Execute -> DEBU 3113 Exit" +"2019-09-24 01:05:21.047 UTC [endorser] callChaincode -> INFO 3114 [businesschannel][f531e761] Exit chaincode: name:"lscc" (9ms)" +"2019-09-24 01:05:21.047 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3115 Simulation completed, getting simulation results" +"2019-09-24 01:05:21.048 UTC [lockbasedtxmgr] Done -> DEBU 3116 Done with transaction simulation / query execution [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +"2019-09-24 01:05:21.048 UTC [endorser] SimulateProposal -> DEBU 3117 [businesschannel][f531e761] Exit" +"2019-09-24 01:05:21.048 UTC [endorser] endorseProposal -> DEBU 3118 [businesschannel][f531e761] Entry chaincode: name:"lscc" " +"2019-09-24 01:05:21.048 UTC [endorser] endorseProposal -> DEBU 3119 [businesschannel][f531e761] escc for chaincode name:"lscc" is escc" +"2019-09-24 01:05:21.048 UTC [endorser] EndorseWithPlugin -> DEBU 311a Entering endorsement for {plugin: escc, channel: businesschannel, tx: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, chaincode: lscc}" +"2019-09-24 01:05:21.049 UTC [msp.identity] Sign -> DEBU 311b Sign: plaintext: 0A205E9BE16E661D4992DC3F00B99BAD...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:21.049 UTC [msp.identity] Sign -> DEBU 311c Sign: digest: F8BE741690E206D157694824EF2A7C56D820360B1127992025E5FBC2DE57DB81 " +"2019-09-24 01:05:21.049 UTC [endorser] EndorseWithPlugin -> DEBU 311d Exiting {plugin: escc, channel: businesschannel, tx: f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4, chaincode: lscc}" +"2019-09-24 01:05:21.049 UTC [endorser] endorseProposal -> DEBU 311e [businesschannel][f531e761] Exit" +"2019-09-24 01:05:21.049 UTC [lockbasedtxmgr] Done -> DEBU 311f Done with transaction simulation / query execution [f531e761cbc6bd9d7ae1dc0453bb9b62fff0d55c69bee03e207ed137f6f431d4]" +"2019-09-24 01:05:21.049 UTC [endorser] func1 -> DEBU 3120 Exit: request from 172.18.0.5:49958" +"2019-09-24 01:05:21.049 UTC [comm.grpc.server] 1 -> INFO 3121 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49958 grpc.code=OK grpc.call_duration=15.8854ms +"2019-09-24 01:05:21.052 UTC [grpc] warningf -> DEBU 3122 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49958: read: connection reset by peer" +"2019-09-24 01:05:21.052 UTC [grpc] infof -> DEBU 3123 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.052 UTC [grpc] infof -> DEBU 3124 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.457 UTC [endorser] ProcessProposal -> DEBU 3125 Entering: request from 172.18.0.5:49962" +"2019-09-24 01:05:21.457 UTC [protoutils] ValidateProposalMessage -> DEBU 3126 ValidateProposalMessage starts for signed proposal 0xc003d0a0a0" +"2019-09-24 01:05:21.457 UTC [protoutils] validateChannelHeader -> DEBU 3127 validateChannelHeader info: header type 3" +"2019-09-24 01:05:21.457 UTC [protoutils] checkSignatureFromCreator -> DEBU 3128 begin" +"2019-09-24 01:05:21.457 UTC [msp] GetManagerForChain -> DEBU 3129 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:21.457 UTC [protoutils] checkSignatureFromCreator -> DEBU 312a creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:21.458 UTC [protoutils] checkSignatureFromCreator -> DEBU 312b creator is valid" +"2019-09-24 01:05:21.458 UTC [msp.identity] Verify -> DEBU 312c Verify: digest = 00000000 12 32 f2 d5 01 ff 83 68 a9 b3 1f 9f 17 e9 0e 30 |.2.....h.......0| +00000010 8f 68 f3 49 d5 d8 18 27 58 27 6e 36 fc 19 2a 27 |.h.I...'X'n6..*'|" +"2019-09-24 01:05:21.458 UTC [msp.identity] Verify -> DEBU 312d Verify: sig = 00000000 30 45 02 21 00 89 c6 c2 00 ca 7b 1e aa d9 5c 48 |0E.!......{...\H| +00000010 79 fa 1d 25 70 c5 7a 88 50 05 7c 71 03 8e 68 30 |y..%p.z.P.|q..h0| +00000020 39 23 90 e3 8e 02 20 1b ae 6f 99 9c 65 e7 6a be |9#.... ..o..e.j.| +00000030 ce b0 8c 90 72 2f 6f b3 61 fe ef c8 2d 2a 56 c7 |....r/o.a...-*V.| +00000040 44 b4 07 af 1f 04 6b |D.....k|" +"2019-09-24 01:05:21.458 UTC [protoutils] checkSignatureFromCreator -> DEBU 312e exits successfully" +"2019-09-24 01:05:21.458 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 312f validateChaincodeProposalMessage starts for proposal 0xc00012bf80, header 0xc003d0a500" +"2019-09-24 01:05:21.459 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3130 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 01:05:21.459 UTC [endorser] preProcess -> DEBU 3131 [businesschannel][87e9c255] processing txid: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54" +"2019-09-24 01:05:21.459 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3132 retrieveTransactionByID() - txId = [87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54]" +"2019-09-24 01:05:21.460 UTC [endorser] SimulateProposal -> DEBU 3133 [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.460 UTC [endorser] callChaincode -> INFO 3134 [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.460 UTC [chaincode] Execute -> DEBU 3135 Entry" +"2019-09-24 01:05:21.460 UTC [qscc] Invoke -> DEBU 3136 Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 01:05:21.461 UTC [aclmgmt] CheckACL -> DEBU 3137 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 01:05:21.461 UTC [aclmgmt] CheckACL -> DEBU 3138 acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 3139 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 313a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.461 UTC [policies] Evaluate -> DEBU 313b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.461 UTC [cauthdsl] func1 -> DEBU 313c 0xc0031d6680 gate 1569287121461668100 evaluation starts" +"2019-09-24 01:05:21.461 UTC [cauthdsl] func2 -> DEBU 313d 0xc0031d6680 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.461 UTC [cauthdsl] func2 -> DEBU 313e 0xc0031d6680 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.462 UTC [cauthdsl] func2 -> DEBU 313f 0xc0031d6680 principal matched by identity 0" +"2019-09-24 01:05:21.462 UTC [msp.identity] Verify -> DEBU 3140 Verify: digest = 00000000 12 32 f2 d5 01 ff 83 68 a9 b3 1f 9f 17 e9 0e 30 |.2.....h.......0| +00000010 8f 68 f3 49 d5 d8 18 27 58 27 6e 36 fc 19 2a 27 |.h.I...'X'n6..*'|" +"2019-09-24 01:05:21.462 UTC [msp.identity] Verify -> DEBU 3141 Verify: sig = 00000000 30 45 02 21 00 89 c6 c2 00 ca 7b 1e aa d9 5c 48 |0E.!......{...\H| +00000010 79 fa 1d 25 70 c5 7a 88 50 05 7c 71 03 8e 68 30 |y..%p.z.P.|q..h0| +00000020 39 23 90 e3 8e 02 20 1b ae 6f 99 9c 65 e7 6a be |9#.... ..o..e.j.| +00000030 ce b0 8c 90 72 2f 6f b3 61 fe ef c8 2d 2a 56 c7 |....r/o.a...-*V.| +00000040 44 b4 07 af 1f 04 6b |D.....k|" +"2019-09-24 01:05:21.462 UTC [cauthdsl] func2 -> DEBU 3142 0xc0031d6680 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.462 UTC [cauthdsl] func1 -> DEBU 3143 0xc0031d6680 gate 1569287121461668100 evaluation succeeds" +"2019-09-24 01:05:21.462 UTC [policies] Evaluate -> DEBU 3144 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.462 UTC [policies] Evaluate -> DEBU 3145 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.463 UTC [policies] Evaluate -> DEBU 3146 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.463 UTC [policies] Evaluate -> DEBU 3147 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.463 UTC [chaincode] handleMessage -> DEBU 3148 [87e9c255] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:21.463 UTC [chaincode] Notify -> DEBU 3149 [87e9c255] notifying Txid:87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, channelID:businesschannel" +"2019-09-24 01:05:21.463 UTC [chaincode] Execute -> DEBU 314a Exit" +"2019-09-24 01:05:21.463 UTC [endorser] callChaincode -> INFO 314b [businesschannel][87e9c255] Exit chaincode: name:"qscc" (3ms)" +"2019-09-24 01:05:21.464 UTC [endorser] SimulateProposal -> DEBU 314c [businesschannel][87e9c255] Exit" +"2019-09-24 01:05:21.464 UTC [endorser] endorseProposal -> DEBU 314d [businesschannel][87e9c255] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.464 UTC [endorser] endorseProposal -> DEBU 314e [businesschannel][87e9c255] escc for chaincode name:"qscc" is escc" +"2019-09-24 01:05:21.465 UTC [endorser] EndorseWithPlugin -> DEBU 314f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, chaincode: qscc}" +"2019-09-24 01:05:21.465 UTC [msp.identity] Sign -> DEBU 3150 Sign: plaintext: 0A20EE526719A97B935F8DAA6899BCB2...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:21.465 UTC [msp.identity] Sign -> DEBU 3151 Sign: digest: A102E2B21030BE17848A1423DBDDD04C7AFBA9D107FFCD4216DF820F20EF3AD0 " +"2019-09-24 01:05:21.465 UTC [endorser] EndorseWithPlugin -> DEBU 3152 Exiting {plugin: escc, channel: businesschannel, tx: 87e9c2557e91fc6752a1d83ba7aa3435a05341982632e287250c62a09b9f2d54, chaincode: qscc}" +"2019-09-24 01:05:21.465 UTC [endorser] endorseProposal -> DEBU 3153 [businesschannel][87e9c255] Exit" +"2019-09-24 01:05:21.465 UTC [endorser] func1 -> DEBU 3154 Exit: request from 172.18.0.5:49962" +"2019-09-24 01:05:21.466 UTC [comm.grpc.server] 1 -> INFO 3155 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49962 grpc.code=OK grpc.call_duration=9.4879ms +"2019-09-24 01:05:21.469 UTC [grpc] infof -> DEBU 3156 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.469 UTC [grpc] infof -> DEBU 3157 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.641 UTC [endorser] ProcessProposal -> DEBU 3158 Entering: request from 172.18.0.5:49966" +"2019-09-24 01:05:21.642 UTC [protoutils] ValidateProposalMessage -> DEBU 3159 ValidateProposalMessage starts for signed proposal 0xc002b6af50" +"2019-09-24 01:05:21.642 UTC [protoutils] validateChannelHeader -> DEBU 315a validateChannelHeader info: header type 3" +"2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315b begin" +"2019-09-24 01:05:21.642 UTC [msp] GetManagerForChain -> DEBU 315c Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315d creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 315e creator is valid" +"2019-09-24 01:05:21.642 UTC [msp.identity] Verify -> DEBU 315f Verify: digest = 00000000 72 e2 b8 d1 97 b2 b0 34 8c 64 21 88 0b 8d ab de |r......4.d!.....| +00000010 0e 9a cf 4c 33 f6 34 19 8b 75 78 3d ae 6e f3 e5 |...L3.4..ux=.n..|" +"2019-09-24 01:05:21.642 UTC [msp.identity] Verify -> DEBU 3160 Verify: sig = 00000000 30 45 02 21 00 d9 cc a7 a9 74 31 bb e2 33 0c 8e |0E.!.....t1..3..| +00000010 d8 54 74 c6 1b 2c ca a6 15 a9 49 df c2 15 10 d8 |.Tt..,....I.....| +00000020 63 7f cd b3 7e 02 20 6a ed e4 f6 8b 4a af b0 c8 |c...~. j....J...| +00000030 16 d5 02 ca 3c 8d 9e 6b 71 7d 2c ef a2 83 cb ae |....<..kq},.....| +00000040 00 7a 17 0e 0a c8 76 |.z....v|" +"2019-09-24 01:05:21.642 UTC [protoutils] checkSignatureFromCreator -> DEBU 3161 exits successfully" +"2019-09-24 01:05:21.642 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3162 validateChaincodeProposalMessage starts for proposal 0xc0001695e0, header 0xc002b6b3b0" +"2019-09-24 01:05:21.642 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3163 validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 01:05:21.642 UTC [endorser] preProcess -> DEBU 3164 [businesschannel][2a941883] processing txid: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e" +"2019-09-24 01:05:21.642 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3165 retrieveTransactionByID() - txId = [2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e]" +"2019-09-24 01:05:21.642 UTC [endorser] SimulateProposal -> DEBU 3166 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.642 UTC [endorser] callChaincode -> INFO 3167 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.643 UTC [chaincode] Execute -> DEBU 3168 Entry" +"2019-09-24 01:05:21.643 UTC [qscc] Invoke -> DEBU 3169 Invoke function: GetBlockByNumber on chain: businesschannel" +"2019-09-24 01:05:21.643 UTC [aclmgmt] CheckACL -> DEBU 316a acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber" +"2019-09-24 01:05:21.643 UTC [aclmgmt] CheckACL -> DEBU 316b acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 316e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func1 -> DEBU 316f 0xc0039f6810 gate 1569287121643448100 evaluation starts" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3170 0xc0039f6810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3171 0xc0039f6810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3172 0xc0039f6810 principal matched by identity 0" +"2019-09-24 01:05:21.643 UTC [msp.identity] Verify -> DEBU 3173 Verify: digest = 00000000 72 e2 b8 d1 97 b2 b0 34 8c 64 21 88 0b 8d ab de |r......4.d!.....| +00000010 0e 9a cf 4c 33 f6 34 19 8b 75 78 3d ae 6e f3 e5 |...L3.4..ux=.n..|" +"2019-09-24 01:05:21.643 UTC [msp.identity] Verify -> DEBU 3174 Verify: sig = 00000000 30 45 02 21 00 d9 cc a7 a9 74 31 bb e2 33 0c 8e |0E.!.....t1..3..| +00000010 d8 54 74 c6 1b 2c ca a6 15 a9 49 df c2 15 10 d8 |.Tt..,....I.....| +00000020 63 7f cd b3 7e 02 20 6a ed e4 f6 8b 4a af b0 c8 |c...~. j....J...| +00000030 16 d5 02 ca 3c 8d 9e 6b 71 7d 2c ef a2 83 cb ae |....<..kq},.....| +00000040 00 7a 17 0e 0a c8 76 |.z....v|" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func2 -> DEBU 3175 0xc0039f6810 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.643 UTC [cauthdsl] func1 -> DEBU 3176 0xc0039f6810 gate 1569287121643448100 evaluation succeeds" +"2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 3177 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.643 UTC [policies] Evaluate -> DEBU 3178 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.644 UTC [policies] Evaluate -> DEBU 3179 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.644 UTC [policies] Evaluate -> DEBU 317a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.644 UTC [fsblkstorage] retrieveBlockByNumber -> DEBU 317b retrieveBlockByNumber() - blockNum = [2]" +"2019-09-24 01:05:21.644 UTC [fsblkstorage] newBlockfileStream -> DEBU 317c newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[51321]" +"2019-09-24 01:05:21.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 317d Remaining bytes=[38117], Going to peek [8] bytes" +"2019-09-24 01:05:21.644 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 317e Returning blockbytes - length=[25515], placementInfo={fileNum=[0], startOffset=[51321], bytesOffset=[51324]}" +"2019-09-24 01:05:21.644 UTC [chaincode] handleMessage -> DEBU 317f [2a941883] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:21.644 UTC [chaincode] Notify -> DEBU 3180 [2a941883] notifying Txid:2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, channelID:businesschannel" +"2019-09-24 01:05:21.644 UTC [chaincode] Execute -> DEBU 3181 Exit" +"2019-09-24 01:05:21.644 UTC [endorser] callChaincode -> INFO 3182 [businesschannel][2a941883] Exit chaincode: name:"qscc" (2ms)" +"2019-09-24 01:05:21.644 UTC [endorser] SimulateProposal -> DEBU 3183 [businesschannel][2a941883] Exit" +"2019-09-24 01:05:21.644 UTC [endorser] endorseProposal -> DEBU 3184 [businesschannel][2a941883] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:21.644 UTC [endorser] endorseProposal -> DEBU 3185 [businesschannel][2a941883] escc for chaincode name:"qscc" is escc" +"2019-09-24 01:05:21.644 UTC [endorser] EndorseWithPlugin -> DEBU 3186 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, chaincode: qscc}" +"2019-09-24 01:05:21.644 UTC [msp.identity] Sign -> DEBU 3187 Sign: plaintext: 0A203C3FF634082C0951010D7F6334EE...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:21.644 UTC [msp.identity] Sign -> DEBU 3188 Sign: digest: 6676A3005D0CB765F3D06BE35780B1DCD18CB1251042E9C09CA225967D1AE2FD " +"2019-09-24 01:05:21.645 UTC [endorser] EndorseWithPlugin -> DEBU 3189 Exiting {plugin: escc, channel: businesschannel, tx: 2a94188300d16e75d3f2683fe860e29b0c024a72cfd86b20cd8b435839362e7e, chaincode: qscc}" +"2019-09-24 01:05:21.645 UTC [endorser] endorseProposal -> DEBU 318a [businesschannel][2a941883] Exit" +"2019-09-24 01:05:21.645 UTC [endorser] func1 -> DEBU 318b Exit: request from 172.18.0.5:49966" +"2019-09-24 01:05:21.645 UTC [comm.grpc.server] 1 -> INFO 318c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49966 grpc.code=OK grpc.call_duration=4.2149ms +"2019-09-24 01:05:21.655 UTC [grpc] infof -> DEBU 318d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.655 UTC [msp] DeserializeIdentity -> DEBU 318e Obtaining identity" +"2019-09-24 01:05:21.655 UTC [msp] DeserializeIdentity -> DEBU 318f Obtaining identity" +"2019-09-24 01:05:21.656 UTC [gossip.comm] Send -> DEBU 3190 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3191 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3192 Exiting" +"2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3193 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.657 UTC [gossip.comm] sendToEndpoint -> DEBU 3194 Exiting" +"2019-09-24 01:05:21.658 UTC [gossip.comm] func1 -> DEBU 3195 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.658 UTC [gossip.gossip] handleMessage -> DEBU 3196 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.658 UTC [msp] DeserializeIdentity -> DEBU 3197 Obtaining identity" +"2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 3198 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +"2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 3199 Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +"2019-09-24 01:05:21.659 UTC [msp.identity] Verify -> DEBU 319a Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:21.660 UTC [msp.identity] Verify -> DEBU 319b Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:21.660 UTC [msp] DeserializeIdentity -> DEBU 319c Obtaining identity" +"2019-09-24 01:05:21.661 UTC [msp] DeserializeIdentity -> DEBU 319d Obtaining identity" +"2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 319e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 319f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31a0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.661 UTC [policies] Evaluate -> DEBU 31a3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.661 UTC [cauthdsl] func1 -> DEBU 31a4 0xc0037ea870 gate 1569287121661916200 evaluation starts" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a5 0xc0037ea870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a6 0xc0037ea870 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a7 0xc0037ea870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func2 -> DEBU 31a8 0xc0037ea870 principal evaluation fails" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func1 -> DEBU 31a9 0xc0037ea870 gate 1569287121661916200 evaluation fails" +"2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31aa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31ab == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.662 UTC [policies] Evaluate -> DEBU 31ac == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.662 UTC [cauthdsl] func1 -> DEBU 31ad 0xc0037eb0b0 gate 1569287121662933700 evaluation starts" +"2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31ae 0xc0037eb0b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31af 0xc0037eb0b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.663 UTC [cauthdsl] func2 -> DEBU 31b0 0xc0037eb0b0 principal matched by identity 0" +"2019-09-24 01:05:21.663 UTC [msp.identity] Verify -> DEBU 31b1 Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:21.663 UTC [msp.identity] Verify -> DEBU 31b2 Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:21.664 UTC [cauthdsl] func2 -> DEBU 31b3 0xc0037eb0b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.664 UTC [cauthdsl] func1 -> DEBU 31b4 0xc0037eb0b0 gate 1569287121662933700 evaluation succeeds" +"2019-09-24 01:05:21.664 UTC [policies] Evaluate -> DEBU 31b5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.664 UTC [policies] Evaluate -> DEBU 31b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.665 UTC [policies] Evaluate -> DEBU 31b7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.665 UTC [policies] Evaluate -> DEBU 31b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.665 UTC [msp] DeserializeIdentity -> DEBU 31b9 Obtaining identity" +"2019-09-24 01:05:21.665 UTC [msp] DeserializeIdentity -> DEBU 31ba Obtaining identity" +"2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 31bb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31bc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31bd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.666 UTC [policies] Evaluate -> DEBU 31be == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.666 UTC [policies] Evaluate -> DEBU 31bf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.667 UTC [policies] Evaluate -> DEBU 31c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.667 UTC [cauthdsl] func1 -> DEBU 31c1 0xc0030d8880 gate 1569287121667510700 evaluation starts" +"2019-09-24 01:05:21.667 UTC [cauthdsl] func2 -> DEBU 31c2 0xc0030d8880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c3 0xc0030d8880 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c4 0xc0030d8880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.668 UTC [cauthdsl] func2 -> DEBU 31c5 0xc0030d8880 principal evaluation fails" +"2019-09-24 01:05:21.668 UTC [cauthdsl] func1 -> DEBU 31c6 0xc0030d8880 gate 1569287121667510700 evaluation fails" +"2019-09-24 01:05:21.668 UTC [policies] Evaluate -> DEBU 31c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.669 UTC [policies] Evaluate -> DEBU 31c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.670 UTC [msp] DeserializeIdentity -> DEBU 31c9 Obtaining identity" +"2019-09-24 01:05:21.670 UTC [msp] DeserializeIdentity -> DEBU 31ca Obtaining identity" +"2019-09-24 01:05:21.672 UTC [gossip.comm] Send -> DEBU 31cb Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +"2019-09-24 01:05:21.672 UTC [msp] DeserializeIdentity -> DEBU 31cc Obtaining identity" +"2019-09-24 01:05:21.672 UTC [msp] DeserializeIdentity -> DEBU 31cd Obtaining identity" +"2019-09-24 01:05:21.673 UTC [gossip.comm] sendToEndpoint -> DEBU 31ce Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.673 UTC [gossip.comm] sendToEndpoint -> DEBU 31cf Exiting" +"2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d1 Exiting" +"2019-09-24 01:05:21.669 UTC [policies] Evaluate -> DEBU 31d3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.674 UTC [cauthdsl] func1 -> DEBU 31d4 0xc0030d90d0 gate 1569287121674866500 evaluation starts" +"2019-09-24 01:05:21.674 UTC [gossip.comm] sendToEndpoint -> DEBU 31d2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.675 UTC [gossip.comm] sendToEndpoint -> DEBU 31d5 Exiting" +"2019-09-24 01:05:21.686 UTC [gossip.comm] func1 -> DEBU 31d7 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.675 UTC [grpc] infof -> DEBU 31d8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:21.674 UTC [cauthdsl] func2 -> DEBU 31d6 0xc0030d90d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.687 UTC [gossip.comm] sendToEndpoint -> DEBU 31d9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.687 UTC [gossip.comm] sendToEndpoint -> DEBU 31da Exiting" +"2019-09-24 01:05:21.690 UTC [gossip.comm] func1 -> DEBU 31db Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.687 UTC [cauthdsl] func2 -> DEBU 31dc 0xc0030d90d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.695 UTC [cauthdsl] func2 -> DEBU 31dd 0xc0030d90d0 principal matched by identity 0" +"2019-09-24 01:05:21.695 UTC [msp.identity] Verify -> DEBU 31de Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:21.696 UTC [msp.identity] Verify -> DEBU 31df Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:21.696 UTC [cauthdsl] func2 -> DEBU 31e0 0xc0030d90d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.696 UTC [cauthdsl] func1 -> DEBU 31e1 0xc0030d90d0 gate 1569287121674866500 evaluation succeeds" +"2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.696 UTC [policies] Evaluate -> DEBU 31e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.696 UTC [msp] DeserializeIdentity -> DEBU 31e6 Obtaining identity" +"2019-09-24 01:05:21.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31e7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 31e8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.697 UTC [policies] Evaluate -> DEBU 31eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.697 UTC [cauthdsl] func1 -> DEBU 31ec 0xc003c363f0 gate 1569287121697277500 evaluation starts" +"2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ed 0xc003c363f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ee 0xc003c363f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31ef 0xc003c363f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.697 UTC [cauthdsl] func2 -> DEBU 31f0 0xc003c363f0 principal evaluation fails" +"2019-09-24 01:05:21.698 UTC [cauthdsl] func1 -> DEBU 31f1 0xc003c363f0 gate 1569287121697277500 evaluation fails" +"2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.698 UTC [policies] Evaluate -> DEBU 31f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.698 UTC [cauthdsl] func1 -> DEBU 31f5 0xc003c36c30 gate 1569287121698893700 evaluation starts" +"2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f6 0xc003c36c30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f7 0xc003c36c30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.699 UTC [cauthdsl] func2 -> DEBU 31f8 0xc003c36c30 principal matched by identity 0" +"2019-09-24 01:05:21.699 UTC [msp.identity] Verify -> DEBU 31f9 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:21.704 UTC [msp.identity] Verify -> DEBU 31fa Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:21.705 UTC [cauthdsl] func2 -> DEBU 31fb 0xc003c36c30 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.705 UTC [cauthdsl] func1 -> DEBU 31fc 0xc003c36c30 gate 1569287121698893700 evaluation succeeds" +"2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31fd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.705 UTC [policies] Evaluate -> DEBU 31ff Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.706 UTC [policies] Evaluate -> DEBU 3200 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.706 UTC [gossip.gossip] handleMessage -> DEBU 3201 Exiting" +"2019-09-24 01:05:21.706 UTC [gossip.gossip] handleMessage -> DEBU 3202 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.706 UTC [msp] DeserializeIdentity -> DEBU 3203 Obtaining identity" +"2019-09-24 01:05:21.706 UTC [msp.identity] Verify -> DEBU 3204 Verify: digest = 00000000 7c b0 1b 92 16 24 14 59 70 e9 6a 8d 83 59 9c d1 ||....$.Yp.j..Y..| +00000010 30 c4 e5 1b 48 ec 5b f5 2a 9e 47 43 c7 f7 e8 e1 |0...H.[.*.GC....|" +"2019-09-24 01:05:21.706 UTC [msp.identity] Verify -> DEBU 3205 Verify: sig = 00000000 30 45 02 21 00 ca 57 d3 97 ef cc b1 84 a6 99 77 |0E.!..W........w| +00000010 dc 6f bf 95 22 29 39 82 7b f0 91 3c a5 56 85 00 |.o..")9.{..<.V..| +00000020 05 d4 4d fc 60 02 20 54 00 13 99 bc 4a 21 a1 95 |..M.`. T....J!..| +00000030 5d e6 e2 f4 e9 62 c2 30 80 b4 78 de 13 64 ae 6a |]....b.0..x..d.j| +00000040 52 7a 14 48 65 d2 44 |Rz.He.D|" +"2019-09-24 01:05:21.707 UTC [msp.identity] Verify -> DEBU 3206 Verify: digest = 00000000 d2 f6 b0 08 34 3d ca 70 be e7 11 27 30 46 db b5 |....4=.p...'0F..| +00000010 90 b9 a5 77 de fd 6f 1b e3 7a 21 2f 96 54 fd 62 |...w..o..z!/.T.b|" +"2019-09-24 01:05:21.707 UTC [msp.identity] Verify -> DEBU 3207 Verify: sig = 00000000 30 45 02 21 00 d6 85 59 b3 6c 5e f8 71 3c cf 57 |0E.!...Y.l^.q<.W| +00000010 5d 58 4c bc 86 08 96 97 ee 54 57 7a d9 69 c0 6a |]XL......TWz.i.j| +00000020 8e b2 b1 11 be 02 20 11 10 45 26 f7 00 58 c8 d4 |...... ..E&..X..| +00000030 fd 6a 24 11 78 f3 18 80 8c a7 89 b0 5a e9 e4 59 |.j$.x.......Z..Y| +00000040 ac 07 e5 a5 67 22 a6 |....g".|" +"2019-09-24 01:05:21.707 UTC [msp] DeserializeIdentity -> DEBU 3208 Obtaining identity" +"2019-09-24 01:05:21.708 UTC [msp] DeserializeIdentity -> DEBU 3209 Obtaining identity" +"2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 320a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.708 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 320c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.708 UTC [policies] Evaluate -> DEBU 320d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.708 UTC [policies] Evaluate -> DEBU 320e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 320f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3210 0xc003c49580 gate 1569287121709074800 evaluation starts" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3211 0xc003c49580 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3212 0xc003c49580 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3213 0xc003c49580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 3214 0xc003c49580 principal evaluation fails" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3215 0xc003c49580 gate 1569287121709074800 evaluation fails" +"2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3216 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3217 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.709 UTC [policies] Evaluate -> DEBU 3218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func1 -> DEBU 3219 0xc003c49dc0 gate 1569287121709726200 evaluation starts" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321a 0xc003c49dc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321b 0xc003c49dc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.709 UTC [cauthdsl] func2 -> DEBU 321c 0xc003c49dc0 principal matched by identity 0" +"2019-09-24 01:05:21.709 UTC [msp.identity] Verify -> DEBU 321d Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +"2019-09-24 01:05:21.709 UTC [msp.identity] Verify -> DEBU 321e Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +00000040 b6 66 27 b7 81 6b |.f'..k|" +"2019-09-24 01:05:21.710 UTC [cauthdsl] func2 -> DEBU 321f 0xc003c49dc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.710 UTC [cauthdsl] func1 -> DEBU 3220 0xc003c49dc0 gate 1569287121709726200 evaluation succeeds" +"2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3221 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3222 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3223 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 3224 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.710 UTC [msp] DeserializeIdentity -> DEBU 3225 Obtaining identity" +"2019-09-24 01:05:21.710 UTC [msp] DeserializeIdentity -> DEBU 3226 Obtaining identity" +"2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3227 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3228 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.710 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3229 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.710 UTC [policies] Evaluate -> DEBU 322a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 322b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 322c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 322d 0xc003ab9590 gate 1569287121711087600 evaluation starts" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 322e 0xc003ab9590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 322f 0xc003ab9590 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3230 0xc003ab9590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3231 0xc003ab9590 principal evaluation fails" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 3232 0xc003ab9590 gate 1569287121711087600 evaluation fails" +"2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3233 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3234 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.711 UTC [policies] Evaluate -> DEBU 3235 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func1 -> DEBU 3236 0xc003ab9dd0 gate 1569287121711509200 evaluation starts" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3237 0xc003ab9dd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3238 0xc003ab9dd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 3239 0xc003ab9dd0 principal matched by identity 0" +"2019-09-24 01:05:21.711 UTC [msp.identity] Verify -> DEBU 323a Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:21.711 UTC [msp.identity] Verify -> DEBU 323b Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:21.711 UTC [cauthdsl] func2 -> DEBU 323c 0xc003ab9dd0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 323d 0xc003ab9dd0 gate 1569287121711509200 evaluation succeeds" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 323e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 323f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3240 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3241 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.712 UTC [msp] DeserializeIdentity -> DEBU 3242 Obtaining identity" +"2019-09-24 01:05:21.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3243 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3244 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3245 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3246 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3247 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 3248 0xc003ac8eb0 gate 1569287121712533500 evaluation starts" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3249 0xc003ac8eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324a 0xc003ac8eb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324b 0xc003ac8eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 324c 0xc003ac8eb0 principal evaluation fails" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 324d 0xc003ac8eb0 gate 1569287121712533500 evaluation fails" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 324e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 324f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.712 UTC [policies] Evaluate -> DEBU 3250 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func1 -> DEBU 3251 0xc003ac96f0 gate 1569287121712881200 evaluation starts" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3252 0xc003ac96f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.712 UTC [cauthdsl] func2 -> DEBU 3253 0xc003ac96f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.713 UTC [cauthdsl] func2 -> DEBU 3254 0xc003ac96f0 principal matched by identity 0" +"2019-09-24 01:05:21.713 UTC [msp.identity] Verify -> DEBU 3255 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:21.713 UTC [msp.identity] Verify -> DEBU 3256 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:21.713 UTC [cauthdsl] func2 -> DEBU 3257 0xc003ac96f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.713 UTC [cauthdsl] func1 -> DEBU 3258 0xc003ac96f0 gate 1569287121712881200 evaluation succeeds" +"2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 3259 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.713 UTC [policies] Evaluate -> DEBU 325c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.713 UTC [gossip.gossip] handleMessage -> DEBU 325d Exiting" +"2019-09-24 01:05:21.713 UTC [gossip.gossip] handleMessage -> DEBU 325e Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.713 UTC [msp] DeserializeIdentity -> DEBU 325f Obtaining identity" +"2019-09-24 01:05:21.717 UTC [gossip.election] waitForInterrupt -> DEBU 3260 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:21.717 UTC [gossip.election] IsLeader -> DEBU 3261 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:21.717 UTC [msp] GetDefaultSigningIdentity -> DEBU 3262 Obtaining default signing identity" +"2019-09-24 01:05:21.717 UTC [msp.identity] Sign -> DEBU 3263 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100C1801 " +"2019-09-24 01:05:21.717 UTC [msp.identity] Sign -> DEBU 3264 Sign: digest: 7D33A109E0DBBCAC69AD40B409900FF277AC1092D35623E0EAA8392753D1F9C7 " +"2019-09-24 01:05:21.717 UTC [gossip.election] waitForInterrupt -> DEBU 3265 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:21.717 UTC [msp] DeserializeIdentity -> DEBU 3266 Obtaining identity" +"2019-09-24 01:05:21.717 UTC [msp] DeserializeIdentity -> DEBU 3267 Obtaining identity" +"2019-09-24 01:05:21.718 UTC [gossip.pull] Hello -> DEBU 3268 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 3269 Obtaining identity" +"2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326a Obtaining identity" +"2019-09-24 01:05:21.718 UTC [gossip.comm] Send -> DEBU 326b Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:21.718 UTC [gossip.comm] sendToEndpoint -> DEBU 326c Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.718 UTC [gossip.comm] sendToEndpoint -> DEBU 326d Exiting" +"2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326e Obtaining identity" +"2019-09-24 01:05:21.718 UTC [msp] DeserializeIdentity -> DEBU 326f Obtaining identity" +"2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3270 Obtaining identity" +"2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3271 Obtaining identity" +"2019-09-24 01:05:21.719 UTC [gossip.comm] Send -> DEBU 3272 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3273 Obtaining identity" +"2019-09-24 01:05:21.719 UTC [msp] DeserializeIdentity -> DEBU 3274 Obtaining identity" +"2019-09-24 01:05:21.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3275 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3276 Exiting" +"2019-09-24 01:05:21.722 UTC [gossip.comm] func1 -> DEBU 3277 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.722 UTC [msp] DeserializeIdentity -> DEBU 3278 Obtaining identity" +"2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3279 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 327a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.723 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 327b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.723 UTC [policies] Evaluate -> DEBU 327e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 327f 0xc003b13100 gate 1569287121724091500 evaluation starts" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3280 0xc003b13100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3281 0xc003b13100 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3282 0xc003b13100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3283 0xc003b13100 principal evaluation fails" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 3284 0xc003b13100 gate 1569287121724091500 evaluation fails" +"2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3285 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3286 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.724 UTC [policies] Evaluate -> DEBU 3287 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func1 -> DEBU 3288 0xc003b13940 gate 1569287121724508000 evaluation starts" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 3289 0xc003b13940 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 328a 0xc003b13940 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.724 UTC [cauthdsl] func2 -> DEBU 328b 0xc003b13940 principal matched by identity 0" +"2019-09-24 01:05:21.724 UTC [msp.identity] Verify -> DEBU 328c Verify: digest = 00000000 d2 52 f1 75 d8 ae b9 d5 ac d1 f0 e2 aa 85 b1 7e |.R.u...........~| +00000010 45 84 13 90 18 e1 f7 bd b2 05 79 a8 b1 f6 f4 0f |E.........y.....|" +"2019-09-24 01:05:21.724 UTC [msp.identity] Verify -> DEBU 328d Verify: sig = 00000000 30 45 02 21 00 ab a5 42 8a b2 7e b4 71 e0 50 2e |0E.!...B..~.q.P.| +00000010 5a 0b f1 bc 3b bc 41 5c f0 e1 cb 58 a3 6b 30 d3 |Z...;.A\...X.k0.| +00000020 1f 75 d5 ca 0f 02 20 6e 53 d5 79 d7 21 cd 23 cb |.u.... nS.y.!.#.| +00000030 cc 3e 91 8c 32 43 9d 81 44 92 0e bb 6a 16 af fe |.>..2C..D...j...| +00000040 f4 ea e1 60 17 3b 99 |...`.;.|" +"2019-09-24 01:05:21.725 UTC [cauthdsl] func2 -> DEBU 328e 0xc003b13940 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.725 UTC [cauthdsl] func1 -> DEBU 328f 0xc003b13940 gate 1569287121724508000 evaluation succeeds" +"2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3290 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3291 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3292 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.725 UTC [policies] Evaluate -> DEBU 3293 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.725 UTC [msp] DeserializeIdentity -> DEBU 3294 Obtaining identity" +"2019-09-24 01:05:21.726 UTC [msp] DeserializeIdentity -> DEBU 3295 Obtaining identity" +"2019-09-24 01:05:21.726 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3296 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:21.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3297 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.727 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3298 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 3299 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 329a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.727 UTC [policies] Evaluate -> DEBU 329b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.727 UTC [cauthdsl] func1 -> DEBU 329c 0xc003d6b110 gate 1569287121727680700 evaluation starts" +"2019-09-24 01:05:21.727 UTC [cauthdsl] func2 -> DEBU 329d 0xc003d6b110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.727 UTC [cauthdsl] func2 -> DEBU 329e 0xc003d6b110 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 329f 0xc003d6b110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a0 0xc003d6b110 principal evaluation fails" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32a1 0xc003d6b110 gate 1569287121727680700 evaluation fails" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32a5 0xc003d6b950 gate 1569287121728361800 evaluation starts" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a6 0xc003d6b950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a7 0xc003d6b950 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32a8 0xc003d6b950 principal matched by identity 0" +"2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32a9 Verify: digest = 00000000 fd 98 b4 0b a4 92 0a 7a b8 19 cd d7 46 6b 91 6b |.......z....Fk.k| +00000010 33 35 ef 72 4f 33 c4 c1 c0 38 5c 3b a6 46 5f 5d |35.rO3...8\;.F_]|" +"2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32aa Verify: sig = 00000000 30 44 02 20 6f 0e 25 74 dc c6 07 d2 c0 b5 1c db |0D. o.%t........| +00000010 5d 84 34 93 bd a8 99 d5 01 fe 70 16 0a 11 93 ec |].4.......p.....| +00000020 83 1c f7 74 02 20 1e 38 46 61 88 bf f9 4a de 2a |...t. .8Fa...J.*| +00000030 d8 51 d3 3d 7a dc 1c 52 60 27 dd 0d a3 6c 9c d3 |.Q.=z..R`'...l..| +00000040 b6 66 27 b7 81 6b |.f'..k|" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func2 -> DEBU 32ab 0xc003d6b950 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.728 UTC [cauthdsl] func1 -> DEBU 32ac 0xc003d6b950 gate 1569287121728361800 evaluation succeeds" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.728 UTC [policies] Evaluate -> DEBU 32b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.728 UTC [msp.identity] Verify -> DEBU 32b1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32b2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:21.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.729 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32b4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func1 -> DEBU 32b8 0xc003b35050 gate 1569287121729251200 evaluation starts" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32b9 0xc003b35050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32ba 0xc003b35050 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32bb 0xc003b35050 principal matched by identity 0" +"2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32bc Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32bd Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func2 -> DEBU 32be 0xc003b35050 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:21.729 UTC [cauthdsl] func1 -> DEBU 32bf 0xc003b35050 gate 1569287121729251200 evaluation succeeds" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c0 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:21.729 UTC [policies] Evaluate -> DEBU 32c3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32c4 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:21.729 UTC [msp.identity] Verify -> DEBU 32c5 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c6 Exiting" +"2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.730 UTC [gossip.pull] HandleMessage -> DEBU 32c8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.730 UTC [gossip.gossip] handleMessage -> DEBU 32c9 Exiting" +"2019-09-24 01:05:21.840 UTC [gossip.comm] func1 -> DEBU 32ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.840 UTC [gossip.gossip] handleMessage -> DEBU 32cb Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.843 UTC [msp] DeserializeIdentity -> DEBU 32cc Obtaining identity" +"2019-09-24 01:05:21.843 UTC [msp] DeserializeIdentity -> DEBU 32cd Obtaining identity" +"2019-09-24 01:05:21.843 UTC [gossip.gossip] handleMessage -> DEBU 32ce Exiting" +"2019-09-24 01:05:21.850 UTC [gossip.comm] func1 -> DEBU 32cf Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.850 UTC [gossip.gossip] handleMessage -> DEBU 32d0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.850 UTC [msp.identity] Verify -> DEBU 32d1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32d2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:21.852 UTC [msp] DeserializeIdentity -> DEBU 32d3 Obtaining identity" +"2019-09-24 01:05:21.852 UTC [gossip.gossip] handleMessage -> DEBU 32d4 Exiting" +"2019-09-24 01:05:21.853 UTC [gossip.comm] func1 -> DEBU 32d5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.853 UTC [gossip.gossip] handleMessage -> DEBU 32d6 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.853 UTC [msp.identity] Verify -> DEBU 32d7 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32d8 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:21.853 UTC [gossip.gossip] handleMessage -> DEBU 32d9 Exiting" +"2019-09-24 01:05:21.854 UTC [gossip.comm] func1 -> DEBU 32da Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.854 UTC [gossip.gossip] handleMessage -> DEBU 32db Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:21.854 UTC [msp.identity] Verify -> DEBU 32dc Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 32dd Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:21.854 UTC [msp] DeserializeIdentity -> DEBU 32de Obtaining identity" +"2019-09-24 01:05:21.854 UTC [gossip.gossip] handleMessage -> DEBU 32df Exiting" +"2019-09-24 01:05:21.860 UTC [gossip.comm] func1 -> DEBU 32e0 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.860 UTC [gossip.gossip] handleMessage -> DEBU 32e1 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.860 UTC [gossip.pull] HandleMessage -> DEBU 32e2 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:21.860 UTC [gossip.pull] SendDigest -> DEBU 32e3 Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:21.861 UTC [gossip.gossip] handleMessage -> DEBU 32e4 Exiting" +"2019-09-24 01:05:22.040 UTC [gossip.comm] func1 -> DEBU 32e5 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.040 UTC [gossip.gossip] handleMessage -> DEBU 32e6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e7 Obtaining identity" +"2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e8 Obtaining identity" +"2019-09-24 01:05:22.041 UTC [msp] DeserializeIdentity -> DEBU 32e9 Obtaining identity" +"2019-09-24 01:05:22.041 UTC [gossip.gossip] handleMessage -> DEBU 32ea Exiting" +"2019-09-24 01:05:22.044 UTC [gossip.comm] func1 -> DEBU 32eb Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.044 UTC [gossip.gossip] handleMessage -> DEBU 32ec Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.044 UTC [msp] DeserializeIdentity -> DEBU 32ed Obtaining identity" +"2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 32ee Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32ef Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.044 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 32f0 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f1 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f2 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.044 UTC [policies] Evaluate -> DEBU 32f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.044 UTC [cauthdsl] func1 -> DEBU 32f4 0xc003c06340 gate 1569287122044616700 evaluation starts" +"2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f5 0xc003c06340 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f6 0xc003c06340 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.044 UTC [cauthdsl] func2 -> DEBU 32f7 0xc003c06340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32f8 0xc003c06340 principal evaluation fails" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 32f9 0xc003c06340 gate 1569287122044616700 evaluation fails" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fa Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 32fc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 32fd 0xc003c06b80 gate 1569287122045263400 evaluation starts" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32fe 0xc003c06b80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 32ff 0xc003c06b80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 3300 0xc003c06b80 principal matched by identity 0" +"2019-09-24 01:05:22.045 UTC [msp.identity] Verify -> DEBU 3301 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:22.045 UTC [msp.identity] Verify -> DEBU 3302 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func2 -> DEBU 3303 0xc003c06b80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.045 UTC [cauthdsl] func1 -> DEBU 3304 0xc003c06b80 gate 1569287122045263400 evaluation succeeds" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3305 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3306 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3307 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.045 UTC [policies] Evaluate -> DEBU 3308 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.045 UTC [msp] DeserializeIdentity -> DEBU 3309 Obtaining identity" +"2019-09-24 01:05:22.045 UTC [gossip.gossip] handleMessage -> DEBU 330a Exiting" +"2019-09-24 01:05:22.051 UTC [gossip.comm] func1 -> DEBU 330b Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.051 UTC [gossip.gossip] handleMessage -> DEBU 330c Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.051 UTC [msp] DeserializeIdentity -> DEBU 330d Obtaining identity" +"2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 330e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 330f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.051 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3310 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3311 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3312 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.051 UTC [policies] Evaluate -> DEBU 3313 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 3314 0xc002fc0650 gate 1569287122052012100 evaluation starts" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3315 0xc002fc0650 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3316 0xc002fc0650 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3317 0xc002fc0650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func2 -> DEBU 3318 0xc002fc0650 principal evaluation fails" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 3319 0xc002fc0650 gate 1569287122052012100 evaluation fails" +"2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.052 UTC [policies] Evaluate -> DEBU 331c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.052 UTC [cauthdsl] func1 -> DEBU 331d 0xc002fc0e90 gate 1569287122052590500 evaluation starts" +"2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 331e 0xc002fc0e90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 331f 0xc002fc0e90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 3320 0xc002fc0e90 principal matched by identity 0" +"2019-09-24 01:05:22.053 UTC [msp.identity] Verify -> DEBU 3321 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:22.053 UTC [msp.identity] Verify -> DEBU 3322 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:22.053 UTC [cauthdsl] func2 -> DEBU 3323 0xc002fc0e90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.054 UTC [cauthdsl] func1 -> DEBU 3324 0xc002fc0e90 gate 1569287122052590500 evaluation succeeds" +"2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3325 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3326 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3327 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.054 UTC [policies] Evaluate -> DEBU 3328 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.054 UTC [msp] DeserializeIdentity -> DEBU 3329 Obtaining identity" +"2019-09-24 01:05:22.054 UTC [gossip.gossip] handleMessage -> DEBU 332a Exiting" +"2019-09-24 01:05:22.127 UTC [endorser] ProcessProposal -> DEBU 332b Entering: request from 172.18.0.5:49970" +"2019-09-24 01:05:22.127 UTC [protoutils] ValidateProposalMessage -> DEBU 332c ValidateProposalMessage starts for signed proposal 0xc002fe21e0" +"2019-09-24 01:05:22.127 UTC [protoutils] validateChannelHeader -> DEBU 332d validateChannelHeader info: header type 3" +"2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 332e begin" +"2019-09-24 01:05:22.127 UTC [msp] GetManagerForChain -> DEBU 332f Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 3330 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:22.127 UTC [protoutils] checkSignatureFromCreator -> DEBU 3331 creator is valid" +"2019-09-24 01:05:22.127 UTC [msp.identity] Verify -> DEBU 3332 Verify: digest = 00000000 39 88 55 65 18 6c c9 83 48 c7 2a 31 4e a6 e9 27 |9.Ue.l..H.*1N..'| +00000010 0e a7 b1 2e 43 ba a4 ac d3 03 d7 86 55 21 7a 9f |....C.......U!z.|" +"2019-09-24 01:05:22.127 UTC [msp.identity] Verify -> DEBU 3333 Verify: sig = 00000000 30 44 02 20 5f ca 34 e3 3c 9d 79 31 8f ae 9b ae |0D. _.4.<.y1....| +00000010 13 79 f0 ab 65 01 88 36 09 f5 d1 a2 19 b0 ea 86 |.y..e..6........| +00000020 48 62 6b ae 02 20 27 99 58 20 72 30 fe b1 88 e8 |Hbk.. '.X r0....| +00000030 ba a8 21 8a c5 b0 9c 82 0e b3 95 3c 71 45 0a e3 |..!........ DEBU 3334 exits successfully" +"2019-09-24 01:05:22.127 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3335 validateChaincodeProposalMessage starts for proposal 0xc0037d8a80, header 0xc002fe25f0" +"2019-09-24 01:05:22.128 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 3336 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 01:05:22.128 UTC [endorser] preProcess -> DEBU 3337 [businesschannel][2284bef8] processing txid: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748" +"2019-09-24 01:05:22.128 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3338 retrieveTransactionByID() - txId = [2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748]" +"2019-09-24 01:05:22.128 UTC [endorser] SimulateProposal -> DEBU 3339 [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.128 UTC [endorser] callChaincode -> INFO 333a [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.128 UTC [chaincode] Execute -> DEBU 333b Entry" +"2019-09-24 01:05:22.128 UTC [cscc] Invoke -> DEBU 333c Invoke function: GetConfigBlock" +"2019-09-24 01:05:22.128 UTC [aclmgmt] CheckACL -> DEBU 333d acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock" +"2019-09-24 01:05:22.128 UTC [aclmgmt] CheckACL -> DEBU 333e acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 333f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 3340 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 3341 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.128 UTC [cauthdsl] func1 -> DEBU 3342 0xc002ac3040 gate 1569287122128547000 evaluation starts" +"2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3343 0xc002ac3040 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3344 0xc002ac3040 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.128 UTC [cauthdsl] func2 -> DEBU 3345 0xc002ac3040 principal matched by identity 0" +"2019-09-24 01:05:22.128 UTC [msp.identity] Verify -> DEBU 3346 Verify: digest = 00000000 39 88 55 65 18 6c c9 83 48 c7 2a 31 4e a6 e9 27 |9.Ue.l..H.*1N..'| +00000010 0e a7 b1 2e 43 ba a4 ac d3 03 d7 86 55 21 7a 9f |....C.......U!z.|" +"2019-09-24 01:05:22.128 UTC [msp.identity] Verify -> DEBU 3347 Verify: sig = 00000000 30 44 02 20 5f ca 34 e3 3c 9d 79 31 8f ae 9b ae |0D. _.4.<.y1....| +00000010 13 79 f0 ab 65 01 88 36 09 f5 d1 a2 19 b0 ea 86 |.y..e..6........| +00000020 48 62 6b ae 02 20 27 99 58 20 72 30 fe b1 88 e8 |Hbk.. '.X r0....| +00000030 ba a8 21 8a c5 b0 9c 82 0e b3 95 3c 71 45 0a e3 |..!........ DEBU 3348 0xc002ac3040 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.128 UTC [cauthdsl] func1 -> DEBU 3349 0xc002ac3040 gate 1569287122128547000 evaluation succeeds" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334a Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.128 UTC [policies] Evaluate -> DEBU 334d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.129 UTC [chaincode] handleMessage -> DEBU 334e [2284bef8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:22.129 UTC [chaincode] Notify -> DEBU 334f [2284bef8] notifying Txid:2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, channelID:businesschannel" +"2019-09-24 01:05:22.129 UTC [chaincode] Execute -> DEBU 3350 Exit" +"2019-09-24 01:05:22.129 UTC [endorser] callChaincode -> INFO 3351 [businesschannel][2284bef8] Exit chaincode: name:"cscc" (1ms)" +"2019-09-24 01:05:22.129 UTC [endorser] SimulateProposal -> DEBU 3352 [businesschannel][2284bef8] Exit" +"2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3353 [businesschannel][2284bef8] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3354 [businesschannel][2284bef8] escc for chaincode name:"cscc" is escc" +"2019-09-24 01:05:22.129 UTC [endorser] EndorseWithPlugin -> DEBU 3355 Entering endorsement for {plugin: escc, channel: businesschannel, tx: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, chaincode: cscc}" +"2019-09-24 01:05:22.129 UTC [msp.identity] Sign -> DEBU 3356 Sign: plaintext: 0A2052A6A572325076ED18A6B2EBC28D...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:22.129 UTC [msp.identity] Sign -> DEBU 3357 Sign: digest: 5AB5B4D9782CA769D92CCF4ADF6F5001F122EEB8BA38964CA3AC5A3B4E1169BA " +"2019-09-24 01:05:22.129 UTC [endorser] EndorseWithPlugin -> DEBU 3358 Exiting {plugin: escc, channel: businesschannel, tx: 2284bef8e6ec64b09e552a64260499ae41e4ee84dcde31f3e102c474cc1c5748, chaincode: cscc}" +"2019-09-24 01:05:22.129 UTC [endorser] endorseProposal -> DEBU 3359 [businesschannel][2284bef8] Exit" +"2019-09-24 01:05:22.130 UTC [endorser] func1 -> DEBU 335a Exit: request from 172.18.0.5:49970" +"2019-09-24 01:05:22.130 UTC [comm.grpc.server] 1 -> INFO 335b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49970 grpc.code=OK grpc.call_duration=3.0172ms +"2019-09-24 01:05:22.135 UTC [grpc] infof -> DEBU 335c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:22.135 UTC [grpc] infof -> DEBU 335d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:22.241 UTC [gossip.comm] func1 -> DEBU 335e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.241 UTC [gossip.gossip] handleMessage -> DEBU 335f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.242 UTC [msp] DeserializeIdentity -> DEBU 3360 Obtaining identity" +"2019-09-24 01:05:22.243 UTC [msp] DeserializeIdentity -> DEBU 3361 Obtaining identity" +"2019-09-24 01:05:22.243 UTC [msp] DeserializeIdentity -> DEBU 3362 Obtaining identity" +"2019-09-24 01:05:22.244 UTC [gossip.gossip] handleMessage -> DEBU 3363 Exiting" +"2019-09-24 01:05:22.246 UTC [gossip.comm] func1 -> DEBU 3364 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.246 UTC [gossip.gossip] handleMessage -> DEBU 3365 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.247 UTC [msp] DeserializeIdentity -> DEBU 3366 Obtaining identity" +"2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3367 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3368 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.248 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3369 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.248 UTC [policies] Evaluate -> DEBU 336c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.249 UTC [cauthdsl] func1 -> DEBU 336d 0xc002ae9eb0 gate 1569287122249536700 evaluation starts" +"2019-09-24 01:05:22.250 UTC [cauthdsl] func2 -> DEBU 336e 0xc002ae9eb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 336f 0xc002ae9eb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 3370 0xc002ae9eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.251 UTC [cauthdsl] func2 -> DEBU 3371 0xc002ae9eb0 principal evaluation fails" +"2019-09-24 01:05:22.252 UTC [cauthdsl] func1 -> DEBU 3372 0xc002ae9eb0 gate 1569287122249536700 evaluation fails" +"2019-09-24 01:05:22.252 UTC [policies] Evaluate -> DEBU 3373 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.253 UTC [policies] Evaluate -> DEBU 3374 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.253 UTC [policies] Evaluate -> DEBU 3375 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.253 UTC [cauthdsl] func1 -> DEBU 3376 0xc0041426f0 gate 1569287122253343700 evaluation starts" +"2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3377 0xc0041426f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3378 0xc0041426f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.253 UTC [cauthdsl] func2 -> DEBU 3379 0xc0041426f0 principal matched by identity 0" +"2019-09-24 01:05:22.254 UTC [msp.identity] Verify -> DEBU 337a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:22.254 UTC [msp.identity] Verify -> DEBU 337b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:22.257 UTC [cauthdsl] func2 -> DEBU 337c 0xc0041426f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.257 UTC [cauthdsl] func1 -> DEBU 337d 0xc0041426f0 gate 1569287122253343700 evaluation succeeds" +"2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 337e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 337f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.257 UTC [policies] Evaluate -> DEBU 3380 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.258 UTC [policies] Evaluate -> DEBU 3381 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.262 UTC [msp] DeserializeIdentity -> DEBU 3382 Obtaining identity" +"2019-09-24 01:05:22.262 UTC [gossip.gossip] handleMessage -> DEBU 3383 Exiting" +"2019-09-24 01:05:22.346 UTC [endorser] ProcessProposal -> DEBU 3384 Entering: request from 172.18.0.5:49974" +"2019-09-24 01:05:22.346 UTC [protoutils] ValidateProposalMessage -> DEBU 3385 ValidateProposalMessage starts for signed proposal 0xc003c742d0" +"2019-09-24 01:05:22.346 UTC [protoutils] validateChannelHeader -> DEBU 3386 validateChannelHeader info: header type 3" +"2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 3387 begin" +"2019-09-24 01:05:22.347 UTC [msp] GetManagerForChain -> DEBU 3388 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 3389 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:22.347 UTC [protoutils] checkSignatureFromCreator -> DEBU 338a creator is valid" +"2019-09-24 01:05:22.347 UTC [msp.identity] Verify -> DEBU 338b Verify: digest = 00000000 24 1c ee 74 08 eb d3 e4 99 54 d3 aa 0b 0f 2d 24 |$..t.....T....-$| +00000010 57 d8 7d 38 07 19 71 49 99 73 2b 62 42 10 f8 22 |W.}8..qI.s+bB.."|" +"2019-09-24 01:05:22.347 UTC [msp.identity] Verify -> DEBU 338c Verify: sig = 00000000 30 44 02 20 7c 23 0c 52 97 21 7c 23 9e e4 3e 00 |0D. |#.R.!|#..>.| +00000010 43 e8 97 68 d8 85 22 bf a4 8d db b3 53 86 dc 57 |C..h..".....S..W| +00000020 44 ba dd e5 02 20 28 f4 20 02 23 50 bb ba f5 71 |D.... (. .#P...q| +00000030 9d 08 ca cc a5 bd 5d 42 71 e6 b2 62 61 36 33 d7 |......]Bq..ba63.| +00000040 bb 1e 3a 01 82 55 |..:..U|" +"2019-09-24 01:05:22.348 UTC [protoutils] checkSignatureFromCreator -> DEBU 338d exits successfully" +"2019-09-24 01:05:22.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 338e validateChaincodeProposalMessage starts for proposal 0xc0001f2540, header 0xc003c74730" +"2019-09-24 01:05:22.348 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 338f validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 01:05:22.349 UTC [endorser] preProcess -> DEBU 3390 [businesschannel][1cf7a26f] processing txid: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1" +"2019-09-24 01:05:22.349 UTC [fsblkstorage] retrieveTransactionByID -> DEBU 3391 retrieveTransactionByID() - txId = [1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1]" +"2019-09-24 01:05:22.349 UTC [endorser] SimulateProposal -> DEBU 3392 [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.349 UTC [endorser] callChaincode -> INFO 3393 [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.349 UTC [chaincode] Execute -> DEBU 3394 Entry" +"2019-09-24 01:05:22.350 UTC [cscc] Invoke -> DEBU 3395 Invoke function: GetChannels" +"2019-09-24 01:05:22.350 UTC [msp.identity] Verify -> DEBU 3396 Verify: digest = 00000000 24 1c ee 74 08 eb d3 e4 99 54 d3 aa 0b 0f 2d 24 |$..t.....T....-$| +00000010 57 d8 7d 38 07 19 71 49 99 73 2b 62 42 10 f8 22 |W.}8..qI.s+bB.."|" +"2019-09-24 01:05:22.350 UTC [msp.identity] Verify -> DEBU 3397 Verify: sig = 00000000 30 44 02 20 7c 23 0c 52 97 21 7c 23 9e e4 3e 00 |0D. |#.R.!|#..>.| +00000010 43 e8 97 68 d8 85 22 bf a4 8d db b3 53 86 dc 57 |C..h..".....S..W| +00000020 44 ba dd e5 02 20 28 f4 20 02 23 50 bb ba f5 71 |D.... (. .#P...q| +00000030 9d 08 ca cc a5 bd 5d 42 71 e6 b2 62 61 36 33 d7 |......]Bq..ba63.| +00000040 bb 1e 3a 01 82 55 |..:..U|" +"2019-09-24 01:05:22.351 UTC [chaincode] handleMessage -> DEBU 3398 [1cf7a26f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:22.351 UTC [chaincode] Notify -> DEBU 3399 [1cf7a26f] notifying Txid:1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, channelID:businesschannel" +"2019-09-24 01:05:22.351 UTC [chaincode] Execute -> DEBU 339a Exit" +"2019-09-24 01:05:22.351 UTC [endorser] callChaincode -> INFO 339b [businesschannel][1cf7a26f] Exit chaincode: name:"cscc" (2ms)" +"2019-09-24 01:05:22.351 UTC [endorser] SimulateProposal -> DEBU 339c [businesschannel][1cf7a26f] Exit" +"2019-09-24 01:05:22.352 UTC [endorser] endorseProposal -> DEBU 339d [businesschannel][1cf7a26f] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:22.352 UTC [endorser] endorseProposal -> DEBU 339e [businesschannel][1cf7a26f] escc for chaincode name:"cscc" is escc" +"2019-09-24 01:05:22.352 UTC [endorser] EndorseWithPlugin -> DEBU 339f Entering endorsement for {plugin: escc, channel: businesschannel, tx: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, chaincode: cscc}" +"2019-09-24 01:05:22.353 UTC [msp.identity] Sign -> DEBU 33a0 Sign: plaintext: 0A203CD1F05BE4A3795BD98365BF1F7D...455254494649434154452D2D2D2D2D0A " +"2019-09-24 01:05:22.353 UTC [msp.identity] Sign -> DEBU 33a1 Sign: digest: D288B09E043683FDDA8ADD03CC0F77AB214FA8BC368157EB9739515446495C67 " +"2019-09-24 01:05:22.353 UTC [endorser] EndorseWithPlugin -> DEBU 33a2 Exiting {plugin: escc, channel: businesschannel, tx: 1cf7a26fcbe483929f5eedcc0b300d1db68d0624a9f0832079ecff0540695fe1, chaincode: cscc}" +"2019-09-24 01:05:22.353 UTC [endorser] endorseProposal -> DEBU 33a3 [businesschannel][1cf7a26f] Exit" +"2019-09-24 01:05:22.353 UTC [endorser] func1 -> DEBU 33a4 Exit: request from 172.18.0.5:49974" +"2019-09-24 01:05:22.354 UTC [comm.grpc.server] 1 -> INFO 33a5 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:49974 grpc.code=OK grpc.call_duration=8.261ms +"2019-09-24 01:05:22.357 UTC [grpc] warningf -> DEBU 33a6 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:49974: read: connection reset by peer" +"2019-09-24 01:05:22.357 UTC [grpc] infof -> DEBU 33a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:22.357 UTC [grpc] infof -> DEBU 33a8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:22.504 UTC [gossip.comm] func1 -> DEBU 33a9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.comm] func1 -> DEBU 33aa Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33ab Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.pull] HandleMessage -> DEBU 33ac GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.pull] SendDigest -> DEBU 33ad Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33ae Exiting" +"2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33af Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.gossip] handleMessage -> DEBU 33b0 Exiting" +"2019-09-24 01:05:22.505 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33b1 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.505 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33b2 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b3 Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +"2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b4 Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +"2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b5 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:22.506 UTC [msp.identity] Verify -> DEBU 33b6 Verify: sig = 00000000 30 44 02 20 72 88 8c a8 26 96 de 17 55 be 48 c2 |0D. r...&...U.H.| +00000010 49 8e cd c3 9a f3 7d 06 b5 f3 92 42 17 4e c0 5e |I.....}....B.N.^| +00000020 3d 24 22 d6 02 20 6f c0 1b 4b 51 aa df 48 9f fb |=$".. o..KQ..H..| +00000030 5b a3 6c 34 0f 2c bd 17 9c c6 7a 2d 9c 8c 46 35 |[.l4.,....z-..F5| +00000040 cf ac 0a 27 1d 54 |...'.T|" +"2019-09-24 01:05:22.506 UTC [gossip.discovery] handleAliveMessage -> DEBU 33b7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33b9 updating membership: timestamp: " +"2019-09-24 01:05:22.506 UTC [gossip.discovery] learnExistingMembers -> DEBU 33ba Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:22.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:22.507 UTC [gossip.discovery] learnExistingMembers -> DEBU 33bc Exiting" +"2019-09-24 01:05:22.507 UTC [gossip.discovery] handleAliveMessage -> DEBU 33bd Exiting" +"2019-09-24 01:05:22.507 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33be Exiting" +"2019-09-24 01:05:22.507 UTC [gossip.discovery] sendMemResponse -> DEBU 33bf Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:22.507 UTC [msp] DeserializeIdentity -> DEBU 33c0 Obtaining identity" +"2019-09-24 01:05:22.507 UTC [msp] DeserializeIdentity -> DEBU 33c1 Obtaining identity" +"2019-09-24 01:05:22.507 UTC [gossip.comm] Send -> DEBU 33c2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.507 UTC [gossip.discovery] sendMemResponse -> DEBU 33c3 Exiting, replying with alive: > alive: " +"2019-09-24 01:05:22.507 UTC [gossip.comm] sendToEndpoint -> DEBU 33c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.507 UTC [gossip.comm] sendToEndpoint -> DEBU 33c5 Exiting" +"2019-09-24 01:05:22.783 UTC [gossip.comm] func1 -> DEBU 33c6 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.784 UTC [gossip.gossip] handleMessage -> DEBU 33c7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.784 UTC [gossip.pull] HandleMessage -> DEBU 33c8 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.785 UTC [msp] DeserializeIdentity -> DEBU 33c9 Obtaining identity" +"2019-09-24 01:05:22.785 UTC [msp] DeserializeIdentity -> DEBU 33ca Obtaining identity" +"2019-09-24 01:05:22.786 UTC [msp] DeserializeIdentity -> DEBU 33cb Obtaining identity" +"2019-09-24 01:05:22.787 UTC [msp] DeserializeIdentity -> DEBU 33cc Obtaining identity" +"2019-09-24 01:05:22.787 UTC [msp] DeserializeIdentity -> DEBU 33cd Obtaining identity" +"2019-09-24 01:05:22.788 UTC [msp] DeserializeIdentity -> DEBU 33ce Obtaining identity" +"2019-09-24 01:05:22.788 UTC [gossip.pull] SendDigest -> DEBU 33cf Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:22.789 UTC [gossip.gossip] handleMessage -> DEBU 33d0 Exiting" +"2019-09-24 01:05:22.801 UTC [gossip.comm] func1 -> DEBU 33d1 Got message: GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.801 UTC [gossip.gossip] handleMessage -> DEBU 33d2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.802 UTC [gossip.gossip] handleMessage -> DEBU 33d3 Exiting" +"2019-09-24 01:05:22.802 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33d4 Got message: GossipMessage: tag:EMPTY mem_req:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.802 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 33d5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:22.803 UTC [msp] DeserializeIdentity -> DEBU 33d6 Obtaining identity" +"2019-09-24 01:05:22.803 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 33d7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33d8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 33d9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33da == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33db This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.805 UTC [policies] Evaluate -> DEBU 33dc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.806 UTC [cauthdsl] func1 -> DEBU 33dd 0xc0029d8220 gate 1569287122806032000 evaluation starts" +"2019-09-24 01:05:22.806 UTC [cauthdsl] func2 -> DEBU 33de 0xc0029d8220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.806 UTC [cauthdsl] func2 -> DEBU 33df 0xc0029d8220 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.807 UTC [cauthdsl] func2 -> DEBU 33e0 0xc0029d8220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.807 UTC [cauthdsl] func2 -> DEBU 33e1 0xc0029d8220 principal evaluation fails" +"2019-09-24 01:05:22.807 UTC [cauthdsl] func1 -> DEBU 33e2 0xc0029d8220 gate 1569287122806032000 evaluation fails" +"2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.808 UTC [policies] Evaluate -> DEBU 33e5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.809 UTC [cauthdsl] func1 -> DEBU 33e6 0xc0029d8bc0 gate 1569287122809326900 evaluation starts" +"2019-09-24 01:05:22.809 UTC [cauthdsl] func2 -> DEBU 33e7 0xc0029d8bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.809 UTC [cauthdsl] func2 -> DEBU 33e8 0xc0029d8bc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.810 UTC [cauthdsl] func2 -> DEBU 33e9 0xc0029d8bc0 principal matched by identity 0" +"2019-09-24 01:05:22.810 UTC [msp.identity] Verify -> DEBU 33ea Verify: digest = 00000000 1d a2 9c 33 5f 83 24 e0 38 13 96 71 3d e0 47 ed |...3_.$.8..q=.G.| +00000010 27 88 c0 86 10 6a 34 99 a6 c0 e5 37 87 55 af 82 |'....j4....7.U..|" +"2019-09-24 01:05:22.811 UTC [msp.identity] Verify -> DEBU 33eb Verify: sig = 00000000 30 44 02 20 0f 9c e4 a5 24 f2 1e 56 62 21 94 a0 |0D. ....$..Vb!..| +00000010 1a 26 b1 3e 2f ce 4a 62 37 56 53 59 15 2f 75 18 |.&.>/.Jb7VSY./u.| +00000020 c9 b7 31 d2 02 20 6d 49 1b d5 28 b1 d7 49 d8 f1 |..1.. mI..(..I..| +00000030 2b 73 0e 04 7e c2 70 c8 35 bf 2f 44 6a 9e 68 31 |+s..~.p.5./Dj.h1| +00000040 ce 9e 6c 59 58 64 |..lYXd|" +"2019-09-24 01:05:22.811 UTC [cauthdsl] func2 -> DEBU 33ec 0xc0029d8bc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.812 UTC [cauthdsl] func1 -> DEBU 33ed 0xc0029d8bc0 gate 1569287122809326900 evaluation succeeds" +"2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33ee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33ef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.812 UTC [policies] Evaluate -> DEBU 33f0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.813 UTC [policies] Evaluate -> DEBU 33f1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.814 UTC [gossip.discovery] handleAliveMessage -> DEBU 33f2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.815 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:22.815 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f4 updating membership: timestamp: " +"2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:22.816 UTC [gossip.discovery] learnExistingMembers -> DEBU 33f7 Exiting" +"2019-09-24 01:05:22.817 UTC [gossip.discovery] handleAliveMessage -> DEBU 33f8 Exiting" +"2019-09-24 01:05:22.817 UTC [gossip.discovery] handleMsgFromComm -> DEBU 33f9 Exiting" +"2019-09-24 01:05:22.817 UTC [gossip.discovery] sendMemResponse -> DEBU 33fa Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:22.818 UTC [msp] DeserializeIdentity -> DEBU 33fb Obtaining identity" +"2019-09-24 01:05:22.818 UTC [msp] DeserializeIdentity -> DEBU 33fc Obtaining identity" +"2019-09-24 01:05:22.819 UTC [msp] DeserializeIdentity -> DEBU 33fd Obtaining identity" +"2019-09-24 01:05:22.819 UTC [gossip.comm] Send -> DEBU 33fe Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.819 UTC [gossip.comm] sendToEndpoint -> DEBU 33ff Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.820 UTC [gossip.comm] sendToEndpoint -> DEBU 3400 Exiting" +"2019-09-24 01:05:22.820 UTC [gossip.discovery] sendMemResponse -> DEBU 3401 Exiting, replying with alive: alive:\301\261\357\016?\344\273\353\241c\247-\257\016\336\002 x\326\n\373^\372\222\026&\t\026\340\326\206\245\312\276\337AV\301\352\321\213\343\320\344\303\267\203\2066" > alive:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > alive: " +"2019-09-24 01:05:22.837 UTC [gossip.pull] Hello -> DEBU 3402 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3403 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.838 UTC [gossip.pull] Hello -> DEBU 3404 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3405 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.838 UTC [gossip.pull] Hello -> DEBU 3406 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:22.838 UTC [gossip.comm] Send -> DEBU 3407 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 3408 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 3409 Exiting" +"2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 340a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.838 UTC [gossip.comm] sendToEndpoint -> DEBU 340b Exiting" +"2019-09-24 01:05:22.839 UTC [gossip.comm] sendToEndpoint -> DEBU 340c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.839 UTC [gossip.comm] sendToEndpoint -> DEBU 340d Exiting" +"2019-09-24 01:05:22.840 UTC [gossip.comm] func1 -> DEBU 340e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.840 UTC [gossip.gossip] handleMessage -> DEBU 340f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.841 UTC [gossip.pull] HandleMessage -> DEBU 3410 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.841 UTC [gossip.comm] func1 -> DEBU 3411 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.841 UTC [gossip.gossip] handleMessage -> DEBU 3412 Exiting" +"2019-09-24 01:05:22.842 UTC [gossip.gossip] handleMessage -> DEBU 3414 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.842 UTC [gossip.pull] HandleMessage -> DEBU 3415 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.842 UTC [gossip.gossip] handleMessage -> DEBU 3416 Exiting" +"2019-09-24 01:05:22.841 UTC [gossip.comm] func1 -> DEBU 3413 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.843 UTC [gossip.gossip] handleMessage -> DEBU 3417 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.843 UTC [gossip.pull] HandleMessage -> DEBU 3418 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.843 UTC [gossip.gossip] handleMessage -> DEBU 3419 Exiting" +"2019-09-24 01:05:22.844 UTC [gossip.comm] func1 -> DEBU 341a Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.844 UTC [gossip.gossip] handleMessage -> DEBU 341b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.845 UTC [gossip.pull] HandleMessage -> DEBU 341c GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.845 UTC [msp] DeserializeIdentity -> DEBU 341d Obtaining identity" +"2019-09-24 01:05:22.845 UTC [msp] DeserializeIdentity -> DEBU 341e Obtaining identity" +"2019-09-24 01:05:22.846 UTC [msp] DeserializeIdentity -> DEBU 341f Obtaining identity" +"2019-09-24 01:05:22.846 UTC [msp] DeserializeIdentity -> DEBU 3420 Obtaining identity" +"2019-09-24 01:05:22.847 UTC [msp] DeserializeIdentity -> DEBU 3421 Obtaining identity" +"2019-09-24 01:05:22.847 UTC [msp] DeserializeIdentity -> DEBU 3422 Obtaining identity" +"2019-09-24 01:05:22.848 UTC [gossip.pull] SendDigest -> DEBU 3423 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:22.848 UTC [gossip.gossip] handleMessage -> DEBU 3424 Exiting" +"2019-09-24 01:05:22.863 UTC [gossip.comm] func1 -> DEBU 3425 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.863 UTC [gossip.gossip] handleMessage -> DEBU 3426 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.864 UTC [gossip.gossip] handleMessage -> DEBU 3427 Exiting" +"2019-09-24 01:05:22.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3428 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.873 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3429 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:22.873 UTC [msp] DeserializeIdentity -> DEBU 342a Obtaining identity" +"2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 342b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 342c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 342d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.873 UTC [policies] Evaluate -> DEBU 342e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.874 UTC [policies] Evaluate -> DEBU 342f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.874 UTC [policies] Evaluate -> DEBU 3430 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func1 -> DEBU 3431 0xc002872f40 gate 1569287122874279300 evaluation starts" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3432 0xc002872f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3433 0xc002872f40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3434 0xc002872f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func2 -> DEBU 3435 0xc002872f40 principal evaluation fails" +"2019-09-24 01:05:22.874 UTC [cauthdsl] func1 -> DEBU 3436 0xc002872f40 gate 1569287122874279300 evaluation fails" +"2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3437 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3438 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.875 UTC [policies] Evaluate -> DEBU 3439 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.875 UTC [cauthdsl] func1 -> DEBU 343a 0xc0028737f0 gate 1569287122875894600 evaluation starts" +"2019-09-24 01:05:22.875 UTC [cauthdsl] func2 -> DEBU 343b 0xc0028737f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 343c 0xc0028737f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 343d 0xc0028737f0 principal matched by identity 0" +"2019-09-24 01:05:22.876 UTC [msp.identity] Verify -> DEBU 343e Verify: digest = 00000000 2c 1e 36 ad a5 25 a9 3b 80 6c e7 88 4f e9 13 d8 |,.6..%.;.l..O...| +00000010 3a 82 ec d7 36 24 01 c8 2f f8 c6 44 8e 70 e3 f1 |:...6$../..D.p..|" +"2019-09-24 01:05:22.876 UTC [msp.identity] Verify -> DEBU 343f Verify: sig = 00000000 30 45 02 21 00 86 6f d9 12 d6 86 e7 67 d8 71 76 |0E.!..o.....g.qv| +00000010 a9 09 1c 32 0f 6b 24 11 ce 84 d9 7b 03 4c e5 4c |...2.k$....{.L.L| +00000020 8f af 41 6a 06 02 20 0a ec 2e f1 39 9e 83 30 88 |..Aj.. ....9..0.| +00000030 d0 d3 49 34 97 02 3c 38 ce 16 09 7f f4 60 28 6b |..I4..<8.....`(k| +00000040 c2 b8 0a 40 fc ab 2d |...@..-|" +"2019-09-24 01:05:22.876 UTC [cauthdsl] func2 -> DEBU 3440 0xc0028737f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.876 UTC [cauthdsl] func1 -> DEBU 3441 0xc0028737f0 gate 1569287122875894600 evaluation succeeds" +"2019-09-24 01:05:22.876 UTC [policies] Evaluate -> DEBU 3442 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3443 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3444 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.877 UTC [policies] Evaluate -> DEBU 3445 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 3446 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3447 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:22.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 3448 updating membership: timestamp: " +"2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 3449 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 344a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:22.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 344b Exiting" +"2019-09-24 01:05:22.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 344c Exiting" +"2019-09-24 01:05:22.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 344d Exiting" +"2019-09-24 01:05:22.878 UTC [gossip.discovery] sendMemResponse -> DEBU 344e Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:22.878 UTC [msp] DeserializeIdentity -> DEBU 344f Obtaining identity" +"2019-09-24 01:05:22.876 UTC [msp] GetDefaultSigningIdentity -> DEBU 3450 Obtaining default signing identity" +"2019-09-24 01:05:22.879 UTC [msp.identity] Sign -> DEBU 3452 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151026 " +"2019-09-24 01:05:22.879 UTC [msp.identity] Sign -> DEBU 3453 Sign: digest: B051FE9CE64E788203FB920315C922512F1B8A11CC28B01474981166B207EC72 " +"2019-09-24 01:05:22.878 UTC [msp] DeserializeIdentity -> DEBU 3451 Obtaining identity" +"2019-09-24 01:05:22.880 UTC [msp] DeserializeIdentity -> DEBU 3454 Obtaining identity" +"2019-09-24 01:05:22.880 UTC [gossip.comm] Send -> DEBU 3455 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.880 UTC [gossip.discovery] sendMemResponse -> DEBU 3456 Exiting, replying with alive: alive: alive:/\316Jb7VSY\025/u\030\311\2671\322\002 mI\033\325(\261\327I\330\361+s\016\004~\302p\3105\277/Dj\236h1\316\236lYXd" > alive: " +"2019-09-24 01:05:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 3457 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.880 UTC [gossip.comm] sendToEndpoint -> DEBU 3459 Exiting" +"2019-09-24 01:05:22.880 UTC [msp] GetDefaultSigningIdentity -> DEBU 3458 Obtaining default signing identity" +"2019-09-24 01:05:22.881 UTC [msp.identity] Sign -> DEBU 345a Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:22.881 UTC [msp.identity] Sign -> DEBU 345b Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:22.882 UTC [gossip.comm] Send -> DEBU 345c Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.882 UTC [msp] DeserializeIdentity -> DEBU 345d Obtaining identity" +"2019-09-24 01:05:22.882 UTC [gossip.comm] sendToEndpoint -> DEBU 345e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.882 UTC [gossip.comm] sendToEndpoint -> DEBU 3460 Exiting" +"2019-09-24 01:05:22.882 UTC [gossip.comm] Send -> DEBU 345f Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.883 UTC [msp] DeserializeIdentity -> DEBU 3461 Obtaining identity" +"2019-09-24 01:05:22.883 UTC [gossip.comm] Send -> DEBU 3462 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3463 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3464 Exiting" +"2019-09-24 01:05:22.884 UTC [gossip.comm] sendToEndpoint -> DEBU 3465 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.885 UTC [gossip.comm] sendToEndpoint -> DEBU 3466 Exiting" +"2019-09-24 01:05:22.885 UTC [gossip.comm] func1 -> DEBU 3467 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.885 UTC [gossip.gossip] handleMessage -> DEBU 3468 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.886 UTC [gossip.gossip] handleMessage -> DEBU 3469 Exiting" +"2019-09-24 01:05:22.886 UTC [gossip.discovery] handleMsgFromComm -> DEBU 346a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.886 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 346b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:22.887 UTC [msp.identity] Verify -> DEBU 346c Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +"2019-09-24 01:05:22.887 UTC [gossip.comm] func1 -> DEBU 346d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.895 UTC [gossip.gossip] handleMessage -> DEBU 346f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.887 UTC [gossip.comm] func1 -> DEBU 346e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.895 UTC [msp.identity] Verify -> DEBU 3470 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +00000040 5c ba 34 3b 4a cf |\.4;J.|" +"2019-09-24 01:05:22.896 UTC [msp.identity] Verify -> DEBU 3471 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:22.896 UTC [msp.identity] Verify -> DEBU 3472 Verify: sig = 00000000 30 44 02 20 7e a4 67 cd 40 36 7e 8b b1 7c d8 91 |0D. ~.g.@6~..|..| +00000010 66 c0 33 99 8b 60 97 85 65 0d 94 3f 13 da 73 59 |f.3..`..e..?..sY| +00000020 c2 2d 4b bb 02 20 2c 11 13 1e 59 3f 2f e7 e5 d0 |.-K.. ,...Y?/...| +00000030 e0 42 f5 63 6d dd a0 2c 55 24 e2 bb 40 2f 96 85 |.B.cm..,U$..@/..| +00000040 ec d5 5b 8f f1 04 |..[...|" +"2019-09-24 01:05:22.897 UTC [gossip.discovery] handleAliveMessage -> DEBU 3473 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:22.897 UTC [gossip.discovery] isSentByMe -> DEBU 3474 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:22.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3475 Exiting" +"2019-09-24 01:05:22.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3476 Exiting" +"2019-09-24 01:05:22.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3477 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.899 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3479 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:22.898 UTC [gossip.gossip] handleMessage -> DEBU 3478 Exiting" +"2019-09-24 01:05:22.899 UTC [gossip.gossip] handleMessage -> DEBU 347a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.899 UTC [msp] DeserializeIdentity -> DEBU 347b Obtaining identity" +"2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 347c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.900 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 347e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.900 UTC [policies] Evaluate -> DEBU 347f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.901 UTC [policies] Evaluate -> DEBU 3480 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.901 UTC [policies] Evaluate -> DEBU 3481 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.901 UTC [cauthdsl] func1 -> DEBU 3482 0xc002837c40 gate 1569287122901715100 evaluation starts" +"2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3483 0xc002837c40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3484 0xc002837c40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.902 UTC [cauthdsl] func2 -> DEBU 3485 0xc002837c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.903 UTC [cauthdsl] func2 -> DEBU 3486 0xc002837c40 principal evaluation fails" +"2019-09-24 01:05:22.903 UTC [cauthdsl] func1 -> DEBU 3487 0xc002837c40 gate 1569287122901715100 evaluation fails" +"2019-09-24 01:05:22.903 UTC [policies] Evaluate -> DEBU 3488 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.903 UTC [policies] Evaluate -> DEBU 3489 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.904 UTC [policies] Evaluate -> DEBU 348a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.904 UTC [cauthdsl] func1 -> DEBU 348b 0xc0027f4490 gate 1569287122904412200 evaluation starts" +"2019-09-24 01:05:22.904 UTC [cauthdsl] func2 -> DEBU 348c 0xc0027f4490 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.905 UTC [cauthdsl] func2 -> DEBU 348d 0xc0027f4490 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.905 UTC [cauthdsl] func2 -> DEBU 348e 0xc0027f4490 principal matched by identity 0" +"2019-09-24 01:05:22.905 UTC [msp.identity] Verify -> DEBU 348f Verify: digest = 00000000 1d a2 9c 33 5f 83 24 e0 38 13 96 71 3d e0 47 ed |...3_.$.8..q=.G.| +00000010 27 88 c0 86 10 6a 34 99 a6 c0 e5 37 87 55 af 82 |'....j4....7.U..|" +"2019-09-24 01:05:22.906 UTC [msp.identity] Verify -> DEBU 3490 Verify: sig = 00000000 30 44 02 20 0f 9c e4 a5 24 f2 1e 56 62 21 94 a0 |0D. ....$..Vb!..| +00000010 1a 26 b1 3e 2f ce 4a 62 37 56 53 59 15 2f 75 18 |.&.>/.Jb7VSY./u.| +00000020 c9 b7 31 d2 02 20 6d 49 1b d5 28 b1 d7 49 d8 f1 |..1.. mI..(..I..| +00000030 2b 73 0e 04 7e c2 70 c8 35 bf 2f 44 6a 9e 68 31 |+s..~.p.5./Dj.h1| +00000040 ce 9e 6c 59 58 64 |..lYXd|" +"2019-09-24 01:05:22.906 UTC [cauthdsl] func2 -> DEBU 3491 0xc0027f4490 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.906 UTC [cauthdsl] func1 -> DEBU 3492 0xc0027f4490 gate 1569287122904412200 evaluation succeeds" +"2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3493 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3494 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3495 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.907 UTC [policies] Evaluate -> DEBU 3496 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 3497 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.908 UTC [gossip.discovery] handleAliveMessage -> DEBU 3498 Exiting" +"2019-09-24 01:05:22.908 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3499 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:22.909 UTC [msp.identity] Verify -> DEBU 349a Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +"2019-09-24 01:05:22.909 UTC [msp.identity] Verify -> DEBU 349b Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +"2019-09-24 01:05:22.909 UTC [gossip.discovery] handleAliveMessage -> DEBU 349c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 349d Exiting" +"2019-09-24 01:05:22.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 349e Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:22.911 UTC [msp.identity] Verify -> DEBU 349f Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +"2019-09-24 01:05:22.911 UTC [msp.identity] Verify -> DEBU 34a0 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +00000040 5c ba 34 3b 4a cf |\.4;J.|" +"2019-09-24 01:05:22.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.911 UTC [gossip.discovery] isSentByMe -> DEBU 34a2 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.912 UTC [gossip.discovery] handleAliveMessage -> DEBU 34a3 Exiting" +"2019-09-24 01:05:22.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a4 Exiting" +"2019-09-24 01:05:22.912 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34a5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:22.913 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34a6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:22.913 UTC [gossip.gossip] handleMessage -> DEBU 34a7 Exiting" +"2019-09-24 01:05:22.914 UTC [msp.identity] Verify -> DEBU 34a8 Verify: digest = 00000000 b0 51 fe 9c e6 4e 78 82 03 fb 92 03 15 c9 22 51 |.Q...Nx......."Q| +00000010 2f 1b 8a 11 cc 28 b0 14 74 98 11 66 b2 07 ec 72 |/....(..t..f...r|" +"2019-09-24 01:05:22.914 UTC [msp.identity] Verify -> DEBU 34a9 Verify: sig = 00000000 30 44 02 20 54 50 8a fc c1 1a 77 48 74 8f a8 d1 |0D. TP....wHt...| +00000010 4a 08 b9 85 93 c7 f0 1c e6 96 f8 54 b4 e0 22 b4 |J..........T..".| +00000020 8e 5e b2 85 02 20 4f ba ab 8b f0 16 70 dd 56 18 |.^... O.....p.V.| +00000030 83 4b 3c 10 c6 c0 38 28 49 33 eb fb af 4f 9e 9b |.K<...8(I3...O..| +00000040 5c ba 34 3b 4a cf |\.4;J.|" +"2019-09-24 01:05:22.915 UTC [gossip.discovery] handleAliveMessage -> DEBU 34aa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.915 UTC [gossip.discovery] isSentByMe -> DEBU 34ab Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:22.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ac Exiting" +"2019-09-24 01:05:22.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34ad Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:22.916 UTC [msp] DeserializeIdentity -> DEBU 34ae Obtaining identity" +"2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.917 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34b1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:22.918 UTC [policies] Evaluate -> DEBU 34b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:22.918 UTC [cauthdsl] func1 -> DEBU 34b5 0xc002762120 gate 1569287122918744300 evaluation starts" +"2019-09-24 01:05:22.918 UTC [cauthdsl] func2 -> DEBU 34b6 0xc002762120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b7 0xc002762120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b8 0xc002762120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:22.919 UTC [cauthdsl] func2 -> DEBU 34b9 0xc002762120 principal evaluation fails" +"2019-09-24 01:05:22.920 UTC [cauthdsl] func1 -> DEBU 34ba 0xc002762120 gate 1569287122918744300 evaluation fails" +"2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:22.920 UTC [policies] Evaluate -> DEBU 34bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:22.921 UTC [cauthdsl] func1 -> DEBU 34be 0xc0027629e0 gate 1569287122921352000 evaluation starts" +"2019-09-24 01:05:22.921 UTC [cauthdsl] func2 -> DEBU 34bf 0xc0027629e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:22.921 UTC [cauthdsl] func2 -> DEBU 34c0 0xc0027629e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:22.922 UTC [cauthdsl] func2 -> DEBU 34c1 0xc0027629e0 principal matched by identity 0" +"2019-09-24 01:05:22.922 UTC [msp.identity] Verify -> DEBU 34c2 Verify: digest = 00000000 2c 1e 36 ad a5 25 a9 3b 80 6c e7 88 4f e9 13 d8 |,.6..%.;.l..O...| +00000010 3a 82 ec d7 36 24 01 c8 2f f8 c6 44 8e 70 e3 f1 |:...6$../..D.p..|" +"2019-09-24 01:05:22.922 UTC [msp.identity] Verify -> DEBU 34c3 Verify: sig = 00000000 30 45 02 21 00 86 6f d9 12 d6 86 e7 67 d8 71 76 |0E.!..o.....g.qv| +00000010 a9 09 1c 32 0f 6b 24 11 ce 84 d9 7b 03 4c e5 4c |...2.k$....{.L.L| +00000020 8f af 41 6a 06 02 20 0a ec 2e f1 39 9e 83 30 88 |..Aj.. ....9..0.| +00000030 d0 d3 49 34 97 02 3c 38 ce 16 09 7f f4 60 28 6b |..I4..<8.....`(k| +00000040 c2 b8 0a 40 fc ab 2d |...@..-|" +"2019-09-24 01:05:22.923 UTC [cauthdsl] func2 -> DEBU 34c4 0xc0027629e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:22.923 UTC [cauthdsl] func1 -> DEBU 34c5 0xc0027629e0 gate 1569287122921352000 evaluation succeeds" +"2019-09-24 01:05:22.923 UTC [policies] Evaluate -> DEBU 34c6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.924 UTC [policies] Evaluate -> DEBU 34c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:22.924 UTC [policies] Evaluate -> DEBU 34c8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:22.925 UTC [policies] Evaluate -> DEBU 34c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:22.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 34ca Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 34cb Exiting" +"2019-09-24 01:05:22.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34cc Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:22.926 UTC [msp.identity] Verify -> DEBU 34cd Verify: digest = 00000000 a6 13 86 a1 05 91 9f 0b 47 0e 09 b2 ee 6c a8 51 |........G....l.Q| +00000010 21 56 f3 13 91 2b bc 87 52 07 1a 00 16 85 ca 81 |!V...+..R.......|" +"2019-09-24 01:05:22.927 UTC [msp.identity] Verify -> DEBU 34ce Verify: sig = 00000000 30 45 02 21 00 f8 cf a5 d6 21 ef 9f 4f 61 7b fb |0E.!.....!..Oa{.| +00000010 5f 48 72 da 7e a7 c3 1e 9b 7d 2a bb 6b 69 48 6b |_Hr.~....}*.kiHk| +00000020 eb d3 46 0a 97 02 20 4d 33 a2 cd 52 0a d1 3a e5 |..F... M3..R..:.| +00000030 24 cf 2e 65 07 91 7e ab df 79 9f 37 b0 1e 3f d9 |$..e..~..y.7..?.| +00000040 8a 44 25 bb b1 71 16 |.D%..q.|" +"2019-09-24 01:05:22.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 34cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:22.927 UTC [gossip.discovery] handleAliveMessage -> DEBU 34d0 Exiting" +"2019-09-24 01:05:22.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d1 Exiting" +"2019-09-24 01:05:23.514 UTC [gossip.comm] func1 -> DEBU 34d2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.514 UTC [gossip.gossip] handleMessage -> DEBU 34d3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.514 UTC [gossip.gossip] handleMessage -> DEBU 34d4 Exiting" +"2019-09-24 01:05:23.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34d5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.516 UTC [gossip.comm] func1 -> DEBU 34d7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34d8 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:23.517 UTC [msp.identity] Verify -> DEBU 34d9 Verify: digest = 00000000 70 7a c9 73 7a 3f 46 1d 7c 8b 81 bd d4 8c 33 74 |pz.sz?F.|.....3t| +00000010 6c c1 fd 4f ba db f0 fa de 29 db 96 18 9c d8 74 |l..O.....).....t|" +"2019-09-24 01:05:23.517 UTC [msp.identity] Verify -> DEBU 34db Verify: sig = 00000000 30 45 02 21 00 e2 9f a1 4f 10 cd 17 d7 51 99 bc |0E.!....O....Q..| +00000010 b2 e6 29 97 e7 0a d7 53 84 21 0c 76 1a 44 e8 8a |..)....S.!.v.D..| +00000020 73 80 8e 41 1a 02 20 56 0b ea f4 31 3a b3 8e 29 |s..A.. V...1:..)| +00000030 74 ab 88 0d b2 3c ea 8b ee 78 7c db e2 8c f2 7e |t....<...x|....~| +00000040 8a fb 4d 0c 3b dd d1 |..M.;..|" +"2019-09-24 01:05:23.516 UTC [gossip.gossip] handleMessage -> DEBU 34da Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.514 UTC [gossip.comm] func1 -> DEBU 34d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 34dc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 34dd Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:23.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 34de updating membership: timestamp: " +"2019-09-24 01:05:23.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 34df Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:23.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 34e0 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:23.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 34e1 Exiting" +"2019-09-24 01:05:23.520 UTC [gossip.discovery] handleAliveMessage -> DEBU 34e2 Exiting" +"2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e3 Exiting" +"2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e5 Exiting" +"2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e6 Exiting" +"2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.521 UTC [gossip.gossip] handleMessage -> DEBU 34e8 Exiting" +"2019-09-24 01:05:23.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34ea Exiting" +"2019-09-24 01:05:23.527 UTC [msp] DeserializeIdentity -> DEBU 34eb Obtaining identity" +"2019-09-24 01:05:23.527 UTC [msp] DeserializeIdentity -> DEBU 34ec Obtaining identity" +"2019-09-24 01:05:23.528 UTC [gossip.comm] Send -> DEBU 34ed Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:23.529 UTC [msp] DeserializeIdentity -> DEBU 34ee Obtaining identity" +"2019-09-24 01:05:23.530 UTC [gossip.comm] Send -> DEBU 34f0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:23.529 UTC [gossip.comm] sendToEndpoint -> DEBU 34ef Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.530 UTC [gossip.comm] sendToEndpoint -> DEBU 34f1 Exiting" +"2019-09-24 01:05:23.531 UTC [gossip.comm] sendToEndpoint -> DEBU 34f2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:23.531 UTC [gossip.comm] sendToEndpoint -> DEBU 34f3 Exiting" +"2019-09-24 01:05:24.136 UTC [gossip.comm] func1 -> DEBU 34f4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.136 UTC [gossip.gossip] handleMessage -> DEBU 34f5 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.142 UTC [gossip.comm] func1 -> DEBU 34f8 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.136 UTC [gossip.gossip] handleMessage -> DEBU 34f9 Exiting" +"2019-09-24 01:05:24.144 UTC [gossip.gossip] handleMessage -> DEBU 34fa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.145 UTC [gossip.discovery] handleMsgFromComm -> DEBU 34fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.145 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 34fc Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:24.145 UTC [msp] DeserializeIdentity -> DEBU 34fd Obtaining identity" +"2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 34fe Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 34ff Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:24.146 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3500 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:24.146 UTC [policies] Evaluate -> DEBU 3501 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:24.149 UTC [policies] Evaluate -> DEBU 3503 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.149 UTC [policies] Evaluate -> DEBU 3504 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:24.149 UTC [cauthdsl] func1 -> DEBU 3505 0xc002675240 gate 1569287124149903900 evaluation starts" +"2019-09-24 01:05:24.149 UTC [cauthdsl] func2 -> DEBU 3506 0xc002675240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3507 0xc002675240 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3508 0xc002675240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:24.149 UTC [gossip.comm] func1 -> DEBU 3502 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.150 UTC [cauthdsl] func2 -> DEBU 3509 0xc002675240 principal evaluation fails" +"2019-09-24 01:05:24.154 UTC [cauthdsl] func1 -> DEBU 350a 0xc002675240 gate 1569287124149903900 evaluation fails" +"2019-09-24 01:05:24.154 UTC [policies] Evaluate -> DEBU 350b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.154 UTC [policies] Evaluate -> DEBU 350c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.155 UTC [policies] Evaluate -> DEBU 350d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:24.155 UTC [cauthdsl] func1 -> DEBU 350e 0xc002675a80 gate 1569287124155141500 evaluation starts" +"2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 350f 0xc002675a80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 3510 0xc002675a80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:24.155 UTC [cauthdsl] func2 -> DEBU 3511 0xc002675a80 principal matched by identity 0" +"2019-09-24 01:05:24.158 UTC [gossip.comm] func1 -> DEBU 3512 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.156 UTC [msp.identity] Verify -> DEBU 3513 Verify: digest = 00000000 51 7f dd 77 51 60 4f 4c d6 11 0f 13 07 3a 33 9f |Q..wQ`OL.....:3.| +00000010 3b 07 81 29 a1 5f a1 0f 35 3a 6f a8 64 28 33 72 |;..)._..5:o.d(3r|" +"2019-09-24 01:05:24.158 UTC [msp.identity] Verify -> DEBU 3514 Verify: sig = 00000000 30 45 02 21 00 df ba 94 a7 91 29 30 e9 5b d1 a7 |0E.!......)0.[..| +00000010 a5 4b 7d 4b 61 d4 b6 9c 0f 24 c9 40 72 c4 7c ab |.K}Ka....$.@r.|.| +00000020 5c b1 ff 3e 10 02 20 18 de 36 96 6c 26 90 4b 96 |\..>.. ..6.l&.K.| +00000030 61 92 79 6a 82 02 63 de de 73 f6 be 6c b7 50 89 |a.yj..c..s..l.P.| +00000040 cd 24 29 d0 0a c1 fc |.$)....|" +"2019-09-24 01:05:24.159 UTC [cauthdsl] func2 -> DEBU 3515 0xc002675a80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.159 UTC [cauthdsl] func1 -> DEBU 3516 0xc002675a80 gate 1569287124155141500 evaluation succeeds" +"2019-09-24 01:05:24.160 UTC [policies] Evaluate -> DEBU 3517 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.160 UTC [policies] Evaluate -> DEBU 3518 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.161 UTC [policies] Evaluate -> DEBU 3519 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:24.163 UTC [policies] Evaluate -> DEBU 351a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:24.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 351b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 351c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:24.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 351d updating membership: timestamp: " +"2019-09-24 01:05:24.164 UTC [gossip.discovery] learnExistingMembers -> DEBU 351e Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:24.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 351f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:24.165 UTC [gossip.discovery] learnExistingMembers -> DEBU 3520 Exiting" +"2019-09-24 01:05:24.165 UTC [gossip.discovery] handleAliveMessage -> DEBU 3521 Exiting" +"2019-09-24 01:05:24.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3522 Exiting" +"2019-09-24 01:05:24.167 UTC [gossip.gossip] handleMessage -> DEBU 3523 Exiting" +"2019-09-24 01:05:24.167 UTC [gossip.gossip] handleMessage -> DEBU 3524 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.166 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3525 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.167 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3526 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:24.167 UTC [msp] DeserializeIdentity -> DEBU 3527 Obtaining identity" +"2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3528 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3529 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:24.169 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 352a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 352d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 352e 0xc00266bb90 gate 1569287124169400900 evaluation starts" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 352f 0xc00266bb90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3530 0xc00266bb90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3531 0xc00266bb90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3532 0xc00266bb90 principal evaluation fails" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 3533 0xc00266bb90 gate 1569287124169400900 evaluation fails" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3534 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:24.169 UTC [policies] Evaluate -> DEBU 3536 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func1 -> DEBU 3537 0xc0026404a0 gate 1569287124169659900 evaluation starts" +"2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 3539 Obtaining identity" +"2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 353a Obtaining identity" +"2019-09-24 01:05:24.171 UTC [msp] DeserializeIdentity -> DEBU 353b Obtaining identity" +"2019-09-24 01:05:24.172 UTC [msp] DeserializeIdentity -> DEBU 353c Obtaining identity" +"2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353d Obtaining identity" +"2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353e Obtaining identity" +"2019-09-24 01:05:24.173 UTC [msp] DeserializeIdentity -> DEBU 353f Obtaining identity" +"2019-09-24 01:05:24.174 UTC [gossip.comm] Send -> DEBU 3540 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:24.175 UTC [msp] DeserializeIdentity -> DEBU 3541 Obtaining identity" +"2019-09-24 01:05:24.175 UTC [gossip.comm] Send -> DEBU 3542 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3543 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3544 Exiting" +"2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3545 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.178 UTC [gossip.comm] sendToEndpoint -> DEBU 3546 Exiting" +"2019-09-24 01:05:24.169 UTC [cauthdsl] func2 -> DEBU 3538 0xc0026404a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:24.180 UTC [cauthdsl] func2 -> DEBU 3547 0xc0026404a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:24.180 UTC [cauthdsl] func2 -> DEBU 3548 0xc0026404a0 principal matched by identity 0" +"2019-09-24 01:05:24.181 UTC [msp.identity] Verify -> DEBU 3549 Verify: digest = 00000000 54 5a b6 9e 78 d3 d6 b9 c5 72 e8 6d 99 bb 71 71 |TZ..x....r.m..qq| +00000010 1d 57 60 91 eb 63 40 a4 c4 f0 12 b4 ab e7 6c 89 |.W`..c@.......l.|" +"2019-09-24 01:05:24.182 UTC [msp.identity] Verify -> DEBU 354a Verify: sig = 00000000 30 44 02 20 64 09 01 58 97 a8 18 ba 55 15 07 2f |0D. d..X....U../| +00000010 da 92 52 75 24 4e 5a 41 5f 68 79 4b 9a c2 3b 3f |..Ru$NZA_hyK..;?| +00000020 5d c9 d6 e6 02 20 68 49 83 27 59 89 a6 07 16 7f |].... hI.'Y.....| +00000030 3c 24 c5 1f 8c 67 29 b6 70 b0 c1 71 81 c3 55 8a |<$...g).p..q..U.| +00000040 8c bd 70 79 10 f1 |..py..|" +"2019-09-24 01:05:24.184 UTC [cauthdsl] func2 -> DEBU 354b 0xc0026404a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:24.184 UTC [cauthdsl] func1 -> DEBU 354c 0xc0026404a0 gate 1569287124169659900 evaluation succeeds" +"2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:24.185 UTC [policies] Evaluate -> DEBU 354f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:24.186 UTC [policies] Evaluate -> DEBU 3550 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:24.186 UTC [gossip.discovery] handleAliveMessage -> DEBU 3551 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3552 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:24.187 UTC [gossip.discovery] learnExistingMembers -> DEBU 3553 updating membership: timestamp: " +"2019-09-24 01:05:24.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 3554 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:24.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 3555 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:24.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 3556 Exiting" +"2019-09-24 01:05:24.195 UTC [gossip.discovery] handleAliveMessage -> DEBU 3557 Exiting" +"2019-09-24 01:05:24.201 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3558 Exiting" +"2019-09-24 01:05:24.203 UTC [gossip.gossip] handleMessage -> DEBU 3559 Exiting" +"2019-09-24 01:05:24.204 UTC [gossip.gossip] handleMessage -> DEBU 355a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.204 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.206 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355c Exiting" +"2019-09-24 01:05:24.206 UTC [gossip.gossip] handleMessage -> DEBU 355d Exiting" +"2019-09-24 01:05:24.207 UTC [gossip.gossip] handleMessage -> DEBU 355e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 355f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3560 Exiting" +"2019-09-24 01:05:24.208 UTC [gossip.gossip] handleMessage -> DEBU 3561 Exiting" +"2019-09-24 01:05:24.208 UTC [gossip.gossip] handleMessage -> DEBU 3562 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3563 Obtaining identity" +"2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3564 Obtaining identity" +"2019-09-24 01:05:24.208 UTC [msp] DeserializeIdentity -> DEBU 3565 Obtaining identity" +"2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3566 Obtaining identity" +"2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3567 Obtaining identity" +"2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3568 Obtaining identity" +"2019-09-24 01:05:24.209 UTC [msp] DeserializeIdentity -> DEBU 3569 Obtaining identity" +"2019-09-24 01:05:24.209 UTC [gossip.comm] Send -> DEBU 356a Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:24.210 UTC [msp] DeserializeIdentity -> DEBU 356b Obtaining identity" +"2019-09-24 01:05:24.210 UTC [gossip.comm] Send -> DEBU 356c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356e Exiting" +"2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 356f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.211 UTC [gossip.comm] sendToEndpoint -> DEBU 3570 Exiting" +"2019-09-24 01:05:24.217 UTC [msp] GetDefaultSigningIdentity -> DEBU 3571 Obtaining default signing identity" +"2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3572 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151027 " +"2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3573 Sign: digest: 52293E4BDFB62DE3177E5E322DD07855E065E87E552F03C97A56954DABAD5EEB " +"2019-09-24 01:05:24.218 UTC [msp] GetDefaultSigningIdentity -> DEBU 3574 Obtaining default signing identity" +"2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3575 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:24.218 UTC [msp.identity] Sign -> DEBU 3576 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:24.218 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3577 Sleeping 5s" +"2019-09-24 01:05:24.207 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3578 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3579 Exiting" +"2019-09-24 01:05:24.218 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.220 UTC [gossip.gossip] handleMessage -> DEBU 357b Exiting" +"2019-09-24 01:05:24.220 UTC [gossip.discovery] handleMsgFromComm -> DEBU 357c Exiting" +"2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 357d Obtaining identity" +"2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 357e Obtaining identity" +"2019-09-24 01:05:24.224 UTC [gossip.comm] Send -> DEBU 357f Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 3580 Obtaining identity" +"2019-09-24 01:05:24.224 UTC [gossip.comm] Send -> DEBU 3581 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:24.224 UTC [msp] DeserializeIdentity -> DEBU 3582 Obtaining identity" +"2019-09-24 01:05:24.244 UTC [gossip.comm] sendToEndpoint -> DEBU 3583 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.244 UTC [gossip.comm] sendToEndpoint -> DEBU 3584 Exiting" +"2019-09-24 01:05:24.265 UTC [gossip.comm] Send -> DEBU 3585 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:24.267 UTC [gossip.comm] sendToEndpoint -> DEBU 3586 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.267 UTC [gossip.comm] sendToEndpoint -> DEBU 3587 Exiting" +"2019-09-24 01:05:24.268 UTC [gossip.comm] func1 -> DEBU 3588 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.269 UTC [gossip.gossip] handleMessage -> DEBU 3589 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.269 UTC [gossip.gossip] handleMessage -> DEBU 358a Exiting" +"2019-09-24 01:05:24.269 UTC [gossip.discovery] handleMsgFromComm -> DEBU 358b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.270 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 358c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:24.270 UTC [msp.identity] Verify -> DEBU 358d Verify: digest = 00000000 52 29 3e 4b df b6 2d e3 17 7e 5e 32 2d d0 78 55 |R)>K..-..~^2-.xU| +00000010 e0 65 e8 7e 55 2f 03 c9 7a 56 95 4d ab ad 5e eb |.e.~U/..zV.M..^.|" +"2019-09-24 01:05:24.271 UTC [msp.identity] Verify -> DEBU 358e Verify: sig = 00000000 30 44 02 20 45 0a f6 b1 c7 8a 74 a8 5f 32 8d c2 |0D. E.....t._2..| +00000010 f1 4d c1 2d 10 31 f2 c3 60 f8 b5 64 62 21 1e 65 |.M.-.1..`..db!.e| +00000020 2f e4 75 49 02 20 65 70 4f 0c 9c d0 a8 6e 7d c5 |/.uI. epO....n}.| +00000030 1a d8 f8 5b bb 5d a4 9e 3e 40 e4 d3 4b d8 1c 95 |...[.]..>@..K...| +00000040 9f 38 4a ec 65 c9 |.8J.e.|" +"2019-09-24 01:05:24.271 UTC [gossip.discovery] isSentByMe -> DEBU 358f Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.272 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3590 Exiting" +"2019-09-24 01:05:24.272 UTC [gossip.comm] sendToEndpoint -> DEBU 3591 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.273 UTC [gossip.comm] sendToEndpoint -> DEBU 3592 Exiting" +"2019-09-24 01:05:24.277 UTC [gossip.comm] func1 -> DEBU 3593 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.278 UTC [gossip.gossip] handleMessage -> DEBU 3594 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.278 UTC [gossip.gossip] handleMessage -> DEBU 3595 Exiting" +"2019-09-24 01:05:24.279 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3596 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.279 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3597 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:24.279 UTC [msp.identity] Verify -> DEBU 3598 Verify: digest = 00000000 52 29 3e 4b df b6 2d e3 17 7e 5e 32 2d d0 78 55 |R)>K..-..~^2-.xU| +00000010 e0 65 e8 7e 55 2f 03 c9 7a 56 95 4d ab ad 5e eb |.e.~U/..zV.M..^.|" +"2019-09-24 01:05:24.279 UTC [msp.identity] Verify -> DEBU 3599 Verify: sig = 00000000 30 44 02 20 45 0a f6 b1 c7 8a 74 a8 5f 32 8d c2 |0D. E.....t._2..| +00000010 f1 4d c1 2d 10 31 f2 c3 60 f8 b5 64 62 21 1e 65 |.M.-.1..`..db!.e| +00000020 2f e4 75 49 02 20 65 70 4f 0c 9c d0 a8 6e 7d c5 |/.uI. epO....n}.| +00000030 1a d8 f8 5b bb 5d a4 9e 3e 40 e4 d3 4b d8 1c 95 |...[.]..>@..K...| +00000040 9f 38 4a ec 65 c9 |.8J.e.|" +"2019-09-24 01:05:24.280 UTC [gossip.discovery] isSentByMe -> DEBU 359a Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:24.280 UTC [gossip.discovery] handleMsgFromComm -> DEBU 359b Exiting" +"2019-09-24 01:05:25.653 UTC [msp] DeserializeIdentity -> DEBU 359c Obtaining identity" +"2019-09-24 01:05:25.654 UTC [msp] DeserializeIdentity -> DEBU 359d Obtaining identity" +"2019-09-24 01:05:25.654 UTC [gossip.comm] Send -> DEBU 359e Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 359f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a0 Exiting" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a2 Exiting" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.654 UTC [gossip.comm] sendToEndpoint -> DEBU 35a4 Exiting" +"2019-09-24 01:05:25.655 UTC [gossip.comm] func1 -> DEBU 35a5 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.655 UTC [gossip.gossip] handleMessage -> DEBU 35a6 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a7 Obtaining identity" +"2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a8 Obtaining identity" +"2019-09-24 01:05:25.655 UTC [msp] DeserializeIdentity -> DEBU 35a9 Obtaining identity" +"2019-09-24 01:05:25.655 UTC [gossip.comm] func1 -> DEBU 35aa Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.655 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ac Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ad Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35b1 0xc0025f7ec0 gate 1569287125656415500 evaluation starts" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b2 0xc0025f7ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b3 0xc0025f7ec0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b4 0xc0025f7ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35b5 0xc0025f7ec0 principal evaluation fails" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35b6 0xc0025f7ec0 gate 1569287125656415500 evaluation fails" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.656 UTC [policies] Evaluate -> DEBU 35b9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func1 -> DEBU 35ba 0xc0025e07a0 gate 1569287125656864600 evaluation starts" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bb 0xc0025e07a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bc 0xc0025e07a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.656 UTC [cauthdsl] func2 -> DEBU 35bd 0xc0025e07a0 principal matched by identity 0" +"2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35be Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35bf Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:25.657 UTC [cauthdsl] func2 -> DEBU 35c0 0xc0025e07a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.657 UTC [cauthdsl] func1 -> DEBU 35c1 0xc0025e07a0 gate 1569287125656864600 evaluation succeeds" +"2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.657 UTC [policies] Evaluate -> DEBU 35c5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c6 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c7 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:25.657 UTC [msp.identity] Verify -> DEBU 35c8 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 35c9 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:25.657 UTC [msp] DeserializeIdentity -> DEBU 35ca Obtaining identity" +"2019-09-24 01:05:25.657 UTC [msp] DeserializeIdentity -> DEBU 35cb Obtaining identity" +"2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.658 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35d2 0xc002592ef0 gate 1569287125658193300 evaluation starts" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d3 0xc002592ef0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d4 0xc002592ef0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d5 0xc002592ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35d6 0xc002592ef0 principal evaluation fails" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35d7 0xc002592ef0 gate 1569287125658193300 evaluation fails" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35db 0xc0025937b0 gate 1569287125658442200 evaluation starts" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35dc 0xc0025937b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35dd 0xc0025937b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35de 0xc0025937b0 principal matched by identity 0" +"2019-09-24 01:05:25.658 UTC [msp.identity] Verify -> DEBU 35df Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:25.658 UTC [msp.identity] Verify -> DEBU 35e0 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func2 -> DEBU 35e1 0xc0025937b0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.658 UTC [cauthdsl] func1 -> DEBU 35e2 0xc0025937b0 gate 1569287125658442200 evaluation succeeds" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.658 UTC [policies] Evaluate -> DEBU 35e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.658 UTC [gossip.gossip] handleMessage -> DEBU 35e7 Exiting" +"2019-09-24 01:05:25.658 UTC [gossip.gossip] handleMessage -> DEBU 35e8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.658 UTC [msp] DeserializeIdentity -> DEBU 35e9 Obtaining identity" +"2019-09-24 01:05:25.658 UTC [msp] DeserializeIdentity -> DEBU 35ea Obtaining identity" +"2019-09-24 01:05:25.659 UTC [msp] DeserializeIdentity -> DEBU 35eb Obtaining identity" +"2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 35ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ed Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.659 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 35ee Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.659 UTC [gossip.comm] func1 -> DEBU 35f1 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35f3 0xc00257f910 gate 1569287125659309000 evaluation starts" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f4 0xc00257f910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f5 0xc00257f910 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f6 0xc00257f910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35f7 0xc00257f910 principal evaluation fails" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35f8 0xc00257f910 gate 1569287125659309000 evaluation fails" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 35fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 35fc 0xc00256e1d0 gate 1569287125659553500 evaluation starts" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35fd 0xc00256e1d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35fe 0xc00256e1d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 35ff 0xc00256e1d0 principal matched by identity 0" +"2019-09-24 01:05:25.659 UTC [msp.identity] Verify -> DEBU 3600 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:25.659 UTC [msp.identity] Verify -> DEBU 3601 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func2 -> DEBU 3602 0xc00256e1d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.659 UTC [cauthdsl] func1 -> DEBU 3603 0xc00256e1d0 gate 1569287125659553500 evaluation succeeds" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 3604 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.659 UTC [policies] Evaluate -> DEBU 3605 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.660 UTC [policies] Evaluate -> DEBU 3606 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.660 UTC [policies] Evaluate -> DEBU 3607 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 3608 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 3609 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:25.660 UTC [msp.identity] Verify -> DEBU 360a Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 360b Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:25.660 UTC [msp] DeserializeIdentity -> DEBU 360c Obtaining identity" +"2019-09-24 01:05:25.660 UTC [msp] DeserializeIdentity -> DEBU 360d Obtaining identity" +"2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 360e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 360f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.660 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3610 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3611 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3612 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3613 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3614 0xc0024ea8a0 gate 1569287125661087800 evaluation starts" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3615 0xc0024ea8a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3616 0xc0024ea8a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3617 0xc0024ea8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3618 0xc0024ea8a0 principal evaluation fails" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3619 0xc0024ea8a0 gate 1569287125661087800 evaluation fails" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 361c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 361d 0xc0024eb0e0 gate 1569287125661327800 evaluation starts" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 361e 0xc0024eb0e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 361f 0xc0024eb0e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3620 0xc0024eb0e0 principal matched by identity 0" +"2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 3621 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 3622 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func2 -> DEBU 3623 0xc0024eb0e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.661 UTC [cauthdsl] func1 -> DEBU 3624 0xc0024eb0e0 gate 1569287125661327800 evaluation succeeds" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3625 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3626 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3627 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.661 UTC [policies] Evaluate -> DEBU 3628 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.661 UTC [gossip.gossip] handleMessage -> DEBU 3629 Exiting" +"2019-09-24 01:05:25.661 UTC [gossip.gossip] handleMessage -> DEBU 362a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.661 UTC [msp.identity] Verify -> DEBU 362b Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 362c Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:25.662 UTC [msp.identity] Verify -> DEBU 362d Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:25.662 UTC [msp.identity] Verify -> DEBU 362e Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:25.662 UTC [msp] DeserializeIdentity -> DEBU 362f Obtaining identity" +"2019-09-24 01:05:25.662 UTC [msp] DeserializeIdentity -> DEBU 3630 Obtaining identity" +"2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3631 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3632 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3633 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3634 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3635 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.662 UTC [policies] Evaluate -> DEBU 3636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.662 UTC [cauthdsl] func1 -> DEBU 3637 0xc0024df9d0 gate 1569287125662890900 evaluation starts" +"2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 3638 0xc0024df9d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 3639 0xc0024df9d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.662 UTC [cauthdsl] func2 -> DEBU 363a 0xc0024df9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 363b 0xc0024df9d0 principal evaluation fails" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 363c 0xc0024df9d0 gate 1569287125662890900 evaluation fails" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 363f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3640 0xc0024d2320 gate 1569287125663133200 evaluation starts" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3641 0xc0024d2320 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3642 0xc0024d2320 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3643 0xc0024d2320 principal matched by identity 0" +"2019-09-24 01:05:25.663 UTC [msp.identity] Verify -> DEBU 3644 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:25.663 UTC [msp.identity] Verify -> DEBU 3645 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func2 -> DEBU 3646 0xc0024d2320 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3647 0xc0024d2320 gate 1569287125663133200 evaluation succeeds" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3648 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3649 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 364a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 364b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.663 UTC [msp] DeserializeIdentity -> DEBU 364c Obtaining identity" +"2019-09-24 01:05:25.663 UTC [msp] DeserializeIdentity -> DEBU 364d Obtaining identity" +"2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 364e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 364f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.663 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3650 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3651 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3652 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:25.663 UTC [policies] Evaluate -> DEBU 3653 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:25.663 UTC [cauthdsl] func1 -> DEBU 3654 0xc0024d3af0 gate 1569287125663969500 evaluation starts" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3655 0xc0024d3af0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3656 0xc0024d3af0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3657 0xc0024d3af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3658 0xc0024d3af0 principal evaluation fails" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 3659 0xc0024d3af0 gate 1569287125663969500 evaluation fails" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 365c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 365d 0xc0024c4340 gate 1569287125664335500 evaluation starts" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 365e 0xc0024c4340 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 365f 0xc0024c4340 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3660 0xc0024c4340 principal matched by identity 0" +"2019-09-24 01:05:25.664 UTC [msp.identity] Verify -> DEBU 3661 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:25.664 UTC [msp.identity] Verify -> DEBU 3662 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func2 -> DEBU 3663 0xc0024c4340 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:25.664 UTC [cauthdsl] func1 -> DEBU 3664 0xc0024c4340 gate 1569287125664335500 evaluation succeeds" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3665 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3666 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3667 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:25.664 UTC [policies] Evaluate -> DEBU 3668 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:25.664 UTC [gossip.gossip] handleMessage -> DEBU 3669 Exiting" +"2019-09-24 01:05:25.686 UTC [gossip.privdata] run -> DEBU 366a Start reconcile missing private info" +"2019-09-24 01:05:25.686 UTC [leveldbhelper] GetIterator -> DEBU 366b Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfa}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}]" +"2019-09-24 01:05:25.686 UTC [gossip.privdata] reconcile -> DEBU 366c Reconciliation cycle finished successfully. no items to reconcile" +"2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 366d Obtaining identity" +"2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 366e Obtaining identity" +"2019-09-24 01:05:25.719 UTC [gossip.pull] Hello -> DEBU 366f Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 3670 Obtaining identity" +"2019-09-24 01:05:25.719 UTC [msp] DeserializeIdentity -> DEBU 3671 Obtaining identity" +"2019-09-24 01:05:25.719 UTC [gossip.comm] Send -> DEBU 3672 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:25.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3673 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.719 UTC [gossip.comm] sendToEndpoint -> DEBU 3674 Exiting" +"2019-09-24 01:05:25.720 UTC [gossip.comm] func1 -> DEBU 3675 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.720 UTC [gossip.gossip] handleMessage -> DEBU 3676 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.720 UTC [gossip.pull] HandleMessage -> DEBU 3677 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.720 UTC [gossip.gossip] handleMessage -> DEBU 3678 Exiting" +"2019-09-24 01:05:25.838 UTC [gossip.comm] func1 -> DEBU 3679 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.838 UTC [gossip.gossip] handleMessage -> DEBU 367a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.838 UTC [msp] DeserializeIdentity -> DEBU 367b Obtaining identity" +"2019-09-24 01:05:25.838 UTC [msp] DeserializeIdentity -> DEBU 367c Obtaining identity" +"2019-09-24 01:05:25.838 UTC [gossip.gossip] handleMessage -> DEBU 367d Exiting" +"2019-09-24 01:05:25.861 UTC [gossip.comm] func1 -> DEBU 367e Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.861 UTC [gossip.gossip] handleMessage -> DEBU 367f Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.861 UTC [gossip.pull] HandleMessage -> DEBU 3680 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:25.861 UTC [gossip.pull] SendDigest -> DEBU 3681 Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:25.861 UTC [gossip.gossip] handleMessage -> DEBU 3682 Exiting" +"2019-09-24 01:05:26.041 UTC [gossip.comm] func1 -> DEBU 3683 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.041 UTC [gossip.gossip] handleMessage -> DEBU 3684 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3685 Obtaining identity" +"2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3686 Obtaining identity" +"2019-09-24 01:05:26.041 UTC [msp] DeserializeIdentity -> DEBU 3687 Obtaining identity" +"2019-09-24 01:05:26.041 UTC [gossip.gossip] handleMessage -> DEBU 3688 Exiting" +"2019-09-24 01:05:26.241 UTC [gossip.comm] func1 -> DEBU 3689 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.241 UTC [gossip.gossip] handleMessage -> DEBU 368a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368b Obtaining identity" +"2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368c Obtaining identity" +"2019-09-24 01:05:26.242 UTC [msp] DeserializeIdentity -> DEBU 368d Obtaining identity" +"2019-09-24 01:05:26.242 UTC [gossip.gossip] handleMessage -> DEBU 368e Exiting" +"2019-09-24 01:05:26.483 UTC [gossip.comm] func1 -> DEBU 368f Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.483 UTC [gossip.gossip] handleMessage -> DEBU 3690 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.483 UTC [gossip.pull] HandleMessage -> DEBU 3691 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.483 UTC [gossip.pull] SendDigest -> DEBU 3692 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:26.483 UTC [gossip.gossip] handleMessage -> DEBU 3693 Exiting" +"2019-09-24 01:05:26.487 UTC [gossip.comm] func1 -> DEBU 3694 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.488 UTC [gossip.gossip] handleMessage -> DEBU 3695 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.488 UTC [gossip.gossip] handleMessage -> DEBU 3696 Exiting" +"2019-09-24 01:05:26.488 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3697 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.488 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3698 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 3699 Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +"2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369a Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +"2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369b Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:26.488 UTC [msp.identity] Verify -> DEBU 369c Verify: sig = 00000000 30 45 02 21 00 c1 be d3 05 e1 60 17 b9 99 a9 d9 |0E.!......`.....| +00000010 b0 e2 2f f9 41 90 a7 9f c6 4a 4c 94 c4 e2 09 c4 |../.A....JL.....| +00000020 0d 97 6a 0a 02 02 20 2c b6 bd df f0 33 e8 f7 1b |..j... ,....3...| +00000030 c4 a9 4b 2c b3 ec 4d 4c 6b ea 3a e1 98 3c d2 94 |..K,..MLk.:..<..| +00000040 95 cf 85 3a f1 02 8a |...:...|" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] handleAliveMessage -> DEBU 369d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 369e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 369f updating membership: timestamp: " +"2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a0 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a1 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] learnExistingMembers -> DEBU 36a2 Exiting" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] handleAliveMessage -> DEBU 36a3 Exiting" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36a4 Exiting" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] sendMemResponse -> DEBU 36a5 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:26.489 UTC [msp] DeserializeIdentity -> DEBU 36a6 Obtaining identity" +"2019-09-24 01:05:26.489 UTC [msp] DeserializeIdentity -> DEBU 36a7 Obtaining identity" +"2019-09-24 01:05:26.489 UTC [gossip.comm] Send -> DEBU 36a8 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.489 UTC [gossip.discovery] sendMemResponse -> DEBU 36a9 Exiting, replying with alive: > alive:@\344\323K\330\034\225\2378J\354e\311" > " +"2019-09-24 01:05:26.489 UTC [gossip.comm] sendToEndpoint -> DEBU 36aa Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.489 UTC [gossip.comm] sendToEndpoint -> DEBU 36ab Exiting" +"2019-09-24 01:05:26.718 UTC [gossip.election] waitForInterrupt -> DEBU 36ac d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:26.718 UTC [gossip.election] IsLeader -> DEBU 36ad d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:26.718 UTC [msp] GetDefaultSigningIdentity -> DEBU 36ae Obtaining default signing identity" +"2019-09-24 01:05:26.719 UTC [msp.identity] Sign -> DEBU 36af Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100D1801 " +"2019-09-24 01:05:26.719 UTC [msp.identity] Sign -> DEBU 36b0 Sign: digest: 4DD8F1ECB91763A4BE4D5B744D96A25BC50A62EB5B8531897BD750AC927040E0 " +"2019-09-24 01:05:26.720 UTC [gossip.election] waitForInterrupt -> DEBU 36b1 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b2 Obtaining identity" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b3 Obtaining identity" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b4 Obtaining identity" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b5 Obtaining identity" +"2019-09-24 01:05:26.724 UTC [gossip.comm] Send -> DEBU 36b6 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b7 Obtaining identity" +"2019-09-24 01:05:26.724 UTC [msp] DeserializeIdentity -> DEBU 36b8 Obtaining identity" +"2019-09-24 01:05:26.725 UTC [gossip.comm] sendToEndpoint -> DEBU 36b9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:05:26.725 UTC [gossip.comm] sendToEndpoint -> DEBU 36ba Exiting" +"2019-09-24 01:05:26.785 UTC [gossip.comm] func1 -> DEBU 36bb Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.786 UTC [gossip.gossip] handleMessage -> DEBU 36bc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.786 UTC [gossip.pull] HandleMessage -> DEBU 36bd GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.786 UTC [msp] DeserializeIdentity -> DEBU 36be Obtaining identity" +"2019-09-24 01:05:26.786 UTC [msp] DeserializeIdentity -> DEBU 36bf Obtaining identity" +"2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c0 Obtaining identity" +"2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c1 Obtaining identity" +"2019-09-24 01:05:26.787 UTC [msp] DeserializeIdentity -> DEBU 36c2 Obtaining identity" +"2019-09-24 01:05:26.788 UTC [msp] DeserializeIdentity -> DEBU 36c3 Obtaining identity" +"2019-09-24 01:05:26.788 UTC [gossip.pull] SendDigest -> DEBU 36c4 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:26.789 UTC [gossip.gossip] handleMessage -> DEBU 36c5 Exiting" +"2019-09-24 01:05:26.802 UTC [gossip.comm] func1 -> DEBU 36c6 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.802 UTC [gossip.gossip] handleMessage -> DEBU 36c7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.804 UTC [gossip.gossip] handleMessage -> DEBU 36c8 Exiting" +"2019-09-24 01:05:26.804 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36c9 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 36ca Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:26.806 UTC [msp] DeserializeIdentity -> DEBU 36cb Obtaining identity" +"2019-09-24 01:05:26.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 36cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:26.808 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.809 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 36ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:26.809 UTC [policies] Evaluate -> DEBU 36d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:26.810 UTC [cauthdsl] func1 -> DEBU 36d2 0xc000390d40 gate 1569287126810148500 evaluation starts" +"2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d3 0xc000390d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d4 0xc000390d40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.810 UTC [cauthdsl] func2 -> DEBU 36d5 0xc000390d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:26.811 UTC [cauthdsl] func2 -> DEBU 36d6 0xc000390d40 principal evaluation fails" +"2019-09-24 01:05:26.811 UTC [cauthdsl] func1 -> DEBU 36d7 0xc000390d40 gate 1569287126810148500 evaluation fails" +"2019-09-24 01:05:26.811 UTC [policies] Evaluate -> DEBU 36d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.811 UTC [policies] Evaluate -> DEBU 36d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.814 UTC [policies] Evaluate -> DEBU 36da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:26.816 UTC [cauthdsl] func1 -> DEBU 36db 0xc000391580 gate 1569287126816349700 evaluation starts" +"2019-09-24 01:05:26.816 UTC [cauthdsl] func2 -> DEBU 36dc 0xc000391580 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.816 UTC [cauthdsl] func2 -> DEBU 36dd 0xc000391580 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.817 UTC [cauthdsl] func2 -> DEBU 36de 0xc000391580 principal matched by identity 0" +"2019-09-24 01:05:26.817 UTC [msp.identity] Verify -> DEBU 36df Verify: digest = 00000000 35 95 ca b1 a5 fd eb ed 53 7c c4 72 9a 62 85 2a |5.......S|.r.b.*| +00000010 db 60 0a 99 2f a2 ca 21 28 19 ed 39 73 ce b9 42 |.`../..!(..9s..B|" +"2019-09-24 01:05:26.817 UTC [msp.identity] Verify -> DEBU 36e0 Verify: sig = 00000000 30 44 02 20 5e b5 c6 3d 09 8e 1c 51 23 45 96 01 |0D. ^..=...Q#E..| +00000010 5d 4f c2 d2 04 9f d7 f0 aa 78 76 88 fc e0 37 0d |]O.......xv...7.| +00000020 66 a9 5b d2 02 20 40 0b 3d 98 ba 23 5f fd b0 44 |f.[.. @.=..#_..D| +00000030 0d 44 1c 88 4c 88 a9 de ac 03 a4 e2 75 a3 0a d8 |.D..L.......u...| +00000040 f1 ef dd 3c 34 97 |...<4.|" +"2019-09-24 01:05:26.818 UTC [cauthdsl] func2 -> DEBU 36e1 0xc000391580 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:26.818 UTC [cauthdsl] func1 -> DEBU 36e2 0xc000391580 gate 1569287126816349700 evaluation succeeds" +"2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.818 UTC [policies] Evaluate -> DEBU 36e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:26.819 UTC [policies] Evaluate -> DEBU 36e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:26.819 UTC [gossip.discovery] handleAliveMessage -> DEBU 36e7 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.819 UTC [gossip.discovery] learnExistingMembers -> DEBU 36e8 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36e9 updating membership: timestamp: " +"2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36ea Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36eb Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:26.820 UTC [gossip.discovery] learnExistingMembers -> DEBU 36ec Exiting" +"2019-09-24 01:05:26.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 36ed Exiting" +"2019-09-24 01:05:26.821 UTC [gossip.discovery] handleMsgFromComm -> DEBU 36ee Exiting" +"2019-09-24 01:05:26.821 UTC [gossip.discovery] sendMemResponse -> DEBU 36ef Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:26.822 UTC [msp] DeserializeIdentity -> DEBU 36f0 Obtaining identity" +"2019-09-24 01:05:26.822 UTC [msp] DeserializeIdentity -> DEBU 36f1 Obtaining identity" +"2019-09-24 01:05:26.824 UTC [msp] DeserializeIdentity -> DEBU 36f2 Obtaining identity" +"2019-09-24 01:05:26.825 UTC [gossip.comm] Send -> DEBU 36f3 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.825 UTC [gossip.comm] sendToEndpoint -> DEBU 36f4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.825 UTC [gossip.comm] sendToEndpoint -> DEBU 36f5 Exiting" +"2019-09-24 01:05:26.826 UTC [gossip.discovery] sendMemResponse -> DEBU 36f6 Exiting, replying with alive: alive: alive: alive:@\344\323K\330\034\225\2378J\354e\311" > " +"2019-09-24 01:05:26.838 UTC [gossip.pull] Hello -> DEBU 36f7 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:26.839 UTC [gossip.comm] Send -> DEBU 36f8 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.839 UTC [gossip.pull] Hello -> DEBU 36f9 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:26.840 UTC [gossip.comm] Send -> DEBU 36fa Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.841 UTC [gossip.pull] Hello -> DEBU 36fb Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:26.842 UTC [gossip.comm] Send -> DEBU 36fc Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.842 UTC [gossip.comm] sendToEndpoint -> DEBU 36fd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.842 UTC [gossip.comm] sendToEndpoint -> DEBU 36fe Exiting" +"2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 36ff Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3700 Exiting" +"2019-09-24 01:05:26.846 UTC [gossip.comm] sendToEndpoint -> DEBU 3701 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.847 UTC [gossip.comm] sendToEndpoint -> DEBU 3702 Exiting" +"2019-09-24 01:05:26.847 UTC [gossip.comm] func1 -> DEBU 3703 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.847 UTC [gossip.gossip] handleMessage -> DEBU 3704 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.847 UTC [gossip.pull] HandleMessage -> DEBU 3705 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3706 Obtaining identity" +"2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3707 Obtaining identity" +"2019-09-24 01:05:26.847 UTC [msp] DeserializeIdentity -> DEBU 3708 Obtaining identity" +"2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 3709 Obtaining identity" +"2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 370a Obtaining identity" +"2019-09-24 01:05:26.848 UTC [msp] DeserializeIdentity -> DEBU 370b Obtaining identity" +"2019-09-24 01:05:26.848 UTC [gossip.pull] SendDigest -> DEBU 370c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:26.848 UTC [gossip.gossip] handleMessage -> DEBU 370d Exiting" +"2019-09-24 01:05:26.849 UTC [gossip.comm] func1 -> DEBU 370e Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.849 UTC [gossip.gossip] handleMessage -> DEBU 370f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.849 UTC [gossip.pull] HandleMessage -> DEBU 3710 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.850 UTC [gossip.gossip] handleMessage -> DEBU 3711 Exiting" +"2019-09-24 01:05:26.851 UTC [gossip.comm] func1 -> DEBU 3712 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.851 UTC [gossip.gossip] handleMessage -> DEBU 3713 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.851 UTC [gossip.pull] HandleMessage -> DEBU 3714 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.851 UTC [gossip.gossip] handleMessage -> DEBU 3715 Exiting" +"2019-09-24 01:05:26.852 UTC [gossip.comm] func1 -> DEBU 3716 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.852 UTC [gossip.gossip] handleMessage -> DEBU 3717 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.853 UTC [gossip.pull] HandleMessage -> DEBU 3718 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.853 UTC [gossip.gossip] handleMessage -> DEBU 3719 Exiting" +"2019-09-24 01:05:26.868 UTC [gossip.comm] func1 -> DEBU 371a Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.869 UTC [gossip.gossip] handleMessage -> DEBU 371b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.869 UTC [gossip.gossip] handleMessage -> DEBU 371c Exiting" +"2019-09-24 01:05:26.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 371d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 371e Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:26.870 UTC [msp] DeserializeIdentity -> DEBU 371f Obtaining identity" +"2019-09-24 01:05:26.870 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3720 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:26.870 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3721 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3722 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.871 UTC [policies] Evaluate -> DEBU 3723 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:26.871 UTC [policies] Evaluate -> DEBU 3724 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:26.872 UTC [policies] Evaluate -> DEBU 3725 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:26.872 UTC [cauthdsl] func1 -> DEBU 3726 0xc0003f8220 gate 1569287126872369700 evaluation starts" +"2019-09-24 01:05:26.872 UTC [cauthdsl] func2 -> DEBU 3727 0xc0003f8220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.872 UTC [cauthdsl] func2 -> DEBU 3728 0xc0003f8220 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.873 UTC [cauthdsl] func2 -> DEBU 3729 0xc0003f8220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:26.873 UTC [cauthdsl] func2 -> DEBU 372a 0xc0003f8220 principal evaluation fails" +"2019-09-24 01:05:26.873 UTC [cauthdsl] func1 -> DEBU 372b 0xc0003f8220 gate 1569287126872369700 evaluation fails" +"2019-09-24 01:05:26.873 UTC [policies] Evaluate -> DEBU 372c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.874 UTC [policies] Evaluate -> DEBU 372d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.874 UTC [policies] Evaluate -> DEBU 372e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:26.874 UTC [cauthdsl] func1 -> DEBU 372f 0xc0003f8a70 gate 1569287126874614400 evaluation starts" +"2019-09-24 01:05:26.874 UTC [cauthdsl] func2 -> DEBU 3730 0xc0003f8a70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.875 UTC [cauthdsl] func2 -> DEBU 3731 0xc0003f8a70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.875 UTC [cauthdsl] func2 -> DEBU 3732 0xc0003f8a70 principal matched by identity 0" +"2019-09-24 01:05:26.875 UTC [msp.identity] Verify -> DEBU 3733 Verify: digest = 00000000 88 64 10 77 0c 76 79 07 2b 24 1e e0 2b 19 6a c0 |.d.w.vy.+$..+.j.| +00000010 ed bd ec c6 a1 1b d3 80 f8 9c b9 a5 04 28 34 60 |.............(4`|" +"2019-09-24 01:05:26.876 UTC [msp.identity] Verify -> DEBU 3734 Verify: sig = 00000000 30 44 02 20 3f 35 c6 87 57 dd 59 db c4 e1 d8 c4 |0D. ?5..W.Y.....| +00000010 19 24 d2 a2 59 af 90 e8 88 8a 7a 52 a0 28 7f ae |.$..Y.....zR.(..| +00000020 98 6d 15 e2 02 20 2f 87 43 67 c3 91 45 58 3b e9 |.m... /.Cg..EX;.| +00000030 fe b5 bd 8d c8 67 2d 95 dd ca c2 18 06 a3 e3 78 |.....g-........x| +00000040 b9 ef 3b f1 77 84 |..;.w.|" +"2019-09-24 01:05:26.876 UTC [cauthdsl] func2 -> DEBU 3735 0xc0003f8a70 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:26.876 UTC [cauthdsl] func1 -> DEBU 3736 0xc0003f8a70 gate 1569287126874614400 evaluation succeeds" +"2019-09-24 01:05:26.876 UTC [policies] Evaluate -> DEBU 3737 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 3738 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 3739 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:26.877 UTC [policies] Evaluate -> DEBU 373a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:26.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 373b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373d updating membership: timestamp: " +"2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373e Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:26.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 373f Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:26.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 3740 Exiting" +"2019-09-24 01:05:26.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 3741 Exiting" +"2019-09-24 01:05:26.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3742 Exiting" +"2019-09-24 01:05:26.879 UTC [gossip.discovery] sendMemResponse -> DEBU 3743 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3744 Obtaining identity" +"2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3745 Obtaining identity" +"2019-09-24 01:05:26.880 UTC [msp] DeserializeIdentity -> DEBU 3746 Obtaining identity" +"2019-09-24 01:05:26.880 UTC [gossip.comm] Send -> DEBU 3747 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.881 UTC [gossip.comm] sendToEndpoint -> DEBU 3748 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.881 UTC [gossip.comm] sendToEndpoint -> DEBU 3749 Exiting" +"2019-09-24 01:05:26.882 UTC [gossip.discovery] sendMemResponse -> DEBU 374a Exiting, replying with alive: alive: alive: alive:@\344\323K\330\034\225\2378J\354e\311" > " +"2019-09-24 01:05:26.885 UTC [msp] GetDefaultSigningIdentity -> DEBU 374b Obtaining default signing identity" +"2019-09-24 01:05:26.886 UTC [msp.identity] Sign -> DEBU 374c Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151028 " +"2019-09-24 01:05:26.886 UTC [msp.identity] Sign -> DEBU 374d Sign: digest: 61A074C76E9F0A554F260C0AD0EC04E376AF871C95F33338DDB16C704EB1CFC1 " +"2019-09-24 01:05:26.887 UTC [msp] GetDefaultSigningIdentity -> DEBU 374e Obtaining default signing identity" +"2019-09-24 01:05:26.887 UTC [msp.identity] Sign -> DEBU 374f Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:26.887 UTC [msp.identity] Sign -> DEBU 3750 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:26.887 UTC [msp] DeserializeIdentity -> DEBU 3751 Obtaining identity" +"2019-09-24 01:05:26.888 UTC [gossip.comm] Send -> DEBU 3752 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.889 UTC [msp] DeserializeIdentity -> DEBU 3753 Obtaining identity" +"2019-09-24 01:05:26.889 UTC [gossip.comm] Send -> DEBU 3754 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.889 UTC [gossip.comm] Send -> DEBU 3755 Entering, sending GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3756 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3757 Exiting" +"2019-09-24 01:05:26.889 UTC [gossip.comm] sendToEndpoint -> DEBU 3758 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3759 Exiting" +"2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 375a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:'O\203\304\351\017\260,q\315\254\302\311+4\302" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.890 UTC [gossip.comm] sendToEndpoint -> DEBU 375b Exiting" +"2019-09-24 01:05:26.899 UTC [gossip.comm] func1 -> DEBU 375c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.900 UTC [gossip.gossip] handleMessage -> DEBU 375d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.900 UTC [gossip.gossip] handleMessage -> DEBU 375e Exiting" +"2019-09-24 01:05:26.900 UTC [gossip.discovery] handleMsgFromComm -> DEBU 375f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.900 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3760 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:26.901 UTC [msp.identity] Verify -> DEBU 3761 Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +"2019-09-24 01:05:26.901 UTC [msp.identity] Verify -> DEBU 3762 Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +00000040 ac c2 c9 2b 34 c2 |...+4.|" +"2019-09-24 01:05:26.902 UTC [msp.identity] Verify -> DEBU 3763 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:26.903 UTC [msp.identity] Verify -> DEBU 3764 Verify: sig = 00000000 30 44 02 20 33 69 14 14 24 b7 6a 85 bd 82 ec ba |0D. 3i..$.j.....| +00000010 6e fe 6f 45 1c d0 43 f2 2a 0d 80 82 66 8f 68 f8 |n.oE..C.*...f.h.| +00000020 06 53 b3 a4 02 20 7a 07 fb 2f 4e 51 ab aa 59 76 |.S... z../NQ..Yv| +00000030 f1 d5 6b 85 18 e2 f7 b8 86 eb 28 cb 7b 24 c3 c1 |..k.......(.{$..| +00000040 0f 2b b2 db 10 d5 |.+....|" +"2019-09-24 01:05:26.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3765 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:26.903 UTC [gossip.discovery] isSentByMe -> DEBU 3766 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:26.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3767 Exiting" +"2019-09-24 01:05:26.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3768 Exiting" +"2019-09-24 01:05:26.905 UTC [gossip.comm] func1 -> DEBU 3769 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.905 UTC [gossip.gossip] handleMessage -> DEBU 376a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.905 UTC [gossip.gossip] handleMessage -> DEBU 376b Exiting" +"2019-09-24 01:05:26.905 UTC [gossip.discovery] handleMsgFromComm -> DEBU 376c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 376d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:26.906 UTC [msp.identity] Verify -> DEBU 376e Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +"2019-09-24 01:05:26.906 UTC [msp.identity] Verify -> DEBU 376f Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +00000040 ac c2 c9 2b 34 c2 |...+4.|" +"2019-09-24 01:05:26.907 UTC [gossip.discovery] handleAliveMessage -> DEBU 3770 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.909 UTC [gossip.discovery] isSentByMe -> DEBU 3772 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.910 UTC [gossip.discovery] handleAliveMessage -> DEBU 3773 Exiting" +"2019-09-24 01:05:26.909 UTC [gossip.comm] func1 -> DEBU 3771 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3774 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:26.911 UTC [msp] DeserializeIdentity -> DEBU 3775 Obtaining identity" +"2019-09-24 01:05:26.911 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3776 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:26.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3777 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.913 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3779 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 377c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 377d 0xc000383df0 gate 1569287126913553100 evaluation starts" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 377e 0xc000383df0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 377f 0xc000383df0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3780 0xc000383df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3781 0xc000383df0 principal evaluation fails" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 3782 0xc000383df0 gate 1569287126913553100 evaluation fails" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3783 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3784 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.913 UTC [policies] Evaluate -> DEBU 3785 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func1 -> DEBU 3786 0xc00030c5a0 gate 1569287126913911900 evaluation starts" +"2019-09-24 01:05:26.913 UTC [cauthdsl] func2 -> DEBU 3787 0xc00030c5a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 3788 0xc00030c5a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 3789 0xc00030c5a0 principal matched by identity 0" +"2019-09-24 01:05:26.914 UTC [msp.identity] Verify -> DEBU 378a Verify: digest = 00000000 88 64 10 77 0c 76 79 07 2b 24 1e e0 2b 19 6a c0 |.d.w.vy.+$..+.j.| +00000010 ed bd ec c6 a1 1b d3 80 f8 9c b9 a5 04 28 34 60 |.............(4`|" +"2019-09-24 01:05:26.914 UTC [msp.identity] Verify -> DEBU 378b Verify: sig = 00000000 30 44 02 20 3f 35 c6 87 57 dd 59 db c4 e1 d8 c4 |0D. ?5..W.Y.....| +00000010 19 24 d2 a2 59 af 90 e8 88 8a 7a 52 a0 28 7f ae |.$..Y.....zR.(..| +00000020 98 6d 15 e2 02 20 2f 87 43 67 c3 91 45 58 3b e9 |.m... /.Cg..EX;.| +00000030 fe b5 bd 8d c8 67 2d 95 dd ca c2 18 06 a3 e3 78 |.....g-........x| +00000040 b9 ef 3b f1 77 84 |..;.w.|" +"2019-09-24 01:05:26.914 UTC [cauthdsl] func2 -> DEBU 378c 0xc00030c5a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:26.914 UTC [cauthdsl] func1 -> DEBU 378d 0xc00030c5a0 gate 1569287126913911900 evaluation succeeds" +"2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 378e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 378f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 3790 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:26.914 UTC [policies] Evaluate -> DEBU 3791 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:26.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 3792 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 3793 Exiting" +"2019-09-24 01:05:26.911 UTC [gossip.gossip] handleMessage -> DEBU 3778 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3794 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:26.920 UTC [msp.identity] Verify -> DEBU 3795 Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +"2019-09-24 01:05:26.920 UTC [msp.identity] Verify -> DEBU 3796 Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +"2019-09-24 01:05:26.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 3797 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:26.924 UTC [gossip.discovery] handleAliveMessage -> DEBU 3798 Exiting" +"2019-09-24 01:05:26.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3799 Exiting" +"2019-09-24 01:05:26.928 UTC [gossip.discovery] handleMsgFromComm -> DEBU 379a Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:26.929 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 379b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:26.929 UTC [msp.identity] Verify -> DEBU 379c Verify: digest = 00000000 f5 5c cf 31 69 ef 8c 2d 41 8c 59 ab 2f 6b c8 cc |.\.1i..-A.Y./k..| +00000010 5a e9 fc d0 49 a4 52 bb e4 58 17 e2 07 32 d5 b9 |Z...I.R..X...2..|" +"2019-09-24 01:05:26.929 UTC [msp.identity] Verify -> DEBU 379d Verify: sig = 00000000 30 45 02 21 00 e6 ac c5 21 17 9c fd 34 7e 73 6b |0E.!....!...4~sk| +00000010 7e 42 c2 eb 6e 68 3b 4a cb c9 48 9d 61 4e 32 ac |~B..nh;J..H.aN2.| +00000020 c7 c5 63 19 fb 02 20 02 76 ef 37 78 64 e9 f5 22 |..c... .v.7xd.."| +00000030 42 96 d2 e2 8b 2b 52 1f f4 05 e9 11 b3 c9 57 88 |B....+R.......W.| +00000040 11 07 7d 24 a5 4a 19 |..}$.J.|" +"2019-09-24 01:05:26.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 379e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:26.929 UTC [gossip.discovery] handleAliveMessage -> DEBU 379f Exiting" +"2019-09-24 01:05:26.930 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:26.930 UTC [msp.identity] Verify -> DEBU 37a1 Verify: digest = 00000000 61 a0 74 c7 6e 9f 0a 55 4f 26 0c 0a d0 ec 04 e3 |a.t.n..UO&......| +00000010 76 af 87 1c 95 f3 33 38 dd b1 6c 70 4e b1 cf c1 |v.....38..lpN...|" +"2019-09-24 01:05:26.930 UTC [msp.identity] Verify -> DEBU 37a2 Verify: sig = 00000000 30 44 02 20 25 ea ca 1f 9b 9f c1 87 0a 34 25 90 |0D. %........4%.| +00000010 2e 38 56 32 b5 b7 b7 d2 dd b4 41 f4 3d e8 5e 04 |.8V2......A.=.^.| +00000020 81 81 b3 a4 02 20 1c 01 fa 2f d7 a7 33 07 50 98 |..... .../..3.P.| +00000030 f7 72 e9 ef a0 3e 27 4f 83 c4 e9 0f b0 2c 71 cd |.r...>'O.....,q.| +00000040 ac c2 c9 2b 34 c2 |...+4.|" +"2019-09-24 01:05:26.930 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.931 UTC [gossip.discovery] isSentByMe -> DEBU 37a4 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.931 UTC [gossip.discovery] handleAliveMessage -> DEBU 37a5 Exiting" +"2019-09-24 01:05:26.931 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37a6 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:26.931 UTC [msp] DeserializeIdentity -> DEBU 37a7 Obtaining identity" +"2019-09-24 01:05:26.931 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37a8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:26.931 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37a9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.932 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37aa Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ab == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ac This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37ad == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37ae 0xc00035ecb0 gate 1569287126932452200 evaluation starts" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37af 0xc00035ecb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b0 0xc00035ecb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b1 0xc00035ecb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b2 0xc00035ecb0 principal evaluation fails" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37b3 0xc00035ecb0 gate 1569287126932452200 evaluation fails" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:26.932 UTC [policies] Evaluate -> DEBU 37b6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func1 -> DEBU 37b7 0xc00035f520 gate 1569287126932907600 evaluation starts" +"2019-09-24 01:05:26.932 UTC [cauthdsl] func2 -> DEBU 37b8 0xc00035f520 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37b9 0xc00035f520 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37ba 0xc00035f520 principal matched by identity 0" +"2019-09-24 01:05:26.933 UTC [msp.identity] Verify -> DEBU 37bb Verify: digest = 00000000 35 95 ca b1 a5 fd eb ed 53 7c c4 72 9a 62 85 2a |5.......S|.r.b.*| +00000010 db 60 0a 99 2f a2 ca 21 28 19 ed 39 73 ce b9 42 |.`../..!(..9s..B|" +"2019-09-24 01:05:26.933 UTC [msp.identity] Verify -> DEBU 37bc Verify: sig = 00000000 30 44 02 20 5e b5 c6 3d 09 8e 1c 51 23 45 96 01 |0D. ^..=...Q#E..| +00000010 5d 4f c2 d2 04 9f d7 f0 aa 78 76 88 fc e0 37 0d |]O.......xv...7.| +00000020 66 a9 5b d2 02 20 40 0b 3d 98 ba 23 5f fd b0 44 |f.[.. @.=..#_..D| +00000030 0d 44 1c 88 4c 88 a9 de ac 03 a4 e2 75 a3 0a d8 |.D..L.......u...| +00000040 f1 ef dd 3c 34 97 |...<4.|" +"2019-09-24 01:05:26.933 UTC [cauthdsl] func2 -> DEBU 37bd 0xc00035f520 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:26.933 UTC [cauthdsl] func1 -> DEBU 37be 0xc00035f520 gate 1569287126932907600 evaluation succeeds" +"2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37bf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:26.933 UTC [policies] Evaluate -> DEBU 37c2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:26.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c3 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:26.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 37c4 Exiting" +"2019-09-24 01:05:26.933 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37c5 Exiting" +"2019-09-24 01:05:26.933 UTC [gossip.gossip] handleMessage -> DEBU 37c6 Exiting" +"2019-09-24 01:05:28.516 UTC [gossip.comm] func1 -> DEBU 37c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.516 UTC [gossip.gossip] handleMessage -> DEBU 37c8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.516 UTC [gossip.gossip] handleMessage -> DEBU 37c9 Exiting" +"2019-09-24 01:05:28.516 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37ca Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.516 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37cb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:28.516 UTC [msp.identity] Verify -> DEBU 37cc Verify: digest = 00000000 69 68 fa 3d 4f b8 70 97 62 b8 99 20 da 87 40 87 |ih.=O.p.b.. ..@.| +00000010 94 62 67 7c e1 80 ed 7c ad 5d 57 10 df 8e 6d eb |.bg|...|.]W...m.|" +"2019-09-24 01:05:28.516 UTC [msp.identity] Verify -> DEBU 37cd Verify: sig = 00000000 30 44 02 20 26 32 bd 49 e2 64 ff 25 0b 51 fc 84 |0D. &2.I.d.%.Q..| +00000010 6f 84 bb f9 c7 94 f7 46 03 77 25 1e de 70 be 71 |o......F.w%..p.q| +00000020 d1 9c df a9 02 20 2a 26 59 e8 9e 00 81 ff 85 2d |..... *&Y......-| +00000030 ad 6e d4 b8 28 41 a2 1f f7 68 a2 7a e3 5a f7 12 |.n..(A...h.z.Z..| +00000040 89 cb bd 23 fb 5b |...#.[|" +"2019-09-24 01:05:28.516 UTC [gossip.discovery] handleAliveMessage -> DEBU 37ce Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37cf Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d0 updating membership: timestamp: " +"2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d1 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d2 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:28.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 37d3 Exiting" +"2019-09-24 01:05:28.517 UTC [gossip.discovery] handleAliveMessage -> DEBU 37d4 Exiting" +"2019-09-24 01:05:28.517 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d5 Exiting" +"2019-09-24 01:05:28.518 UTC [gossip.comm] func1 -> DEBU 37d6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.518 UTC [gossip.gossip] handleMessage -> DEBU 37d7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.518 UTC [gossip.gossip] handleMessage -> DEBU 37d8 Exiting" +"2019-09-24 01:05:28.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37d9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37da Exiting" +"2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37db Obtaining identity" +"2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37dc Obtaining identity" +"2019-09-24 01:05:28.520 UTC [gossip.comm] Send -> DEBU 37dd Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:28.520 UTC [msp] DeserializeIdentity -> DEBU 37de Obtaining identity" +"2019-09-24 01:05:28.520 UTC [gossip.comm] Send -> DEBU 37df Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e1 Exiting" +"2019-09-24 01:05:28.521 UTC [gossip.comm] sendToEndpoint -> DEBU 37e2 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.522 UTC [gossip.comm] sendToEndpoint -> DEBU 37e3 Exiting" +"2019-09-24 01:05:28.527 UTC [gossip.comm] func1 -> DEBU 37e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.527 UTC [gossip.gossip] handleMessage -> DEBU 37e5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.527 UTC [gossip.gossip] handleMessage -> DEBU 37e6 Exiting" +"2019-09-24 01:05:28.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:28.528 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37e8 Exiting" +"2019-09-24 01:05:29.140 UTC [gossip.comm] func1 -> DEBU 37e9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.141 UTC [gossip.gossip] handleMessage -> DEBU 37ea Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.141 UTC [gossip.gossip] handleMessage -> DEBU 37eb Exiting" +"2019-09-24 01:05:29.141 UTC [gossip.discovery] handleMsgFromComm -> DEBU 37ec Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.141 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 37ed Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:29.141 UTC [msp] DeserializeIdentity -> DEBU 37ee Obtaining identity" +"2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 37ef Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.141 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 37f1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37f5 0xc002a622a0 gate 1569287129141491200 evaluation starts" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f6 0xc002a622a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f7 0xc002a622a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f8 0xc002a622a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37f9 0xc002a622a0 principal evaluation fails" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37fa 0xc002a622a0 gate 1569287129141491200 evaluation fails" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.141 UTC [policies] Evaluate -> DEBU 37fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func1 -> DEBU 37fe 0xc002a62b10 gate 1569287129141736900 evaluation starts" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 37ff 0xc002a62b10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 3800 0xc002a62b10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.141 UTC [cauthdsl] func2 -> DEBU 3801 0xc002a62b10 principal matched by identity 0" +"2019-09-24 01:05:29.141 UTC [msp.identity] Verify -> DEBU 3802 Verify: digest = 00000000 18 00 51 24 30 bc af 02 c8 ae 98 d5 bf 5a 38 43 |..Q$0........Z8C| +00000010 45 6a 87 fd 5f aa cf 29 07 73 55 de 82 b0 78 27 |Ej.._..).sU...x'|" +"2019-09-24 01:05:29.141 UTC [msp.identity] Verify -> DEBU 3803 Verify: sig = 00000000 30 44 02 20 3d 09 67 ae 26 9e a4 9f 70 c3 18 41 |0D. =.g.&...p..A| +00000010 db fc 59 58 6d 55 04 ff 6f aa a9 55 b1 91 fb 63 |..YXmU..o..U...c| +00000020 1d 60 f1 72 02 20 3e fb ca 23 d3 0f 74 c7 86 1e |.`.r. >..#..t...| +00000030 ab 6a 1c 9b 2c 06 b4 27 1d 10 ed dc 06 34 4c 0b |.j..,..'.....4L.| +00000040 ce fa 0b 10 ee 87 |......|" +"2019-09-24 01:05:29.142 UTC [cauthdsl] func2 -> DEBU 3804 0xc002a62b10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.142 UTC [cauthdsl] func1 -> DEBU 3805 0xc002a62b10 gate 1569287129141736900 evaluation succeeds" +"2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3806 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3807 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3808 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.142 UTC [policies] Evaluate -> DEBU 3809 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 380a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380c updating membership: timestamp: " +"2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380d Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] learnExistingMembers -> DEBU 380f Exiting" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] handleAliveMessage -> DEBU 3810 Exiting" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3811 Exiting" +"2019-09-24 01:05:29.142 UTC [gossip.comm] func1 -> DEBU 3812 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.142 UTC [gossip.gossip] handleMessage -> DEBU 3813 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.142 UTC [gossip.gossip] handleMessage -> DEBU 3814 Exiting" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3815 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3816 Exiting" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3817 Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3818 Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3819 Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381a Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381b Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381c Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381d Obtaining identity" +"2019-09-24 01:05:29.143 UTC [gossip.comm] Send -> DEBU 381e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 381f Obtaining identity" +"2019-09-24 01:05:29.143 UTC [msp] DeserializeIdentity -> DEBU 3820 Obtaining identity" +"2019-09-24 01:05:29.143 UTC [gossip.comm] Send -> DEBU 3821 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3822 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3823 Exiting" +"2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3824 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.143 UTC [gossip.comm] sendToEndpoint -> DEBU 3825 Exiting" +"2019-09-24 01:05:29.162 UTC [gossip.comm] func1 -> DEBU 3826 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.162 UTC [gossip.gossip] handleMessage -> DEBU 3827 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.162 UTC [gossip.gossip] handleMessage -> DEBU 3828 Exiting" +"2019-09-24 01:05:29.162 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3829 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.162 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 382a Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:29.162 UTC [msp] DeserializeIdentity -> DEBU 382b Obtaining identity" +"2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 382c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.162 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 382e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 382f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 3830 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.162 UTC [policies] Evaluate -> DEBU 3831 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.162 UTC [cauthdsl] func1 -> DEBU 3832 0xc00303b370 gate 1569287129162959500 evaluation starts" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3833 0xc00303b370 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3834 0xc00303b370 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3835 0xc00303b370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3836 0xc00303b370 principal evaluation fails" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 3837 0xc00303b370 gate 1569287129162959500 evaluation fails" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3838 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3839 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 383a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 383b 0xc00303bbb0 gate 1569287129163215800 evaluation starts" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383c 0xc00303bbb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383d 0xc00303bbb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 383e 0xc00303bbb0 principal matched by identity 0" +"2019-09-24 01:05:29.163 UTC [msp.identity] Verify -> DEBU 383f Verify: digest = 00000000 c9 1d cc 76 7e 19 60 f1 d9 94 58 7f 4d e3 f8 db |...v~.`...X.M...| +00000010 c6 fb 89 aa 29 21 b4 67 1d 89 ef ac 5a 8c 8f 1f |....)!.g....Z...|" +"2019-09-24 01:05:29.163 UTC [msp.identity] Verify -> DEBU 3840 Verify: sig = 00000000 30 44 02 20 5c 6c ba d9 84 b5 76 07 10 d8 59 5f |0D. \l....v...Y_| +00000010 d7 f0 79 8e 88 fe 1c cd 5e 9f eb f1 5b d8 20 2b |..y.....^...[. +| +00000020 99 65 65 df 02 20 7a d8 b4 b1 bb 57 e5 fa d1 f3 |.ee.. z....W....| +00000030 83 fc ea 93 b7 13 b9 14 a9 ad ee 41 04 8f 20 30 |...........A.. 0| +00000040 9a aa cd 94 21 1d |....!.|" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func2 -> DEBU 3841 0xc00303bbb0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.163 UTC [cauthdsl] func1 -> DEBU 3842 0xc00303bbb0 gate 1569287129163215800 evaluation succeeds" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3843 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3844 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3845 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.163 UTC [policies] Evaluate -> DEBU 3846 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 3847 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3848 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 3849 updating membership: timestamp: " +"2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] learnExistingMembers -> DEBU 384c Exiting" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] handleAliveMessage -> DEBU 384d Exiting" +"2019-09-24 01:05:29.163 UTC [gossip.discovery] handleMsgFromComm -> DEBU 384e Exiting" +"2019-09-24 01:05:29.164 UTC [gossip.comm] func1 -> DEBU 384f Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.164 UTC [gossip.gossip] handleMessage -> DEBU 3850 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.164 UTC [gossip.gossip] handleMessage -> DEBU 3851 Exiting" +"2019-09-24 01:05:29.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3852 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.164 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3853 Exiting" +"2019-09-24 01:05:29.165 UTC [gossip.comm] func1 -> DEBU 3854 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.165 UTC [gossip.gossip] handleMessage -> DEBU 3855 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.165 UTC [gossip.gossip] handleMessage -> DEBU 3856 Exiting" +"2019-09-24 01:05:29.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3857 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.165 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3858 Exiting" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 3859 Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385a Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385b Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385c Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385d Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385e Obtaining identity" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 385f Obtaining identity" +"2019-09-24 01:05:29.166 UTC [gossip.comm] Send -> DEBU 3860 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.166 UTC [msp] DeserializeIdentity -> DEBU 3861 Obtaining identity" +"2019-09-24 01:05:29.166 UTC [gossip.comm] Send -> DEBU 3862 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3863 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3864 Exiting" +"2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3865 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.167 UTC [gossip.comm] sendToEndpoint -> DEBU 3866 Exiting" +"2019-09-24 01:05:29.219 UTC [msp] GetDefaultSigningIdentity -> DEBU 3867 Obtaining default signing identity" +"2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 3868 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151029 " +"2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 3869 Sign: digest: 4DB399D3A632DB710FB1BCD19DCADD015529367B51EB21776A6917868289931B " +"2019-09-24 01:05:29.219 UTC [msp] GetDefaultSigningIdentity -> DEBU 386a Obtaining default signing identity" +"2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 386b Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:29.219 UTC [msp.identity] Sign -> DEBU 386c Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:29.219 UTC [gossip.discovery] periodicalSendAlive -> DEBU 386d Sleeping 5s" +"2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 386e Obtaining identity" +"2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 386f Obtaining identity" +"2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3870 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 3871 Obtaining identity" +"2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3872 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.220 UTC [msp] DeserializeIdentity -> DEBU 3873 Obtaining identity" +"2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3874 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.220 UTC [gossip.comm] Send -> DEBU 3875 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3876 Exiting" +"2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3877 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.221 UTC [gossip.comm] sendToEndpoint -> DEBU 3878 Exiting" +"2019-09-24 01:05:29.220 UTC [gossip.comm] sendToEndpoint -> DEBU 3879 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:29.223 UTC [gossip.comm] sendToEndpoint -> DEBU 387a Exiting" +"2019-09-24 01:05:29.654 UTC [msp] DeserializeIdentity -> DEBU 387b Obtaining identity" +"2019-09-24 01:05:29.656 UTC [msp] DeserializeIdentity -> DEBU 387c Obtaining identity" +"2019-09-24 01:05:29.657 UTC [gossip.comm] Send -> DEBU 387d Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 387f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 387e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.660 UTC [gossip.comm] sendToEndpoint -> DEBU 3881 Exiting" +"2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 3880 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.660 UTC [gossip.comm] sendToEndpoint -> DEBU 3882 Exiting" +"2019-09-24 01:05:29.662 UTC [gossip.comm] func1 -> DEBU 3883 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.662 UTC [gossip.gossip] handleMessage -> DEBU 3884 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.663 UTC [msp] DeserializeIdentity -> DEBU 3885 Obtaining identity" +"2019-09-24 01:05:29.663 UTC [msp] DeserializeIdentity -> DEBU 3886 Obtaining identity" +"2019-09-24 01:05:29.664 UTC [msp] DeserializeIdentity -> DEBU 3887 Obtaining identity" +"2019-09-24 01:05:29.659 UTC [gossip.comm] sendToEndpoint -> DEBU 3888 Exiting" +"2019-09-24 01:05:29.665 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3889 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.665 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 388b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.666 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 388c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.667 UTC [policies] Evaluate -> DEBU 388d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.665 UTC [gossip.comm] func1 -> DEBU 388a Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.667 UTC [policies] Evaluate -> DEBU 388e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.668 UTC [policies] Evaluate -> DEBU 388f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.669 UTC [cauthdsl] func1 -> DEBU 3890 0xc0031de260 gate 1569287129669355500 evaluation starts" +"2019-09-24 01:05:29.669 UTC [cauthdsl] func2 -> DEBU 3891 0xc0031de260 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.669 UTC [cauthdsl] func2 -> DEBU 3892 0xc0031de260 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.670 UTC [cauthdsl] func2 -> DEBU 3893 0xc0031de260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.670 UTC [cauthdsl] func2 -> DEBU 3894 0xc0031de260 principal evaluation fails" +"2019-09-24 01:05:29.670 UTC [cauthdsl] func1 -> DEBU 3895 0xc0031de260 gate 1569287129669355500 evaluation fails" +"2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3896 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3897 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.671 UTC [policies] Evaluate -> DEBU 3898 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.671 UTC [cauthdsl] func1 -> DEBU 3899 0xc0031deaa0 gate 1569287129671924800 evaluation starts" +"2019-09-24 01:05:29.672 UTC [cauthdsl] func2 -> DEBU 389a 0xc0031deaa0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.672 UTC [cauthdsl] func2 -> DEBU 389b 0xc0031deaa0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.673 UTC [cauthdsl] func2 -> DEBU 389c 0xc0031deaa0 principal matched by identity 0" +"2019-09-24 01:05:29.673 UTC [msp.identity] Verify -> DEBU 389d Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:29.673 UTC [msp.identity] Verify -> DEBU 389e Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:29.674 UTC [cauthdsl] func2 -> DEBU 389f 0xc0031deaa0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.674 UTC [cauthdsl] func1 -> DEBU 38a0 0xc0031deaa0 gate 1569287129671924800 evaluation succeeds" +"2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.674 UTC [policies] Evaluate -> DEBU 38a4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a5 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a6 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:29.675 UTC [msp.identity] Verify -> DEBU 38a7 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 38a8 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:29.675 UTC [msp] DeserializeIdentity -> DEBU 38a9 Obtaining identity" +"2019-09-24 01:05:29.675 UTC [msp] DeserializeIdentity -> DEBU 38aa Obtaining identity" +"2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38ab Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ac Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ad Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38ae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38af This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.675 UTC [policies] Evaluate -> DEBU 38b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.681 UTC [cauthdsl] func1 -> DEBU 38b1 0xc0032b3180 gate 1569287129675786800 evaluation starts" +"2019-09-24 01:05:29.683 UTC [cauthdsl] func2 -> DEBU 38b2 0xc0032b3180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.685 UTC [cauthdsl] func2 -> DEBU 38b4 0xc0032b3180 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.685 UTC [cauthdsl] func2 -> DEBU 38b5 0xc0032b3180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.686 UTC [cauthdsl] func2 -> DEBU 38b6 0xc0032b3180 principal evaluation fails" +"2019-09-24 01:05:29.686 UTC [cauthdsl] func1 -> DEBU 38b7 0xc0032b3180 gate 1569287129675786800 evaluation fails" +"2019-09-24 01:05:29.685 UTC [gossip.comm] func1 -> DEBU 38b3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.686 UTC [policies] Evaluate -> DEBU 38b8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.687 UTC [policies] Evaluate -> DEBU 38b9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.687 UTC [policies] Evaluate -> DEBU 38ba == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.687 UTC [cauthdsl] func1 -> DEBU 38bb 0xc0032b3a10 gate 1569287129687908000 evaluation starts" +"2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38bc 0xc0032b3a10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38bd 0xc0032b3a10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.688 UTC [cauthdsl] func2 -> DEBU 38be 0xc0032b3a10 principal matched by identity 0" +"2019-09-24 01:05:29.689 UTC [msp.identity] Verify -> DEBU 38bf Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:29.690 UTC [msp.identity] Verify -> DEBU 38c0 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:29.691 UTC [cauthdsl] func2 -> DEBU 38c1 0xc0032b3a10 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.691 UTC [cauthdsl] func1 -> DEBU 38c2 0xc0032b3a10 gate 1569287129687908000 evaluation succeeds" +"2019-09-24 01:05:29.692 UTC [policies] Evaluate -> DEBU 38c3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.693 UTC [policies] Evaluate -> DEBU 38c4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.693 UTC [policies] Evaluate -> DEBU 38c5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.694 UTC [policies] Evaluate -> DEBU 38c6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.694 UTC [gossip.gossip] handleMessage -> DEBU 38c7 Exiting" +"2019-09-24 01:05:29.694 UTC [gossip.gossip] handleMessage -> DEBU 38c8 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.695 UTC [msp] DeserializeIdentity -> DEBU 38c9 Obtaining identity" +"2019-09-24 01:05:29.695 UTC [msp] DeserializeIdentity -> DEBU 38ca Obtaining identity" +"2019-09-24 01:05:29.696 UTC [msp] DeserializeIdentity -> DEBU 38cb Obtaining identity" +"2019-09-24 01:05:29.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38cc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38cd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ce Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38cf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38d0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.697 UTC [policies] Evaluate -> DEBU 38d1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func1 -> DEBU 38d2 0xc0032bf640 gate 1569287129697585800 evaluation starts" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d3 0xc0032bf640 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d4 0xc0032bf640 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d5 0xc0032bf640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func2 -> DEBU 38d6 0xc0032bf640 principal evaluation fails" +"2019-09-24 01:05:29.697 UTC [cauthdsl] func1 -> DEBU 38d7 0xc0032bf640 gate 1569287129697585800 evaluation fails" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38d8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38d9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38da == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func1 -> DEBU 38db 0xc0032bfe80 gate 1569287129698108200 evaluation starts" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38dc 0xc0032bfe80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38dd 0xc0032bfe80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38de 0xc0032bfe80 principal matched by identity 0" +"2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38df Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e0 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func2 -> DEBU 38e1 0xc0032bfe80 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.698 UTC [cauthdsl] func1 -> DEBU 38e2 0xc0032bfe80 gate 1569287129698108200 evaluation succeeds" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.698 UTC [policies] Evaluate -> DEBU 38e6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e7 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e8 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:29.698 UTC [msp.identity] Verify -> DEBU 38e9 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 38ea Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:29.699 UTC [msp] DeserializeIdentity -> DEBU 38eb Obtaining identity" +"2019-09-24 01:05:29.699 UTC [msp] DeserializeIdentity -> DEBU 38ec Obtaining identity" +"2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 38ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.699 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 38ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.701 UTC [policies] Evaluate -> DEBU 38f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.701 UTC [policies] Evaluate -> DEBU 38f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.702 UTC [policies] Evaluate -> DEBU 38f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.702 UTC [cauthdsl] func1 -> DEBU 38f3 0xc00333c630 gate 1569287129702566900 evaluation starts" +"2019-09-24 01:05:29.702 UTC [cauthdsl] func2 -> DEBU 38f4 0xc00333c630 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f5 0xc00333c630 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f6 0xc00333c630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.703 UTC [cauthdsl] func2 -> DEBU 38f7 0xc00333c630 principal evaluation fails" +"2019-09-24 01:05:29.704 UTC [cauthdsl] func1 -> DEBU 38f8 0xc00333c630 gate 1569287129702566900 evaluation fails" +"2019-09-24 01:05:29.704 UTC [policies] Evaluate -> DEBU 38f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.704 UTC [policies] Evaluate -> DEBU 38fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.705 UTC [policies] Evaluate -> DEBU 38fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.705 UTC [cauthdsl] func1 -> DEBU 38fc 0xc00333cea0 gate 1569287129705460500 evaluation starts" +"2019-09-24 01:05:29.705 UTC [cauthdsl] func2 -> DEBU 38fd 0xc00333cea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.706 UTC [cauthdsl] func2 -> DEBU 38fe 0xc00333cea0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.706 UTC [cauthdsl] func2 -> DEBU 38ff 0xc00333cea0 principal matched by identity 0" +"2019-09-24 01:05:29.706 UTC [msp.identity] Verify -> DEBU 3900 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:29.706 UTC [msp.identity] Verify -> DEBU 3901 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:29.707 UTC [cauthdsl] func2 -> DEBU 3902 0xc00333cea0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.707 UTC [cauthdsl] func1 -> DEBU 3903 0xc00333cea0 gate 1569287129705460500 evaluation succeeds" +"2019-09-24 01:05:29.707 UTC [policies] Evaluate -> DEBU 3904 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3905 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3906 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.708 UTC [policies] Evaluate -> DEBU 3907 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.708 UTC [gossip.gossip] handleMessage -> DEBU 3908 Exiting" +"2019-09-24 01:05:29.708 UTC [gossip.gossip] handleMessage -> DEBU 3909 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.709 UTC [msp.identity] Verify -> DEBU 390a Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 390b Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:29.710 UTC [msp.identity] Verify -> DEBU 390c Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:29.710 UTC [msp.identity] Verify -> DEBU 390d Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:29.711 UTC [msp] DeserializeIdentity -> DEBU 390e Obtaining identity" +"2019-09-24 01:05:29.711 UTC [msp] DeserializeIdentity -> DEBU 390f Obtaining identity" +"2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3910 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3911 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.712 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3912 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3913 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3914 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 3915 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 3916 0xc0033738f0 gate 1569287129712680200 evaluation starts" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3917 0xc0033738f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3918 0xc0033738f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3919 0xc0033738f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 391a 0xc0033738f0 principal evaluation fails" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 391b 0xc0033738f0 gate 1569287129712680200 evaluation fails" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.712 UTC [policies] Evaluate -> DEBU 391e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func1 -> DEBU 391f 0xc0033c6190 gate 1569287129712936600 evaluation starts" +"2019-09-24 01:05:29.712 UTC [cauthdsl] func2 -> DEBU 3920 0xc0033c6190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3921 0xc0033c6190 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3922 0xc0033c6190 principal matched by identity 0" +"2019-09-24 01:05:29.713 UTC [msp.identity] Verify -> DEBU 3923 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:29.713 UTC [msp.identity] Verify -> DEBU 3924 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3925 0xc0033c6190 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func1 -> DEBU 3926 0xc0033c6190 gate 1569287129712936600 evaluation succeeds" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3927 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3929 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 392a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.713 UTC [msp] DeserializeIdentity -> DEBU 392b Obtaining identity" +"2019-09-24 01:05:29.713 UTC [msp] DeserializeIdentity -> DEBU 392c Obtaining identity" +"2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 392d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 392e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.713 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 392f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3930 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3931 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:29.713 UTC [policies] Evaluate -> DEBU 3932 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func1 -> DEBU 3933 0xc0033c7a90 gate 1569287129713687300 evaluation starts" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3934 0xc0033c7a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.713 UTC [cauthdsl] func2 -> DEBU 3935 0xc0033c7a90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.714 UTC [cauthdsl] func2 -> DEBU 3936 0xc0033c7a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:29.714 UTC [cauthdsl] func2 -> DEBU 3937 0xc0033c7a90 principal evaluation fails" +"2019-09-24 01:05:29.715 UTC [cauthdsl] func1 -> DEBU 3938 0xc0033c7a90 gate 1569287129713687300 evaluation fails" +"2019-09-24 01:05:29.716 UTC [policies] Evaluate -> DEBU 3939 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.717 UTC [policies] Evaluate -> DEBU 393a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:29.717 UTC [policies] Evaluate -> DEBU 393b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:29.717 UTC [cauthdsl] func1 -> DEBU 393c 0xc0034022d0 gate 1569287129717501700 evaluation starts" +"2019-09-24 01:05:29.717 UTC [cauthdsl] func2 -> DEBU 393d 0xc0034022d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:29.717 UTC [cauthdsl] func2 -> DEBU 393e 0xc0034022d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:29.718 UTC [cauthdsl] func2 -> DEBU 393f 0xc0034022d0 principal matched by identity 0" +"2019-09-24 01:05:29.718 UTC [msp.identity] Verify -> DEBU 3940 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:29.718 UTC [msp.identity] Verify -> DEBU 3941 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:29.718 UTC [cauthdsl] func2 -> DEBU 3942 0xc0034022d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:29.718 UTC [cauthdsl] func1 -> DEBU 3943 0xc0034022d0 gate 1569287129717501700 evaluation succeeds" +"2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3944 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3946 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:29.718 UTC [policies] Evaluate -> DEBU 3947 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:29.719 UTC [gossip.gossip] handleMessage -> DEBU 3948 Exiting" +"2019-09-24 01:05:29.719 UTC [msp] DeserializeIdentity -> DEBU 3949 Obtaining identity" +"2019-09-24 01:05:29.720 UTC [msp] DeserializeIdentity -> DEBU 394a Obtaining identity" +"2019-09-24 01:05:29.720 UTC [gossip.pull] Hello -> DEBU 394b Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:29.720 UTC [msp] DeserializeIdentity -> DEBU 394c Obtaining identity" +"2019-09-24 01:05:29.721 UTC [msp] DeserializeIdentity -> DEBU 394d Obtaining identity" +"2019-09-24 01:05:29.721 UTC [gossip.comm] Send -> DEBU 394e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:29.721 UTC [gossip.comm] sendToEndpoint -> DEBU 394f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.722 UTC [gossip.comm] sendToEndpoint -> DEBU 3950 Exiting" +"2019-09-24 01:05:29.723 UTC [gossip.comm] func1 -> DEBU 3951 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.723 UTC [gossip.gossip] handleMessage -> DEBU 3952 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.724 UTC [gossip.pull] HandleMessage -> DEBU 3953 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.724 UTC [gossip.gossip] handleMessage -> DEBU 3954 Exiting" +"2019-09-24 01:05:29.839 UTC [gossip.comm] func1 -> DEBU 3955 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.840 UTC [gossip.gossip] handleMessage -> DEBU 3956 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.841 UTC [msp] DeserializeIdentity -> DEBU 3957 Obtaining identity" +"2019-09-24 01:05:29.841 UTC [msp] DeserializeIdentity -> DEBU 3958 Obtaining identity" +"2019-09-24 01:05:29.842 UTC [gossip.gossip] handleMessage -> DEBU 3959 Exiting" +"2019-09-24 01:05:29.862 UTC [gossip.comm] func1 -> DEBU 395a Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.863 UTC [gossip.gossip] handleMessage -> DEBU 395b Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.864 UTC [gossip.pull] HandleMessage -> DEBU 395c GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:29.864 UTC [gossip.pull] SendDigest -> DEBU 395d Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:29.864 UTC [gossip.gossip] handleMessage -> DEBU 395e Exiting" +"2019-09-24 01:05:30.040 UTC [gossip.comm] func1 -> DEBU 395f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.041 UTC [gossip.gossip] handleMessage -> DEBU 3960 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.041 UTC [msp] DeserializeIdentity -> DEBU 3961 Obtaining identity" +"2019-09-24 01:05:30.042 UTC [msp] DeserializeIdentity -> DEBU 3962 Obtaining identity" +"2019-09-24 01:05:30.042 UTC [msp] DeserializeIdentity -> DEBU 3963 Obtaining identity" +"2019-09-24 01:05:30.042 UTC [gossip.gossip] handleMessage -> DEBU 3964 Exiting" +"2019-09-24 01:05:30.240 UTC [gossip.comm] func1 -> DEBU 3965 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.241 UTC [gossip.gossip] handleMessage -> DEBU 3966 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.241 UTC [msp] DeserializeIdentity -> DEBU 3967 Obtaining identity" +"2019-09-24 01:05:30.242 UTC [msp] DeserializeIdentity -> DEBU 3968 Obtaining identity" +"2019-09-24 01:05:30.244 UTC [msp] DeserializeIdentity -> DEBU 3969 Obtaining identity" +"2019-09-24 01:05:30.245 UTC [gossip.gossip] handleMessage -> DEBU 396a Exiting" +"2019-09-24 01:05:30.483 UTC [gossip.comm] func1 -> DEBU 396b Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.484 UTC [gossip.gossip] handleMessage -> DEBU 396c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.484 UTC [gossip.pull] HandleMessage -> DEBU 396d GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.485 UTC [gossip.pull] SendDigest -> DEBU 396e Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:30.485 UTC [gossip.gossip] handleMessage -> DEBU 396f Exiting" +"2019-09-24 01:05:30.490 UTC [gossip.comm] func1 -> DEBU 3970 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.490 UTC [gossip.gossip] handleMessage -> DEBU 3971 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.490 UTC [gossip.gossip] handleMessage -> DEBU 3972 Exiting" +"2019-09-24 01:05:30.491 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3973 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.491 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3974 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:30.491 UTC [msp.identity] Verify -> DEBU 3975 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +"2019-09-24 01:05:30.492 UTC [msp.identity] Verify -> DEBU 3976 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +00000040 c8 31 d2 9b c5 d3 |.1....|" +"2019-09-24 01:05:30.492 UTC [msp.identity] Verify -> DEBU 3977 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:30.493 UTC [msp.identity] Verify -> DEBU 3978 Verify: sig = 00000000 30 45 02 21 00 f2 56 af a2 31 20 31 a4 04 4f e6 |0E.!..V..1 1..O.| +00000010 03 f6 26 d2 83 04 ae 42 f9 d0 87 49 ea 2c 79 6a |..&....B...I.,yj| +00000020 15 c1 42 18 0f 02 20 7a b2 64 da 27 09 e4 f1 c3 |..B... z.d.'....| +00000030 08 4e 8b 3f 7a c2 7e f0 09 38 ad 43 05 e3 2e 3d |.N.?z.~..8.C...=| +00000040 22 a4 dd 47 c0 22 72 |"..G."r|" +"2019-09-24 01:05:30.494 UTC [gossip.discovery] handleAliveMessage -> DEBU 3979 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:30.494 UTC [gossip.discovery] learnExistingMembers -> DEBU 397a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:30.494 UTC [gossip.discovery] learnExistingMembers -> DEBU 397b updating membership: timestamp: " +"2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397c Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:30.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 397e Exiting" +"2019-09-24 01:05:30.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 397f Exiting" +"2019-09-24 01:05:30.496 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3980 Exiting" +"2019-09-24 01:05:30.496 UTC [gossip.discovery] sendMemResponse -> DEBU 3981 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:30.496 UTC [msp] DeserializeIdentity -> DEBU 3982 Obtaining identity" +"2019-09-24 01:05:30.497 UTC [msp] DeserializeIdentity -> DEBU 3983 Obtaining identity" +"2019-09-24 01:05:30.497 UTC [gossip.comm] Send -> DEBU 3984 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.497 UTC [gossip.comm] sendToEndpoint -> DEBU 3986 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.498 UTC [gossip.comm] sendToEndpoint -> DEBU 3987 Exiting" +"2019-09-24 01:05:30.497 UTC [gossip.discovery] sendMemResponse -> DEBU 3985 Exiting, replying with alive: > alive: " +"2019-09-24 01:05:30.785 UTC [gossip.comm] func1 -> DEBU 3988 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.786 UTC [gossip.gossip] handleMessage -> DEBU 3989 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.786 UTC [gossip.pull] HandleMessage -> DEBU 398a GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.786 UTC [msp] DeserializeIdentity -> DEBU 398b Obtaining identity" +"2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398c Obtaining identity" +"2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398d Obtaining identity" +"2019-09-24 01:05:30.787 UTC [msp] DeserializeIdentity -> DEBU 398e Obtaining identity" +"2019-09-24 01:05:30.788 UTC [msp] DeserializeIdentity -> DEBU 398f Obtaining identity" +"2019-09-24 01:05:30.788 UTC [msp] DeserializeIdentity -> DEBU 3990 Obtaining identity" +"2019-09-24 01:05:30.789 UTC [gossip.pull] SendDigest -> DEBU 3991 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:30.790 UTC [gossip.gossip] handleMessage -> DEBU 3992 Exiting" +"2019-09-24 01:05:30.800 UTC [gossip.comm] func1 -> DEBU 3993 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.802 UTC [gossip.gossip] handleMessage -> DEBU 3994 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.802 UTC [gossip.gossip] handleMessage -> DEBU 3995 Exiting" +"2019-09-24 01:05:30.803 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3996 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.803 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3997 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:30.803 UTC [msp] DeserializeIdentity -> DEBU 3998 Obtaining identity" +"2019-09-24 01:05:30.804 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3999 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:30.804 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.805 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 399b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.805 UTC [policies] Evaluate -> DEBU 399c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:30.806 UTC [policies] Evaluate -> DEBU 399d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:30.806 UTC [policies] Evaluate -> DEBU 399e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:30.807 UTC [cauthdsl] func1 -> DEBU 399f 0xc003482800 gate 1569287130807262400 evaluation starts" +"2019-09-24 01:05:30.807 UTC [cauthdsl] func2 -> DEBU 39a0 0xc003482800 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.808 UTC [cauthdsl] func2 -> DEBU 39a1 0xc003482800 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.808 UTC [cauthdsl] func2 -> DEBU 39a2 0xc003482800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39a3 0xc003482800 principal evaluation fails" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39a4 0xc003482800 gate 1569287130807262400 evaluation fails" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a5 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39a7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39a8 0xc003483060 gate 1569287130809182800 evaluation starts" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39a9 0xc003483060 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39aa 0xc003483060 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39ab 0xc003483060 principal matched by identity 0" +"2019-09-24 01:05:30.809 UTC [msp.identity] Verify -> DEBU 39ac Verify: digest = 00000000 26 d6 45 45 11 c7 e9 8e 6a 9e 80 0b 9f fa b7 08 |&.EE....j.......| +00000010 82 00 e0 f5 f8 90 8e 8e 40 ff a7 fc ca c7 d3 a7 |........@.......|" +"2019-09-24 01:05:30.809 UTC [msp.identity] Verify -> DEBU 39ad Verify: sig = 00000000 30 45 02 21 00 9e 0e 3a 7b ab f6 01 24 60 a6 37 |0E.!...:{...$`.7| +00000010 eb 53 13 0c 2d f9 f9 8f cc cc 41 f3 0c 9a 14 ea |.S..-.....A.....| +00000020 98 6e d7 1f b7 02 20 53 30 91 02 da 56 9c 80 00 |.n.... S0...V...| +00000030 c7 89 85 62 c7 cc 2b 95 cd fb 72 10 ed 2d 39 37 |...b..+...r..-97| +00000040 f5 df 91 6c 59 c7 8b |...lY..|" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func2 -> DEBU 39ae 0xc003483060 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:30.809 UTC [cauthdsl] func1 -> DEBU 39af 0xc003483060 gate 1569287130809182800 evaluation succeeds" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:30.809 UTC [policies] Evaluate -> DEBU 39b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 39b4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b6 updating membership: timestamp: " +"2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b7 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 39b9 Exiting" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 39ba Exiting" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39bb Exiting" +"2019-09-24 01:05:30.809 UTC [gossip.discovery] sendMemResponse -> DEBU 39bc Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:30.809 UTC [msp] DeserializeIdentity -> DEBU 39bd Obtaining identity" +"2019-09-24 01:05:30.810 UTC [msp] DeserializeIdentity -> DEBU 39be Obtaining identity" +"2019-09-24 01:05:30.810 UTC [msp] DeserializeIdentity -> DEBU 39bf Obtaining identity" +"2019-09-24 01:05:30.810 UTC [gossip.comm] Send -> DEBU 39c0 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.810 UTC [gossip.discovery] sendMemResponse -> DEBU 39c1 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:30.810 UTC [gossip.comm] sendToEndpoint -> DEBU 39c2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.810 UTC [gossip.comm] sendToEndpoint -> DEBU 39c3 Exiting" +"2019-09-24 01:05:30.847 UTC [gossip.comm] func1 -> DEBU 39c4 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.847 UTC [gossip.gossip] handleMessage -> DEBU 39c5 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.847 UTC [gossip.pull] HandleMessage -> DEBU 39c6 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c7 Obtaining identity" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c8 Obtaining identity" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39c9 Obtaining identity" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39ca Obtaining identity" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39cb Obtaining identity" +"2019-09-24 01:05:30.847 UTC [msp] DeserializeIdentity -> DEBU 39cc Obtaining identity" +"2019-09-24 01:05:30.847 UTC [gossip.pull] SendDigest -> DEBU 39cd Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:30.848 UTC [gossip.gossip] handleMessage -> DEBU 39ce Exiting" +"2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39cf Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39d1 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.848 UTC [gossip.pull] Hello -> DEBU 39d3 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:30.848 UTC [gossip.comm] Send -> DEBU 39d4 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d6 Exiting" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d8 Exiting" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39d9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.848 UTC [gossip.comm] sendToEndpoint -> DEBU 39da Exiting" +"2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39db Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39dc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39dd GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39de Exiting" +"2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39df Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39e1 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e2 Exiting" +"2019-09-24 01:05:30.852 UTC [gossip.comm] func1 -> DEBU 39e3 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.pull] HandleMessage -> DEBU 39e5 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.852 UTC [gossip.gossip] handleMessage -> DEBU 39e6 Exiting" +"2019-09-24 01:05:30.869 UTC [gossip.comm] func1 -> DEBU 39e7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.871 UTC [gossip.gossip] handleMessage -> DEBU 39e8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.871 UTC [gossip.gossip] handleMessage -> DEBU 39e9 Exiting" +"2019-09-24 01:05:30.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 39ea Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 39eb Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:30.871 UTC [msp] DeserializeIdentity -> DEBU 39ec Obtaining identity" +"2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 39ed Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ee Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.872 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 39ef Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39f3 0xc0034da8c0 gate 1569287130872188100 evaluation starts" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f4 0xc0034da8c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f5 0xc0034da8c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f6 0xc0034da8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39f7 0xc0034da8c0 principal evaluation fails" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39f8 0xc0034da8c0 gate 1569287130872188100 evaluation fails" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39f9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39fa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 39fb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 39fc 0xc0034db1e0 gate 1569287130872518800 evaluation starts" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39fd 0xc0034db1e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39fe 0xc0034db1e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 39ff 0xc0034db1e0 principal matched by identity 0" +"2019-09-24 01:05:30.872 UTC [msp.identity] Verify -> DEBU 3a00 Verify: digest = 00000000 7f 79 b1 3b 80 6e 8e 43 43 92 4b e4 95 cd 9c 01 |.y.;.n.CC.K.....| +00000010 c5 75 7a 23 33 50 13 f4 3e f2 74 b9 30 94 d0 40 |.uz#3P..>.t.0..@|" +"2019-09-24 01:05:30.872 UTC [msp.identity] Verify -> DEBU 3a01 Verify: sig = 00000000 30 44 02 20 26 32 1b df 52 3c 19 69 e4 fa 91 13 |0D. &2..R<.i....| +00000010 58 2e e5 89 3a 78 57 4e a9 b2 c3 d2 61 a1 5a 6e |X...:xWN....a.Zn| +00000020 94 b7 ed 2e 02 20 4c 2d 8c 8a 41 ef d2 6f 8e 86 |..... L-..A..o..| +00000030 ed 20 9f 8f e3 0a 1e 6c 9d 94 f5 4c 63 eb 6d 1f |. .....l...Lc.m.| +00000040 38 5f 40 cd 16 06 |8_@...|" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func2 -> DEBU 3a02 0xc0034db1e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:30.872 UTC [cauthdsl] func1 -> DEBU 3a03 0xc0034db1e0 gate 1569287130872518800 evaluation succeeds" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a04 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a06 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:30.872 UTC [policies] Evaluate -> DEBU 3a07 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a08 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a09 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0a updating membership: timestamp: " +"2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0b Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] learnExistingMembers -> DEBU 3a0d Exiting" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a0e Exiting" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a0f Exiting" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] sendMemResponse -> DEBU 3a10 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a11 Obtaining identity" +"2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a12 Obtaining identity" +"2019-09-24 01:05:30.873 UTC [msp] DeserializeIdentity -> DEBU 3a13 Obtaining identity" +"2019-09-24 01:05:30.873 UTC [gossip.comm] Send -> DEBU 3a14 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.873 UTC [gossip.discovery] sendMemResponse -> DEBU 3a15 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:30.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3a16 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.873 UTC [gossip.comm] sendToEndpoint -> DEBU 3a17 Exiting" +"2019-09-24 01:05:30.889 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a18 Obtaining default signing identity" +"2019-09-24 01:05:30.889 UTC [msp.identity] Sign -> DEBU 3a19 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315102A " +"2019-09-24 01:05:30.889 UTC [msp.identity] Sign -> DEBU 3a1a Sign: digest: DBFF47F58609B1794808192A67EDAAD9A6E563BDE48A337FD01E8CFA5CD6C23C " +"2019-09-24 01:05:30.890 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a1b Obtaining default signing identity" +"2019-09-24 01:05:30.890 UTC [msp.identity] Sign -> DEBU 3a1c Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:30.890 UTC [msp.identity] Sign -> DEBU 3a1d Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a1e Entering, sending GossipMessage: tag:EMPTY mem_req:h\023\313" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.890 UTC [msp] DeserializeIdentity -> DEBU 3a1f Obtaining identity" +"2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a20 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.890 UTC [msp] DeserializeIdentity -> DEBU 3a21 Obtaining identity" +"2019-09-24 01:05:30.890 UTC [gossip.comm] Send -> DEBU 3a22 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a23 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a24 Exiting" +"2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a25 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:h\023\313" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.890 UTC [gossip.comm] sendToEndpoint -> DEBU 3a26 Exiting" +"2019-09-24 01:05:30.891 UTC [gossip.comm] sendToEndpoint -> DEBU 3a27 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.891 UTC [gossip.comm] sendToEndpoint -> DEBU 3a28 Exiting" +"2019-09-24 01:05:30.894 UTC [gossip.comm] func1 -> DEBU 3a29 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.894 UTC [gossip.gossip] handleMessage -> DEBU 3a2a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.894 UTC [gossip.gossip] handleMessage -> DEBU 3a2b Exiting" +"2019-09-24 01:05:30.894 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a2c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.894 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a2d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:30.894 UTC [msp] DeserializeIdentity -> DEBU 3a2e Obtaining identity" +"2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a2f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a30 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.895 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a31 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a32 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a33 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:30.895 UTC [policies] Evaluate -> DEBU 3a34 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:30.895 UTC [cauthdsl] func1 -> DEBU 3a35 0xc003549cf0 gate 1569287130895861300 evaluation starts" +"2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a36 0xc003549cf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a37 0xc003549cf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a38 0xc003549cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:30.895 UTC [cauthdsl] func2 -> DEBU 3a39 0xc003549cf0 principal evaluation fails" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a3a 0xc003549cf0 gate 1569287130895861300 evaluation fails" +"2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a3d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a3e 0xc003562530 gate 1569287130896141600 evaluation starts" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a3f 0xc003562530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a40 0xc003562530 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a41 0xc003562530 principal matched by identity 0" +"2019-09-24 01:05:30.896 UTC [msp.identity] Verify -> DEBU 3a42 Verify: digest = 00000000 7f 79 b1 3b 80 6e 8e 43 43 92 4b e4 95 cd 9c 01 |.y.;.n.CC.K.....| +00000010 c5 75 7a 23 33 50 13 f4 3e f2 74 b9 30 94 d0 40 |.uz#3P..>.t.0..@|" +"2019-09-24 01:05:30.896 UTC [msp.identity] Verify -> DEBU 3a43 Verify: sig = 00000000 30 44 02 20 26 32 1b df 52 3c 19 69 e4 fa 91 13 |0D. &2..R<.i....| +00000010 58 2e e5 89 3a 78 57 4e a9 b2 c3 d2 61 a1 5a 6e |X...:xWN....a.Zn| +00000020 94 b7 ed 2e 02 20 4c 2d 8c 8a 41 ef d2 6f 8e 86 |..... L-..A..o..| +00000030 ed 20 9f 8f e3 0a 1e 6c 9d 94 f5 4c 63 eb 6d 1f |. .....l...Lc.m.| +00000040 38 5f 40 cd 16 06 |8_@...|" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func2 -> DEBU 3a44 0xc003562530 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:30.896 UTC [cauthdsl] func1 -> DEBU 3a45 0xc003562530 gate 1569287130896141600 evaluation succeeds" +"2019-09-24 01:05:30.896 UTC [gossip.comm] func1 -> DEBU 3a46 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.896 UTC [gossip.gossip] handleMessage -> DEBU 3a47 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.897 UTC [gossip.comm] func1 -> DEBU 3a48 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.896 UTC [policies] Evaluate -> DEBU 3a49 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:30.898 UTC [policies] Evaluate -> DEBU 3a4c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a4d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a4e Exiting" +"2019-09-24 01:05:30.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a4f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a50 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +"2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a51 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +00000040 c8 31 d2 9b c5 d3 |.1....|" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a52 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a53 Exiting" +"2019-09-24 01:05:30.898 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a54 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a55 Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +"2019-09-24 01:05:30.898 UTC [msp.identity] Verify -> DEBU 3a56 Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a57 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] isSentByMe -> DEBU 3a58 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a59 Exiting" +"2019-09-24 01:05:30.898 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a5a Exiting" +"2019-09-24 01:05:30.902 UTC [gossip.gossip] handleMessage -> DEBU 3a5b Exiting" +"2019-09-24 01:05:30.902 UTC [gossip.gossip] handleMessage -> DEBU 3a5c Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.902 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a5d Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a5e Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:30.902 UTC [msp.identity] Verify -> DEBU 3a5f Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +"2019-09-24 01:05:30.902 UTC [msp.identity] Verify -> DEBU 3a60 Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a61 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.902 UTC [gossip.discovery] isSentByMe -> DEBU 3a62 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.902 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a63 Exiting" +"2019-09-24 01:05:30.902 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a64 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:30.902 UTC [msp] DeserializeIdentity -> DEBU 3a65 Obtaining identity" +"2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3a66 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a67 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.902 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3a68 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a69 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a6a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:30.902 UTC [policies] Evaluate -> DEBU 3a6b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:30.902 UTC [cauthdsl] func1 -> DEBU 3a6c 0xc0036042c0 gate 1569287130902916500 evaluation starts" +"2019-09-24 01:05:30.902 UTC [cauthdsl] func2 -> DEBU 3a6d 0xc0036042c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.902 UTC [cauthdsl] func2 -> DEBU 3a6e 0xc0036042c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a6f 0xc0036042c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a70 0xc0036042c0 principal evaluation fails" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a71 0xc0036042c0 gate 1569287130902916500 evaluation fails" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a72 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a73 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a74 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a75 0xc003604bc0 gate 1569287130903177700 evaluation starts" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a76 0xc003604bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a77 0xc003604bc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a78 0xc003604bc0 principal matched by identity 0" +"2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a79 Verify: digest = 00000000 26 d6 45 45 11 c7 e9 8e 6a 9e 80 0b 9f fa b7 08 |&.EE....j.......| +00000010 82 00 e0 f5 f8 90 8e 8e 40 ff a7 fc ca c7 d3 a7 |........@.......|" +"2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a7a Verify: sig = 00000000 30 45 02 21 00 9e 0e 3a 7b ab f6 01 24 60 a6 37 |0E.!...:{...$`.7| +00000010 eb 53 13 0c 2d f9 f9 8f cc cc 41 f3 0c 9a 14 ea |.S..-.....A.....| +00000020 98 6e d7 1f b7 02 20 53 30 91 02 da 56 9c 80 00 |.n.... S0...V...| +00000030 c7 89 85 62 c7 cc 2b 95 cd fb 72 10 ed 2d 39 37 |...b..+...r..-97| +00000040 f5 df 91 6c 59 c7 8b |...lY..|" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func2 -> DEBU 3a7b 0xc003604bc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:30.903 UTC [cauthdsl] func1 -> DEBU 3a7c 0xc003604bc0 gate 1569287130903177700 evaluation succeeds" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a7f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:30.903 UTC [policies] Evaluate -> DEBU 3a80 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a81 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a82 Exiting" +"2019-09-24 01:05:30.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a83 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a84 Verify: digest = 00000000 e6 ae 8b d0 03 99 15 f1 e7 e8 1e 38 93 e8 6d 62 |...........8..mb| +00000010 23 a6 7a 2e 76 a1 dd f3 d4 a3 6a 9b 7e 87 e8 ae |#.z.v.....j.~...|" +"2019-09-24 01:05:30.903 UTC [msp.identity] Verify -> DEBU 3a85 Verify: sig = 00000000 30 44 02 20 18 06 95 2b 77 50 64 0b 4f 33 cd 51 |0D. ...+wPd.O3.Q| +00000010 18 00 f1 d9 62 b4 cb 62 4f 15 ad 02 6f 33 b2 72 |....b..bO...o3.r| +00000020 91 26 69 fb 02 20 38 91 dd 0d 99 29 83 1d 0f ec |.&i.. 8....)....| +00000030 e7 6b a7 da 38 29 a7 8b 4d a8 59 f4 0f d5 be 56 |.k..8)..M.Y....V| +00000040 c8 31 d2 9b c5 d3 |.1....|" +"2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a86 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:30.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a87 Exiting" +"2019-09-24 01:05:30.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a88 Exiting" +"2019-09-24 01:05:30.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a89 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:30.904 UTC [gossip.gossip] handleMessage -> DEBU 3a8a Exiting" +"2019-09-24 01:05:30.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3a8b Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8c Verify: digest = 00000000 db ff 47 f5 86 09 b1 79 48 08 19 2a 67 ed aa d9 |..G....yH..*g...| +00000010 a6 e5 63 bd e4 8a 33 7f d0 1e 8c fa 5c d6 c2 3c |..c...3.....\..<|" +"2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8d Verify: sig = 00000000 30 45 02 21 00 94 a7 43 54 81 be f8 7a b2 35 b9 |0E.!...CT...z.5.| +00000010 ae 5b 62 ef e6 45 3d 3c 73 6b a6 aa 6d 95 b1 dc |.[b..E= DEBU 3a8e Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:30.904 UTC [msp.identity] Verify -> DEBU 3a8f Verify: sig = 00000000 30 44 02 20 47 eb be 85 98 9c 9d cc 66 b3 7b a6 |0D. G.......f.{.| +00000010 af 47 be 25 02 ad 5c b5 71 07 50 fe 6e 03 42 54 |.G.%..\.q.P.n.BT| +00000020 d4 95 51 a9 02 20 4a 64 0f c3 f0 e0 29 31 cf f0 |..Q.. Jd....)1..| +00000030 af 68 40 26 11 56 7f 1e 04 f9 1f af 3a 68 9e 79 |.h@&.V......:h.y| +00000040 8e 16 3e 68 13 cb |..>h..|" +"2019-09-24 01:05:30.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a90 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:30.904 UTC [gossip.discovery] isSentByMe -> DEBU 3a91 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:30.904 UTC [gossip.discovery] handleAliveMessage -> DEBU 3a92 Exiting" +"2019-09-24 01:05:30.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3a93 Exiting" +"2019-09-24 01:05:31.720 UTC [gossip.election] waitForInterrupt -> DEBU 3a94 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:31.720 UTC [gossip.election] IsLeader -> DEBU 3a95 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:31.721 UTC [msp] GetDefaultSigningIdentity -> DEBU 3a96 Obtaining default signing identity" +"2019-09-24 01:05:31.721 UTC [msp.identity] Sign -> DEBU 3a97 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100E1801 " +"2019-09-24 01:05:31.721 UTC [msp.identity] Sign -> DEBU 3a98 Sign: digest: 69ADDF10A0E196DE8523CFAE8052AD658226FD437222E9F29FBD8DA9A51627BA " +"2019-09-24 01:05:31.721 UTC [gossip.election] waitForInterrupt -> DEBU 3a99 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9a Obtaining identity" +"2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9b Obtaining identity" +"2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9c Obtaining identity" +"2019-09-24 01:05:31.730 UTC [msp] DeserializeIdentity -> DEBU 3a9d Obtaining identity" +"2019-09-24 01:05:31.731 UTC [gossip.comm] Send -> DEBU 3a9e Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:31.731 UTC [msp] DeserializeIdentity -> DEBU 3a9f Obtaining identity" +"2019-09-24 01:05:31.731 UTC [msp] DeserializeIdentity -> DEBU 3aa0 Obtaining identity" +"2019-09-24 01:05:31.731 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:05:31.731 UTC [gossip.comm] sendToEndpoint -> DEBU 3aa2 Exiting" +"2019-09-24 01:05:33.513 UTC [gossip.comm] func1 -> DEBU 3aa3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.513 UTC [gossip.gossip] handleMessage -> DEBU 3aa4 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.514 UTC [gossip.gossip] handleMessage -> DEBU 3aa5 Exiting" +"2019-09-24 01:05:33.514 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3aa6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.515 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3aa7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:33.516 UTC [msp.identity] Verify -> DEBU 3aa8 Verify: digest = 00000000 dc c1 4c 3b d3 b7 06 df ce 3b 0b af 2a 8a d5 fa |..L;.....;..*...| +00000010 0d 1a 8e c6 44 6f 13 7a ce 52 1b 7d 80 2d 29 08 |....Do.z.R.}.-).|" +"2019-09-24 01:05:33.516 UTC [msp.identity] Verify -> DEBU 3aa9 Verify: sig = 00000000 30 44 02 20 06 e6 cf 33 c6 0a b6 bb 34 7d f3 d3 |0D. ...3....4}..| +00000010 14 d5 08 01 40 b4 68 70 9c 2d b5 5b a6 8b 43 62 |....@.hp.-.[..Cb| +00000020 4b b0 5e 03 02 20 29 f7 99 cd 8a f2 99 9b 64 22 |K.^.. ).......d"| +00000030 b6 16 5b fc 79 64 69 61 ad 97 b4 c5 0d 28 a8 e2 |..[.ydia.....(..| +00000040 17 28 7e 00 91 af |.(~...|" +"2019-09-24 01:05:33.516 UTC [gossip.discovery] handleAliveMessage -> DEBU 3aaa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:33.517 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aac updating membership: timestamp: " +"2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aad Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:33.518 UTC [gossip.discovery] learnExistingMembers -> DEBU 3aaf Exiting" +"2019-09-24 01:05:33.518 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ab0 Exiting" +"2019-09-24 01:05:33.519 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab1 Exiting" +"2019-09-24 01:05:33.520 UTC [gossip.comm] func1 -> DEBU 3ab2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.520 UTC [gossip.gossip] handleMessage -> DEBU 3ab3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.520 UTC [gossip.gossip] handleMessage -> DEBU 3ab4 Exiting" +"2019-09-24 01:05:33.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab5 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ab6 Exiting" +"2019-09-24 01:05:33.521 UTC [msp] DeserializeIdentity -> DEBU 3ab7 Obtaining identity" +"2019-09-24 01:05:33.521 UTC [msp] DeserializeIdentity -> DEBU 3ab8 Obtaining identity" +"2019-09-24 01:05:33.522 UTC [msp] DeserializeIdentity -> DEBU 3ab9 Obtaining identity" +"2019-09-24 01:05:33.524 UTC [gossip.comm] Send -> DEBU 3aba Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:33.524 UTC [msp] DeserializeIdentity -> DEBU 3abb Obtaining identity" +"2019-09-24 01:05:33.524 UTC [gossip.comm] Send -> DEBU 3abc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:33.525 UTC [gossip.comm] sendToEndpoint -> DEBU 3abd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.525 UTC [gossip.comm] sendToEndpoint -> DEBU 3abe Exiting" +"2019-09-24 01:05:33.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3abf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.526 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac0 Exiting" +"2019-09-24 01:05:33.527 UTC [gossip.comm] func1 -> DEBU 3ac1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.528 UTC [gossip.gossip] handleMessage -> DEBU 3ac2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.528 UTC [gossip.gossip] handleMessage -> DEBU 3ac3 Exiting" +"2019-09-24 01:05:33.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:33.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ac5 Exiting" +"2019-09-24 01:05:33.653 UTC [msp] DeserializeIdentity -> DEBU 3ac6 Obtaining identity" +"2019-09-24 01:05:33.653 UTC [msp] DeserializeIdentity -> DEBU 3ac7 Obtaining identity" +"2019-09-24 01:05:33.653 UTC [gossip.comm] Send -> DEBU 3ac8 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3ac9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3aca Exiting" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acb Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acc Exiting" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3acd Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.653 UTC [gossip.comm] sendToEndpoint -> DEBU 3ace Exiting" +"2019-09-24 01:05:33.655 UTC [gossip.comm] func1 -> DEBU 3acf Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.655 UTC [gossip.gossip] handleMessage -> DEBU 3ad0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad1 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3ad2 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad3 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:33.655 UTC [msp.identity] Verify -> DEBU 3ad4 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:33.655 UTC [msp] DeserializeIdentity -> DEBU 3ad5 Obtaining identity" +"2019-09-24 01:05:33.655 UTC [msp] DeserializeIdentity -> DEBU 3ad6 Obtaining identity" +"2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ad7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.656 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3ad9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3ada == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3adb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.656 UTC [policies] Evaluate -> DEBU 3adc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func1 -> DEBU 3add 0xc0037d0d20 gate 1569287133656777500 evaluation starts" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ade 0xc0037d0d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3adf 0xc0037d0d20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ae0 0xc0037d0d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func2 -> DEBU 3ae1 0xc0037d0d20 principal evaluation fails" +"2019-09-24 01:05:33.656 UTC [cauthdsl] func1 -> DEBU 3ae2 0xc0037d0d20 gate 1569287133656777500 evaluation fails" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3ae5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func1 -> DEBU 3ae6 0xc0037d1560 gate 1569287133657111000 evaluation starts" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae7 0xc0037d1560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae8 0xc0037d1560 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3ae9 0xc0037d1560 principal matched by identity 0" +"2019-09-24 01:05:33.657 UTC [msp.identity] Verify -> DEBU 3aea Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:33.657 UTC [msp.identity] Verify -> DEBU 3aeb Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func2 -> DEBU 3aec 0xc0037d1560 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.657 UTC [cauthdsl] func1 -> DEBU 3aed 0xc0037d1560 gate 1569287133657111000 evaluation succeeds" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3aee Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3aef == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.657 UTC [msp] DeserializeIdentity -> DEBU 3af2 Obtaining identity" +"2019-09-24 01:05:33.657 UTC [msp] DeserializeIdentity -> DEBU 3af3 Obtaining identity" +"2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3af4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.657 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3af6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.657 UTC [policies] Evaluate -> DEBU 3af9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3afa 0xc003882d40 gate 1569287133658024100 evaluation starts" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afb 0xc003882d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afc 0xc003882d40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afd 0xc003882d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3afe 0xc003882d40 principal evaluation fails" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3aff 0xc003882d40 gate 1569287133658024100 evaluation fails" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b00 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b01 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b02 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3b03 0xc0038835c0 gate 1569287133658359000 evaluation starts" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b04 0xc0038835c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b05 0xc0038835c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b06 0xc0038835c0 principal matched by identity 0" +"2019-09-24 01:05:33.658 UTC [msp.identity] Verify -> DEBU 3b07 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:33.658 UTC [msp.identity] Verify -> DEBU 3b08 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func2 -> DEBU 3b09 0xc0038835c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.658 UTC [cauthdsl] func1 -> DEBU 3b0a 0xc0038835c0 gate 1569287133658359000 evaluation succeeds" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.658 UTC [policies] Evaluate -> DEBU 3b0e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.658 UTC [gossip.gossip] handleMessage -> DEBU 3b0f Exiting" +"2019-09-24 01:05:33.661 UTC [gossip.comm] func1 -> DEBU 3b10 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.661 UTC [gossip.gossip] handleMessage -> DEBU 3b11 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b12 Obtaining identity" +"2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b13 Obtaining identity" +"2019-09-24 01:05:33.661 UTC [msp] DeserializeIdentity -> DEBU 3b14 Obtaining identity" +"2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b16 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.662 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b17 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.662 UTC [policies] Evaluate -> DEBU 3b18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.663 UTC [policies] Evaluate -> DEBU 3b19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.663 UTC [policies] Evaluate -> DEBU 3b1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.663 UTC [cauthdsl] func1 -> DEBU 3b1b 0xc003895270 gate 1569287133663491400 evaluation starts" +"2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1c 0xc003895270 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1d 0xc003895270 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1e 0xc003895270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.663 UTC [cauthdsl] func2 -> DEBU 3b1f 0xc003895270 principal evaluation fails" +"2019-09-24 01:05:33.664 UTC [cauthdsl] func1 -> DEBU 3b20 0xc003895270 gate 1569287133663491400 evaluation fails" +"2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b21 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.664 UTC [policies] Evaluate -> DEBU 3b23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.664 UTC [cauthdsl] func1 -> DEBU 3b24 0xc003895ab0 gate 1569287133664531300 evaluation starts" +"2019-09-24 01:05:33.664 UTC [cauthdsl] func2 -> DEBU 3b25 0xc003895ab0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.664 UTC [cauthdsl] func2 -> DEBU 3b26 0xc003895ab0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.665 UTC [cauthdsl] func2 -> DEBU 3b27 0xc003895ab0 principal matched by identity 0" +"2019-09-24 01:05:33.666 UTC [msp.identity] Verify -> DEBU 3b28 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:33.667 UTC [msp.identity] Verify -> DEBU 3b29 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:33.667 UTC [cauthdsl] func2 -> DEBU 3b2a 0xc003895ab0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.668 UTC [cauthdsl] func1 -> DEBU 3b2c 0xc003895ab0 gate 1569287133664531300 evaluation succeeds" +"2019-09-24 01:05:33.668 UTC [policies] Evaluate -> DEBU 3b2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.668 UTC [policies] Evaluate -> DEBU 3b2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.669 UTC [policies] Evaluate -> DEBU 3b2f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.669 UTC [policies] Evaluate -> DEBU 3b30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.668 UTC [gossip.comm] func1 -> DEBU 3b2b Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.670 UTC [msp.identity] Verify -> DEBU 3b31 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:33.670 UTC [msp.identity] Verify -> DEBU 3b32 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:33.671 UTC [msp.identity] Verify -> DEBU 3b33 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3b34 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:33.672 UTC [msp] DeserializeIdentity -> DEBU 3b35 Obtaining identity" +"2019-09-24 01:05:33.672 UTC [msp] DeserializeIdentity -> DEBU 3b36 Obtaining identity" +"2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b37 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b38 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.672 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b39 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b3c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func1 -> DEBU 3b3d 0xc0038ba110 gate 1569287133673171800 evaluation starts" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b3e 0xc0038ba110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b3f 0xc0038ba110 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b40 0xc0038ba110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func2 -> DEBU 3b41 0xc0038ba110 principal evaluation fails" +"2019-09-24 01:05:33.673 UTC [cauthdsl] func1 -> DEBU 3b42 0xc0038ba110 gate 1569287133673171800 evaluation fails" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.673 UTC [policies] Evaluate -> DEBU 3b45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func1 -> DEBU 3b46 0xc0038baa50 gate 1569287133673968900 evaluation starts" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b47 0xc0038baa50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b48 0xc0038baa50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b49 0xc0038baa50 principal matched by identity 0" +"2019-09-24 01:05:33.674 UTC [msp.identity] Verify -> DEBU 3b4a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:33.674 UTC [msp.identity] Verify -> DEBU 3b4b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func2 -> DEBU 3b4c 0xc0038baa50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.674 UTC [cauthdsl] func1 -> DEBU 3b4d 0xc0038baa50 gate 1569287133673968900 evaluation succeeds" +"2019-09-24 01:05:33.674 UTC [policies] Evaluate -> DEBU 3b4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.674 UTC [policies] Evaluate -> DEBU 3b4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.675 UTC [policies] Evaluate -> DEBU 3b50 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.675 UTC [policies] Evaluate -> DEBU 3b51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.675 UTC [gossip.gossip] handleMessage -> DEBU 3b52 Exiting" +"2019-09-24 01:05:33.676 UTC [gossip.gossip] handleMessage -> DEBU 3b53 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b54 Obtaining identity" +"2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b55 Obtaining identity" +"2019-09-24 01:05:33.676 UTC [msp] DeserializeIdentity -> DEBU 3b56 Obtaining identity" +"2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b57 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b58 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.676 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b59 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b5d 0xc00390c560 gate 1569287133676534900 evaluation starts" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b5e 0xc00390c560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b5f 0xc00390c560 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b60 0xc00390c560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b61 0xc00390c560 principal evaluation fails" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b62 0xc00390c560 gate 1569287133676534900 evaluation fails" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.676 UTC [policies] Evaluate -> DEBU 3b65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func1 -> DEBU 3b66 0xc00390cda0 gate 1569287133676828300 evaluation starts" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b67 0xc00390cda0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.676 UTC [cauthdsl] func2 -> DEBU 3b68 0xc00390cda0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.677 UTC [cauthdsl] func2 -> DEBU 3b69 0xc00390cda0 principal matched by identity 0" +"2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b6a Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b6b Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:33.677 UTC [cauthdsl] func2 -> DEBU 3b6c 0xc00390cda0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.677 UTC [cauthdsl] func1 -> DEBU 3b6d 0xc00390cda0 gate 1569287133676828300 evaluation succeeds" +"2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b70 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.677 UTC [policies] Evaluate -> DEBU 3b71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b72 Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:33.677 UTC [msp.identity] Verify -> DEBU 3b73 Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:33.678 UTC [msp.identity] Verify -> DEBU 3b74 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3b75 Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:33.679 UTC [msp] DeserializeIdentity -> DEBU 3b76 Obtaining identity" +"2019-09-24 01:05:33.679 UTC [msp] DeserializeIdentity -> DEBU 3b77 Obtaining identity" +"2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3b78 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b79 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.679 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3b7a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:33.679 UTC [policies] Evaluate -> DEBU 3b7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:33.679 UTC [cauthdsl] func1 -> DEBU 3b7e 0xc0039433c0 gate 1569287133679560300 evaluation starts" +"2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b7f 0xc0039433c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b80 0xc0039433c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.679 UTC [cauthdsl] func2 -> DEBU 3b81 0xc0039433c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b82 0xc0039433c0 principal evaluation fails" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func1 -> DEBU 3b83 0xc0039433c0 gate 1569287133679560300 evaluation fails" +"2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b84 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:33.680 UTC [policies] Evaluate -> DEBU 3b86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func1 -> DEBU 3b87 0xc003943d20 gate 1569287133680490900 evaluation starts" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b88 0xc003943d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b89 0xc003943d20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:33.680 UTC [cauthdsl] func2 -> DEBU 3b8a 0xc003943d20 principal matched by identity 0" +"2019-09-24 01:05:33.680 UTC [msp.identity] Verify -> DEBU 3b8b Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:33.680 UTC [msp.identity] Verify -> DEBU 3b8c Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:33.681 UTC [cauthdsl] func2 -> DEBU 3b8d 0xc003943d20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:33.681 UTC [cauthdsl] func1 -> DEBU 3b8e 0xc003943d20 gate 1569287133680490900 evaluation succeeds" +"2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b8f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b90 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b91 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:33.681 UTC [policies] Evaluate -> DEBU 3b92 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:33.681 UTC [gossip.gossip] handleMessage -> DEBU 3b93 Exiting" +"2019-09-24 01:05:33.722 UTC [msp] DeserializeIdentity -> DEBU 3b94 Obtaining identity" +"2019-09-24 01:05:33.722 UTC [msp] DeserializeIdentity -> DEBU 3b95 Obtaining identity" +"2019-09-24 01:05:33.722 UTC [gossip.pull] Hello -> DEBU 3b96 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:33.723 UTC [msp] DeserializeIdentity -> DEBU 3b97 Obtaining identity" +"2019-09-24 01:05:33.723 UTC [msp] DeserializeIdentity -> DEBU 3b98 Obtaining identity" +"2019-09-24 01:05:33.723 UTC [gossip.comm] Send -> DEBU 3b99 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:33.723 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.723 UTC [gossip.comm] sendToEndpoint -> DEBU 3b9b Exiting" +"2019-09-24 01:05:33.726 UTC [gossip.comm] func1 -> DEBU 3b9c Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.726 UTC [gossip.gossip] handleMessage -> DEBU 3b9d Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.728 UTC [gossip.pull] HandleMessage -> DEBU 3b9e GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.728 UTC [gossip.gossip] handleMessage -> DEBU 3b9f Exiting" +"2019-09-24 01:05:33.798 UTC [gossip.discovery] periodicalReconnectToDead -> DEBU 3ba0 Sleeping 25s" +"2019-09-24 01:05:33.845 UTC [gossip.comm] func1 -> DEBU 3ba1 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.845 UTC [gossip.gossip] handleMessage -> DEBU 3ba2 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.845 UTC [msp] DeserializeIdentity -> DEBU 3ba3 Obtaining identity" +"2019-09-24 01:05:33.846 UTC [msp] DeserializeIdentity -> DEBU 3ba4 Obtaining identity" +"2019-09-24 01:05:33.846 UTC [gossip.gossip] handleMessage -> DEBU 3ba5 Exiting" +"2019-09-24 01:05:33.863 UTC [gossip.comm] func1 -> DEBU 3ba6 Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.864 UTC [gossip.gossip] handleMessage -> DEBU 3ba7 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.866 UTC [gossip.pull] HandleMessage -> DEBU 3ba8 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:33.866 UTC [gossip.pull] SendDigest -> DEBU 3ba9 Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:33.866 UTC [gossip.gossip] handleMessage -> DEBU 3baa Exiting" +"2019-09-24 01:05:34.042 UTC [gossip.comm] func1 -> DEBU 3bab Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.042 UTC [gossip.gossip] handleMessage -> DEBU 3bac Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3bad Obtaining identity" +"2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3bae Obtaining identity" +"2019-09-24 01:05:34.042 UTC [msp] DeserializeIdentity -> DEBU 3baf Obtaining identity" +"2019-09-24 01:05:34.042 UTC [gossip.gossip] handleMessage -> DEBU 3bb0 Exiting" +"2019-09-24 01:05:34.142 UTC [gossip.comm] func1 -> DEBU 3bb1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.142 UTC [gossip.gossip] handleMessage -> DEBU 3bb2 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.142 UTC [gossip.gossip] handleMessage -> DEBU 3bb3 Exiting" +"2019-09-24 01:05:34.142 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bb4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.143 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3bb5 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:34.143 UTC [msp] DeserializeIdentity -> DEBU 3bb6 Obtaining identity" +"2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3bb7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.143 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3bb9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bbb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bbc == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bbd 0xc003965660 gate 1569287134143356000 evaluation starts" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bbe 0xc003965660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bbf 0xc003965660 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc0 0xc003965660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc1 0xc003965660 principal evaluation fails" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bc2 0xc003965660 gate 1569287134143356000 evaluation fails" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc3 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.143 UTC [policies] Evaluate -> DEBU 3bc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func1 -> DEBU 3bc6 0xc003965ee0 gate 1569287134143627600 evaluation starts" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc7 0xc003965ee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc8 0xc003965ee0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.143 UTC [cauthdsl] func2 -> DEBU 3bc9 0xc003965ee0 principal matched by identity 0" +"2019-09-24 01:05:34.155 UTC [msp.identity] Verify -> DEBU 3bca Verify: digest = 00000000 8d d3 91 56 17 16 4f ab 4a 01 9d 31 d1 06 89 04 |...V..O.J..1....| +00000010 ab 31 cc 07 2a e9 07 38 f7 b4 65 a3 84 97 09 d7 |.1..*..8..e.....|" +"2019-09-24 01:05:34.155 UTC [msp.identity] Verify -> DEBU 3bcb Verify: sig = 00000000 30 45 02 21 00 a6 15 f8 dd 67 b2 50 90 ed 38 25 |0E.!.....g.P..8%| +00000010 ca cf 1c e8 af 50 1c 8e 12 8a de 68 b4 3f 3f 05 |.....P.....h.??.| +00000020 f6 14 e2 59 38 02 20 77 b2 e0 a3 f1 40 88 14 a3 |...Y8. w....@...| +00000030 13 e3 66 4f 56 d6 ef f3 e9 c6 e8 79 2a 32 36 41 |..fOV......y*26A| +00000040 de 51 71 58 a1 9f 01 |.QqX...|" +"2019-09-24 01:05:34.155 UTC [cauthdsl] func2 -> DEBU 3bcc 0xc003965ee0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.155 UTC [cauthdsl] func1 -> DEBU 3bcd 0xc003965ee0 gate 1569287134143627600 evaluation succeeds" +"2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bce Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bd0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.155 UTC [policies] Evaluate -> DEBU 3bd1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.155 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd4 updating membership: timestamp: " +"2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.155 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:34.156 UTC [gossip.discovery] learnExistingMembers -> DEBU 3bd7 Exiting" +"2019-09-24 01:05:34.156 UTC [gossip.discovery] handleAliveMessage -> DEBU 3bd8 Exiting" +"2019-09-24 01:05:34.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bd9 Exiting" +"2019-09-24 01:05:34.148 UTC [gossip.comm] func1 -> DEBU 3bda Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bdb Obtaining identity" +"2019-09-24 01:05:34.156 UTC [gossip.gossip] handleMessage -> DEBU 3bdc Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.156 UTC [gossip.gossip] handleMessage -> DEBU 3bdd Exiting" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bde Obtaining identity" +"2019-09-24 01:05:34.156 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3bdf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be0 Obtaining identity" +"2019-09-24 01:05:34.156 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3be1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be2 Obtaining identity" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be3 Obtaining identity" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be4 Obtaining identity" +"2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3be5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3be6 Obtaining identity" +"2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.156 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3be8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.156 UTC [gossip.comm] Send -> DEBU 3bea Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3beb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bec Obtaining identity" +"2019-09-24 01:05:34.156 UTC [policies] Evaluate -> DEBU 3bed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.156 UTC [msp] DeserializeIdentity -> DEBU 3bee Obtaining identity" +"2019-09-24 01:05:34.156 UTC [cauthdsl] func1 -> DEBU 3bef 0xc003a022e0 gate 1569287134156942500 evaluation starts" +"2019-09-24 01:05:34.156 UTC [cauthdsl] func2 -> DEBU 3bf0 0xc003a022e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf1 0xc003a022e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.156 UTC [gossip.comm] Send -> DEBU 3bf2 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf3 0xc003a022e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bf4 0xc003a022e0 principal evaluation fails" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func1 -> DEBU 3bf5 0xc003a022e0 gate 1569287134156942500 evaluation fails" +"2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bf8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.157 UTC [policies] Evaluate -> DEBU 3bf9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bfa Exiting" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func1 -> DEBU 3bfb 0xc003a02b20 gate 1569287134157635100 evaluation starts" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bfc 0xc003a02b20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bfd 0xc003a02b20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3bfe Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.157 UTC [cauthdsl] func2 -> DEBU 3bff 0xc003a02b20 principal matched by identity 0" +"2019-09-24 01:05:34.157 UTC [gossip.comm] sendToEndpoint -> DEBU 3c00 Exiting" +"2019-09-24 01:05:34.157 UTC [msp.identity] Verify -> DEBU 3c01 Verify: digest = 00000000 4f a3 f8 cd 1d 6d ae e9 8d e4 f4 ad 77 63 a8 ae |O....m......wc..| +00000010 3a bb fb 89 52 47 f9 ab 69 ca 91 9e e9 5b 3c 32 |:...RG..i....[<2|" +"2019-09-24 01:05:34.157 UTC [msp.identity] Verify -> DEBU 3c02 Verify: sig = 00000000 30 44 02 20 23 6a a4 ea 4f 2a ca 12 bf 54 d8 ac |0D. #j..O*...T..| +00000010 15 84 63 0f 16 b6 3b 31 44 3b e2 82 98 3e 3a 2a |..c...;1D;...>:*| +00000020 07 c9 c8 ed 02 20 0e aa ae 14 74 b3 9a 37 a7 fc |..... ....t..7..| +00000030 df 08 d0 ad 98 a5 2b ad b0 35 80 c4 41 f7 fa 38 |......+..5..A..8| +00000040 ff 05 f7 4f 75 18 |...Ou.|" +"2019-09-24 01:05:34.161 UTC [gossip.comm] func1 -> DEBU 3c03 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.162 UTC [gossip.gossip] handleMessage -> DEBU 3c04 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.171 UTC [gossip.comm] func1 -> DEBU 3c05 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.179 UTC [cauthdsl] func2 -> DEBU 3c06 0xc003a02b20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.179 UTC [gossip.comm] func1 -> DEBU 3c07 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.180 UTC [cauthdsl] func1 -> DEBU 3c08 0xc003a02b20 gate 1569287134157635100 evaluation succeeds" +"2019-09-24 01:05:34.181 UTC [policies] Evaluate -> DEBU 3c09 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.181 UTC [policies] Evaluate -> DEBU 3c0a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.182 UTC [policies] Evaluate -> DEBU 3c0b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.182 UTC [policies] Evaluate -> DEBU 3c0c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c0d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c0e Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c0f updating membership: timestamp: " +"2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c10 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c11 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] learnExistingMembers -> DEBU 3c12 Exiting" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] handleAliveMessage -> DEBU 3c13 Exiting" +"2019-09-24 01:05:34.183 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c14 Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c15 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c16 Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c17 Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c18 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c19 Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c1a Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1c Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.184 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c1e Exiting" +"2019-09-24 01:05:34.184 UTC [gossip.gossip] handleMessage -> DEBU 3c1f Exiting" +"2019-09-24 01:05:34.187 UTC [gossip.comm] func1 -> DEBU 3c20 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.188 UTC [gossip.gossip] handleMessage -> DEBU 3c21 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.188 UTC [gossip.gossip] handleMessage -> DEBU 3c22 Exiting" +"2019-09-24 01:05:34.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c23 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c24 Exiting" +"2019-09-24 01:05:34.202 UTC [msp] DeserializeIdentity -> DEBU 3c25 Obtaining identity" +"2019-09-24 01:05:34.203 UTC [msp] DeserializeIdentity -> DEBU 3c26 Obtaining identity" +"2019-09-24 01:05:34.203 UTC [msp] DeserializeIdentity -> DEBU 3c27 Obtaining identity" +"2019-09-24 01:05:34.205 UTC [msp] DeserializeIdentity -> DEBU 3c28 Obtaining identity" +"2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c29 Obtaining identity" +"2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c2a Obtaining identity" +"2019-09-24 01:05:34.206 UTC [gossip.comm] Send -> DEBU 3c2b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:34.206 UTC [msp] DeserializeIdentity -> DEBU 3c2c Obtaining identity" +"2019-09-24 01:05:34.207 UTC [msp] DeserializeIdentity -> DEBU 3c2d Obtaining identity" +"2019-09-24 01:05:34.207 UTC [gossip.comm] Send -> DEBU 3c2e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:34.207 UTC [gossip.comm] sendToEndpoint -> DEBU 3c2f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.207 UTC [gossip.comm] sendToEndpoint -> DEBU 3c30 Exiting" +"2019-09-24 01:05:34.208 UTC [gossip.comm] sendToEndpoint -> DEBU 3c31 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.209 UTC [gossip.comm] sendToEndpoint -> DEBU 3c32 Exiting" +"2019-09-24 01:05:34.228 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c33 Obtaining default signing identity" +"2019-09-24 01:05:34.229 UTC [msp.identity] Sign -> DEBU 3c34 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE315102B " +"2019-09-24 01:05:34.229 UTC [msp.identity] Sign -> DEBU 3c35 Sign: digest: A0C83A504A8E825B736337AB9A6D109FDC4A7039C108F42FB3ECE1D930617225 " +"2019-09-24 01:05:34.230 UTC [msp] GetDefaultSigningIdentity -> DEBU 3c36 Obtaining default signing identity" +"2019-09-24 01:05:34.230 UTC [msp.identity] Sign -> DEBU 3c37 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:34.231 UTC [msp.identity] Sign -> DEBU 3c38 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:34.233 UTC [gossip.discovery] periodicalSendAlive -> DEBU 3c39 Sleeping 5s" +"2019-09-24 01:05:34.236 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3c3a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.236 UTC [peer.gossip.mcs] VerifyBlock -> DEBU 3c3b Got block validation policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.237 UTC [policies] Evaluate -> DEBU 3c3c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation ==" +"2019-09-24 01:05:34.238 UTC [policies] Evaluate -> DEBU 3c3d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.245 UTC [policies] Evaluate -> DEBU 3c40 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2019-09-24 01:05:34.245 UTC [cauthdsl] func1 -> DEBU 3c41 0xc003ba1ca0 gate 1569287134245719100 evaluation starts" +"2019-09-24 01:05:34.242 UTC [msp] DeserializeIdentity -> DEBU 3c3e Obtaining identity" +"2019-09-24 01:05:34.242 UTC [gossip.comm] func1 -> DEBU 3c3f Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.245 UTC [cauthdsl] func2 -> DEBU 3c42 0xc003ba1ca0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.246 UTC [msp] DeserializeIdentity -> DEBU 3c43 Obtaining identity" +"2019-09-24 01:05:34.247 UTC [gossip.gossip] handleMessage -> DEBU 3c44 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c47 Obtaining identity" +"2019-09-24 01:05:34.247 UTC [cauthdsl] func2 -> DEBU 3c45 0xc003ba1ca0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.248 UTC [cauthdsl] func2 -> DEBU 3c48 0xc003ba1ca0 principal matched by identity 0" +"2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c49 Obtaining identity" +"2019-09-24 01:05:34.248 UTC [msp.identity] Verify -> DEBU 3c4a Verify: digest = 00000000 1b 37 c0 9e 55 ed 9d 02 98 21 e5 75 f2 c2 0e 50 |.7..U....!.u...P| +00000010 76 ec 4e e0 9a 1a 73 f9 d4 48 aa 9e de 15 87 20 |v.N...s..H..... |" +"2019-09-24 01:05:34.248 UTC [msp] DeserializeIdentity -> DEBU 3c4b Obtaining identity" +"2019-09-24 01:05:34.248 UTC [msp.identity] Verify -> DEBU 3c4c Verify: sig = 00000000 30 45 02 21 00 88 34 ba 98 e0 b6 ea 22 09 d5 e1 |0E.!..4....."...| +00000010 f2 a6 30 92 d0 95 21 72 ce a1 5b b7 43 09 8b fb |..0...!r..[.C...| +00000020 25 41 f0 ad 0e 02 20 7d 7d e0 b2 d8 5a 59 0a d2 |%A.... }}...ZY..| +00000030 57 15 06 d5 35 a5 aa 07 3f ad 09 17 01 19 6a 79 |W...5...?.....jy| +00000040 5c c9 9f 41 2f 81 e6 |\..A/..|" +"2019-09-24 01:05:34.248 UTC [gossip.gossip] handleMessage -> DEBU 3c4d Exiting" +"2019-09-24 01:05:34.247 UTC [gossip.comm] Send -> DEBU 3c46 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:34.251 UTC [cauthdsl] func2 -> DEBU 3c4e 0xc003ba1ca0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.251 UTC [cauthdsl] func1 -> DEBU 3c4f 0xc003ba1ca0 gate 1569287134245719100 evaluation succeeds" +"2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c50 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c51 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c52 Signature set satisfies policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.252 UTC [policies] Evaluate -> DEBU 3c53 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.253 UTC [gossip.comm] sendToEndpoint -> DEBU 3c55 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:34.253 UTC [blocksProvider] DeliverBlocks -> DEBU 3c56 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-09-24 01:05:34.254 UTC [gossip.state] addPayload -> DEBU 3c58 [businesschannel] Adding payload to local buffer, blockNum = [6]" +"2019-09-24 01:05:34.254 UTC [gossip.state] addPayload -> DEBU 3c59 Blocks payloads buffer size for channel [businesschannel] is 1 blocks" +"2019-09-24 01:05:34.254 UTC [blocksProvider] DeliverBlocks -> DEBU 3c5a [businesschannel] Gossiping block [6], peers number [3]" +"2019-09-24 01:05:34.256 UTC [gossip.channel] AddToMsgStore -> DEBU 3c5b Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes to the block puller" +"2019-09-24 01:05:34.257 UTC [gossip.pull] Add -> DEBU 3c5c Added 6, total items: 6" +"2019-09-24 01:05:34.260 UTC [gossip.state] deliverPayloads -> DEBU 3c5d [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6]" +"2019-09-24 01:05:34.262 UTC [gossip.state] deliverPayloads -> DEBU 3c5e [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger" +"2019-09-24 01:05:34.263 UTC [gossip.privdata] StoreBlock -> INFO 3c5f [businesschannel] Received block [6] from buffer" +"2019-09-24 01:05:34.264 UTC [gossip.privdata] StoreBlock -> DEBU 3c60 [businesschannel] Validating block [6]" +"2019-09-24 01:05:34.251 UTC [msp] DeserializeIdentity -> DEBU 3c54 Obtaining identity" +"2019-09-24 01:05:34.264 UTC [committer.txvalidator] Validate -> DEBU 3c61 [businesschannel] START Block Validation for block [6]" +"2019-09-24 01:05:34.267 UTC [committer.txvalidator] Validate -> DEBU 3c62 expecting 1 block validation responses" +"2019-09-24 01:05:34.267 UTC [committer.txvalidator] validateTx -> DEBU 3c63 [businesschannel] validateTx starts for block 0xc0026d2740 env 0xc000361360 txn 0" +"2019-09-24 01:05:34.267 UTC [protoutils] ValidateTransaction -> DEBU 3c65 ValidateTransactionEnvelope starts for envelope 0xc000361360" +"2019-09-24 01:05:34.268 UTC [protoutils] ValidateTransaction -> DEBU 3c66 Header is channel_header:"\010\001\032\006\010\336\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030M\243\211\350u\336Q\364\206N\031\242Yx\245\327$K\2515\217\246\361\241" " +"2019-09-24 01:05:34.269 UTC [protoutils] validateChannelHeader -> DEBU 3c67 validateChannelHeader info: header type 1" +"2019-09-24 01:05:34.269 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c68 begin" +"2019-09-24 01:05:34.271 UTC [msp] GetManagerForChain -> DEBU 3c69 Returning existing manager for channel 'businesschannel'" +"2019-09-24 01:05:34.265 UTC [gossip.comm] Send -> DEBU 3c64 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:34.253 UTC [gossip.comm] sendToEndpoint -> DEBU 3c57 Exiting" +"2019-09-24 01:05:34.273 UTC [msp] DeserializeIdentity -> DEBU 3c6a Obtaining identity" +"2019-09-24 01:05:34.277 UTC [gossip.comm] Send -> DEBU 3c6c Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:34.273 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.278 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6d Exiting" +"2019-09-24 01:05:34.278 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6e Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.279 UTC [gossip.comm] sendToEndpoint -> DEBU 3c6f Exiting" +"2019-09-24 01:05:34.272 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c70 creator is &{OrdererMSP 0058e3488296b2d57ea0b911cdedda94a168d70ed40631215aa7d90478e7e4e0}" +"2019-09-24 01:05:34.280 UTC [msp] Validate -> DEBU 3c71 MSP OrdererMSP validating identity" +"2019-09-24 01:05:34.281 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c72 creator is valid" +"2019-09-24 01:05:34.282 UTC [msp.identity] Verify -> DEBU 3c73 Verify: digest = 00000000 e8 3b 6c b0 cb 64 33 1c 60 2e dc 16 9a 72 c7 7e |.;l..d3.`....r.~| +00000010 b5 7c 91 3f f2 9c 89 14 9e af 22 4b d7 b4 1d 39 |.|.?......"K...9|" +"2019-09-24 01:05:34.284 UTC [msp.identity] Verify -> DEBU 3c74 Verify: sig = 00000000 30 45 02 21 00 c2 c4 e5 1d c9 50 29 43 06 ff 62 |0E.!......P)C..b| +00000010 a2 4d 31 63 8f d4 19 45 73 28 e7 aa 84 be 07 cb |.M1c...Es(......| +00000020 7a 8b 70 c7 0d 02 20 43 38 d8 58 1a 1f 12 97 1d |z.p... C8.X.....| +00000030 b9 9a 26 76 46 99 eb a4 61 0a f0 b7 be bc b1 cb |..&vF...a.......| +00000040 18 c1 b7 68 5e f4 30 |...h^.0|" +"2019-09-24 01:05:34.286 UTC [protoutils] checkSignatureFromCreator -> DEBU 3c75 exits successfully" +"2019-09-24 01:05:34.286 UTC [protoutils] validateConfigTransaction -> DEBU 3c76 validateConfigTransaction starts for data 0xc003aee000, header channel_header:"\010\001\032\006\010\336\327\245\354\005\"\017businesschannel" signature_header:"\n\225\006\n\nOrdererMSP\022\206\006-----BEGIN CERTIFICATE-----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\nfQ==\n-----END CERTIFICATE-----\n\022\030M\243\211\350u\336Q\364\206N\031\242Yx\245\327$K\2515\217\246\361\241" " +"2019-09-24 01:05:34.286 UTC [committer.txvalidator] validateTx -> DEBU 3c77 Transaction is for channel businesschannel" +"2019-09-24 01:05:34.286 UTC [common.configtx] addToMap -> DEBU 3c78 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7b Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.287 UTC [common.configtx] addToMap -> DEBU 3c7d Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c7e Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c7f Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c80 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.288 UTC [common.configtx] addToMap -> DEBU 3c81 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.289 UTC [common.configtx] addToMap -> DEBU 3c82 Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.286 UTC [gossip.comm] func1 -> DEBU 3c79 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.289 UTC [gossip.gossip] handleMessage -> DEBU 3c83 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.290 UTC [gossip.gossip] handleMessage -> DEBU 3c84 Exiting" +"2019-09-24 01:05:34.289 UTC [common.configtx] addToMap -> DEBU 3c85 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.292 UTC [common.configtx] addToMap -> DEBU 3c86 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.293 UTC [common.configtx] addToMap -> DEBU 3c87 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.293 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c88 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.293 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3c89 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.294 UTC [common.configtx] addToMap -> DEBU 3c8a Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.293 UTC [msp.identity] Verify -> DEBU 3c8b Verify: digest = 00000000 a0 c8 3a 50 4a 8e 82 5b 73 63 37 ab 9a 6d 10 9f |..:PJ..[sc7..m..| +00000010 dc 4a 70 39 c1 08 f4 2f b3 ec e1 d9 30 61 72 25 |.Jp9.../....0ar%|" +"2019-09-24 01:05:34.296 UTC [msp.identity] Verify -> DEBU 3c8d Verify: sig = 00000000 30 44 02 20 4a 5d 21 ee 71 e1 5b 93 b2 bb b4 a8 |0D. J]!.q.[.....| +00000010 8c 22 b4 e5 2f ea 9d 25 25 71 5e ab 27 41 eb f0 |."../..%%q^.'A..| +00000020 0c 3b a5 7f 02 20 1c d7 a6 15 25 9d 23 92 74 be |.;... ....%.#.t.| +00000030 97 ab 57 da 09 71 26 3b 0e 69 b3 3f 00 96 1c 19 |..W..q&;.i.?....| +00000040 e8 68 88 5c e0 5e |.h.\.^|" +"2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c8e Obtaining identity" +"2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c8f Obtaining identity" +"2019-09-24 01:05:34.297 UTC [msp] DeserializeIdentity -> DEBU 3c90 Obtaining identity" +"2019-09-24 01:05:34.298 UTC [msp] DeserializeIdentity -> DEBU 3c92 Obtaining identity" +"2019-09-24 01:05:34.298 UTC [gossip.discovery] isSentByMe -> DEBU 3c91 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.298 UTC [gossip.comm] Send -> DEBU 3c93 Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.298 UTC [msp] DeserializeIdentity -> DEBU 3c94 Obtaining identity" +"2019-09-24 01:05:34.299 UTC [msp] DeserializeIdentity -> DEBU 3c95 Obtaining identity" +"2019-09-24 01:05:34.299 UTC [gossip.comm] sendToEndpoint -> DEBU 3c96 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 38502 bytes, seq: 6}, Envelope: 38535 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.298 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3c97 Exiting" +"2019-09-24 01:05:34.300 UTC [gossip.comm] sendToEndpoint -> DEBU 3c98 Exiting" +"2019-09-24 01:05:34.294 UTC [common.configtx] addToMap -> DEBU 3c8c Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.287 UTC [gossip.comm] func1 -> DEBU 3c7a Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.301 UTC [common.configtx] addToMap -> DEBU 3c99 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.301 UTC [gossip.gossip] handleMessage -> DEBU 3c9a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.302 UTC [comm.grpc.server] 1 -> INFO 3c9b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.301Z grpc.peer_address=172.18.0.9:51538 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=223µs +"2019-09-24 01:05:34.303 UTC [common.configtx] addToMap -> DEBU 3c9c Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.304 UTC [gossip.gossip] handleMessage -> DEBU 3c9e Exiting" +"2019-09-24 01:05:34.305 UTC [common.configtx] addToMap -> DEBU 3c9d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3c9f Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3ca0 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.306 UTC [common.configtx] addToMap -> DEBU 3ca1 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca3 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.307 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ca4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.307 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ca5 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.307 UTC [common.configtx] addToMap -> DEBU 3ca6 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.308 UTC [common.configtx] addToMap -> DEBU 3ca7 Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.309 UTC [common.configtx] addToMap -> DEBU 3ca8 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.309 UTC [common.configtx] addToMap -> DEBU 3ca9 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.325 UTC [common.configtx] addToMap -> DEBU 3cac Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.309 UTC [msp.identity] Verify -> DEBU 3caa Verify: digest = 00000000 a0 c8 3a 50 4a 8e 82 5b 73 63 37 ab 9a 6d 10 9f |..:PJ..[sc7..m..| +00000010 dc 4a 70 39 c1 08 f4 2f b3 ec e1 d9 30 61 72 25 |.Jp9.../....0ar%|" +"2019-09-24 01:05:34.313 UTC [msp] GetDefaultSigningIdentity -> DEBU 3cab Obtaining default signing identity" +"2019-09-24 01:05:34.327 UTC [common.configtx] addToMap -> DEBU 3cad Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.329 UTC [msp.identity] Verify -> DEBU 3cae Verify: sig = 00000000 30 44 02 20 4a 5d 21 ee 71 e1 5b 93 b2 bb b4 a8 |0D. J]!.q.[.....| +00000010 8c 22 b4 e5 2f ea 9d 25 25 71 5e ab 27 41 eb f0 |."../..%%q^.'A..| +00000020 0c 3b a5 7f 02 20 1c d7 a6 15 25 9d 23 92 74 be |.;... ....%.#.t.| +00000030 97 ab 57 da 09 71 26 3b 0e 69 b3 3f 00 96 1c 19 |..W..q&;.i.?....| +00000040 e8 68 88 5c e0 5e |.h.\.^|" +"2019-09-24 01:05:34.330 UTC [gossip.discovery] isSentByMe -> DEBU 3cb1 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.331 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3cb2 Exiting" +"2019-09-24 01:05:34.329 UTC [msp.identity] Sign -> DEBU 3caf Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.330 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb0 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.332 UTC [msp.identity] Sign -> DEBU 3cb3 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.332 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb4 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.334 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb5 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.337 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb6 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.338 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb7 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.338 UTC [common.configtx] verifyDeltaSet -> DEBU 3cb8 Processing change to key: [Group] /Channel/Application" +"2019-09-24 01:05:34.338 UTC [common.configtx] policyForItem -> DEBU 3cb9 Getting policy for item Application with mod_policy Admins" +"2019-09-24 01:05:34.338 UTC [policies] Manager -> DEBU 3cba Manager Channel looking up path []" +"2019-09-24 01:05:34.338 UTC [policies] Manager -> DEBU 3cbb Manager Channel has managers Application" +"2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbc Manager Channel has managers Orderer" +"2019-09-24 01:05:34.338 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3cbd Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51538" +"2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbe Manager Channel looking up path [Application]" +"2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cbf Manager Channel has managers Orderer" +"2019-09-24 01:05:34.339 UTC [policies] Manager -> DEBU 3cc0 Manager Channel has managers Application" +"2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc1 Manager Channel/Application looking up path []" +"2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc2 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:34.340 UTC [policies] Manager -> DEBU 3cc3 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:34.341 UTC [policies] Evaluate -> DEBU 3cc4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2019-09-24 01:05:34.341 UTC [policies] Evaluate -> DEBU 3cc5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.343 UTC [policies] Evaluate -> DEBU 3cc6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2019-09-24 01:05:34.344 UTC [cauthdsl] deduplicate -> WARN 3cc7 De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:34.345 UTC [cauthdsl] func1 -> DEBU 3cc8 0xc0034977d0 gate 1569287134345069100 evaluation starts" +"2019-09-24 01:05:34.345 UTC [cauthdsl] func2 -> DEBU 3cc9 0xc0034977d0 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:34.345 UTC [cauthdsl] func2 -> DEBU 3cca 0xc0034977d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.346 UTC [cauthdsl] func2 -> DEBU 3ccb 0xc0034977d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2019-09-24 01:05:34.346 UTC [cauthdsl] func2 -> DEBU 3ccc 0xc0034977d0 processing identity 1 with bytes of 1150090" +"2019-09-24 01:05:34.346 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3ccd Checking if identity has been named explicitly as an admin for Org2MSP" +"2019-09-24 01:05:34.347 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 3cce Checking if identity carries the admin ou for Org2MSP" +"2019-09-24 01:05:34.347 UTC [msp] Validate -> DEBU 3ccf MSP Org2MSP validating identity" +"2019-09-24 01:05:34.347 UTC [msp] getCertificationChain -> DEBU 3cd0 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.348 UTC [msp] hasOURole -> DEBU 3cd1 MSP Org2MSP checking if the identity is a client" +"2019-09-24 01:05:34.349 UTC [msp] getCertificationChain -> DEBU 3cd2 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.349 UTC [cauthdsl] func2 -> DEBU 3cd3 0xc0034977d0 principal matched by identity 1" +"2019-09-24 01:05:34.349 UTC [msp.identity] Verify -> DEBU 3cd4 Verify: digest = 00000000 e5 72 71 6e 4f 20 23 fe 7c 3c 6d 08 af 73 cc cb |.rqnO #.| DEBU 3cd5 Verify: sig = 00000000 30 44 02 20 6e b0 43 f3 38 56 07 cf 0b c2 20 5d |0D. n.C.8V.... ]| +00000010 7e 00 49 ae 56 14 e6 9c 3c c9 f1 f6 f9 d6 5a d6 |~.I.V...<.....Z.| +00000020 c8 34 65 2b 02 20 54 cd d2 60 e2 5a 7c bd fb 1f |.4e+. T..`.Z|...| +00000030 ef 38 e3 69 4f 8d 6f fa 58 48 c6 2b 2d 87 1c 7f |.8.iO.o.XH.+-...| +00000040 c9 eb 2b ab e2 96 |..+...|" +"2019-09-24 01:05:34.350 UTC [cauthdsl] func2 -> DEBU 3cd6 0xc0034977d0 principal evaluation succeeds for identity 1" +"2019-09-24 01:05:34.350 UTC [cauthdsl] func1 -> DEBU 3cd7 0xc0034977d0 gate 1569287134345069100 evaluation succeeds" +"2019-09-24 01:05:34.350 UTC [policies] Evaluate -> DEBU 3cd8 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.350 UTC [policies] Evaluate -> DEBU 3cd9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.351 UTC [policies] Evaluate -> DEBU 3cda == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2019-09-24 01:05:34.351 UTC [cauthdsl] deduplicate -> WARN 3cdb De-duplicating identity [Org1MSP33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc] at index 2 in signature set" +"2019-09-24 01:05:34.352 UTC [cauthdsl] func1 -> DEBU 3cdc 0xc0034c0180 gate 1569287134352213400 evaluation starts" +"2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cdd 0xc0034c0180 signed by 0 principal evaluation starts (used [false false false])" +"2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cde 0xc0034c0180 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.352 UTC [cauthdsl] func2 -> DEBU 3cdf 0xc0034c0180 principal matched by identity 0" +"2019-09-24 01:05:34.353 UTC [msp.identity] Verify -> DEBU 3ce0 Verify: digest = 00000000 39 12 02 5d 8f 3a 68 08 b2 2f d3 57 d2 a9 f9 6f |9..].:h../.W...o| +00000010 70 13 ba d5 27 07 eb a9 ae 37 2d b3 ae 96 e2 18 |p...'....7-.....|" +"2019-09-24 01:05:34.353 UTC [msp.identity] Verify -> DEBU 3ce1 Verify: sig = 00000000 30 44 02 20 08 d3 5d 32 8c 02 12 54 d2 88 db b8 |0D. ..]2...T....| +00000010 c2 26 9b 36 0a 5d f0 d5 27 fc e1 de 10 3b 1f 6c |.&.6.]..'....;.l| +00000020 97 d2 53 19 02 20 72 21 35 38 e6 f4 2b f2 3e 2f |..S.. r!58..+.>/| +00000030 32 d0 a1 0a ae b8 8c 31 2a a9 69 6f a0 20 c6 ce |2......1*.io. ..| +00000040 31 77 20 8d 0c 60 |1w ..`|" +"2019-09-24 01:05:34.354 UTC [cauthdsl] func2 -> DEBU 3ce2 0xc0034c0180 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.354 UTC [cauthdsl] func1 -> DEBU 3ce3 0xc0034c0180 gate 1569287134352213400 evaluation succeeds" +"2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce4 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce6 Signature set satisfies policy /Channel/Application/Admins" +"2019-09-24 01:05:34.354 UTC [policies] Evaluate -> DEBU 3ce7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2019-09-24 01:05:34.355 UTC [common.configtx] verifyDeltaSet -> DEBU 3ce8 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3ce9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3cea Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3ceb Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.356 UTC [common.configtx] recurseConfigMap -> DEBU 3cec Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.358 UTC [common.configtx] recurseConfigMap -> DEBU 3ced Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.358 UTC [common.configtx] recurseConfigMap -> DEBU 3cee Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cef Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cf0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.359 UTC [common.configtx] recurseConfigMap -> DEBU 3cf1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.360 UTC [common.configtx] recurseConfigMap -> DEBU 3cf5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf7 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf8 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cf9 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfa Setting policy for key LifecycleEndorsement to " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfb Setting policy for key Readers to " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfc Setting policy for key Writers to " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfd Setting policy for key Admins to " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cfe Setting policy for key Endorsement to " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3cff Setting policy for key Readers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3d00 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.configtx] recurseConfigMap -> DEBU 3d01 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2019-09-24 01:05:34.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3d02 Initializing protos for *channelconfig.ChannelProtos" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d03 Processing field: HashingAlgorithm" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d04 Processing field: BlockDataHashingStructure" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d05 Processing field: OrdererAddresses" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d06 Processing field: Consortium" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d07 Processing field: Capabilities" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] NewStandardValues -> DEBU 3d08 Initializing protos for *channelconfig.ApplicationProtos" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d09 Processing field: ACLs" +"2019-09-24 01:05:34.361 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d0a Processing field: Capabilities" +"2019-09-24 01:05:34.362 UTC [common.channelconfig] NewStandardValues -> DEBU 3d0b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.367 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d0c Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51538" +"2019-09-24 01:05:34.367 UTC [msp] DeserializeIdentity -> DEBU 3d0d Obtaining identity" +"2019-09-24 01:05:34.369 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d0e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.369 UTC [msp] DeserializeIdentity -> DEBU 3d0f Obtaining identity" +"2019-09-24 01:05:34.369 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.370 UTC [msp] DeserializeIdentity -> DEBU 3d11 Obtaining identity" +"2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d12 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d13 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.370 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d14 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d15 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d16 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.371 UTC [policies] Evaluate -> DEBU 3d17 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.371 UTC [cauthdsl] func1 -> DEBU 3d18 0xc003f38970 gate 1569287134371476400 evaluation starts" +"2019-09-24 01:05:34.371 UTC [cauthdsl] func2 -> DEBU 3d19 0xc003f38970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.371 UTC [cauthdsl] func2 -> DEBU 3d1a 0xc003f38970 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d1b 0xc003f38970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d1c 0xc003f38970 principal evaluation fails" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func1 -> DEBU 3d1d 0xc003f38970 gate 1569287134371476400 evaluation fails" +"2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d1e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d1f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.372 UTC [policies] Evaluate -> DEBU 3d20 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func1 -> DEBU 3d21 0xc003f391d0 gate 1569287134372689900 evaluation starts" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d22 0xc003f391d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.372 UTC [cauthdsl] func2 -> DEBU 3d23 0xc003f391d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.373 UTC [cauthdsl] func2 -> DEBU 3d24 0xc003f391d0 principal matched by identity 0" +"2019-09-24 01:05:34.373 UTC [msp.identity] Verify -> DEBU 3d25 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3d26 Verify: sig = 00000000 30 44 02 20 74 85 ee 55 7f 98 9f f8 ac 4a 1b ee |0D. t..U.....J..| +00000010 8f 77 44 fb 31 ec 7d 60 f2 0a 2d e4 6e 62 8b 79 |.wD.1.}`..-.nb.y| +00000020 f5 a0 28 c2 02 20 79 55 37 f5 2e 2d 1c 20 ee 06 |..(.. yU7..-. ..| +00000030 4e f9 26 d5 88 11 84 a2 03 03 70 05 77 14 92 0e |N.&.......p.w...| +00000040 82 7c be 74 01 a4 |.|.t..|" +"2019-09-24 01:05:34.376 UTC [cauthdsl] func2 -> DEBU 3d27 0xc003f391d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.379 UTC [cauthdsl] func1 -> DEBU 3d28 0xc003f391d0 gate 1569287134372689900 evaluation succeeds" +"2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d29 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.379 UTC [policies] Evaluate -> DEBU 3d2c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.381 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d2d Authenticated 172.18.0.9:51538" +"2019-09-24 01:05:34.382 UTC [gossip.comm] GossipStream -> DEBU 3d2e Servicing 172.18.0.9:51538" +"2019-09-24 01:05:34.383 UTC [gossip.comm] writeToStream -> DEBU 3d2f Closing writing to stream" +"2019-09-24 01:05:34.383 UTC [gossip.comm] serviceConnection -> DEBU 3d30 Closing reading from stream" +"2019-09-24 01:05:34.390 UTC [gossip.comm] readFromStream -> DEBU 3d31 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 canceling read because closing" +"2019-09-24 01:05:34.395 UTC [comm.grpc.server] 1 -> INFO 3d32 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.395Z grpc.peer_address=172.18.0.8:35478 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.7µs +"2019-09-24 01:05:34.398 UTC [grpc] infof -> DEBU 3d33 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.399 UTC [gossip.comm] readFromStream -> DEBU 3d34 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.399 UTC [gossip.comm] func2 -> DEBU 3d35 Client 172.18.0.9:51538 disconnected" +"2019-09-24 01:05:34.399 UTC [comm.grpc.server] 1 -> INFO 3d36 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.313Z grpc.peer_address=172.18.0.9:51538 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=86.6244ms +"2019-09-24 01:05:34.402 UTC [grpc] infof -> DEBU 3d37 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.402 UTC [gossip.comm] writeToStream -> DEBU 3d38 Closing writing to stream" +"2019-09-24 01:05:34.362 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d39 Processing field: AnchorPeers" +"2019-09-24 01:05:34.403 UTC [common.channelconfig] NewStandardValues -> DEBU 3d3a Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.403 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d3b Processing field: MSP" +"2019-09-24 01:05:34.405 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d3c Obtaining default signing identity" +"2019-09-24 01:05:34.405 UTC [msp.identity] Sign -> DEBU 3d3d Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.405 UTC [msp.identity] Sign -> DEBU 3d3e Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.406 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d3f Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:35478" +"2019-09-24 01:05:34.407 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d40 Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:35478" +"2019-09-24 01:05:34.407 UTC [msp] DeserializeIdentity -> DEBU 3d41 Obtaining identity" +"2019-09-24 01:05:34.407 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d42 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.407 UTC [msp] DeserializeIdentity -> DEBU 3d43 Obtaining identity" +"2019-09-24 01:05:34.408 UTC [common.channelconfig] Validate -> DEBU 3d44 Anchor peers for org Org3MSP are " +"2019-09-24 01:05:34.408 UTC [common.channelconfig] validateMSP -> DEBU 3d45 Setting up MSP for org Org3MSP" +"2019-09-24 01:05:34.408 UTC [msp] newBccspMsp -> DEBU 3d46 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.409 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.409 UTC [msp] DeserializeIdentity -> DEBU 3d48 Obtaining identity" +"2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d4a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d4b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.411 UTC [comm.grpc.server] 1 -> INFO 3d4d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.41Z grpc.peer_address=172.18.0.9:51546 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=758.9µs +"2019-09-24 01:05:34.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3d4c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d4e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d4f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.412 UTC [policies] Evaluate -> DEBU 3d50 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.413 UTC [cauthdsl] func1 -> DEBU 3d51 0xc003f97a90 gate 1569287134413084700 evaluation starts" +"2019-09-24 01:05:34.413 UTC [cauthdsl] func2 -> DEBU 3d52 0xc003f97a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.408 UTC [msp] New -> DEBU 3d49 Creating Cache-MSP instance" +"2019-09-24 01:05:34.414 UTC [msp] Setup -> DEBU 3d53 Setting up MSP instance Org3MSP" +"2019-09-24 01:05:34.415 UTC [msp.identity] newIdentity -> DEBU 3d54 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQRwvFDsGFw/HyJmWEAwUpiTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pH6mFSmA3hLoZ+cph1vKCOVr+9el8vO86Xu6i/7R/Xbor8KBFasPESGgGR1uinlK +eD3FjMksdn/e0fAB3XQhyaNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBi +qlTOd1bfslHoWKpSe/+865PjoE2PNjy918LqITCFETAKBggqhkjOPQQDAgNIADBF +AiEA0zLCRa45H2eglfgh4MDKqbuNkfJAA96XckOizdtUXBACIGXfU2zEGoGmaYnI +dYwS3hhngHiwgZ04VycGu5gUPC+j +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.416 UTC [common.channelconfig] NewStandardValues -> DEBU 3d55 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.417 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d56 Processing field: AnchorPeers" +"2019-09-24 01:05:34.417 UTC [common.channelconfig] NewStandardValues -> DEBU 3d57 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.418 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d58 Processing field: MSP" +"2019-09-24 01:05:34.418 UTC [common.channelconfig] Validate -> DEBU 3d59 Anchor peers for org Org1MSP are anchor_peers: " +"2019-09-24 01:05:34.418 UTC [common.channelconfig] validateMSP -> DEBU 3d5a Setting up MSP for org Org1MSP" +"2019-09-24 01:05:34.418 UTC [msp] newBccspMsp -> DEBU 3d5b Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.419 UTC [msp] New -> DEBU 3d5c Creating Cache-MSP instance" +"2019-09-24 01:05:34.419 UTC [msp] Setup -> DEBU 3d5d Setting up MSP instance Org1MSP" +"2019-09-24 01:05:34.421 UTC [msp.identity] newIdentity -> DEBU 3d5e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQVoOy7i6tVHJQ1PJGIAb4gjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +UwoCgUOHaT596JTIZTvJOpqWlqGoGa5b7SU9hc3WLGVSmZfWtbCuSTpr86j26haQ +I3KAL5207NhJPq+6Np8r76NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCC9 +VEDQCwkynJ4O2YIeOdU4UIR8AXB1P33cDlGAvcyYHjAKBggqhkjOPQQDAgNHADBE +AiAnxJKszQecCkMQUl5/VAU1W4tf27Y4ovazuZ03IQ+JlQIgIuFweRw79udVfVtS +zeuAMdERG0OX6tpsU+PcrCZVqBE= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.423 UTC [common.channelconfig] NewStandardValues -> DEBU 3d5f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2019-09-24 01:05:34.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d60 Processing field: AnchorPeers" +"2019-09-24 01:05:34.423 UTC [common.channelconfig] NewStandardValues -> DEBU 3d61 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.423 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d62 Processing field: MSP" +"2019-09-24 01:05:34.424 UTC [common.channelconfig] Validate -> DEBU 3d63 Anchor peers for org Org2MSP are anchor_peers: " +"2019-09-24 01:05:34.424 UTC [common.channelconfig] validateMSP -> DEBU 3d64 Setting up MSP for org Org2MSP" +"2019-09-24 01:05:34.424 UTC [msp] newBccspMsp -> DEBU 3d65 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.424 UTC [msp] New -> DEBU 3d66 Creating Cache-MSP instance" +"2019-09-24 01:05:34.424 UTC [msp] Setup -> DEBU 3d67 Setting up MSP instance Org2MSP" +"2019-09-24 01:05:34.425 UTC [msp.identity] newIdentity -> DEBU 3d68 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQUM3B5r8kvE2USLdmiZz2djAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +pAshABt9efFmiQZ7PCQn1owvZAnzVM/Ei/JteMjhlWH06tbNeBLmgJF4sltk0t/E +p08l6NEM89BslUvHDjyg2qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCO +a5XQf99jTcpfiG/OeeFBlQg3B13jTSJ0gZ11wsy01DAKBggqhkjOPQQDAgNHADBE +AiBx9Bwmb02DSWi25epN/GLLgy68qAOg8EK4bqGw2+3gjgIgZmatCUHZcQpId0B6 +cdBU5LLvZghoy+5fBvp98DMbKf0= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.427 UTC [common.channelconfig] NewStandardValues -> DEBU 3d69 Initializing protos for *channelconfig.OrdererProtos" +"2019-09-24 01:05:34.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6a Processing field: ConsensusType" +"2019-09-24 01:05:34.427 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d6b Processing field: BatchSize" +"2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d70 Processing field: BatchTimeout" +"2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d71 Processing field: KafkaBrokers" +"2019-09-24 01:05:34.429 UTC [msp] GetDefaultSigningIdentity -> DEBU 3d6c Obtaining default signing identity" +"2019-09-24 01:05:34.429 UTC [cauthdsl] func2 -> DEBU 3d6d 0xc003f97a90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.431 UTC [msp.identity] Sign -> DEBU 3d73 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.431 UTC [msp.identity] Sign -> DEBU 3d74 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.431 UTC [cauthdsl] func2 -> DEBU 3d75 0xc003f97a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.431 UTC [cauthdsl] func2 -> DEBU 3d76 0xc003f97a90 principal evaluation fails" +"2019-09-24 01:05:34.432 UTC [cauthdsl] func1 -> DEBU 3d77 0xc003f97a90 gate 1569287134413084700 evaluation fails" +"2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d78 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d79 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.432 UTC [policies] Evaluate -> DEBU 3d7a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.432 UTC [cauthdsl] func1 -> DEBU 3d7b 0xc003703cc0 gate 1569287134432844600 evaluation starts" +"2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7c 0xc003703cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7d 0xc003703cc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.432 UTC [cauthdsl] func2 -> DEBU 3d7e 0xc003703cc0 principal matched by identity 0" +"2019-09-24 01:05:34.433 UTC [msp.identity] Verify -> DEBU 3d7f Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:05:34.433 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d80 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:51546" +"2019-09-24 01:05:34.433 UTC [msp.identity] Verify -> DEBU 3d81 Verify: sig = 00000000 30 44 02 20 3e 94 d9 7d 59 74 a0 04 84 5f 87 33 |0D. >..}Yt..._.3| +00000010 60 ea cf 83 a9 01 c0 0d 4b 4d 4d 4f 1f dc d0 fc |`.......KMMO....| +00000020 2e ff 1e 27 02 20 6b 1b 05 b5 ac 49 51 17 29 7e |...'. k....IQ.)~| +00000030 45 b1 e1 56 57 36 4f ec 88 5a 90 9b 92 1d d6 67 |E..VW6O..Z.....g| +00000040 c7 a5 63 be 32 0d |..c.2.|" +"2019-09-24 01:05:34.434 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d82 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:51546" +"2019-09-24 01:05:34.434 UTC [msp] DeserializeIdentity -> DEBU 3d83 Obtaining identity" +"2019-09-24 01:05:34.437 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.438 UTC [msp] DeserializeIdentity -> DEBU 3d86 Obtaining identity" +"2019-09-24 01:05:34.435 UTC [cauthdsl] func2 -> DEBU 3d84 0xc003703cc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.430 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d72 Processing field: ChannelRestrictions" +"2019-09-24 01:05:34.429 UTC [gossip.comm] func1 -> DEBU 3d6e Got message: GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.430 UTC [grpc] infof -> DEBU 3d6f transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.439 UTC [cauthdsl] func1 -> DEBU 3d87 0xc003703cc0 gate 1569287134432844600 evaluation succeeds" +"2019-09-24 01:05:34.440 UTC [policies] Evaluate -> DEBU 3d8a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.440 UTC [policies] Evaluate -> DEBU 3d8b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.441 UTC [policies] Evaluate -> DEBU 3d8c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.441 UTC [policies] Evaluate -> DEBU 3d8d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.441 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3d8e Authenticated 172.18.0.8:35478" +"2019-09-24 01:05:34.441 UTC [gossip.comm] GossipStream -> DEBU 3d8f Servicing 172.18.0.8:35478" +"2019-09-24 01:05:34.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d88 Processing field: Capabilities" +"2019-09-24 01:05:34.442 UTC [common.channelconfig] NewStandardValues -> DEBU 3d90 Initializing protos for *channelconfig.OrdererOrgProtos" +"2019-09-24 01:05:34.442 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d91 Processing field: Endpoints" +"2019-09-24 01:05:34.443 UTC [common.channelconfig] NewStandardValues -> DEBU 3d92 Initializing protos for *channelconfig.OrganizationProtos" +"2019-09-24 01:05:34.443 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d93 Processing field: MSP" +"2019-09-24 01:05:34.443 UTC [common.channelconfig] validateMSP -> DEBU 3d94 Setting up MSP for org OrdererOrg" +"2019-09-24 01:05:34.443 UTC [msp] newBccspMsp -> DEBU 3d95 Creating BCCSP-based MSP instance" +"2019-09-24 01:05:34.443 UTC [msp] New -> DEBU 3d96 Creating Cache-MSP instance" +"2019-09-24 01:05:34.443 UTC [msp] Setup -> DEBU 3d97 Setting up MSP instance OrdererMSP" +"2019-09-24 01:05:34.444 UTC [msp.identity] newIdentity -> DEBU 3d98 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRALkA3kA+//oagSDlIqyHOKswCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQE4NkiEOucWnRl4z64kRsAxgU5 +54+05gtebflsj8+4j7N8ilc00Q5jj+/pmnbfmIteJNTXgjw1lJVhPNqEQSWoo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIINcIS2aO/kAuImLWl6hCZDCdkeE +GaF67wJUeCknCKCiMAoGCCqGSM49BAMCA0cAMEQCIHz3udWbnfpZSpElpVx8XqWJ +RNG/kM3Z1rzqQ71NdJ1IAiAKeU89pK21ftue2XUO8vjEtymXRohcVt0QNuSjSDgU +1g== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.446 UTC [msp.identity] newIdentity -> DEBU 3d99 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICCzCCAbGgAwIBAgIRAPstpmLty1/Uwr+XtLuNV4kwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBaMFYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRowGAYDVQQDDBFBZG1pbkBleGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABNzocrkw5zv++6bLXhTWCZda7+qw6RGF6v5TiU95P7a9f/Kml6yZ +Fy5J7skQMjgS8755w1tBq/N2yscieGONH0GjTTBLMA4GA1UdDwEB/wQEAwIHgDAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIINcIS2aO/kAuImLWl6hCZDCdkeEGaF6 +7wJUeCknCKCiMAoGCCqGSM49BAMCA0gAMEUCIQD1lGsCNEdo2Ny8bNrWpmIZL4uO +W3jyVgLJe3YB5I17aAIgV+BLow4NaXg9Vh5jr07LJAkOEMxyfPF5oRJAGRJmWEg= +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.445 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3d9a Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.446 UTC [msp] Validate -> DEBU 3d9b MSP OrdererMSP validating identity" +"2019-09-24 01:05:34.447 UTC [msp] Setup -> DEBU 3d9c Setting up the MSP manager (4 msps)" +"2019-09-24 01:05:34.447 UTC [msp] Setup -> DEBU 3d9d MSP manager setup complete, setup 4 msps" +"2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3d9e Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3d9f Proposed new policy Readers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3da0 Proposed new policy Writers for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.447 UTC [policies] NewManagerImpl -> DEBU 3da1 Proposed new policy Admins for Channel/Application/Org3MSP" +"2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da2 Proposed new policy Admins for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da3 Proposed new policy Readers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da4 Proposed new policy Writers for Channel/Application/Org1MSP" +"2019-09-24 01:05:34.449 UTC [policies] NewManagerImpl -> DEBU 3da5 Proposed new policy Writers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.446 UTC [msp] DeserializeIdentity -> DEBU 3da6 Obtaining identity" +"2019-09-24 01:05:34.450 UTC [policies] NewManagerImpl -> DEBU 3da7 Proposed new policy Admins for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.451 UTC [policies] NewManagerImpl -> DEBU 3dad Proposed new policy Readers for Channel/Application/Org2MSP" +"2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3dae Proposed new policy Writers for Channel/Application" +"2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3daf Proposed new policy Admins for Channel/Application" +"2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.452 UTC [policies] NewManagerImpl -> DEBU 3db2 Proposed new policy Endorsement for Channel/Application" +"2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db3 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2019-09-24 01:05:34.452 UTC [policies] GetPolicy -> DEBU 3db4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db5 Proposed new policy LifecycleEndorsement for Channel/Application" +"2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db6 Proposed new policy Readers for Channel/Application" +"2019-09-24 01:05:34.453 UTC [policies] NewManagerImpl -> DEBU 3db7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3db8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3db9 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dba Proposed new policy Readers for Channel/Orderer" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbb Proposed new policy Writers for Channel/Orderer" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbc Proposed new policy Admins for Channel/Orderer" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbd Proposed new policy BlockValidation for Channel/Orderer" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbe Proposed new policy Admins for Channel" +"2019-09-24 01:05:34.454 UTC [policies] NewManagerImpl -> DEBU 3dbf Proposed new policy Readers for Channel" +"2019-09-24 01:05:34.455 UTC [policies] NewManagerImpl -> DEBU 3dc0 Proposed new policy Writers for Channel" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc1 Adding to config map: [Group] /Channel" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc2 Adding to config map: [Group] /Channel/Application" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc3 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc4 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc5 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2019-09-24 01:05:34.455 UTC [common.configtx] addToMap -> DEBU 3dc6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dc9 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dca Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dcb Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2019-09-24 01:05:34.456 UTC [common.configtx] addToMap -> DEBU 3dcc Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dcd Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dce Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dcf Adding to config map: [Group] /Channel/Application/Org1MSP" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.457 UTC [common.configtx] addToMap -> DEBU 3dd4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2019-09-24 01:05:34.457 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3dd5 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd6 Adding to config map: [Value] /Channel/Application/ACLs" +"2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd8 Adding to config map: [Value] /Channel/Application/Capabilities" +"2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dd9 Adding to config map: [Policy] /Channel/Application/Writers" +"2019-09-24 01:05:34.458 UTC [common.configtx] addToMap -> DEBU 3dda Adding to config map: [Policy] /Channel/Application/Admins" +"2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddb Adding to config map: [Policy] /Channel/Application/Endorsement" +"2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3ddd Adding to config map: [Policy] /Channel/Application/Readers" +"2019-09-24 01:05:34.458 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3dd7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.450 UTC [gossip.comm] writeToStream -> DEBU 3da8 Closing writing to stream" +"2019-09-24 01:05:34.459 UTC [gossip.comm] serviceConnection -> DEBU 3ddf Closing reading from stream" +"2019-09-24 01:05:34.450 UTC [gossip.comm] readFromStream -> DEBU 3da9 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 canceling read because closing" +"2019-09-24 01:05:34.450 UTC [gossip.comm] readFromStream -> DEBU 3daa Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.450 UTC [gossip.comm] func2 -> DEBU 3dab Client 172.18.0.8:35478 disconnected" +"2019-09-24 01:05:34.460 UTC [comm.grpc.server] 1 -> INFO 3de0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.405Z grpc.peer_address=172.18.0.8:35478 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.4815ms +"2019-09-24 01:05:34.450 UTC [grpc] infof -> DEBU 3dac transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.459 UTC [common.configtx] addToMap -> DEBU 3dde Adding to config map: [Group] /Channel/Orderer" +"2019-09-24 01:05:34.459 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3de1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.460 UTC [common.configtx] addToMap -> DEBU 3de2 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de4 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de8 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2019-09-24 01:05:34.461 UTC [common.configtx] addToMap -> DEBU 3de9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3dea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3deb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3dec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2019-09-24 01:05:34.462 UTC [common.configtx] addToMap -> DEBU 3ded Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3dee Adding to config map: [Policy] /Channel/Orderer/Readers" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3def Adding to config map: [Policy] /Channel/Orderer/Writers" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df0 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df1 Adding to config map: [Value] /Channel/Capabilities" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df2 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2019-09-24 01:05:34.463 UTC [common.configtx] addToMap -> DEBU 3df3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df4 Adding to config map: [Value] /Channel/OrdererAddresses" +"2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df5 Adding to config map: [Value] /Channel/Consortium" +"2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df6 Adding to config map: [Policy] /Channel/Readers" +"2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df7 Adding to config map: [Policy] /Channel/Writers" +"2019-09-24 01:05:34.464 UTC [common.configtx] addToMap -> DEBU 3df8 Adding to config map: [Policy] /Channel/Admins" +"2019-09-24 01:05:34.465 UTC [common.channelconfig] LogSanityChecks -> DEBU 3df9 As expected, current configuration has policy '/Channel/Readers'" +"2019-09-24 01:05:34.465 UTC [common.channelconfig] LogSanityChecks -> DEBU 3dfa As expected, current configuration has policy '/Channel/Writers'" +"2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfb Manager Channel looking up path [Application]" +"2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfc Manager Channel has managers Application" +"2019-09-24 01:05:34.465 UTC [policies] Manager -> DEBU 3dfd Manager Channel has managers Orderer" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3dfe Manager Channel/Application looking up path []" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3dff Manager Channel/Application has managers Org3MSP" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e00 Manager Channel/Application has managers Org1MSP" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e01 Manager Channel/Application has managers Org2MSP" +"2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e02 As expected, current configuration has policy '/Channel/Application/Readers'" +"2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e03 As expected, current configuration has policy '/Channel/Application/Writers'" +"2019-09-24 01:05:34.466 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e04 As expected, current configuration has policy '/Channel/Application/Admins'" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e05 Manager Channel looking up path [Orderer]" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e06 Manager Channel has managers Application" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e07 Manager Channel has managers Orderer" +"2019-09-24 01:05:34.466 UTC [policies] Manager -> DEBU 3e08 Manager Channel/Orderer looking up path []" +"2019-09-24 01:05:34.467 UTC [policies] Manager -> DEBU 3e09 Manager Channel/Orderer has managers OrdererOrg" +"2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0b As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0c As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2019-09-24 01:05:34.467 UTC [common.channelconfig] LogSanityChecks -> DEBU 3e0d As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2019-09-24 01:05:34.467 UTC [common.capabilities] Supported -> DEBU 3e0e Application capability V1_4_2 is supported and is enabled" +"2019-09-24 01:05:34.467 UTC [common.capabilities] Supported -> DEBU 3e0f Channel capability V1_4_3 is supported and is enabled" +"2019-09-24 01:05:34.467 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3e10 Processing new config for channel businesschannel" +"2019-09-24 01:05:34.467 UTC [gossip.service] ProcessConfigUpdate -> DEBU 3e11 Calling out because config was updated for channel businesschannel" +"2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e12 Org3MSP anchor peers: []" +"2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e13 Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ]" +"2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e14 Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ]" +"2019-09-24 01:05:34.468 UTC [gossip.service] updateAnchors -> DEBU 3e15 Creating state provider for chainID businesschannel" +"2019-09-24 01:05:34.470 UTC [msp] DeserializeIdentity -> DEBU 3e16 Obtaining identity" +"2019-09-24 01:05:34.470 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e17 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.470 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e18 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e19 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e1a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.470 UTC [policies] Evaluate -> DEBU 3e1b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.471 UTC [cauthdsl] func1 -> DEBU 3e1c 0xc003ab9560 gate 1569287134471059300 evaluation starts" +"2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1d 0xc003ab9560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1e 0xc003ab9560 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e1f 0xc003ab9560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.471 UTC [cauthdsl] func2 -> DEBU 3e20 0xc003ab9560 principal evaluation fails" +"2019-09-24 01:05:34.472 UTC [cauthdsl] func1 -> DEBU 3e21 0xc003ab9560 gate 1569287134471059300 evaluation fails" +"2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e22 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e23 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.472 UTC [policies] Evaluate -> DEBU 3e24 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.472 UTC [cauthdsl] func1 -> DEBU 3e25 0xc003ab9da0 gate 1569287134472648500 evaluation starts" +"2019-09-24 01:05:34.472 UTC [cauthdsl] func2 -> DEBU 3e26 0xc003ab9da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.472 UTC [cauthdsl] func2 -> DEBU 3e27 0xc003ab9da0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.473 UTC [cauthdsl] func2 -> DEBU 3e28 0xc003ab9da0 principal matched by identity 0" +"2019-09-24 01:05:34.473 UTC [msp.identity] Verify -> DEBU 3e29 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:34.473 UTC [msp.identity] Verify -> DEBU 3e2a Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:34.473 UTC [cauthdsl] func2 -> DEBU 3e2b 0xc003ab9da0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.474 UTC [cauthdsl] func1 -> DEBU 3e2c 0xc003ab9da0 gate 1569287134472648500 evaluation succeeds" +"2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e2d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.463 UTC [policies] Evaluate -> DEBU 3e2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e31 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.474 UTC [policies] Evaluate -> DEBU 3e32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.475 UTC [policies] Evaluate -> DEBU 3e33 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.475 UTC [msp] DeserializeIdentity -> DEBU 3e34 Obtaining identity" +"2019-09-24 01:05:34.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e37 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.476 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e38 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.476 UTC [policies] Evaluate -> DEBU 3e39 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.475 UTC [cauthdsl] func1 -> DEBU 3e35 0xc002f9ff20 gate 1569287134475579800 evaluation starts" +"2019-09-24 01:05:34.460 UTC [gossip.comm] writeToStream -> DEBU 3de3 Closing writing to stream" +"2019-09-24 01:05:34.475 UTC [comm.grpc.server] 1 -> INFO 3e36 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.473Z grpc.peer_address=172.18.0.6:44168 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=93.4µs +"2019-09-24 01:05:34.440 UTC [gossip.gossip] handleMessage -> DEBU 3d89 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.476 UTC [policies] Evaluate -> DEBU 3e3a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.477 UTC [cauthdsl] func2 -> DEBU 3e3b 0xc002f9ff20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e3f 0xc002f9ff20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e40 0xc002f9ff20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.478 UTC [cauthdsl] func2 -> DEBU 3e41 0xc002f9ff20 principal evaluation fails" +"2019-09-24 01:05:34.478 UTC [cauthdsl] func1 -> DEBU 3e42 0xc002f9ff20 gate 1569287134475579800 evaluation fails" +"2019-09-24 01:05:34.478 UTC [policies] Evaluate -> DEBU 3e43 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.479 UTC [policies] Evaluate -> DEBU 3e44 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.479 UTC [policies] Evaluate -> DEBU 3e45 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.479 UTC [cauthdsl] func1 -> DEBU 3e46 0xc003b34b90 gate 1569287134479849300 evaluation starts" +"2019-09-24 01:05:34.479 UTC [cauthdsl] func2 -> DEBU 3e47 0xc003b34b90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.480 UTC [cauthdsl] func2 -> DEBU 3e48 0xc003b34b90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.480 UTC [cauthdsl] func2 -> DEBU 3e49 0xc003b34b90 principal matched by identity 0" +"2019-09-24 01:05:34.480 UTC [msp.identity] Verify -> DEBU 3e4a Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3e4b Verify: sig = 00000000 30 45 02 21 00 9c 0e 1a 1f bc 46 02 71 e4 9b db |0E.!......F.q...| +00000010 82 6b 4d 5a 8f 61 91 f8 fb b6 25 87 a4 ad 6a 5d |.kMZ.a....%...j]| +00000020 82 4f f0 7d 81 02 20 60 14 7d 48 5e 63 33 05 28 |.O.}.. `.}H^c3.(| +00000030 5c fc d2 92 34 26 1b 47 f7 4e 9d ce a4 e9 7e 68 |\...4&.G.N....~h| +00000040 ec 6d 10 58 f8 7a 31 |.m.X.z1|" +"2019-09-24 01:05:34.481 UTC [cauthdsl] func2 -> DEBU 3e4c 0xc003b34b90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.481 UTC [cauthdsl] func1 -> DEBU 3e4d 0xc003b34b90 gate 1569287134479849300 evaluation succeeds" +"2019-09-24 01:05:34.481 UTC [policies] Evaluate -> DEBU 3e4e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.481 UTC [policies] Evaluate -> DEBU 3e4f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.482 UTC [policies] Evaluate -> DEBU 3e50 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.482 UTC [policies] Evaluate -> DEBU 3e51 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.482 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3e52 Authenticated 172.18.0.9:51546" +"2019-09-24 01:05:34.482 UTC [gossip.comm] GossipStream -> DEBU 3e53 Servicing 172.18.0.9:51546" +"2019-09-24 01:05:34.477 UTC [gossip.gossip] handleMessage -> DEBU 3e3c Exiting" +"2019-09-24 01:05:34.478 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e3d Got message: GossipMessage: nonce:6659362410494176684 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.482 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e54 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:34.482 UTC [msp] DeserializeIdentity -> DEBU 3e55 Obtaining identity" +"2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e56 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e57 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.484 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e58 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.485 UTC [policies] Evaluate -> DEBU 3e5b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.485 UTC [cauthdsl] func1 -> DEBU 3e5c 0xc002fc0560 gate 1569287134485898200 evaluation starts" +"2019-09-24 01:05:34.486 UTC [cauthdsl] func2 -> DEBU 3e5d 0xc002fc0560 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.486 UTC [cauthdsl] func2 -> DEBU 3e5e 0xc002fc0560 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.487 UTC [cauthdsl] func2 -> DEBU 3e5f 0xc002fc0560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.487 UTC [cauthdsl] func2 -> DEBU 3e60 0xc002fc0560 principal evaluation fails" +"2019-09-24 01:05:34.487 UTC [cauthdsl] func1 -> DEBU 3e61 0xc002fc0560 gate 1569287134485898200 evaluation fails" +"2019-09-24 01:05:34.487 UTC [policies] Evaluate -> DEBU 3e62 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.487 UTC [policies] Evaluate -> DEBU 3e63 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.488 UTC [policies] Evaluate -> DEBU 3e64 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.488 UTC [cauthdsl] func1 -> DEBU 3e65 0xc002fc0da0 gate 1569287134488442600 evaluation starts" +"2019-09-24 01:05:34.488 UTC [cauthdsl] func2 -> DEBU 3e66 0xc002fc0da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.488 UTC [cauthdsl] func2 -> DEBU 3e67 0xc002fc0da0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.489 UTC [cauthdsl] func2 -> DEBU 3e68 0xc002fc0da0 principal matched by identity 0" +"2019-09-24 01:05:34.489 UTC [msp.identity] Verify -> DEBU 3e69 Verify: digest = 00000000 23 59 88 31 b1 9a f0 09 8e 1e aa ff dc 72 61 bb |#Y.1.........ra.| +00000010 d6 23 b9 1c 82 58 fd 38 b8 6e 22 41 ed 6b fb a1 |.#...X.8.n"A.k..|" +"2019-09-24 01:05:34.490 UTC [msp.identity] Verify -> DEBU 3e6a Verify: sig = 00000000 30 45 02 21 00 f5 19 5d 0d b3 ef 5e e8 7e 36 db |0E.!...]...^.~6.| +00000010 ef 3b 6b 1f 8b a7 be a8 5d 52 68 45 39 7a 2c a1 |.;k.....]RhE9z,.| +00000020 f2 f7 81 c3 b8 02 20 0a 1a a6 fe 97 24 1d c0 f2 |...... .....$...| +00000030 0d 12 8f 2d 6e 70 a3 27 60 19 99 88 83 c4 44 9e |...-np.'`.....D.| +00000040 b1 19 b4 c8 01 da 14 |.......|" +"2019-09-24 01:05:34.491 UTC [cauthdsl] func2 -> DEBU 3e6b 0xc002fc0da0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.491 UTC [cauthdsl] func1 -> DEBU 3e6c 0xc002fc0da0 gate 1569287134488442600 evaluation succeeds" +"2019-09-24 01:05:34.491 UTC [policies] Evaluate -> DEBU 3e6d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e6e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e6f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.492 UTC [policies] Evaluate -> DEBU 3e70 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.492 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e71 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.492 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e72 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e73 updating membership: timestamp: " +"2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e74 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.493 UTC [gossip.gossip] handleMessage -> DEBU 3e75 Entering, 172.18.0.9:51546 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: nonce:17384056206916090620 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e76 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:34.478 UTC [policies] Evaluate -> DEBU 3e3e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.494 UTC [cauthdsl] func1 -> DEBU 3e77 0xc003b21050 gate 1569287134493991000 evaluation starts" +"2019-09-24 01:05:34.494 UTC [cauthdsl] func2 -> DEBU 3e79 0xc003b21050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.494 UTC [cauthdsl] func2 -> DEBU 3e7a 0xc003b21050 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.495 UTC [cauthdsl] func2 -> DEBU 3e7b 0xc003b21050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.493 UTC [gossip.discovery] learnExistingMembers -> DEBU 3e78 Exiting" +"2019-09-24 01:05:34.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 3e7d Exiting" +"2019-09-24 01:05:34.495 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7e Exiting" +"2019-09-24 01:05:34.495 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3e7f Got message: GossipMessage: nonce:17384056206916090620 tag:EMPTY mem_req: > , Envelope: 177 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.496 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3e80 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:34.496 UTC [msp] DeserializeIdentity -> DEBU 3e81 Obtaining identity" +"2019-09-24 01:05:34.496 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3e82 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.496 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e83 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.495 UTC [cauthdsl] func2 -> DEBU 3e7c 0xc003b21050 principal evaluation fails" +"2019-09-24 01:05:34.497 UTC [cauthdsl] func1 -> DEBU 3e84 0xc003b21050 gate 1569287134493991000 evaluation fails" +"2019-09-24 01:05:34.497 UTC [policies] Evaluate -> DEBU 3e85 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.497 UTC [policies] Evaluate -> DEBU 3e86 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.498 UTC [policies] Evaluate -> DEBU 3e87 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.498 UTC [cauthdsl] func1 -> DEBU 3e88 0xc003b21890 gate 1569287134498243700 evaluation starts" +"2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8a 0xc003b21890 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8c 0xc003b21890 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.498 UTC [cauthdsl] func2 -> DEBU 3e8d 0xc003b21890 principal matched by identity 0" +"2019-09-24 01:05:34.498 UTC [msp.identity] Verify -> DEBU 3e8e Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:34.498 UTC [msp.identity] Verify -> DEBU 3e8f Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:34.499 UTC [cauthdsl] func2 -> DEBU 3e90 0xc003b21890 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.499 UTC [cauthdsl] func1 -> DEBU 3e91 0xc003b21890 gate 1569287134498243700 evaluation succeeds" +"2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e92 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.499 UTC [gossip.discovery] sendMemResponse -> DEBU 3e94 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e93 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.499 UTC [policies] Evaluate -> DEBU 3e95 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.500 UTC [policies] Evaluate -> DEBU 3e98 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.498 UTC [gossip.gossip] handleMessage -> DEBU 3e8b Exiting" +"2019-09-24 01:05:34.497 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e89 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.501 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e99 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.505 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3e9b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.505 UTC [policies] Evaluate -> DEBU 3e9e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.500 UTC [gossip.comm] func1 -> DEBU 3e97 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.506 UTC [cauthdsl] func1 -> DEBU 3e9f 0xc00414a8f0 gate 1569287134506196300 evaluation starts" +"2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea1 0xc00414a8f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea2 0xc00414a8f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.506 UTC [cauthdsl] func2 -> DEBU 3ea3 0xc00414a8f0 principal matched by identity 0" +"2019-09-24 01:05:34.499 UTC [msp] DeserializeIdentity -> DEBU 3e96 Obtaining identity" +"2019-09-24 01:05:34.506 UTC [gossip.gossip] handleMessage -> DEBU 3ea0 Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.507 UTC [gossip.pull] HandleMessage -> DEBU 3ea5 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.507 UTC [msp] DeserializeIdentity -> DEBU 3ea6 Obtaining identity" +"2019-09-24 01:05:34.508 UTC [msp] DeserializeIdentity -> DEBU 3ea7 Obtaining identity" +"2019-09-24 01:05:34.510 UTC [gossip.comm] Send -> DEBU 3ea9 Entering, sending GossipMessage: Channel: , nonce: 6659362410494176684, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.511 UTC [gossip.discovery] sendMemResponse -> DEBU 3eaa Exiting, replying with alive: alive::*\007\311\310\355\002 \016\252\256\024t\263\2327\247\374\337\010\320\255\230\245+\255\2605\200\304A\367\3728\377\005\367Ou\030" > alive: alive: " +"2019-09-24 01:05:34.501 UTC [policies] Evaluate -> DEBU 3e9a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.507 UTC [gossip.pull] SendDigest -> DEBU 3ea8 Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:34.506 UTC [msp.identity] Verify -> DEBU 3ea4 Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 3eab This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.512 UTC [policies] Evaluate -> DEBU 3eaf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.512 UTC [cauthdsl] func1 -> DEBU 3eb0 0xc004143720 gate 1569287134512590900 evaluation starts" +"2019-09-24 01:05:34.512 UTC [cauthdsl] func2 -> DEBU 3eb1 0xc004143720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb2 0xc004143720 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb3 0xc004143720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.513 UTC [cauthdsl] func2 -> DEBU 3eb4 0xc004143720 principal evaluation fails" +"2019-09-24 01:05:34.513 UTC [cauthdsl] func1 -> DEBU 3eb5 0xc004143720 gate 1569287134512590900 evaluation fails" +"2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.513 UTC [policies] Evaluate -> DEBU 3eb8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.513 UTC [cauthdsl] func1 -> DEBU 3eb9 0xc004143f60 gate 1569287134513913000 evaluation starts" +"2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3eba 0xc004143f60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3ebb 0xc004143f60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.514 UTC [cauthdsl] func2 -> DEBU 3ebc 0xc004143f60 principal matched by identity 0" +"2019-09-24 01:05:34.515 UTC [msp.identity] Verify -> DEBU 3ebd Verify: digest = 00000000 0d a2 d4 e5 36 a1 95 e8 f5 4f 50 2f 8e 75 11 6b |....6....OP/.u.k| +00000010 40 4b c8 39 dc 56 e0 49 06 7a 9e 3e 5c ba 8c ce |@K.9.V.I.z.>\...|" +"2019-09-24 01:05:34.515 UTC [msp.identity] Verify -> DEBU 3ebe Verify: sig = 00000000 30 45 02 21 00 86 97 71 0c cf 55 f1 30 37 45 6e |0E.!...q..U.07En| +00000010 d5 5a 2c 3c 4f 93 26 1e 9b 1a ce 3b 68 cd 6f f0 |.Z, DEBU 3ebf 0xc004143f60 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.516 UTC [cauthdsl] func1 -> DEBU 3ec0 0xc004143f60 gate 1569287134513913000 evaluation succeeds" +"2019-09-24 01:05:34.516 UTC [policies] Evaluate -> DEBU 3ec1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.511 UTC [gossip.gossip] handleMessage -> DEBU 3eac Exiting" +"2019-09-24 01:05:34.511 UTC [gossip.comm] sendToEndpoint -> DEBU 3ead Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 6659362410494176684, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.517 UTC [gossip.comm] createConnection -> DEBU 3ec4 Entering peer1.org2.example.com:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:34.519 UTC [grpc] DialContext -> DEBU 3ec5 parsed scheme: """ +"2019-09-24 01:05:34.519 UTC [grpc] DialContext -> DEBU 3ec6 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:05:34.517 UTC [policies] Evaluate -> DEBU 3ec7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.519 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ec8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ec9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3eca updating membership: timestamp: " +"2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecb Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.519 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecc Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:34.520 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ecd Exiting" +"2019-09-24 01:05:34.520 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ece Exiting" +"2019-09-24 01:05:34.520 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ecf Exiting" +"2019-09-24 01:05:34.519 UTC [grpc] watcher -> DEBU 3ed0 ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }]" +"2019-09-24 01:05:34.520 UTC [grpc] switchBalancer -> DEBU 3ed1 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:05:34.520 UTC [gossip.discovery] sendMemResponse -> DEBU 3ed2 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:34.520 UTC [grpc] HandleSubConnStateChange -> DEBU 3ed3 pickfirstBalancer: HandleSubConnStateChange: 0xc0039d6b60, CONNECTING" +"2019-09-24 01:05:34.512 UTC [msp.identity] Verify -> DEBU 3eae Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:34.520 UTC [msp] DeserializeIdentity -> DEBU 3ed4 Obtaining identity" +"2019-09-24 01:05:34.521 UTC [msp] DeserializeIdentity -> DEBU 3ed5 Obtaining identity" +"2019-09-24 01:05:34.521 UTC [cauthdsl] func2 -> DEBU 3ed6 0xc00414a8f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.521 UTC [cauthdsl] func1 -> DEBU 3ed7 0xc00414a8f0 gate 1569287134506196300 evaluation succeeds" +"2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3ed8 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.521 UTC [msp] DeserializeIdentity -> DEBU 3ed9 Obtaining identity" +"2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3edb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.526 UTC [gossip.comm] Send -> DEBU 3edc Entering, sending GossipMessage: Channel: , nonce: 17384056206916090620, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.525 UTC [policies] Evaluate -> DEBU 3edd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.526 UTC [gossip.gossip] JoinChan -> INFO 3ede Joining gossip network of channel businesschannel with 3 organizations" +"2019-09-24 01:05:34.526 UTC [gossip.gossip] learnAnchorPeers -> INFO 3edf Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-09-24 01:05:34.527 UTC [gossip.discovery] sendMemResponse -> DEBU 3ee0 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:34.527 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee1 Anchor peer with same endpoint, skipping connecting to myself" +"2019-09-24 01:05:34.528 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee2 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-09-24 01:05:34.527 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee3 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 17384056206916090620, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.528 UTC [gossip.discovery] Connect -> DEBU 3ee5 Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: " +"2019-09-24 01:05:34.529 UTC [gossip.discovery] Connect -> DEBU 3ee6 Exiting" +"2019-09-24 01:05:34.529 UTC [gossip.gossip] learnAnchorPeers -> INFO 3ee7 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-09-24 01:05:34.529 UTC [gossip.service] updateEndpoints -> DEBU 3ee8 Updating endpoints for chainID%!(EXTRA string=businesschannel)" +"2019-09-24 01:05:34.530 UTC [msp] DeserializeIdentity -> DEBU 3ee9 Obtaining identity" +"2019-09-24 01:05:34.531 UTC [gossip.comm] func1 -> DEBU 3eea Got message: GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.531 UTC [gossip.gossip] handleMessage -> DEBU 3eec Entering, 172.18.0.6:7051 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.531 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3eeb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.531 UTC [msp] DeserializeIdentity -> DEBU 3eee Obtaining identity" +"2019-09-24 01:05:34.531 UTC [gossip.gossip] handleMessage -> DEBU 3eed Exiting" +"2019-09-24 01:05:34.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3eef Got message: GossipMessage: tag:EMPTY mem_req:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.533 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3ef1 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:34.534 UTC [msp.identity] Verify -> DEBU 3ef2 Verify: digest = 00000000 e1 10 87 0d 6d e5 0a cd cf 2b 08 98 eb dc 8f 62 |....m....+.....b| +00000010 c6 f6 58 8b 86 ef f7 e0 10 68 7f 86 cc 21 15 24 |..X......h...!.$|" +"2019-09-24 01:05:34.534 UTC [msp.identity] Verify -> DEBU 3ef3 Verify: sig = 00000000 30 44 02 20 49 1f 7a fb 91 b8 ee 32 8c 25 20 71 |0D. I.z....2.% q| +00000010 e3 9c e1 8d e1 1d 88 df b2 e1 21 42 50 9c f7 6c |..........!BP..l| +00000020 7e fc 28 a8 02 20 3a f5 31 14 e4 5e 5b c7 66 e2 |~.(.. :.1..^[.f.| +00000030 05 b1 fa ff 00 dd 68 d2 bb 56 4c bf 01 fa 42 b4 |......h..VL...B.| +00000040 9f 93 3d 66 91 33 |..=f.3|" +"2019-09-24 01:05:34.535 UTC [msp.identity] Verify -> DEBU 3ef4 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:34.535 UTC [msp.identity] Verify -> DEBU 3ef5 Verify: sig = 00000000 30 44 02 20 3e 0c b2 dc 41 74 f7 51 43 df 7f 86 |0D. >...At.QC...| +00000010 6e eb 52 e2 fa 79 27 70 77 b8 b7 83 2d fe f0 d5 |n.R..y'pw...-...| +00000020 9c 06 95 26 02 20 02 3f 21 c4 02 1c a9 4b 03 56 |...&. .?!....K.V| +00000030 10 7c f5 af 94 45 06 7f 02 ec 9e 3a 78 08 53 01 |.|...E.....:x.S.| +00000040 a0 b2 18 f7 c9 cd |......|" +"2019-09-24 01:05:34.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ef6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:34.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef8 updating membership: timestamp: " +"2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ef9 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.536 UTC [gossip.discovery] learnExistingMembers -> DEBU 3efa Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:34.528 UTC [gossip.comm] sendToEndpoint -> DEBU 3ee4 Exiting" +"2019-09-24 01:05:34.539 UTC [gossip.discovery] learnExistingMembers -> DEBU 3efb Exiting" +"2019-09-24 01:05:34.540 UTC [gossip.discovery] handleAliveMessage -> DEBU 3efc Exiting" +"2019-09-24 01:05:34.540 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3efd Exiting" +"2019-09-24 01:05:34.540 UTC [grpc] DialContext -> DEBU 3efe parsed scheme: """ +"2019-09-24 01:05:34.541 UTC [grpc] DialContext -> DEBU 3eff scheme "" not registered, fallback to default scheme" +"2019-09-24 01:05:34.542 UTC [grpc] watcher -> DEBU 3f00 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 01:05:34.542 UTC [grpc] switchBalancer -> DEBU 3f01 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:05:34.543 UTC [grpc] HandleSubConnStateChange -> DEBU 3f02 pickfirstBalancer: HandleSubConnStateChange: 0xc0039d6b60, READY" +"2019-09-24 01:05:34.533 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3ef0 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.544 UTC [peer] updateTrustedRoots -> DEBU 3f03 Updating trusted root authorities for channel businesschannel" +"2019-09-24 01:05:34.551 UTC [gossip.discovery] sendMemResponse -> DEBU 3f04 Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:34.556 UTC [msp] DeserializeIdentity -> DEBU 3f05 Obtaining identity" +"2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f06 updating root CAs for channel [businesschannel]" +"2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f07 adding app root CAs for MSP [Org1MSP]" +"2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f08 adding app root CAs for MSP [Org2MSP]" +"2019-09-24 01:05:34.559 UTC [peer] buildTrustedRootsForChain -> DEBU 3f09 adding orderer root CAs for MSP [OrdererMSP]" +"2019-09-24 01:05:34.560 UTC [peer] buildTrustedRootsForChain -> DEBU 3f0a adding app root CAs for MSP [Org3MSP]" +"2019-09-24 01:05:34.559 UTC [msp] DeserializeIdentity -> DEBU 3f0b Obtaining identity" +"2019-09-24 01:05:34.560 UTC [committer.txvalidator] validateTx -> DEBU 3f0c config transaction received for chain businesschannel" +"2019-09-24 01:05:34.560 UTC [committer.txvalidator] validateTx -> DEBU 3f0d [businesschannel] validateTx completes for block 0xc0026d2740 env 0xc000361360 txn 0" +"2019-09-24 01:05:34.561 UTC [committer.txvalidator] Validate -> DEBU 3f0e got result for idx 0, code 0" +"2019-09-24 01:05:34.561 UTC [committer.txvalidator] Validate -> INFO 3f0f [businesschannel] Validated block [6] in 296ms" +"2019-09-24 01:05:34.560 UTC [msp] DeserializeIdentity -> DEBU 3f10 Obtaining identity" +"2019-09-24 01:05:34.563 UTC [msp.identity] newIdentity -> DEBU 3f15 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br +S/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8 +dvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49 +BAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ +sz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.564 UTC [gossip.comm] Send -> DEBU 3f16 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.565 UTC [gossip.discovery] sendMemResponse -> DEBU 3f17 Exiting, replying with alive:\014\262\334At\367QC\337\177\206n\353R\342\372y'pw\270\267\203-\376\360\325\234\006\225&\002 \002?!\304\002\034\251K\003V\020|\365\257\224E\006\177\002\354\236:x\010S\001\240\262\030\367\311\315" > > alive: " +"2019-09-24 01:05:34.561 UTC [gossip.privdata] listMissingPrivateData -> DEBU 3f11 Retrieving private write sets for 0 transactions from transient store" +"2019-09-24 01:05:34.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f12 Obtaining default signing identity" +"2019-09-24 01:05:34.569 UTC [msp.identity] Sign -> DEBU 3f19 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.570 UTC [msp.identity] Sign -> DEBU 3f1a Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.569 UTC [gossip.privdata] StoreBlock -> DEBU 3f1b [businesschannel] No missing collection private write sets to fetch from remote peers" +"2019-09-24 01:05:34.570 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f1c Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051" +"2019-09-24 01:05:34.571 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f1d Received pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRANf0t/IanN4STn/JcZ4KVc8wCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMTkwOTI0MDA1OTAwWhcNMjkwOTIxMDA1OTAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjEub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAt3I82H42Br\nS/4mDEgoIG1sVVaIHR0t/cn5qj2s9tHFlX1Xrgp5yHw7nZkIgBiFr2WnWw1STIj8\ndvji5ez/db+jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAII5rldB/32NNyl+Ib8554UGVCDcHXeNNInSBnXXCzLTUMAoGCCqGSM49\nBAMCA0cAMEQCIF2y8EWh1OvEceyTDGGFrdNw/vj1AV34iRL9fB9NPH97AiA4FYrQ\nsz9jj8J2EovOyo1qvTIkaqRmYtCxVrei4IW+iA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\305\r\320\021\262\002B\251\233\256[\237\024\007\016\032\236\010T:\211<\305\334\275\373ZS\301\222\270\211" from 172.18.0.8:7051" +"2019-09-24 01:05:34.571 UTC [msp] DeserializeIdentity -> DEBU 3f1e Obtaining identity" +"2019-09-24 01:05:34.571 UTC [msp] Validate -> DEBU 3f1f MSP Org2MSP validating identity" +"2019-09-24 01:05:34.572 UTC [msp] getCertificationChain -> DEBU 3f21 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.572 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f22 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.572 UTC [msp] DeserializeIdentity -> DEBU 3f23 Obtaining identity" +"2019-09-24 01:05:34.571 UTC [committer] preCommit -> DEBU 3f20 Received configuration update, calling CSCC ConfigUpdate" +"2019-09-24 01:05:34.574 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f24 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.575 UTC [kvledger] CommitWithPvtData -> DEBU 3f25 [businesschannel] Validating state for block [6]" +"2019-09-24 01:05:34.575 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f27 Waiting for purge mgr to finish the background job of computing expirying keys for the block" +"2019-09-24 01:05:34.576 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f28 lock acquired on oldBlockCommit for validating read set version against the committed version" +"2019-09-24 01:05:34.576 UTC [lockbasedtxmgr] ValidateAndPrepare -> DEBU 3f29 Validating new block with num trans = [1]" +"2019-09-24 01:05:34.577 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f2a ValidateAndPrepareBatch() for block number = [6]" +"2019-09-24 01:05:34.577 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f2b preprocessing ProtoBlock..." +"2019-09-24 01:05:34.578 UTC [valimpl] preprocessProtoBlock -> DEBU 3f2c txType=CONFIG" +"2019-09-24 01:05:34.578 UTC [valimpl] processNonEndorserTx -> DEBU 3f2d Performing custom processing for transaction [txid=], [txType=CONFIG]" +"2019-09-24 01:05:34.579 UTC [valimpl] processNonEndorserTx -> DEBU 3f2e Processor for custom tx processing:&peer.configtxProcessor{}" +"2019-09-24 01:05:34.580 UTC [lockbasedtxmgr] NewTxSimulator -> DEBU 3f2f constructing new tx simulator" +"2019-09-24 01:05:34.581 UTC [lockbasedtxmgr] newLockBasedTxSimulator -> DEBU 3f30 constructing new tx simulator txid = []" +"2019-09-24 01:05:34.582 UTC [peer] GenerateSimulationResults -> DEBU 3f31 Processing CONFIG" +"2019-09-24 01:05:34.562 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f14 Obtaining default signing identity" +"2019-09-24 01:05:34.582 UTC [msp.identity] Sign -> DEBU 3f32 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.582 UTC [msp.identity] Sign -> DEBU 3f33 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.583 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f34 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:44168" +"2019-09-24 01:05:34.584 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f35 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44168" +"2019-09-24 01:05:34.584 UTC [msp.identity] Verify -> DEBU 3f36 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:05:34.584 UTC [msp.identity] Verify -> DEBU 3f37 Verify: sig = 00000000 30 45 02 21 00 ac 24 e4 61 e8 28 56 54 67 14 52 |0E.!..$.a.(VTg.R| +00000010 e7 ae e0 4d b1 05 13 67 b3 d0 71 4c 57 af 60 d2 |...M...g..qLW.`.| +00000020 c7 f1 94 ee fc 02 20 62 6d 1f 5a 3d d2 df f5 8f |...... bm.Z=....| +00000030 aa 20 27 7f 7c 90 3a 22 a8 7e b1 e2 22 7b 30 54 |. '.|.:".~.."{0T| +00000040 91 db ba fc 99 d4 81 |.......|" +"2019-09-24 01:05:34.585 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f38 Authenticated 172.18.0.6:44168" +"2019-09-24 01:05:34.585 UTC [gossip.comm] GossipStream -> DEBU 3f39 Servicing 172.18.0.6:44168" +"2019-09-24 01:05:34.568 UTC [gossip.comm] sendToEndpoint -> DEBU 3f18 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.586 UTC [gossip.comm] sendToEndpoint -> DEBU 3f3a Exiting" +"2019-09-24 01:05:34.586 UTC [gossip.comm] writeToStream -> DEBU 3f3b Closing writing to stream" +"2019-09-24 01:05:34.586 UTC [gossip.comm] serviceConnection -> DEBU 3f3c Closing reading from stream" +"2019-09-24 01:05:34.587 UTC [gossip.comm] readFromStream -> DEBU 3f3d 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da canceling read because closing" +"2019-09-24 01:05:34.543 UTC [grpc] HandleSubConnStateChange -> DEBU 3f13 pickfirstBalancer: HandleSubConnStateChange: 0xc003b49890, CONNECTING" +"2019-09-24 01:05:34.587 UTC [grpc] HandleSubConnStateChange -> DEBU 3f3e pickfirstBalancer: HandleSubConnStateChange: 0xc003b49890, READY" +"2019-09-24 01:05:34.588 UTC [peer] processChannelConfigTx -> DEBU 3f3f channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > " +"2019-09-24 01:05:34.594 UTC [lockbasedtxmgr] GetTxSimulationResults -> DEBU 3f42 Simulation completed, getting simulation results" +"2019-09-24 01:05:34.575 UTC [msp] DeserializeIdentity -> DEBU 3f26 Obtaining identity" +"2019-09-24 01:05:34.588 UTC [grpc] infof -> DEBU 3f40 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.590 UTC [msp] GetDefaultSigningIdentity -> DEBU 3f41 Obtaining default signing identity" +"2019-09-24 01:05:34.597 UTC [gossip.comm] readFromStream -> DEBU 3f43 Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.597 UTC [gossip.comm] func2 -> DEBU 3f44 Client 172.18.0.6:44168 disconnected" +"2019-09-24 01:05:34.598 UTC [comm.grpc.server] 1 -> INFO 3f49 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-09-24T01:05:44.561Z grpc.peer_address=172.18.0.6:44168 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.5047ms +"2019-09-24 01:05:34.597 UTC [grpc] infof -> DEBU 3f45 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.597 UTC [lockbasedtxmgr] Done -> DEBU 3f46 Done with transaction simulation / query execution []" +"2019-09-24 01:05:34.598 UTC [statebasedval] ValidateAndPrepareBatch -> DEBU 3f4a Block [6] Transaction index [0] TxId [] marked as valid by state validator" +"2019-09-24 01:05:34.598 UTC [gossip.comm] writeToStream -> DEBU 3f4b Closing writing to stream" +"2019-09-24 01:05:34.598 UTC [valinternal] ApplyWriteSet -> DEBU 3f4c txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0033555c0)}" +"2019-09-24 01:05:34.598 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4d validating rwset..." +"2019-09-24 01:05:34.598 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4e postprocessing ProtoBlock..." +"2019-09-24 01:05:34.599 UTC [valimpl] ValidateAndPrepareBatch -> DEBU 3f4f ValidateAndPrepareBatch() complete" +"2019-09-24 01:05:34.597 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f47 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.599 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f51 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.600 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f52 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.597 UTC [msp.identity] Sign -> DEBU 3f48 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.599 UTC [kvledger] CommitWithPvtData -> DEBU 3f50 [businesschannel] Adding CommitHash to the block [6]" +"2019-09-24 01:05:34.600 UTC [policies] Evaluate -> DEBU 3f53 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.601 UTC [msp.identity] Sign -> DEBU 3f54 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.602 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f57 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-09-24 01:05:34.602 UTC [kvledger] CommitWithPvtData -> DEBU 3f55 [businesschannel] Committing block [6] to storage" +"2019-09-24 01:05:34.606 UTC [ledgerstorage] CommitWithPvtData -> DEBU 3f59 Writing block [6] to pvt block store" +"2019-09-24 01:05:34.610 UTC [pvtdatastorage] Prepare -> DEBU 3f5a Saved 0 private data write sets for block [6]" +"2019-09-24 01:05:34.611 UTC [gossip.comm] readFromStream -> DEBU 3f5b Got error, aborting: rpc error: code = Canceled desc = context canceled" +"2019-09-24 01:05:34.611 UTC [gossip.comm] func2 -> DEBU 3f5c Client 172.18.0.9:51546 disconnected" +"2019-09-24 01:05:34.612 UTC [comm.grpc.server] 1 -> INFO 3f5d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.9:51546 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=183.3098ms +"2019-09-24 01:05:34.613 UTC [grpc] infof -> DEBU 3f5e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.613 UTC [gossip.comm] writeToStream -> DEBU 3f5f Closing writing to stream" +"2019-09-24 01:05:34.602 UTC [policies] Evaluate -> DEBU 3f56 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.614 UTC [policies] Evaluate -> DEBU 3f60 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.614 UTC [cauthdsl] func1 -> DEBU 3f61 0xc003612d60 gate 1569287134614306800 evaluation starts" +"2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f62 0xc003612d60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f63 0xc003612d60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f64 0xc003612d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.614 UTC [cauthdsl] func2 -> DEBU 3f65 0xc003612d60 principal evaluation fails" +"2019-09-24 01:05:34.615 UTC [cauthdsl] func1 -> DEBU 3f66 0xc003612d60 gate 1569287134614306800 evaluation fails" +"2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f67 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f68 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.615 UTC [policies] Evaluate -> DEBU 3f69 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.615 UTC [cauthdsl] func1 -> DEBU 3f6a 0xc0036135c0 gate 1569287134615552700 evaluation starts" +"2019-09-24 01:05:34.615 UTC [cauthdsl] func2 -> DEBU 3f6b 0xc0036135c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.616 UTC [cauthdsl] func2 -> DEBU 3f6c 0xc0036135c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.617 UTC [fsblkstorage] indexBlock -> DEBU 3f6d Indexing block [blockNum=6, blockHash=[]byte{0x46, 0x52, 0x27, 0x1b, 0xc, 0xf, 0xee, 0x5b, 0x83, 0xd9, 0x75, 0x78, 0x16, 0xfe, 0x4a, 0x8a, 0xe, 0x49, 0x25, 0x33, 0x16, 0xa2, 0x38, 0x7a, 0x1c, 0x12, 0xa6, 0x93, 0x54, 0xce, 0xb5, 0x65} txOffsets= +txId=ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085 locPointer=offset=71, bytesLength=37480 +]" +"2019-09-24 01:05:34.617 UTC [fsblkstorage] indexBlock -> DEBU 3f6e Adding txLoc [fileSuffixNum=0, offset=89509, bytesLength=37480] for tx ID: [ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085] to txid-index" +"2019-09-24 01:05:34.618 UTC [fsblkstorage] indexBlock -> DEBU 3f6f Adding txLoc [fileSuffixNum=0, offset=89509, bytesLength=37480] for tx number:[0] ID: [ae153987851a7e85ccc4ee004e2b3e4d3880858e8abb4448d3e01334b7996085] to blockNumTranNum index" +"2019-09-24 01:05:34.616 UTC [cauthdsl] func2 -> DEBU 3f70 0xc0036135c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f71 0xc0036135c0 principal evaluation fails" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func1 -> DEBU 3f72 0xc0036135c0 gate 1569287134615552700 evaluation fails" +"2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f73 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f74 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.618 UTC [policies] Evaluate -> DEBU 3f75 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func1 -> DEBU 3f76 0xc003613e20 gate 1569287134618444800 evaluation starts" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f77 0xc003613e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f78 0xc003613e20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.618 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3f79 Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:05:34.618 UTC [msp] Validate -> DEBU 3f7a MSP Org2MSP validating identity" +"2019-09-24 01:05:34.618 UTC [msp] getCertificationChain -> DEBU 3f7b MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f7c 0xc003613e20 principal matched by identity 0" +"2019-09-24 01:05:34.618 UTC [msp.identity] Verify -> DEBU 3f7d Verify: digest = 00000000 1f be 85 6d 84 ba e1 f8 6c e1 c3 07 f5 4e d8 5d |...m....l....N.]| +00000010 43 76 c6 a1 94 dc 57 a0 50 46 48 dd 41 1b b6 dd |Cv....W.PFH.A...|" +"2019-09-24 01:05:34.618 UTC [msp.identity] Verify -> DEBU 3f7e Verify: sig = 00000000 30 45 02 21 00 b7 94 8b 6d 0b 5f 7d 34 2e f6 9c |0E.!....m._}4...| +00000010 12 7d f5 d8 e2 51 7b e7 b7 14 f7 aa ef 9a c1 b0 |.}...Q{.........| +00000020 af 92 14 91 6a 02 20 03 f9 95 74 89 6f 4b b4 e0 |....j. ...t.oK..| +00000030 88 23 42 db 47 91 f7 26 70 21 e1 02 c3 f1 95 88 |.#B.G..&p!......| +00000040 87 89 df 80 c2 46 94 |.....F.|" +"2019-09-24 01:05:34.618 UTC [cauthdsl] func2 -> DEBU 3f7f 0xc003613e20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.619 UTC [cauthdsl] func1 -> DEBU 3f80 0xc003613e20 gate 1569287134618444800 evaluation succeeds" +"2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f81 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f82 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f83 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.619 UTC [policies] Evaluate -> DEBU 3f84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.619 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f85 Authenticated 172.18.0.8:7051" +"2019-09-24 01:05:34.619 UTC [gossip.comm] createConnection -> DEBU 3f86 Exiting" +"2019-09-24 01:05:34.619 UTC [gossip.comm] sendToEndpoint -> DEBU 3f87 Exiting" +"2019-09-24 01:05:34.606 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3f58 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +"2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f88 Obtaining identity" +"2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f89 Obtaining identity" +"2019-09-24 01:05:34.619 UTC [msp.identity] newIdentity -> DEBU 3f8a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQfifCLwH3nBrKHPsyRKNFDzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDrMzGiOyjhS+ +VWe+T/8OYifKnKTvfIf3iwKYjKhl1gCeWVZnHYKOPbUuIPt7aM6xL93yuvxoMd3i +AJkPS7od26NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgjmuV0H/fY03KX4hvznnhQZUINwdd400idIGddcLMtNQwCgYIKoZIzj0E +AwIDSAAwRQIhANcqU+np2Uh9wmgO76XE2kyG1n8oprfRjD3Bw51gWJvtAiBrUG9g +FraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw== +-----END CERTIFICATE-----" +"2019-09-24 01:05:34.619 UTC [msp] Validate -> DEBU 3f8b MSP Org2MSP validating identity" +"2019-09-24 01:05:34.619 UTC [msp] getCertificationChain -> DEBU 3f8c MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.619 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f8d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.619 UTC [msp] DeserializeIdentity -> DEBU 3f8e Obtaining identity" +"2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f8f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.620 UTC [msp] DeserializeIdentity -> DEBU 3f90 Obtaining identity" +"2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 3f91 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f92 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.620 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 3f93 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f94 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f95 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.620 UTC [policies] Evaluate -> DEBU 3f96 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.621 UTC [cauthdsl] func1 -> DEBU 3f97 0xc0038a14a0 gate 1569287134621048300 evaluation starts" +"2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f98 0xc0038a14a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f99 0xc0038a14a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f9a 0xc0038a14a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.621 UTC [cauthdsl] func2 -> DEBU 3f9b 0xc0038a14a0 principal evaluation fails" +"2019-09-24 01:05:34.622 UTC [cauthdsl] func1 -> DEBU 3f9c 0xc0038a14a0 gate 1569287134621048300 evaluation fails" +"2019-09-24 01:05:34.622 UTC [policies] Evaluate -> DEBU 3f9d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.623 UTC [policies] Evaluate -> DEBU 3f9f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.623 UTC [policies] Evaluate -> DEBU 3fa0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.623 UTC [comm.grpc.server] 1 -> INFO 3fa1 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-09-24T01:05:36.622Z grpc.peer_address=172.18.0.6:44178 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=758.5µs +"2019-09-24 01:05:34.623 UTC [cauthdsl] func1 -> DEBU 3fa2 0xc0038a1d00 gate 1569287134623844400 evaluation starts" +"2019-09-24 01:05:34.624 UTC [cauthdsl] func2 -> DEBU 3fa3 0xc0038a1d00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa4 0xc0038a1d00 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa5 0xc0038a1d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.625 UTC [cauthdsl] func2 -> DEBU 3fa6 0xc0038a1d00 principal evaluation fails" +"2019-09-24 01:05:34.625 UTC [cauthdsl] func1 -> DEBU 3fa7 0xc0038a1d00 gate 1569287134623844400 evaluation fails" +"2019-09-24 01:05:34.622 UTC [fsblkstorage] updateCheckpoint -> DEBU 3f9e Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[127962], isChainEmpty=[false], lastBlockNumber=[6]" +"2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3fa8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3faa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.626 UTC [policies] Evaluate -> DEBU 3fab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.626 UTC [cauthdsl] func1 -> DEBU 3fac 0xc0034794e0 gate 1569287134626807000 evaluation starts" +"2019-09-24 01:05:34.627 UTC [cauthdsl] func2 -> DEBU 3fad 0xc0034794e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.626 UTC [pvtdatastorage] Commit -> DEBU 3fa9 Committing private data for block [6]" +"2019-09-24 01:05:34.627 UTC [cauthdsl] func2 -> DEBU 3fae 0xc0034794e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.627 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 3faf Checking if identity satisfies MEMBER role for Org2MSP" +"2019-09-24 01:05:34.627 UTC [msp] Validate -> DEBU 3fb0 MSP Org2MSP validating identity" +"2019-09-24 01:05:34.627 UTC [msp] getCertificationChain -> DEBU 3fb1 MSP Org2MSP getting certification chain" +"2019-09-24 01:05:34.628 UTC [cauthdsl] func2 -> DEBU 3fb2 0xc0034794e0 principal matched by identity 0" +"2019-09-24 01:05:34.628 UTC [msp.identity] Verify -> DEBU 3fb3 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 3fb4 Verify: sig = 00000000 30 45 02 21 00 b7 bb 93 2b 82 a9 e9 31 2e f6 5b |0E.!....+...1..[| +00000010 08 cb db 8b 37 e9 2d ad 90 26 41 76 b3 e7 21 11 |....7.-..&Av..!.| +00000020 a4 4c e9 4b 88 02 20 18 79 44 e5 ce 01 ab 99 1f |.L.K.. .yD......| +00000030 bd 2d 5e 3e 9f 3f 55 36 4b 08 6f a2 20 46 ba bf |.-^>.?U6K.o. F..| +00000040 0c 5d f0 b6 8c 47 35 |.]...G5|" +"2019-09-24 01:05:34.628 UTC [pvtdatastorage] Commit -> DEBU 3fb5 Committed private data for block [6]" +"2019-09-24 01:05:34.629 UTC [cauthdsl] func2 -> DEBU 3fb6 0xc0034794e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.629 UTC [cauthdsl] func1 -> DEBU 3fb7 0xc0034794e0 gate 1569287134626807000 evaluation succeeds" +"2019-09-24 01:05:34.629 UTC [policies] Evaluate -> DEBU 3fb9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.630 UTC [policies] Evaluate -> DEBU 3fba == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.629 UTC [kvledger] CommitWithPvtData -> DEBU 3fb8 [businesschannel] Committing block [6] transactions to state database" +"2019-09-24 01:05:34.630 UTC [lockbasedtxmgr] Commit -> DEBU 3fbc lock acquired on oldBlockCommit for committing regular updates to state database" +"2019-09-24 01:05:34.630 UTC [lockbasedtxmgr] Commit -> DEBU 3fbd Committing updates to state database" +"2019-09-24 01:05:34.631 UTC [pvtstatepurgemgmt] buildExpirySchedule -> DEBU 3fbe Building the expiry schedules based on the update batch" +"2019-09-24 01:05:34.631 UTC [lockbasedtxmgr] Commit -> DEBU 3fbf Write lock acquired for committing updates to state database" +"2019-09-24 01:05:34.631 UTC [stateleveldb] ApplyUpdates -> DEBU 3fc0 Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}]" +"2019-09-24 01:05:34.630 UTC [policies] Evaluate -> DEBU 3fbb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.631 UTC [policies] Evaluate -> DEBU 3fc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.631 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fc2 Authenticated 172.18.0.9:7051" +"2019-09-24 01:05:34.631 UTC [msp] DeserializeIdentity -> DEBU 3fc3 Obtaining identity" +"2019-09-24 01:05:34.631 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fc4 Obtaining default signing identity" +"2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151030 " +"2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc6 Sign: digest: 0E6D9B59A7264475C570D0873D3F530AB52B325846D56195E30A016EB4D80FF4 " +"2019-09-24 01:05:34.632 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fc7 Obtaining default signing identity" +"2019-09-24 01:05:34.632 UTC [msp.identity] Sign -> DEBU 3fc8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:34.633 UTC [msp.identity] Sign -> DEBU 3fc9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:34.633 UTC [lockbasedtxmgr] Commit -> DEBU 3fca Updates committed to state database and the write lock is released" +"2019-09-24 01:05:34.634 UTC [msp] DeserializeIdentity -> DEBU 3fcb Obtaining identity" +"2019-09-24 01:05:34.635 UTC [gossip.comm] Send -> DEBU 3fcf Entering, sending GossipMessage: nonce:5460388262505425325 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.634 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3fcc Preparing potential purge list working-set for expiringAtBlk [7]" +"2019-09-24 01:05:34.634 UTC [lockbasedtxmgr] func1 -> DEBU 3fcd launched the background routine for preparing keys to purge with the next block" +"2019-09-24 01:05:34.634 UTC [grpc] infof -> DEBU 3fce transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:34.636 UTC [leveldbhelper] GetIterator -> DEBU 3fd0 Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}]" +"2019-09-24 01:05:34.636 UTC [pvtstatepurgemgmt] prepareWorkingsetFor -> DEBU 3fd2 No expiry entry found for expiringAtBlk [7]" +"2019-09-24 01:05:34.636 UTC [kvledger] CommitWithPvtData -> DEBU 3fd1 [businesschannel] Committing block [6] transactions to history database" +"2019-09-24 01:05:34.637 UTC [historyleveldb] Commit -> DEBU 3fd3 Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions" +"2019-09-24 01:05:34.637 UTC [historyleveldb] Commit -> DEBU 3fd4 Skipping transaction [0] since it is not an endorsement transaction" +"2019-09-24 01:05:34.638 UTC [gossip.comm] sendToEndpoint -> DEBU 3fd5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:5460388262505425325 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.638 UTC [gossip.comm] createConnection -> DEBU 3fd6 Entering peer0.org2.example.com:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:34.639 UTC [historyleveldb] Commit -> DEBU 3fd7 Channel [businesschannel]: Updates committed to history database for blockNo [6]" +"2019-09-24 01:05:34.639 UTC [kvledger] CommitWithPvtData -> INFO 3fd8 [businesschannel] Committed block [6] with 1 transaction(s) in 63ms (state_validation=23ms block_and_pvtdata_commit=30ms state_commit=6ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc]" +"2019-09-24 01:05:34.639 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fd9 Obtaining default signing identity" +"2019-09-24 01:05:34.639 UTC [msp.identity] Sign -> DEBU 3fda Sign: plaintext: 18057A6C121408C8CBFBB7D9C8CEE315...08071A0C0A0565787030321203312E30 " +"2019-09-24 01:05:34.639 UTC [msp.identity] Sign -> DEBU 3fdb Sign: digest: 0C345A82CB3BA959A79E2BEEF1B03DD9E33445AC70CE28B55B926D0270C6E052 " +"2019-09-24 01:05:34.640 UTC [gossip.state] commitBlock -> DEBU 3fdc [businesschannel] Committed block [6] with 1 transaction(s)" +"2019-09-24 01:05:34.641 UTC [grpc] DialContext -> DEBU 3fdd parsed scheme: """ +"2019-09-24 01:05:34.642 UTC [msp] GetDefaultSigningIdentity -> DEBU 3fde Obtaining default signing identity" +"2019-09-24 01:05:34.643 UTC [msp.identity] Sign -> DEBU 3fdf Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.643 UTC [msp.identity] Sign -> DEBU 3fe0 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.643 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe1 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:44178" +"2019-09-24 01:05:34.644 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe2 Received pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nQpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q==\n-----END CERTIFICATE-----\n" tls_cert_hash:"|\261\267\036\240\333\2479\224{\243\255\370\321\373\331TmV\367\014\310\353\204\027\221\rj\327\352\320\004" from 172.18.0.6:44178" +"2019-09-24 01:05:34.642 UTC [grpc] DialContext -> DEBU 3fe3 scheme "" not registered, fallback to default scheme" +"2019-09-24 01:05:34.644 UTC [grpc] watcher -> DEBU 3fe4 ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }]" +"2019-09-24 01:05:34.644 UTC [grpc] switchBalancer -> DEBU 3fe5 ClientConn switching balancer to "pick_first"" +"2019-09-24 01:05:34.645 UTC [grpc] HandleSubConnStateChange -> DEBU 3fe6 pickfirstBalancer: HandleSubConnStateChange: 0xc003afeb30, CONNECTING" +"2019-09-24 01:05:34.646 UTC [msp.identity] Verify -> DEBU 3fe7 Verify: digest = 00000000 10 76 a9 21 69 fc 98 ef 4b d2 a2 de c7 2d d8 28 |.v.!i...K....-.(| +00000010 17 2e a3 c0 64 4f c5 a3 74 25 f0 82 90 b6 9e d4 |....dO..t%......|" +"2019-09-24 01:05:34.646 UTC [msp.identity] Verify -> DEBU 3fe8 Verify: sig = 00000000 30 45 02 21 00 9c 0f 4b 87 3d a3 42 92 e9 7c 00 |0E.!...K.=.B..|.| +00000010 24 93 26 19 08 a1 8e b0 9e 36 9f da 1e 13 ab 48 |$.&......6.....H| +00000020 d1 88 2e 93 b7 02 20 2d 3f d4 eb f2 40 45 59 4d |...... -?...@EYM| +00000030 c3 52 d5 d6 86 83 45 c1 87 55 d9 16 b1 23 89 27 |.R....E..U...#.'| +00000040 52 59 05 a6 76 a7 56 |RY..v.V|" +"2019-09-24 01:05:34.650 UTC [gossip.comm] authenticateRemotePeer -> DEBU 3fe9 Authenticated 172.18.0.6:44178" +"2019-09-24 01:05:34.650 UTC [gossip.comm] GossipStream -> DEBU 3fea Servicing 172.18.0.6:44178" +"2019-09-24 01:05:34.659 UTC [grpc] HandleSubConnStateChange -> DEBU 3feb pickfirstBalancer: HandleSubConnStateChange: 0xc003afeb30, READY" +"2019-09-24 01:05:34.659 UTC [gossip.gossip] handleMessage -> DEBU 3fec Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: nonce:5039172424698439220 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.661 UTC [gossip.gossip] handleMessage -> DEBU 3fed Exiting" +"2019-09-24 01:05:34.661 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3fee Got message: GossipMessage: nonce:5039172424698439220 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.661 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 3fef Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff0 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +"2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff1 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +00000040 3b c2 e4 93 49 47 |;...IG|" +"2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff2 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:34.662 UTC [msp.identity] Verify -> DEBU 3ff3 Verify: sig = 00000000 30 45 02 21 00 c1 c8 7d 84 08 9e 2b 82 79 de 62 |0E.!...}...+.y.b| +00000010 09 7d 64 f3 f6 5e 83 57 93 fb b3 23 e3 64 24 5c |.}d..^.W...#.d$\| +00000020 66 b6 2c ae bd 02 20 57 5e c0 38 9f 5a 4e 09 73 |f.,... W^.8.ZN.s| +00000030 25 60 66 d9 f8 21 cb 2e 91 6c ca 81 07 c3 d7 38 |%`f..!...l.....8| +00000040 c2 8b e4 a3 ea 5c e4 |.....\.|" +"2019-09-24 01:05:34.663 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ff4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff5 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff6 updating membership: timestamp: " +"2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff7 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.663 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff8 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:34.664 UTC [gossip.discovery] learnExistingMembers -> DEBU 3ff9 Exiting" +"2019-09-24 01:05:34.664 UTC [gossip.discovery] handleAliveMessage -> DEBU 3ffa Exiting" +"2019-09-24 01:05:34.664 UTC [gossip.discovery] handleMsgFromComm -> DEBU 3ffb Exiting" +"2019-09-24 01:05:34.664 UTC [gossip.discovery] sendMemResponse -> DEBU 3ffc Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:34.665 UTC [msp] DeserializeIdentity -> DEBU 3ffd Obtaining identity" +"2019-09-24 01:05:34.665 UTC [msp] DeserializeIdentity -> DEBU 3ffe Obtaining identity" +"2019-09-24 01:05:34.666 UTC [gossip.comm] Send -> DEBU 3fff Entering, sending GossipMessage: Channel: , nonce: 5039172424698439220, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.666 UTC [gossip.discovery] sendMemResponse -> DEBU 4000 Exiting, replying with alive: > alive: " +"2019-09-24 01:05:34.666 UTC [gossip.comm] sendToEndpoint -> DEBU 4001 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5039172424698439220, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 441 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.666 UTC [gossip.comm] sendToEndpoint -> DEBU 4002 Exiting" +"2019-09-24 01:05:34.668 UTC [msp] GetDefaultSigningIdentity -> DEBU 4003 Obtaining default signing identity" +"2019-09-24 01:05:34.668 UTC [msp.identity] Sign -> DEBU 4004 Sign: plaintext: 180172F9060A20D925A8D65F6B3C84EA...D19BCF56AE07A9CFB82E6086D721D211 " +"2019-09-24 01:05:34.668 UTC [msp.identity] Sign -> DEBU 4005 Sign: digest: BA017C360EF13AEAE9DE5FF71DC6F1FBB8CEFF1D8DA0166759341F2D84689259 " +"2019-09-24 01:05:34.668 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4006 Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.9:7051" +"2019-09-24 01:05:34.670 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4007 Received pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nFraI191Nrqz5lbcAbpkT+JStTPq76OxEo+Q8nw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\314\002{g\207\363\310\010\243\251\213\005\001\240\373\006\027\206\002\373\215hK\257\225\246\030>x2*n" from 172.18.0.9:7051" +"2019-09-24 01:05:34.671 UTC [msp] DeserializeIdentity -> DEBU 4008 Obtaining identity" +"2019-09-24 01:05:34.672 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4009 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.672 UTC [msp] DeserializeIdentity -> DEBU 400a Obtaining identity" +"2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400b Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.673 UTC [msp] DeserializeIdentity -> DEBU 400c Obtaining identity" +"2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 400d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.673 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 400f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.674 UTC [policies] Evaluate -> DEBU 4010 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.678 UTC [policies] Evaluate -> DEBU 4011 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.678 UTC [policies] Evaluate -> DEBU 4012 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.679 UTC [cauthdsl] func1 -> DEBU 4013 0xc003e336a0 gate 1569287134678908900 evaluation starts" +"2019-09-24 01:05:34.679 UTC [cauthdsl] func2 -> DEBU 4014 0xc003e336a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4015 0xc003e336a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4016 0xc003e336a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.680 UTC [cauthdsl] func2 -> DEBU 4017 0xc003e336a0 principal evaluation fails" +"2019-09-24 01:05:34.681 UTC [cauthdsl] func1 -> DEBU 4018 0xc003e336a0 gate 1569287134678908900 evaluation fails" +"2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 4019 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 401a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.681 UTC [policies] Evaluate -> DEBU 401b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.682 UTC [cauthdsl] func1 -> DEBU 401c 0xc003e33ee0 gate 1569287134682274100 evaluation starts" +"2019-09-24 01:05:34.682 UTC [cauthdsl] func2 -> DEBU 401d 0xc003e33ee0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.682 UTC [cauthdsl] func2 -> DEBU 401e 0xc003e33ee0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.683 UTC [cauthdsl] func2 -> DEBU 401f 0xc003e33ee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.683 UTC [cauthdsl] func2 -> DEBU 4020 0xc003e33ee0 principal evaluation fails" +"2019-09-24 01:05:34.684 UTC [cauthdsl] func1 -> DEBU 4021 0xc003e33ee0 gate 1569287134682274100 evaluation fails" +"2019-09-24 01:05:34.684 UTC [policies] Evaluate -> DEBU 4022 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.685 UTC [policies] Evaluate -> DEBU 4023 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.685 UTC [policies] Evaluate -> DEBU 4024 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.685 UTC [cauthdsl] func1 -> DEBU 4025 0xc003f40720 gate 1569287134685463000 evaluation starts" +"2019-09-24 01:05:34.685 UTC [cauthdsl] func2 -> DEBU 4026 0xc003f40720 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.686 UTC [cauthdsl] func2 -> DEBU 4027 0xc003f40720 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.686 UTC [cauthdsl] func2 -> DEBU 4028 0xc003f40720 principal matched by identity 0" +"2019-09-24 01:05:34.686 UTC [msp.identity] Verify -> DEBU 4029 Verify: digest = 00000000 7f fc c8 c4 a0 12 ac 38 d4 bb 3c 56 93 94 98 25 |.......8.. DEBU 402a Verify: sig = 00000000 30 44 02 20 2b cf 40 2a 67 f9 af 3b 4b 81 13 6e |0D. +.@*g..;K..n| +00000010 c4 b7 f5 4a 83 dc a5 e1 20 f7 7f a8 34 48 19 97 |...J.... ...4H..| +00000020 f2 a9 29 a5 02 20 01 4d db 28 41 27 25 1e 73 ce |..).. .M.(A'%.s.| +00000030 94 a7 81 7e 67 83 28 44 a2 2d 2f c3 07 91 42 af |...~g.(D.-/...B.| +00000040 bb ca a0 cf 07 50 |.....P|" +"2019-09-24 01:05:34.687 UTC [cauthdsl] func2 -> DEBU 402b 0xc003f40720 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.687 UTC [cauthdsl] func1 -> DEBU 402c 0xc003f40720 gate 1569287134685463000 evaluation succeeds" +"2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 402f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.688 UTC [policies] Evaluate -> DEBU 4030 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.689 UTC [gossip.comm] authenticateRemotePeer -> DEBU 4031 Authenticated 172.18.0.9:7051" +"2019-09-24 01:05:34.689 UTC [gossip.comm] createConnection -> DEBU 4032 Exiting" +"2019-09-24 01:05:34.689 UTC [gossip.comm] sendToEndpoint -> DEBU 4033 Exiting" +"2019-09-24 01:05:34.694 UTC [gossip.comm] func1 -> DEBU 4034 Got message: GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.694 UTC [gossip.gossip] handleMessage -> DEBU 4035 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.695 UTC [gossip.gossip] handleMessage -> DEBU 4036 Exiting" +"2019-09-24 01:05:34.695 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4037 Got message: GossipMessage: Channel: , nonce: 5460388262505425325, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 656 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.695 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4038 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.696 UTC [msp.identity] Verify -> DEBU 4039 Verify: digest = 00000000 0e 6d 9b 59 a7 26 44 75 c5 70 d0 87 3d 3f 53 0a |.m.Y.&Du.p..=?S.| +00000010 b5 2b 32 58 46 d5 61 95 e3 0a 01 6e b4 d8 0f f4 |.+2XF.a....n....|" +"2019-09-24 01:05:34.696 UTC [msp.identity] Verify -> DEBU 403a Verify: sig = 00000000 30 44 02 20 43 d4 a5 ec b1 da b7 1c a2 02 c5 31 |0D. C..........1| +00000010 5b 85 d9 ea 66 3a ec 7a 00 34 e6 fa 7c 0d f5 c5 |[...f:.z.4..|...| +00000020 89 2b 26 0d 02 20 2c 2e 54 8e 2e 1d e9 e4 5f 39 |.+&.. ,.T....._9| +00000030 fa 43 6e 7c fe 0a 4b b2 af 35 d6 db 2a 10 c6 af |.Cn|..K..5..*...| +00000040 34 a9 30 77 76 6b |4.0wvk|" +"2019-09-24 01:05:34.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 403b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.696 UTC [gossip.discovery] isSentByMe -> DEBU 403c Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.696 UTC [gossip.discovery] handleAliveMessage -> DEBU 403d Exiting" +"2019-09-24 01:05:34.697 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 403e Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:34.697 UTC [msp] DeserializeIdentity -> DEBU 403f Obtaining identity" +"2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4040 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4041 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.697 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4042 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4043 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4044 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.698 UTC [policies] Evaluate -> DEBU 4045 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.698 UTC [cauthdsl] func1 -> DEBU 4046 0xc00412f150 gate 1569287134698754900 evaluation starts" +"2019-09-24 01:05:34.698 UTC [cauthdsl] func2 -> DEBU 4047 0xc00412f150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.699 UTC [cauthdsl] func2 -> DEBU 4048 0xc00412f150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.699 UTC [cauthdsl] func2 -> DEBU 4049 0xc00412f150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.700 UTC [cauthdsl] func2 -> DEBU 404a 0xc00412f150 principal evaluation fails" +"2019-09-24 01:05:34.700 UTC [cauthdsl] func1 -> DEBU 404b 0xc00412f150 gate 1569287134698754900 evaluation fails" +"2019-09-24 01:05:34.700 UTC [policies] Evaluate -> DEBU 404c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.701 UTC [policies] Evaluate -> DEBU 404d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.701 UTC [policies] Evaluate -> DEBU 404e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.701 UTC [cauthdsl] func1 -> DEBU 404f 0xc00412f990 gate 1569287134701178900 evaluation starts" +"2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4050 0xc00412f990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4051 0xc00412f990 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.701 UTC [cauthdsl] func2 -> DEBU 4052 0xc00412f990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.702 UTC [cauthdsl] func2 -> DEBU 4053 0xc00412f990 principal evaluation fails" +"2019-09-24 01:05:34.702 UTC [cauthdsl] func1 -> DEBU 4054 0xc00412f990 gate 1569287134701178900 evaluation fails" +"2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4055 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4056 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.702 UTC [policies] Evaluate -> DEBU 4057 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.703 UTC [cauthdsl] func1 -> DEBU 4058 0xc0030861d0 gate 1569287134703305300 evaluation starts" +"2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 4059 0xc0030861d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 405a 0xc0030861d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.703 UTC [cauthdsl] func2 -> DEBU 405b 0xc0030861d0 principal matched by identity 0" +"2019-09-24 01:05:34.704 UTC [msp.identity] Verify -> DEBU 405c Verify: digest = 00000000 23 59 88 31 b1 9a f0 09 8e 1e aa ff dc 72 61 bb |#Y.1.........ra.| +00000010 d6 23 b9 1c 82 58 fd 38 b8 6e 22 41 ed 6b fb a1 |.#...X.8.n"A.k..|" +"2019-09-24 01:05:34.704 UTC [msp.identity] Verify -> DEBU 405d Verify: sig = 00000000 30 45 02 21 00 f5 19 5d 0d b3 ef 5e e8 7e 36 db |0E.!...]...^.~6.| +00000010 ef 3b 6b 1f 8b a7 be a8 5d 52 68 45 39 7a 2c a1 |.;k.....]RhE9z,.| +00000020 f2 f7 81 c3 b8 02 20 0a 1a a6 fe 97 24 1d c0 f2 |...... .....$...| +00000030 0d 12 8f 2d 6e 70 a3 27 60 19 99 88 83 c4 44 9e |...-np.'`.....D.| +00000040 b1 19 b4 c8 01 da 14 |.......|" +"2019-09-24 01:05:34.704 UTC [cauthdsl] func2 -> DEBU 405e 0xc0030861d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.704 UTC [cauthdsl] func1 -> DEBU 405f 0xc0030861d0 gate 1569287134703305300 evaluation succeeds" +"2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4060 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4061 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.705 UTC [policies] Evaluate -> DEBU 4062 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.706 UTC [policies] Evaluate -> DEBU 4063 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4064 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:34.706 UTC [gossip.discovery] handleAliveMessage -> DEBU 4065 Exiting" +"2019-09-24 01:05:34.706 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4066 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:34.707 UTC [msp.identity] Verify -> DEBU 4067 Verify: digest = 00000000 e1 10 87 0d 6d e5 0a cd cf 2b 08 98 eb dc 8f 62 |....m....+.....b| +00000010 c6 f6 58 8b 86 ef f7 e0 10 68 7f 86 cc 21 15 24 |..X......h...!.$|" +"2019-09-24 01:05:34.707 UTC [msp.identity] Verify -> DEBU 4068 Verify: sig = 00000000 30 44 02 20 49 1f 7a fb 91 b8 ee 32 8c 25 20 71 |0D. I.z....2.% q| +00000010 e3 9c e1 8d e1 1d 88 df b2 e1 21 42 50 9c f7 6c |..........!BP..l| +00000020 7e fc 28 a8 02 20 3a f5 31 14 e4 5e 5b c7 66 e2 |~.(.. :.1..^[.f.| +00000030 05 b1 fa ff 00 dd 68 d2 bb 56 4c bf 01 fa 42 b4 |......h..VL...B.| +00000040 9f 93 3d 66 91 33 |..=f.3|" +"2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 4069 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 406a endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" lastAliveTS: 1569287058522105000, 55 but got ts: inc_num:1569287058522105000 seq_num:53 " +"2019-09-24 01:05:34.707 UTC [gossip.discovery] handleAliveMessage -> DEBU 406b Exiting" +"2019-09-24 01:05:34.707 UTC [gossip.discovery] handleMsgFromComm -> DEBU 406c Exiting" +"2019-09-24 01:05:34.788 UTC [gossip.comm] func1 -> DEBU 406d Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.789 UTC [gossip.gossip] handleMessage -> DEBU 406e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.790 UTC [gossip.pull] HandleMessage -> DEBU 406f GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.790 UTC [msp] DeserializeIdentity -> DEBU 4070 Obtaining identity" +"2019-09-24 01:05:34.791 UTC [msp] DeserializeIdentity -> DEBU 4071 Obtaining identity" +"2019-09-24 01:05:34.792 UTC [msp] DeserializeIdentity -> DEBU 4072 Obtaining identity" +"2019-09-24 01:05:34.792 UTC [msp] DeserializeIdentity -> DEBU 4073 Obtaining identity" +"2019-09-24 01:05:34.793 UTC [msp] DeserializeIdentity -> DEBU 4074 Obtaining identity" +"2019-09-24 01:05:34.793 UTC [msp] DeserializeIdentity -> DEBU 4075 Obtaining identity" +"2019-09-24 01:05:34.793 UTC [gossip.pull] SendDigest -> DEBU 4076 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:34.793 UTC [gossip.gossip] handleMessage -> DEBU 4077 Exiting" +"2019-09-24 01:05:34.805 UTC [gossip.comm] func1 -> DEBU 4078 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.805 UTC [gossip.gossip] handleMessage -> DEBU 4079 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.805 UTC [gossip.gossip] handleMessage -> DEBU 407a Exiting" +"2019-09-24 01:05:34.806 UTC [gossip.discovery] handleMsgFromComm -> DEBU 407b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.806 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 407c Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:34.806 UTC [msp] DeserializeIdentity -> DEBU 407d Obtaining identity" +"2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 407e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 407f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.807 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4080 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.807 UTC [policies] Evaluate -> DEBU 4081 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.808 UTC [policies] Evaluate -> DEBU 4082 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.808 UTC [policies] Evaluate -> DEBU 4083 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.808 UTC [cauthdsl] func1 -> DEBU 4084 0xc0031295d0 gate 1569287134808618600 evaluation starts" +"2019-09-24 01:05:34.809 UTC [cauthdsl] func2 -> DEBU 4085 0xc0031295d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4086 0xc0031295d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4087 0xc0031295d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.810 UTC [cauthdsl] func2 -> DEBU 4088 0xc0031295d0 principal evaluation fails" +"2019-09-24 01:05:34.810 UTC [cauthdsl] func1 -> DEBU 4089 0xc0031295d0 gate 1569287134808618600 evaluation fails" +"2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.811 UTC [policies] Evaluate -> DEBU 408c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.811 UTC [cauthdsl] func1 -> DEBU 408d 0xc003129e10 gate 1569287134811860000 evaluation starts" +"2019-09-24 01:05:34.812 UTC [cauthdsl] func2 -> DEBU 408e 0xc003129e10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.812 UTC [cauthdsl] func2 -> DEBU 408f 0xc003129e10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.813 UTC [cauthdsl] func2 -> DEBU 4090 0xc003129e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.813 UTC [cauthdsl] func2 -> DEBU 4091 0xc003129e10 principal evaluation fails" +"2019-09-24 01:05:34.813 UTC [cauthdsl] func1 -> DEBU 4092 0xc003129e10 gate 1569287134811860000 evaluation fails" +"2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4093 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4094 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.814 UTC [policies] Evaluate -> DEBU 4095 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.815 UTC [cauthdsl] func1 -> DEBU 4096 0xc003ba3d20 gate 1569287134815063300 evaluation starts" +"2019-09-24 01:05:34.815 UTC [cauthdsl] func2 -> DEBU 4097 0xc003ba3d20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.815 UTC [cauthdsl] func2 -> DEBU 4098 0xc003ba3d20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.816 UTC [cauthdsl] func2 -> DEBU 4099 0xc003ba3d20 principal matched by identity 0" +"2019-09-24 01:05:34.816 UTC [msp.identity] Verify -> DEBU 409a Verify: digest = 00000000 96 a5 34 6c aa cc 71 70 31 d3 5a 1d 95 4e 89 b7 |..4l..qp1.Z..N..| +00000010 f9 52 af 80 ae 9b 70 50 12 7c db d6 71 11 96 ea |.R....pP.|..q...|" +"2019-09-24 01:05:34.817 UTC [msp.identity] Verify -> DEBU 409b Verify: sig = 00000000 30 44 02 20 1f 40 05 e3 e2 e8 58 a8 4f 89 ad 1b |0D. .@....X.O...| +00000010 91 42 f2 61 39 f7 e2 26 8d f4 0b c9 c7 4f d1 33 |.B.a9..&.....O.3| +00000020 6c 79 03 96 02 20 26 a4 c6 c3 fd 38 ce 72 95 cb |ly... &....8.r..| +00000030 45 31 ba 19 5a 42 19 cd cb 89 ee 9b d6 78 e7 6c |E1..ZB.......x.l| +00000040 cd 76 91 81 14 c3 |.v....|" +"2019-09-24 01:05:34.817 UTC [cauthdsl] func2 -> DEBU 409c 0xc003ba3d20 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.818 UTC [cauthdsl] func1 -> DEBU 409d 0xc003ba3d20 gate 1569287134815063300 evaluation succeeds" +"2019-09-24 01:05:34.818 UTC [policies] Evaluate -> DEBU 409e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.818 UTC [policies] Evaluate -> DEBU 409f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.819 UTC [policies] Evaluate -> DEBU 40a0 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.820 UTC [policies] Evaluate -> DEBU 40a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.821 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.821 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:34.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a4 updating membership: timestamp: " +"2019-09-24 01:05:34.822 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:34.823 UTC [gossip.discovery] learnExistingMembers -> DEBU 40a7 Exiting" +"2019-09-24 01:05:34.824 UTC [gossip.discovery] handleAliveMessage -> DEBU 40a8 Exiting" +"2019-09-24 01:05:34.824 UTC [gossip.discovery] sendMemResponse -> DEBU 40a9 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:34.825 UTC [msp] DeserializeIdentity -> DEBU 40aa Obtaining identity" +"2019-09-24 01:05:34.826 UTC [msp] DeserializeIdentity -> DEBU 40ab Obtaining identity" +"2019-09-24 01:05:34.828 UTC [msp] DeserializeIdentity -> DEBU 40ac Obtaining identity" +"2019-09-24 01:05:34.829 UTC [gossip.comm] Send -> DEBU 40ad Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.830 UTC [gossip.discovery] sendMemResponse -> DEBU 40ae Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:34.830 UTC [gossip.comm] sendToEndpoint -> DEBU 40af Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.831 UTC [gossip.comm] sendToEndpoint -> DEBU 40b0 Exiting" +"2019-09-24 01:05:34.831 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40b1 Exiting" +"2019-09-24 01:05:34.848 UTC [gossip.comm] func1 -> DEBU 40b2 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.848 UTC [gossip.gossip] handleMessage -> DEBU 40b3 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.848 UTC [gossip.pull] HandleMessage -> DEBU 40b4 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.848 UTC [msp] DeserializeIdentity -> DEBU 40b5 Obtaining identity" +"2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b6 Obtaining identity" +"2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b7 Obtaining identity" +"2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b8 Obtaining identity" +"2019-09-24 01:05:34.849 UTC [msp] DeserializeIdentity -> DEBU 40b9 Obtaining identity" +"2019-09-24 01:05:34.850 UTC [msp] DeserializeIdentity -> DEBU 40ba Obtaining identity" +"2019-09-24 01:05:34.850 UTC [gossip.pull] SendDigest -> DEBU 40bb Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:34.850 UTC [gossip.gossip] handleMessage -> DEBU 40bc Exiting" +"2019-09-24 01:05:34.860 UTC [gossip.pull] Hello -> DEBU 40bd Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:34.861 UTC [gossip.comm] Send -> DEBU 40be Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.861 UTC [gossip.pull] Hello -> DEBU 40bf Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:34.862 UTC [gossip.comm] Send -> DEBU 40c0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.862 UTC [gossip.pull] Hello -> DEBU 40c1 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:34.863 UTC [gossip.comm] Send -> DEBU 40c2 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.864 UTC [gossip.comm] sendToEndpoint -> DEBU 40c3 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.864 UTC [gossip.comm] sendToEndpoint -> DEBU 40c4 Exiting" +"2019-09-24 01:05:34.865 UTC [gossip.comm] sendToEndpoint -> DEBU 40c5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.865 UTC [gossip.comm] sendToEndpoint -> DEBU 40c6 Exiting" +"2019-09-24 01:05:34.870 UTC [gossip.comm] func1 -> DEBU 40c7 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.870 UTC [gossip.comm] sendToEndpoint -> DEBU 40c8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.870 UTC [gossip.gossip] handleMessage -> DEBU 40c9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.871 UTC [gossip.comm] sendToEndpoint -> DEBU 40ca Exiting" +"2019-09-24 01:05:34.871 UTC [gossip.gossip] handleMessage -> DEBU 40cb Exiting" +"2019-09-24 01:05:34.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 40cc Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.872 UTC [gossip.comm] func1 -> DEBU 40cd Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40cf Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.873 UTC [gossip.pull] HandleMessage -> DEBU 40d0 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40d1 Exiting" +"2019-09-24 01:05:34.872 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 40ce Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:34.873 UTC [msp] DeserializeIdentity -> DEBU 40d2 Obtaining identity" +"2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 40d3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40d4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.873 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 40d5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.874 UTC [policies] Evaluate -> DEBU 40d8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.874 UTC [cauthdsl] func1 -> DEBU 40d9 0xc003cfb010 gate 1569287134874413500 evaluation starts" +"2019-09-24 01:05:34.873 UTC [gossip.gossip] handleMessage -> DEBU 40da Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.875 UTC [gossip.pull] HandleMessage -> DEBU 40dc GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.875 UTC [gossip.comm] func1 -> DEBU 40dd Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.875 UTC [gossip.gossip] handleMessage -> DEBU 40de Exiting" +"2019-09-24 01:05:34.876 UTC [gossip.gossip] handleMessage -> DEBU 40df Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.874 UTC [cauthdsl] func2 -> DEBU 40db 0xc003cfb010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.877 UTC [gossip.pull] HandleMessage -> DEBU 40e0 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.877 UTC [gossip.gossip] handleMessage -> DEBU 40e2 Exiting" +"2019-09-24 01:05:34.877 UTC [cauthdsl] func2 -> DEBU 40e1 0xc003cfb010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.878 UTC [cauthdsl] func2 -> DEBU 40e3 0xc003cfb010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.878 UTC [cauthdsl] func2 -> DEBU 40e4 0xc003cfb010 principal evaluation fails" +"2019-09-24 01:05:34.878 UTC [cauthdsl] func1 -> DEBU 40e5 0xc003cfb010 gate 1569287134874413500 evaluation fails" +"2019-09-24 01:05:34.878 UTC [policies] Evaluate -> DEBU 40e6 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.878 UTC [policies] Evaluate -> DEBU 40e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.879 UTC [policies] Evaluate -> DEBU 40e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.879 UTC [cauthdsl] func1 -> DEBU 40e9 0xc00359c1b0 gate 1569287134879612100 evaluation starts" +"2019-09-24 01:05:34.879 UTC [cauthdsl] func2 -> DEBU 40ea 0xc00359c1b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40eb 0xc00359c1b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40ec 0xc00359c1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.880 UTC [cauthdsl] func2 -> DEBU 40ed 0xc00359c1b0 principal evaluation fails" +"2019-09-24 01:05:34.880 UTC [cauthdsl] func1 -> DEBU 40ee 0xc00359c1b0 gate 1569287134879612100 evaluation fails" +"2019-09-24 01:05:34.881 UTC [policies] Evaluate -> DEBU 40ef Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.881 UTC [policies] Evaluate -> DEBU 40f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.882 UTC [policies] Evaluate -> DEBU 40f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.882 UTC [cauthdsl] func1 -> DEBU 40f2 0xc00359c9f0 gate 1569287134882296900 evaluation starts" +"2019-09-24 01:05:34.882 UTC [cauthdsl] func2 -> DEBU 40f3 0xc00359c9f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.882 UTC [cauthdsl] func2 -> DEBU 40f4 0xc00359c9f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.883 UTC [cauthdsl] func2 -> DEBU 40f5 0xc00359c9f0 principal matched by identity 0" +"2019-09-24 01:05:34.883 UTC [msp.identity] Verify -> DEBU 40f6 Verify: digest = 00000000 bb 82 94 62 28 99 6b 88 70 81 47 91 98 49 db cd |...b(.k.p.G..I..| +00000010 75 6d b5 5c 75 33 27 87 8e 6c 1b de 6c 08 f9 71 |um.\u3'..l..l..q|" +"2019-09-24 01:05:34.883 UTC [msp.identity] Verify -> DEBU 40f7 Verify: sig = 00000000 30 44 02 20 45 2e 8b 4b d3 dc 19 66 f2 2e 9a be |0D. E..K...f....| +00000010 b1 af b6 23 e2 67 80 71 a5 2c 72 dd 9f 86 8d 78 |...#.g.q.,r....x| +00000020 68 c5 f5 72 02 20 30 0d 50 6a cf bc 11 5a af 20 |h..r. 0.Pj...Z. | +00000030 52 b5 8f 5c e6 f3 11 39 78 73 44 34 b2 14 4f 3a |R..\...9xsD4..O:| +00000040 d8 75 65 ef fe fb |.ue...|" +"2019-09-24 01:05:34.884 UTC [cauthdsl] func2 -> DEBU 40f8 0xc00359c9f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.884 UTC [cauthdsl] func1 -> DEBU 40f9 0xc00359c9f0 gate 1569287134882296900 evaluation succeeds" +"2019-09-24 01:05:34.884 UTC [policies] Evaluate -> DEBU 40fa Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.884 UTC [policies] Evaluate -> DEBU 40fb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.885 UTC [policies] Evaluate -> DEBU 40fc Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.885 UTC [policies] Evaluate -> DEBU 40fd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.885 UTC [gossip.discovery] handleAliveMessage -> DEBU 40fe Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 40ff Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:34.885 UTC [gossip.discovery] learnExistingMembers -> DEBU 4100 updating membership: timestamp: " +"2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4101 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4102 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:34.886 UTC [gossip.discovery] learnExistingMembers -> DEBU 4103 Exiting" +"2019-09-24 01:05:34.886 UTC [gossip.discovery] handleAliveMessage -> DEBU 4104 Exiting" +"2019-09-24 01:05:34.887 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4105 Exiting" +"2019-09-24 01:05:34.887 UTC [gossip.discovery] sendMemResponse -> DEBU 4106 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:34.887 UTC [msp] DeserializeIdentity -> DEBU 4107 Obtaining identity" +"2019-09-24 01:05:34.888 UTC [msp] DeserializeIdentity -> DEBU 4108 Obtaining identity" +"2019-09-24 01:05:34.888 UTC [msp] DeserializeIdentity -> DEBU 4109 Obtaining identity" +"2019-09-24 01:05:34.888 UTC [gossip.comm] Send -> DEBU 410a Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.888 UTC [gossip.discovery] sendMemResponse -> DEBU 410b Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU 410c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.889 UTC [gossip.comm] sendToEndpoint -> DEBU 410d Exiting" +"2019-09-24 01:05:34.891 UTC [msp] GetDefaultSigningIdentity -> DEBU 410e Obtaining default signing identity" +"2019-09-24 01:05:34.891 UTC [msp.identity] Sign -> DEBU 410f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151031 " +"2019-09-24 01:05:34.892 UTC [msp.identity] Sign -> DEBU 4110 Sign: digest: 3E18310DCF123BA3EA00C62F129C57F66C9F2692380DC79BE0CE010D87881164 " +"2019-09-24 01:05:34.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 4111 Obtaining default signing identity" +"2019-09-24 01:05:34.893 UTC [msp.identity] Sign -> DEBU 4112 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:34.893 UTC [msp.identity] Sign -> DEBU 4113 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:34.893 UTC [gossip.comm] Send -> DEBU 4114 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.894 UTC [msp] DeserializeIdentity -> DEBU 4115 Obtaining identity" +"2019-09-24 01:05:34.894 UTC [gossip.comm] Send -> DEBU 4116 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.894 UTC [msp] DeserializeIdentity -> DEBU 4118 Obtaining identity" +"2019-09-24 01:05:34.894 UTC [gossip.comm] Send -> DEBU 4119 Entering, sending GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 411a Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.895 UTC [gossip.comm] sendToEndpoint -> DEBU 411c Exiting" +"2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 411b Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.895 UTC [gossip.comm] sendToEndpoint -> DEBU 411d Exiting" +"2019-09-24 01:05:34.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4117 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\222\321w\201Y\353\323\350g\353\224\255R\217vb\364\231\265\021\334\r\355\202\320\002 T\303Y\203y6\215\235\257@A\333\347\376f+R\343\353\261\325\373\027\244\303v\2240\t.\340d" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.897 UTC [gossip.comm] sendToEndpoint -> DEBU 4120 Exiting" +"2019-09-24 01:05:34.896 UTC [gossip.comm] func1 -> DEBU 411e Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.896 UTC [gossip.comm] func1 -> DEBU 411f Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.899 UTC [gossip.gossip] handleMessage -> DEBU 4121 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.900 UTC [gossip.gossip] handleMessage -> DEBU 4122 Exiting" +"2019-09-24 01:05:34.900 UTC [gossip.gossip] handleMessage -> DEBU 4123 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.901 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4124 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.901 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4125 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.902 UTC [msp.identity] Verify -> DEBU 4126 Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +"2019-09-24 01:05:34.902 UTC [msp.identity] Verify -> DEBU 4127 Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +00000040 94 30 09 2e e0 64 |.0...d|" +"2019-09-24 01:05:34.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4128 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.903 UTC [gossip.discovery] isSentByMe -> DEBU 4129 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 412a Exiting" +"2019-09-24 01:05:34.903 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 412b Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:34.903 UTC [msp] DeserializeIdentity -> DEBU 412c Obtaining identity" +"2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 412d Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 412f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4130 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4131 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.905 UTC [policies] Evaluate -> DEBU 4132 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.905 UTC [cauthdsl] func1 -> DEBU 4133 0xc0037a3740 gate 1569287134905634000 evaluation starts" +"2019-09-24 01:05:34.905 UTC [cauthdsl] func2 -> DEBU 4134 0xc0037a3740 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.905 UTC [cauthdsl] func2 -> DEBU 4135 0xc0037a3740 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.906 UTC [cauthdsl] func2 -> DEBU 4136 0xc0037a3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.906 UTC [cauthdsl] func2 -> DEBU 4137 0xc0037a3740 principal evaluation fails" +"2019-09-24 01:05:34.906 UTC [cauthdsl] func1 -> DEBU 4138 0xc0037a3740 gate 1569287134905634000 evaluation fails" +"2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 4139 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 413a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.906 UTC [policies] Evaluate -> DEBU 413b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.907 UTC [cauthdsl] func1 -> DEBU 413c 0xc0037a3f80 gate 1569287134906895500 evaluation starts" +"2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413d 0xc0037a3f80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413e 0xc0037a3f80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 413f 0xc0037a3f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.907 UTC [cauthdsl] func2 -> DEBU 4140 0xc0037a3f80 principal evaluation fails" +"2019-09-24 01:05:34.908 UTC [cauthdsl] func1 -> DEBU 4141 0xc0037a3f80 gate 1569287134906895500 evaluation fails" +"2019-09-24 01:05:34.908 UTC [policies] Evaluate -> DEBU 4142 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.909 UTC [policies] Evaluate -> DEBU 4143 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.911 UTC [policies] Evaluate -> DEBU 4144 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.911 UTC [cauthdsl] func1 -> DEBU 4145 0xc00380a7c0 gate 1569287134911550300 evaluation starts" +"2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4146 0xc00380a7c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4147 0xc00380a7c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.912 UTC [cauthdsl] func2 -> DEBU 4148 0xc00380a7c0 principal matched by identity 0" +"2019-09-24 01:05:34.912 UTC [msp.identity] Verify -> DEBU 4149 Verify: digest = 00000000 96 a5 34 6c aa cc 71 70 31 d3 5a 1d 95 4e 89 b7 |..4l..qp1.Z..N..| +00000010 f9 52 af 80 ae 9b 70 50 12 7c db d6 71 11 96 ea |.R....pP.|..q...|" +"2019-09-24 01:05:34.913 UTC [msp.identity] Verify -> DEBU 414a Verify: sig = 00000000 30 44 02 20 1f 40 05 e3 e2 e8 58 a8 4f 89 ad 1b |0D. .@....X.O...| +00000010 91 42 f2 61 39 f7 e2 26 8d f4 0b c9 c7 4f d1 33 |.B.a9..&.....O.3| +00000020 6c 79 03 96 02 20 26 a4 c6 c3 fd 38 ce 72 95 cb |ly... &....8.r..| +00000030 45 31 ba 19 5a 42 19 cd cb 89 ee 9b d6 78 e7 6c |E1..ZB.......x.l| +00000040 cd 76 91 81 14 c3 |.v....|" +"2019-09-24 01:05:34.913 UTC [cauthdsl] func2 -> DEBU 414b 0xc00380a7c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.913 UTC [cauthdsl] func1 -> DEBU 414c 0xc00380a7c0 gate 1569287134911550300 evaluation succeeds" +"2019-09-24 01:05:34.913 UTC [policies] Evaluate -> DEBU 414d Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.913 UTC [policies] Evaluate -> DEBU 414e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.914 UTC [policies] Evaluate -> DEBU 414f Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.914 UTC [policies] Evaluate -> DEBU 4150 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 4151 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.914 UTC [gossip.discovery] handleAliveMessage -> DEBU 4152 Exiting" +"2019-09-24 01:05:34.915 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4153 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:34.915 UTC [msp.identity] Verify -> DEBU 4154 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +"2019-09-24 01:05:34.915 UTC [msp.identity] Verify -> DEBU 4155 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +00000040 3b c2 e4 93 49 47 |;...IG|" +"2019-09-24 01:05:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4156 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4157 Exiting" +"2019-09-24 01:05:34.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4158 Exiting" +"2019-09-24 01:05:34.916 UTC [gossip.gossip] handleMessage -> DEBU 4159 Exiting" +"2019-09-24 01:05:34.916 UTC [gossip.gossip] handleMessage -> DEBU 415a Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.917 UTC [gossip.discovery] handleMsgFromComm -> DEBU 415b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 415c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.918 UTC [msp.identity] Verify -> DEBU 415d Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +"2019-09-24 01:05:34.918 UTC [msp.identity] Verify -> DEBU 415e Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +00000040 94 30 09 2e e0 64 |.0...d|" +"2019-09-24 01:05:34.919 UTC [msp.identity] Verify -> DEBU 415f Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:34.919 UTC [msp.identity] Verify -> DEBU 4160 Verify: sig = 00000000 30 45 02 21 00 e6 6e 33 66 7b 99 14 63 71 59 ff |0E.!..n3f{..cqY.| +00000010 d6 c7 9f 46 33 b4 8a dc d6 1f 3f 17 3d 3c 1b a4 |...F3.....?.=<..| +00000020 48 e9 22 38 4d 02 20 76 c3 22 43 38 96 87 e6 d5 |H."8M. v."C8....| +00000030 5f ad f5 60 2c de 08 cd b9 d7 e0 84 a0 0d f3 ce |_..`,...........| +00000040 d7 1f e4 be c4 80 eb |.......|" +"2019-09-24 01:05:34.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4161 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:34.919 UTC [gossip.discovery] isSentByMe -> DEBU 4162 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:34.920 UTC [gossip.discovery] handleAliveMessage -> DEBU 4163 Exiting" +"2019-09-24 01:05:34.920 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4164 Exiting" +"2019-09-24 01:05:34.920 UTC [gossip.gossip] handleMessage -> DEBU 4165 Exiting" +"2019-09-24 01:05:34.921 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4166 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:34.921 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4167 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:34.921 UTC [msp.identity] Verify -> DEBU 4168 Verify: digest = 00000000 3e 18 31 0d cf 12 3b a3 ea 00 c6 2f 12 9c 57 f6 |>.1...;..../..W.| +00000010 6c 9f 26 92 38 0d c7 9b e0 ce 01 0d 87 88 11 64 |l.&.8..........d|" +"2019-09-24 01:05:34.921 UTC [msp.identity] Verify -> DEBU 4169 Verify: sig = 00000000 30 44 02 20 2d a3 00 ff 7a f0 3e 92 d1 77 81 59 |0D. -...z.>..w.Y| +00000010 eb d3 e8 67 eb 94 ad 52 8f 76 62 f4 99 b5 11 dc |...g...R.vb.....| +00000020 0d ed 82 d0 02 20 54 c3 59 83 79 36 8d 9d af 40 |..... T.Y.y6...@| +00000030 41 db e7 fe 66 2b 52 e3 eb b1 d5 fb 17 a4 c3 76 |A...f+R........v| +00000040 94 30 09 2e e0 64 |.0...d|" +"2019-09-24 01:05:34.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 416a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.922 UTC [gossip.discovery] isSentByMe -> DEBU 416b Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 416c Exiting" +"2019-09-24 01:05:34.922 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 416d Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:34.922 UTC [msp] DeserializeIdentity -> DEBU 416e Obtaining identity" +"2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 416f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4170 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.923 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4171 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4172 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4173 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:34.923 UTC [policies] Evaluate -> DEBU 4174 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:34.923 UTC [cauthdsl] func1 -> DEBU 4175 0xc003b94cd0 gate 1569287134923849100 evaluation starts" +"2019-09-24 01:05:34.923 UTC [cauthdsl] func2 -> DEBU 4176 0xc003b94cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4177 0xc003b94cd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4178 0xc003b94cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:34.924 UTC [cauthdsl] func2 -> DEBU 4179 0xc003b94cd0 principal evaluation fails" +"2019-09-24 01:05:34.926 UTC [cauthdsl] func1 -> DEBU 417a 0xc003b94cd0 gate 1569287134923849100 evaluation fails" +"2019-09-24 01:05:34.926 UTC [policies] Evaluate -> DEBU 417b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.927 UTC [policies] Evaluate -> DEBU 417c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:34.927 UTC [policies] Evaluate -> DEBU 417d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:34.928 UTC [cauthdsl] func1 -> DEBU 417e 0xc003b95510 gate 1569287134928027200 evaluation starts" +"2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 417f 0xc003b95510 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4180 0xc003b95510 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4181 0xc003b95510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:34.928 UTC [cauthdsl] func2 -> DEBU 4182 0xc003b95510 principal evaluation fails" +"2019-09-24 01:05:34.929 UTC [cauthdsl] func1 -> DEBU 4183 0xc003b95510 gate 1569287134928027200 evaluation fails" +"2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4184 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4185 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:34.929 UTC [policies] Evaluate -> DEBU 4186 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:34.929 UTC [cauthdsl] func1 -> DEBU 4187 0xc003b95d50 gate 1569287134929959800 evaluation starts" +"2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 4188 0xc003b95d50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 4189 0xc003b95d50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:34.930 UTC [cauthdsl] func2 -> DEBU 418a 0xc003b95d50 principal matched by identity 0" +"2019-09-24 01:05:34.930 UTC [msp.identity] Verify -> DEBU 418b Verify: digest = 00000000 bb 82 94 62 28 99 6b 88 70 81 47 91 98 49 db cd |...b(.k.p.G..I..| +00000010 75 6d b5 5c 75 33 27 87 8e 6c 1b de 6c 08 f9 71 |um.\u3'..l..l..q|" +"2019-09-24 01:05:34.930 UTC [msp.identity] Verify -> DEBU 418c Verify: sig = 00000000 30 44 02 20 45 2e 8b 4b d3 dc 19 66 f2 2e 9a be |0D. E..K...f....| +00000010 b1 af b6 23 e2 67 80 71 a5 2c 72 dd 9f 86 8d 78 |...#.g.q.,r....x| +00000020 68 c5 f5 72 02 20 30 0d 50 6a cf bc 11 5a af 20 |h..r. 0.Pj...Z. | +00000030 52 b5 8f 5c e6 f3 11 39 78 73 44 34 b2 14 4f 3a |R..\...9xsD4..O:| +00000040 d8 75 65 ef fe fb |.ue...|" +"2019-09-24 01:05:34.931 UTC [cauthdsl] func2 -> DEBU 418d 0xc003b95d50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:34.931 UTC [cauthdsl] func1 -> DEBU 418e 0xc003b95d50 gate 1569287134929959800 evaluation succeeds" +"2019-09-24 01:05:34.931 UTC [policies] Evaluate -> DEBU 418f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.931 UTC [policies] Evaluate -> DEBU 4190 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:34.932 UTC [policies] Evaluate -> DEBU 4191 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:34.932 UTC [policies] Evaluate -> DEBU 4192 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 4193 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.932 UTC [gossip.discovery] handleAliveMessage -> DEBU 4194 Exiting" +"2019-09-24 01:05:34.933 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4195 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:34.934 UTC [msp.identity] Verify -> DEBU 4196 Verify: digest = 00000000 e4 12 67 0f ce e8 70 a1 9f d2 f1 2a 15 c5 13 fc |..g...p....*....| +00000010 4e c4 54 e0 de df 12 6c 42 dc 29 92 a2 4f 2a 8b |N.T....lB.)..O*.|" +"2019-09-24 01:05:34.934 UTC [msp.identity] Verify -> DEBU 4197 Verify: sig = 00000000 30 44 02 20 78 27 38 ad 89 10 a0 fd 2c 74 8c 48 |0D. x'8.....,t.H| +00000010 f1 83 f4 8b b7 80 b6 e0 5c b0 5b d3 2f bd 16 39 |........\.[./..9| +00000020 1c 84 32 36 02 20 5e 0c 81 03 78 63 7a 4b 8d eb |..26. ^...xczK..| +00000030 09 5a 8d 45 7a f6 41 0a 85 ef c7 ca af d3 f2 46 |.Z.Ez.A........F| +00000040 3b c2 e4 93 49 47 |;...IG|" +"2019-09-24 01:05:34.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 4198 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:34.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 4199 Exiting" +"2019-09-24 01:05:34.934 UTC [gossip.discovery] handleMsgFromComm -> DEBU 419a Exiting" +"2019-09-24 01:05:36.724 UTC [gossip.election] waitForInterrupt -> DEBU 419b d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:36.726 UTC [gossip.election] IsLeader -> DEBU 419c d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:36.726 UTC [msp] GetDefaultSigningIdentity -> DEBU 419d Obtaining default signing identity" +"2019-09-24 01:05:36.727 UTC [msp.identity] Sign -> DEBU 419e Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE315100F1801 " +"2019-09-24 01:05:36.727 UTC [msp.identity] Sign -> DEBU 419f Sign: digest: 25E6710B6A606F669F8E569B4F527E9039BEB0E41278D76D09C1FDC807AE2883 " +"2019-09-24 01:05:36.727 UTC [gossip.election] waitForInterrupt -> DEBU 41a0 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:36.730 UTC [msp] DeserializeIdentity -> DEBU 41a1 Obtaining identity" +"2019-09-24 01:05:36.731 UTC [msp] DeserializeIdentity -> DEBU 41a2 Obtaining identity" +"2019-09-24 01:05:36.732 UTC [msp] DeserializeIdentity -> DEBU 41a3 Obtaining identity" +"2019-09-24 01:05:36.732 UTC [msp] DeserializeIdentity -> DEBU 41a4 Obtaining identity" +"2019-09-24 01:05:36.733 UTC [gossip.comm] Send -> DEBU 41a5 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:36.734 UTC [gossip.comm] sendToEndpoint -> DEBU 41a6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes" +"2019-09-24 01:05:36.734 UTC [gossip.comm] sendToEndpoint -> DEBU 41a7 Exiting" +"2019-09-24 01:05:36.733 UTC [msp] DeserializeIdentity -> DEBU 41a8 Obtaining identity" +"2019-09-24 01:05:36.736 UTC [msp] DeserializeIdentity -> DEBU 41a9 Obtaining identity" +"2019-09-24 01:05:37.655 UTC [msp] DeserializeIdentity -> DEBU 41aa Obtaining identity" +"2019-09-24 01:05:37.657 UTC [msp] DeserializeIdentity -> DEBU 41ab Obtaining identity" +"2019-09-24 01:05:37.658 UTC [msp] DeserializeIdentity -> DEBU 41ac Obtaining identity" +"2019-09-24 01:05:37.658 UTC [msp] DeserializeIdentity -> DEBU 41ad Obtaining identity" +"2019-09-24 01:05:37.661 UTC [gossip.comm] Send -> DEBU 41ae Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:37.659 UTC [gossip.comm] Send -> DEBU 41af Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers" +"2019-09-24 01:05:37.663 UTC [msp] DeserializeIdentity -> DEBU 41b3 Obtaining identity" +"2019-09-24 01:05:37.663 UTC [msp] DeserializeIdentity -> DEBU 41b4 Obtaining identity" +"2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b5 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b6 Exiting" +"2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b0 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.664 UTC [gossip.comm] sendToEndpoint -> DEBU 41b7 Exiting" +"2019-09-24 01:05:37.674 UTC [gossip.comm] func1 -> DEBU 41b8 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.674 UTC [gossip.gossip] handleMessage -> DEBU 41b9 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.674 UTC [msp] DeserializeIdentity -> DEBU 41ba Obtaining identity" +"2019-09-24 01:05:37.674 UTC [msp.identity] Verify -> DEBU 41bb Verify: digest = 00000000 81 0f 2c ba 53 8f a6 97 5e 16 60 12 0d ff d8 2b |..,.S...^.`....+| +00000010 52 2c c0 4e b0 78 2a 0e f1 40 c1 de 38 68 eb ea |R,.N.x*..@..8h..|" +"2019-09-24 01:05:37.674 UTC [msp.identity] Verify -> DEBU 41bc Verify: sig = 00000000 30 44 02 20 1a 59 9c 91 81 7f 5a 07 d2 38 45 64 |0D. .Y....Z..8Ed| +00000010 80 c0 07 6b 45 5b 22 63 03 48 28 41 6e d0 c4 d7 |...kE["c.H(An...| +00000020 5f af fc 05 02 20 19 b3 c1 8f da 31 4e f5 ed bc |_.... .....1N...| +00000030 7d 44 48 29 59 65 9e a6 9f 4d de 67 61 49 57 e2 |}DH)Ye...M.gaIW.| +00000040 97 6e f4 01 e7 8c |.n....|" +"2019-09-24 01:05:37.675 UTC [msp.identity] Verify -> DEBU 41bd Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 41be Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:37.675 UTC [msp] DeserializeIdentity -> DEBU 41bf Obtaining identity" +"2019-09-24 01:05:37.675 UTC [msp] DeserializeIdentity -> DEBU 41c0 Obtaining identity" +"2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41c1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41c2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.675 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41c3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.675 UTC [policies] Evaluate -> DEBU 41c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.693 UTC [gossip.comm] sendToEndpoint -> DEBU 41c7 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.693 UTC [gossip.comm] sendToEndpoint -> DEBU 41c8 Exiting" +"2019-09-24 01:05:37.694 UTC [cauthdsl] func1 -> DEBU 41c9 0xc002996160 gate 1569287137675727100 evaluation starts" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41cd 0xc002996160 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41ce 0xc002996160 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41cf 0xc002996160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d0 0xc002996160 principal evaluation fails" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41d1 0xc002996160 gate 1569287137675727100 evaluation fails" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41d4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41d5 0xc002982ec0 gate 1569287137695418500 evaluation starts" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d6 0xc002982ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d7 0xc002982ec0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d8 0xc002982ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41d9 0xc002982ec0 principal evaluation fails" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41da 0xc002982ec0 gate 1569287137695418500 evaluation fails" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41db Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41dc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.695 UTC [policies] Evaluate -> DEBU 41dd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func1 -> DEBU 41de 0xc002983700 gate 1569287137695815400 evaluation starts" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41df 0xc002983700 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41e0 0xc002983700 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.695 UTC [cauthdsl] func2 -> DEBU 41e1 0xc002983700 principal matched by identity 0" +"2019-09-24 01:05:37.695 UTC [msp.identity] Verify -> DEBU 41e2 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:37.696 UTC [msp.identity] Verify -> DEBU 41e3 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:37.696 UTC [cauthdsl] func2 -> DEBU 41e4 0xc002983700 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.696 UTC [cauthdsl] func1 -> DEBU 41e5 0xc002983700 gate 1569287137695815400 evaluation succeeds" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e6 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e8 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41e9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.696 UTC [msp] DeserializeIdentity -> DEBU 41ea Obtaining identity" +"2019-09-24 01:05:37.696 UTC [msp] DeserializeIdentity -> DEBU 41eb Obtaining identity" +"2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 41ec Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ed Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.696 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 41ee Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41ef == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41f0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.696 UTC [policies] Evaluate -> DEBU 41f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.696 UTC [cauthdsl] func1 -> DEBU 41f2 0xc002b16ed0 gate 1569287137696924300 evaluation starts" +"2019-09-24 01:05:37.696 UTC [cauthdsl] func2 -> DEBU 41f3 0xc002b16ed0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.697 UTC [cauthdsl] func2 -> DEBU 41f4 0xc002b16ed0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b2 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.697 UTC [gossip.comm] sendToEndpoint -> DEBU 41f6 Exiting" +"2019-09-24 01:05:37.694 UTC [gossip.comm] func1 -> DEBU 41ca Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.694 UTC [gossip.comm] func1 -> DEBU 41cb Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.694 UTC [gossip.comm] sendToEndpoint -> DEBU 41cc Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.698 UTC [gossip.comm] sendToEndpoint -> DEBU 41f7 Exiting" +"2019-09-24 01:05:37.663 UTC [gossip.comm] sendToEndpoint -> DEBU 41b1 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.698 UTC [gossip.comm] sendToEndpoint -> DEBU 41f8 Exiting" +"2019-09-24 01:05:37.697 UTC [cauthdsl] func2 -> DEBU 41f5 0xc002b16ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.699 UTC [cauthdsl] func2 -> DEBU 41f9 0xc002b16ed0 principal evaluation fails" +"2019-09-24 01:05:37.700 UTC [cauthdsl] func1 -> DEBU 41fa 0xc002b16ed0 gate 1569287137696924300 evaluation fails" +"2019-09-24 01:05:37.700 UTC [policies] Evaluate -> DEBU 41fb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.700 UTC [policies] Evaluate -> DEBU 41fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.701 UTC [policies] Evaluate -> DEBU 41fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.701 UTC [cauthdsl] func1 -> DEBU 41fe 0xc002996da0 gate 1569287137701751100 evaluation starts" +"2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 41ff 0xc002996da0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 4200 0xc002996da0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.702 UTC [cauthdsl] func2 -> DEBU 4201 0xc002996da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.703 UTC [cauthdsl] func2 -> DEBU 4202 0xc002996da0 principal evaluation fails" +"2019-09-24 01:05:37.703 UTC [cauthdsl] func1 -> DEBU 4203 0xc002996da0 gate 1569287137701751100 evaluation fails" +"2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4204 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4205 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.704 UTC [policies] Evaluate -> DEBU 4206 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.704 UTC [cauthdsl] func1 -> DEBU 4207 0xc0029975e0 gate 1569287137704683400 evaluation starts" +"2019-09-24 01:05:37.704 UTC [cauthdsl] func2 -> DEBU 4208 0xc0029975e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.705 UTC [cauthdsl] func2 -> DEBU 4209 0xc0029975e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.705 UTC [cauthdsl] func2 -> DEBU 420a 0xc0029975e0 principal matched by identity 0" +"2019-09-24 01:05:37.705 UTC [msp.identity] Verify -> DEBU 420b Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:37.705 UTC [msp.identity] Verify -> DEBU 420c Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 420d 0xc0029975e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 420e 0xc0029975e0 gate 1569287137704683400 evaluation succeeds" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 420f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4210 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4211 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4212 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.706 UTC [msp] DeserializeIdentity -> DEBU 4213 Obtaining identity" +"2019-09-24 01:05:37.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4214 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.706 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4215 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4216 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4217 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4218 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4219 0xc002b546c0 gate 1569287137706378500 evaluation starts" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421a 0xc002b546c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421b 0xc002b546c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421c 0xc002b546c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 421d 0xc002b546c0 principal evaluation fails" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 421e 0xc002b546c0 gate 1569287137706378500 evaluation fails" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 421f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4220 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4221 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4222 0xc002b54f00 gate 1569287137706627700 evaluation starts" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4223 0xc002b54f00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4224 0xc002b54f00 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4225 0xc002b54f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 4226 0xc002b54f00 principal evaluation fails" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 4227 0xc002b54f00 gate 1569287137706627700 evaluation fails" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4228 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 4229 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.706 UTC [policies] Evaluate -> DEBU 422a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func1 -> DEBU 422b 0xc002b55740 gate 1569287137706884700 evaluation starts" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422c 0xc002b55740 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422d 0xc002b55740 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.706 UTC [cauthdsl] func2 -> DEBU 422e 0xc002b55740 principal matched by identity 0" +"2019-09-24 01:05:37.706 UTC [msp.identity] Verify -> DEBU 422f Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 4230 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:37.707 UTC [cauthdsl] func2 -> DEBU 4231 0xc002b55740 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.707 UTC [cauthdsl] func1 -> DEBU 4232 0xc002b55740 gate 1569287137706884700 evaluation succeeds" +"2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4233 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4234 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4235 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.707 UTC [policies] Evaluate -> DEBU 4236 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 4237 Exiting" +"2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 4238 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 4239 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423a Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:37.707 UTC [msp] DeserializeIdentity -> DEBU 423b Obtaining identity" +"2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 423c Exiting" +"2019-09-24 01:05:37.707 UTC [gossip.gossip] handleMessage -> DEBU 423d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\331%\250\326_k<\204\352\304\\<\261\231\2138\r[:5\027AT\205\027!\025\017\372]\343\037" channel_MAC:"\305~\361\202\275\234\303\321\215U\027\201mX\331\216\337\326-x\352U\001N\246\214\"\371q\rYc" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423e Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:37.707 UTC [msp.identity] Verify -> DEBU 423f Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:37.707 UTC [msp] DeserializeIdentity -> DEBU 4240 Obtaining identity" +"2019-09-24 01:05:37.708 UTC [gossip.gossip] handleMessage -> DEBU 4241 Exiting" +"2019-09-24 01:05:37.714 UTC [gossip.gossip] handleMessage -> DEBU 4243 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.714 UTC [gossip.comm] func1 -> DEBU 4242 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.714 UTC [msp] DeserializeIdentity -> DEBU 4244 Obtaining identity" +"2019-09-24 01:05:37.716 UTC [msp] DeserializeIdentity -> DEBU 4245 Obtaining identity" +"2019-09-24 01:05:37.717 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4246 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.717 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4247 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.718 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4248 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 4249 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 424a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.718 UTC [policies] Evaluate -> DEBU 424b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.718 UTC [cauthdsl] func1 -> DEBU 424c 0xc002a320a0 gate 1569287137718859400 evaluation starts" +"2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424d 0xc002a320a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424e 0xc002a320a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 424f 0xc002a320a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.718 UTC [cauthdsl] func2 -> DEBU 4250 0xc002a320a0 principal evaluation fails" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4251 0xc002a320a0 gate 1569287137718859400 evaluation fails" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4252 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4253 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4254 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4255 0xc002a328e0 gate 1569287137719107500 evaluation starts" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4256 0xc002a328e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4257 0xc002a328e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4258 0xc002a328e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4259 0xc002a328e0 principal evaluation fails" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 425a 0xc002a328e0 gate 1569287137719107500 evaluation fails" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 425d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 425e 0xc002a33120 gate 1569287137719348100 evaluation starts" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 425f 0xc002a33120 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4260 0xc002a33120 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4261 0xc002a33120 principal matched by identity 0" +"2019-09-24 01:05:37.719 UTC [msp.identity] Verify -> DEBU 4262 Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:37.719 UTC [msp.identity] Verify -> DEBU 4263 Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func2 -> DEBU 4264 0xc002a33120 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.719 UTC [cauthdsl] func1 -> DEBU 4265 0xc002a33120 gate 1569287137719348100 evaluation succeeds" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4266 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4267 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4268 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.719 UTC [policies] Evaluate -> DEBU 4269 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.719 UTC [msp] DeserializeIdentity -> DEBU 426a Obtaining identity" +"2019-09-24 01:05:37.719 UTC [msp] DeserializeIdentity -> DEBU 426b Obtaining identity" +"2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 426c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.720 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 426e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 426f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4270 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4271 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 4272 0xc002b308f0 gate 1569287137720545200 evaluation starts" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4273 0xc002b308f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4274 0xc002b308f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4275 0xc002b308f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 4276 0xc002b308f0 principal evaluation fails" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 4277 0xc002b308f0 gate 1569287137720545200 evaluation fails" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4278 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 4279 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.720 UTC [policies] Evaluate -> DEBU 427a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func1 -> DEBU 427b 0xc002b31130 gate 1569287137720866900 evaluation starts" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427c 0xc002b31130 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427d 0xc002b31130 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427e 0xc002b31130 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.720 UTC [cauthdsl] func2 -> DEBU 427f 0xc002b31130 principal evaluation fails" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 4280 0xc002b31130 gate 1569287137720866900 evaluation fails" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4281 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4282 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 4283 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 4284 0xc002b31970 gate 1569287137721109800 evaluation starts" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4285 0xc002b31970 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4286 0xc002b31970 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 4287 0xc002b31970 principal matched by identity 0" +"2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4288 Verify: digest = 00000000 88 18 7b d6 eb 48 6d 23 0c 2f dd 53 d5 06 09 30 |..{..Hm#./.S...0| +00000010 cb 97 c8 0c 29 5a 33 85 bc 4b df f4 05 8a a0 dd |....)Z3..K......|" +"2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4289 Verify: sig = 00000000 30 45 02 21 00 ce a1 9d ad 96 f9 a3 fb d5 bd 86 |0E.!............| +00000010 8a 86 b7 67 b6 7f aa 66 d5 41 67 93 b4 c1 52 e3 |...g...f.Ag...R.| +00000020 18 38 c0 ea 8d 02 20 3e c5 be 13 1f ab 0c c2 9e |.8.... >........| +00000030 d5 74 cc ad cb 75 72 e8 1c 1f ce c7 14 2d 13 0c |.t...ur......-..| +00000040 84 81 aa 39 f4 ef 17 |...9...|" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func2 -> DEBU 428a 0xc002b31970 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.721 UTC [cauthdsl] func1 -> DEBU 428b 0xc002b31970 gate 1569287137721109800 evaluation succeeds" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.721 UTC [policies] Evaluate -> DEBU 428f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4290 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:37.721 UTC [msp.identity] Verify -> DEBU 4291 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:37.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4292 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.722 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4293 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4294 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4295 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.723 UTC [policies] Evaluate -> DEBU 4296 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.724 UTC [msp] DeserializeIdentity -> DEBU 4298 Obtaining identity" +"2019-09-24 01:05:37.724 UTC [msp] DeserializeIdentity -> DEBU 4297 Obtaining identity" +"2019-09-24 01:05:37.725 UTC [msp] DeserializeIdentity -> DEBU 4299 Obtaining identity" +"2019-09-24 01:05:37.726 UTC [gossip.pull] Hello -> DEBU 429a Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:37.727 UTC [msp] DeserializeIdentity -> DEBU 429b Obtaining identity" +"2019-09-24 01:05:37.727 UTC [msp] DeserializeIdentity -> DEBU 429c Obtaining identity" +"2019-09-24 01:05:37.728 UTC [gossip.comm] Send -> DEBU 429d Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:37.728 UTC [gossip.comm] sendToEndpoint -> DEBU 429e Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.729 UTC [gossip.comm] sendToEndpoint -> DEBU 429f Exiting" +"2019-09-24 01:05:37.730 UTC [msp.identity] newIdentity -> DEBU 42a0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQEtJxE8E80e8g3hg/v1IXcTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDPfou+eBQPzq +3NFWSD+ewKyfMdKOKKpfch4/hLD/0q40W51bRlDTKoLw4IChyoLO3EZuvZ97dbpw +iqcaBeZD7KNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgvVRA0AsJMpyeDtmCHjnVOFCEfAFwdT993A5RgL3MmB4wCgYIKoZIzj0E +AwIDSAAwRQIhAL54z+fOJL63KniExHmbMs0dskE5f+MjoBO4ZNzjY9A2AiAmgFQ2 +QpQUEr0h1l+KuL7IvTUkbIvOztqq0cLo6ipr5Q== +-----END CERTIFICATE-----" +"2019-09-24 01:05:37.731 UTC [cauthdsl] func1 -> DEBU 42a1 0xc002b3f070 gate 1569287137731422400 evaluation starts" +"2019-09-24 01:05:37.731 UTC [cauthdsl] func2 -> DEBU 42a2 0xc002b3f070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.732 UTC [cauthdsl] func2 -> DEBU 42a3 0xc002b3f070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.732 UTC [cauthdsl] func2 -> DEBU 42a4 0xc002b3f070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-09-24 01:05:37.733 UTC [cauthdsl] func2 -> DEBU 42a5 0xc002b3f070 principal evaluation fails" +"2019-09-24 01:05:37.733 UTC [cauthdsl] func1 -> DEBU 42a6 0xc002b3f070 gate 1569287137731422400 evaluation fails" +"2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a7 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.733 UTC [policies] Evaluate -> DEBU 42a9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.735 UTC [cauthdsl] func1 -> DEBU 42aa 0xc0031c21f0 gate 1569287137735023700 evaluation starts" +"2019-09-24 01:05:37.735 UTC [cauthdsl] func2 -> DEBU 42ab 0xc0031c21f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.735 UTC [cauthdsl] func2 -> DEBU 42ac 0xc0031c21f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.735 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 42ad Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:37.735 UTC [msp] Validate -> DEBU 42ae MSP Org1MSP validating identity" +"2019-09-24 01:05:37.736 UTC [msp] getCertificationChain -> DEBU 42af MSP Org1MSP getting certification chain" +"2019-09-24 01:05:37.736 UTC [cauthdsl] func2 -> DEBU 42b0 0xc0031c21f0 principal matched by identity 0" +"2019-09-24 01:05:37.737 UTC [msp.identity] Verify -> DEBU 42b1 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:37.737 UTC [msp.identity] Verify -> DEBU 42b2 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:37.738 UTC [cauthdsl] func2 -> DEBU 42b3 0xc0031c21f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.738 UTC [cauthdsl] func1 -> DEBU 42b4 0xc0031c21f0 gate 1569287137735023700 evaluation succeeds" +"2019-09-24 01:05:37.738 UTC [policies] Evaluate -> DEBU 42b5 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.738 UTC [policies] Evaluate -> DEBU 42b6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.739 UTC [policies] Evaluate -> DEBU 42b7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.739 UTC [policies] Evaluate -> DEBU 42b8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.739 UTC [msp.identity] Verify -> DEBU 42b9 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:37.740 UTC [msp.identity] Verify -> DEBU 42ba Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:37.740 UTC [gossip.gossip] handleMessage -> DEBU 42bb Exiting" +"2019-09-24 01:05:37.740 UTC [gossip.gossip] handleMessage -> DEBU 42bc Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.741 UTC [msp] DeserializeIdentity -> DEBU 42bd Obtaining identity" +"2019-09-24 01:05:37.741 UTC [msp.identity] Verify -> DEBU 42be Verify: digest = 00000000 3e c7 44 92 46 41 af 3c 50 c3 88 3b 85 84 ad bc |>.D.FA. DEBU 42bf Verify: sig = 00000000 30 44 02 20 28 6f 9a e2 f1 fa 85 bd 92 28 d8 9f |0D. (o.......(..| +00000010 1f 01 09 32 bc 1e 7a cd 36 83 13 bd b7 b8 48 71 |...2..z.6.....Hq| +00000020 6e 9f f4 80 02 20 3a 28 e2 41 d5 30 79 48 3a 99 |n.... :(.A.0yH:.| +00000030 9d 85 d0 27 76 67 cf a3 95 24 e4 04 5e c0 31 b7 |...'vg...$..^.1.| +00000040 be 8d b4 c0 20 4c |.... L|" +"2019-09-24 01:05:37.742 UTC [msp] DeserializeIdentity -> DEBU 42c0 Obtaining identity" +"2019-09-24 01:05:37.742 UTC [msp] DeserializeIdentity -> DEBU 42c1 Obtaining identity" +"2019-09-24 01:05:37.746 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.747 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.748 UTC [policies] Evaluate -> DEBU 42c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.748 UTC [policies] Evaluate -> DEBU 42c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.749 UTC [policies] Evaluate -> DEBU 42c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.749 UTC [cauthdsl] func1 -> DEBU 42c8 0xc0039e8ec0 gate 1569287137749409100 evaluation starts" +"2019-09-24 01:05:37.749 UTC [cauthdsl] func2 -> DEBU 42c9 0xc0039e8ec0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42ca 0xc0039e8ec0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42cb 0xc0039e8ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42cc 0xc0039e8ec0 principal evaluation fails" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42cd 0xc0039e8ec0 gate 1569287137749409100 evaluation fails" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42d1 0xc0039e9700 gate 1569287137750585200 evaluation starts" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d2 0xc0039e9700 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d3 0xc0039e9700 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d4 0xc0039e9700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42d5 0xc0039e9700 principal evaluation fails" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42d6 0xc0039e9700 gate 1569287137750585200 evaluation fails" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.750 UTC [policies] Evaluate -> DEBU 42d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func1 -> DEBU 42da 0xc0039e9f40 gate 1569287137750835300 evaluation starts" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42db 0xc0039e9f40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42dc 0xc0039e9f40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.750 UTC [cauthdsl] func2 -> DEBU 42dd 0xc0039e9f40 principal matched by identity 0" +"2019-09-24 01:05:37.750 UTC [msp.identity] Verify -> DEBU 42de Verify: digest = 00000000 77 3a d3 38 c4 9d 13 fe 0b 21 48 bf c6 0e 2a 18 |w:.8.....!H...*.| +00000010 99 8a 5d 19 32 17 56 9d 98 be e5 09 9f 14 a4 b8 |..].2.V.........|" +"2019-09-24 01:05:37.750 UTC [msp.identity] Verify -> DEBU 42df Verify: sig = 00000000 30 45 02 21 00 ab 65 6d 32 06 c7 d9 df 3b 41 20 |0E.!..em2....;A | +00000010 8b 6d 7f b5 bb 62 04 bb ce 4c b1 17 da aa b3 72 |.m...b...L.....r| +00000020 17 6b a6 4c 3f 02 20 48 72 06 e6 38 e5 6c 55 bf |.k.L?. Hr..8.lU.| +00000030 b8 ad 71 3f 83 d2 06 9f 82 3e e6 4f 1d f9 57 b0 |..q?.....>.O..W.| +00000040 5e 0b 98 72 c3 69 ee |^..r.i.|" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42e0 0xc0039e9f40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42e1 0xc0039e9f40 gate 1569287137750835300 evaluation succeeds" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.751 UTC [msp] DeserializeIdentity -> DEBU 42e6 Obtaining identity" +"2019-09-24 01:05:37.751 UTC [msp] DeserializeIdentity -> DEBU 42e7 Obtaining identity" +"2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 42e8 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42e9 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.751 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 42ea Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42eb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42ec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42ed == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42ee 0xc003c33710 gate 1569287137751654000 evaluation starts" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42ef 0xc003c33710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f0 0xc003c33710 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f1 0xc003c33710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f2 0xc003c33710 principal evaluation fails" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42f3 0xc003c33710 gate 1569287137751654000 evaluation fails" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f4 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.751 UTC [policies] Evaluate -> DEBU 42f6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func1 -> DEBU 42f7 0xc003c33f50 gate 1569287137751892900 evaluation starts" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f8 0xc003c33f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42f9 0xc003c33f50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.751 UTC [cauthdsl] func2 -> DEBU 42fa 0xc003c33f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 42fb 0xc003c33f50 principal evaluation fails" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 42fc 0xc003c33f50 gate 1569287137751892900 evaluation fails" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42fd Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42fe == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 42ff == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4300 0xc0028bc790 gate 1569287137752137500 evaluation starts" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4301 0xc0028bc790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4302 0xc0028bc790 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4303 0xc0028bc790 principal matched by identity 0" +"2019-09-24 01:05:37.752 UTC [msp.identity] Verify -> DEBU 4304 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:37.752 UTC [msp.identity] Verify -> DEBU 4305 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4306 0xc0028bc790 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4307 0xc0028bc790 gate 1569287137752137500 evaluation succeeds" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4308 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4309 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430a Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.752 UTC [msp] DeserializeIdentity -> DEBU 430c Obtaining identity" +"2019-09-24 01:05:37.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.752 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 430e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 430f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4310 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4311 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4312 0xc0028bd870 gate 1569287137752744600 evaluation starts" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4313 0xc0028bd870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4314 0xc0028bd870 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4315 0xc0028bd870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func2 -> DEBU 4316 0xc0028bd870 principal evaluation fails" +"2019-09-24 01:05:37.752 UTC [cauthdsl] func1 -> DEBU 4317 0xc0028bd870 gate 1569287137752744600 evaluation fails" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4318 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 4319 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:37.752 UTC [policies] Evaluate -> DEBU 431a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 431b 0xc0028cc0b0 gate 1569287137752991700 evaluation starts" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431c 0xc0028cc0b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431d 0xc0028cc0b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431e 0xc0028cc0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 431f 0xc0028cc0b0 principal evaluation fails" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 4320 0xc0028cc0b0 gate 1569287137752991700 evaluation fails" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4321 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4322 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 4323 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 4324 0xc0028cc8f0 gate 1569287137753268700 evaluation starts" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4325 0xc0028cc8f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4326 0xc0028cc8f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 4327 0xc0028cc8f0 principal matched by identity 0" +"2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4328 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4329 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func2 -> DEBU 432a 0xc0028cc8f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:37.753 UTC [cauthdsl] func1 -> DEBU 432b 0xc0028cc8f0 gate 1569287137753268700 evaluation succeeds" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:37.753 UTC [policies] Evaluate -> DEBU 432f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:37.753 UTC [msp.identity] Verify -> DEBU 4330 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:37.754 UTC [msp.identity] Verify -> DEBU 4331 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4332 Exiting" +"2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4333 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.754 UTC [gossip.pull] HandleMessage -> DEBU 4334 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.754 UTC [gossip.gossip] handleMessage -> DEBU 4335 Exiting" +"2019-09-24 01:05:37.841 UTC [gossip.gossip] handleMessage -> DEBU 4336 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.841 UTC [msp] DeserializeIdentity -> DEBU 4337 Obtaining identity" +"2019-09-24 01:05:37.841 UTC [msp] DeserializeIdentity -> DEBU 4338 Obtaining identity" +"2019-09-24 01:05:37.842 UTC [gossip.gossip] handleMessage -> DEBU 4339 Exiting" +"2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 433b Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 433c Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433d Exiting" +"2019-09-24 01:05:37.846 UTC [gossip.comm] func1 -> DEBU 433e Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.846 UTC [gossip.gossip] handleMessage -> DEBU 433f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.846 UTC [msp.identity] Verify -> DEBU 4340 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:37.847 UTC [msp.identity] Verify -> DEBU 4341 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:37.847 UTC [msp] DeserializeIdentity -> DEBU 4342 Obtaining identity" +"2019-09-24 01:05:37.847 UTC [gossip.gossip] handleMessage -> DEBU 4343 Exiting" +"2019-09-24 01:05:37.854 UTC [gossip.comm] func1 -> DEBU 4344 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.854 UTC [gossip.gossip] handleMessage -> DEBU 4345 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" channel_MAC:"\352\324\350\013\000bg\242,#\010Pf\223\341\241\2357\270\033\005\027+\260UC\335\256\256\315\211\232" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:37.855 UTC [msp.identity] Verify -> DEBU 4346 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:37.855 UTC [msp.identity] Verify -> DEBU 4347 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:37.855 UTC [msp] DeserializeIdentity -> DEBU 4348 Obtaining identity" +"2019-09-24 01:05:37.855 UTC [gossip.gossip] handleMessage -> DEBU 4349 Exiting" +"2019-09-24 01:05:37.864 UTC [gossip.gossip] handleMessage -> DEBU 434a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.864 UTC [gossip.pull] HandleMessage -> DEBU 434b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:37.864 UTC [gossip.pull] SendDigest -> DEBU 434c Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:37.864 UTC [gossip.gossip] handleMessage -> DEBU 434d Exiting" +"2019-09-24 01:05:38.041 UTC [gossip.comm] func1 -> DEBU 434e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.041 UTC [gossip.gossip] handleMessage -> DEBU 434f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.041 UTC [msp] DeserializeIdentity -> DEBU 4350 Obtaining identity" +"2019-09-24 01:05:38.042 UTC [msp] DeserializeIdentity -> DEBU 4351 Obtaining identity" +"2019-09-24 01:05:38.042 UTC [msp] DeserializeIdentity -> DEBU 4352 Obtaining identity" +"2019-09-24 01:05:38.042 UTC [gossip.gossip] handleMessage -> DEBU 4353 Exiting" +"2019-09-24 01:05:38.046 UTC [gossip.comm] func1 -> DEBU 4354 Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.046 UTC [gossip.gossip] handleMessage -> DEBU 4355 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.046 UTC [msp] DeserializeIdentity -> DEBU 4356 Obtaining identity" +"2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4357 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4358 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.046 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4359 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 435c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 435d 0xc003141cc0 gate 1569287138046592900 evaluation starts" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 435e 0xc003141cc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 435f 0xc003141cc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 4360 0xc003141cc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func2 -> DEBU 4361 0xc003141cc0 principal evaluation fails" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 4362 0xc003141cc0 gate 1569287138046592900 evaluation fails" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4363 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4364 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.046 UTC [policies] Evaluate -> DEBU 4365 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.046 UTC [cauthdsl] func1 -> DEBU 4366 0xc0036d8500 gate 1569287138046937400 evaluation starts" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4367 0xc0036d8500 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4368 0xc0036d8500 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4369 0xc0036d8500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 436a 0xc0036d8500 principal evaluation fails" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 436b 0xc0036d8500 gate 1569287138046937400 evaluation fails" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 436e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 436f 0xc0036d8d40 gate 1569287138047281300 evaluation starts" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4370 0xc0036d8d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4371 0xc0036d8d40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4372 0xc0036d8d40 principal matched by identity 0" +"2019-09-24 01:05:38.047 UTC [msp.identity] Verify -> DEBU 4373 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:38.047 UTC [msp.identity] Verify -> DEBU 4374 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func2 -> DEBU 4375 0xc0036d8d40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.047 UTC [cauthdsl] func1 -> DEBU 4376 0xc0036d8d40 gate 1569287138047281300 evaluation succeeds" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4377 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4378 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 4379 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.047 UTC [policies] Evaluate -> DEBU 437a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.047 UTC [msp] DeserializeIdentity -> DEBU 437b Obtaining identity" +"2019-09-24 01:05:38.047 UTC [gossip.gossip] handleMessage -> DEBU 437c Exiting" +"2019-09-24 01:05:38.055 UTC [gossip.comm] func1 -> DEBU 437d Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.055 UTC [gossip.gossip] handleMessage -> DEBU 437e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" channel_MAC:"\031\307\342\265\307\373\365; > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.055 UTC [msp] DeserializeIdentity -> DEBU 437f Obtaining identity" +"2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4380 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4381 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.055 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4382 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4383 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4384 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.055 UTC [policies] Evaluate -> DEBU 4385 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.055 UTC [cauthdsl] func1 -> DEBU 4386 0xc003cb8810 gate 1569287138055812300 evaluation starts" +"2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4387 0xc003cb8810 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4388 0xc003cb8810 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.055 UTC [cauthdsl] func2 -> DEBU 4389 0xc003cb8810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 438a 0xc003cb8810 principal evaluation fails" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 438b 0xc003cb8810 gate 1569287138055812300 evaluation fails" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 438e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 438f 0xc003cb9050 gate 1569287138056195100 evaluation starts" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4390 0xc003cb9050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4391 0xc003cb9050 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4392 0xc003cb9050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4393 0xc003cb9050 principal evaluation fails" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 4394 0xc003cb9050 gate 1569287138056195100 evaluation fails" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4395 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4396 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.056 UTC [policies] Evaluate -> DEBU 4397 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func1 -> DEBU 4398 0xc003cb9890 gate 1569287138056528300 evaluation starts" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 4399 0xc003cb9890 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 439a 0xc003cb9890 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.056 UTC [cauthdsl] func2 -> DEBU 439b 0xc003cb9890 principal matched by identity 0" +"2019-09-24 01:05:38.056 UTC [msp.identity] Verify -> DEBU 439c Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:38.057 UTC [msp.identity] Verify -> DEBU 439d Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:38.057 UTC [cauthdsl] func2 -> DEBU 439e 0xc003cb9890 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.057 UTC [cauthdsl] func1 -> DEBU 439f 0xc003cb9890 gate 1569287138056528300 evaluation succeeds" +"2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a0 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a2 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.057 UTC [policies] Evaluate -> DEBU 43a3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.057 UTC [msp] DeserializeIdentity -> DEBU 43a4 Obtaining identity" +"2019-09-24 01:05:38.057 UTC [gossip.gossip] handleMessage -> DEBU 43a5 Exiting" +"2019-09-24 01:05:38.240 UTC [gossip.comm] func1 -> DEBU 43a6 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.241 UTC [gossip.gossip] handleMessage -> DEBU 43a7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.241 UTC [msp] DeserializeIdentity -> DEBU 43a8 Obtaining identity" +"2019-09-24 01:05:38.242 UTC [msp] DeserializeIdentity -> DEBU 43a9 Obtaining identity" +"2019-09-24 01:05:38.242 UTC [msp] DeserializeIdentity -> DEBU 43aa Obtaining identity" +"2019-09-24 01:05:38.242 UTC [gossip.gossip] handleMessage -> DEBU 43ab Exiting" +"2019-09-24 01:05:38.247 UTC [gossip.comm] func1 -> DEBU 43ac Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.247 UTC [gossip.gossip] handleMessage -> DEBU 43ad Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" channel_MAC:"lR\306~\006m\353\247T\024%\216\204$n\304\002R3#\277`5\312mS\345\201\373|i\373" properties: > > , Envelope: 112 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.247 UTC [msp] DeserializeIdentity -> DEBU 43ae Obtaining identity" +"2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 43af Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43b0 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.247 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 43b1 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.247 UTC [policies] Evaluate -> DEBU 43b2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.247 UTC [policies] Evaluate -> DEBU 43b3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.248 UTC [policies] Evaluate -> DEBU 43b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func1 -> DEBU 43b5 0xc003cc9360 gate 1569287138248100800 evaluation starts" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b6 0xc003cc9360 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b7 0xc003cc9360 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b8 0xc003cc9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func2 -> DEBU 43b9 0xc003cc9360 principal evaluation fails" +"2019-09-24 01:05:38.248 UTC [cauthdsl] func1 -> DEBU 43ba 0xc003cc9360 gate 1569287138248100800 evaluation fails" +"2019-09-24 01:05:38.249 UTC [policies] Evaluate -> DEBU 43bb Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.249 UTC [policies] Evaluate -> DEBU 43bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.250 UTC [policies] Evaluate -> DEBU 43bd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.251 UTC [cauthdsl] func1 -> DEBU 43be 0xc003cc9ba0 gate 1569287138251818100 evaluation starts" +"2019-09-24 01:05:38.251 UTC [cauthdsl] func2 -> DEBU 43bf 0xc003cc9ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c0 0xc003cc9ba0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c1 0xc003cc9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.252 UTC [cauthdsl] func2 -> DEBU 43c2 0xc003cc9ba0 principal evaluation fails" +"2019-09-24 01:05:38.252 UTC [cauthdsl] func1 -> DEBU 43c3 0xc003cc9ba0 gate 1569287138251818100 evaluation fails" +"2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c4 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.252 UTC [policies] Evaluate -> DEBU 43c6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.252 UTC [cauthdsl] func1 -> DEBU 43c7 0xc003dc03e0 gate 1569287138252873900 evaluation starts" +"2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43c8 0xc003dc03e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43c9 0xc003dc03e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43ca 0xc003dc03e0 principal matched by identity 0" +"2019-09-24 01:05:38.253 UTC [msp.identity] Verify -> DEBU 43cb Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:38.253 UTC [msp.identity] Verify -> DEBU 43cc Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:38.253 UTC [cauthdsl] func2 -> DEBU 43cd 0xc003dc03e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.253 UTC [cauthdsl] func1 -> DEBU 43ce 0xc003dc03e0 gate 1569287138252873900 evaluation succeeds" +"2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43cf Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d1 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.253 UTC [policies] Evaluate -> DEBU 43d2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.253 UTC [msp] DeserializeIdentity -> DEBU 43d3 Obtaining identity" +"2019-09-24 01:05:38.255 UTC [gossip.gossip] handleMessage -> DEBU 43d4 Exiting" +"2019-09-24 01:05:38.491 UTC [gossip.gossip] handleMessage -> DEBU 43d5 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.492 UTC [gossip.pull] HandleMessage -> DEBU 43d6 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.492 UTC [gossip.pull] SendDigest -> DEBU 43d7 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:38.492 UTC [gossip.gossip] handleMessage -> DEBU 43d8 Exiting" +"2019-09-24 01:05:38.521 UTC [gossip.gossip] handleMessage -> DEBU 43d9 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.521 UTC [gossip.gossip] handleMessage -> DEBU 43da Exiting" +"2019-09-24 01:05:38.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43db Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.523 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43dc Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:38.523 UTC [msp.identity] Verify -> DEBU 43dd Verify: digest = 00000000 f9 43 50 94 f4 8c 2e 05 a3 d0 8e 8d 2e c5 44 ba |.CP...........D.| +00000010 d9 b6 46 d8 45 80 55 f7 eb ad 1e 65 fb 06 43 dc |..F.E.U....e..C.|" +"2019-09-24 01:05:38.523 UTC [msp.identity] Verify -> DEBU 43de Verify: sig = 00000000 30 45 02 21 00 c0 9b 50 4f a3 15 fa 5b 2a 76 6c |0E.!...PO...[*vl| +00000010 f1 6b 4d 79 32 89 c3 e3 27 7a ce d2 2e 37 c3 84 |.kMy2...'z...7..| +00000020 3e 38 08 b0 53 02 20 61 a3 e5 98 12 c3 5f 1c fe |>8..S. a....._..| +00000030 95 b9 50 b8 7c 1f 6f b8 4c 53 9b 9a 9a d2 bb 2d |..P.|.o.LS.....-| +00000040 b6 1a 4e 60 55 59 e3 |..N`UY.|" +"2019-09-24 01:05:38.523 UTC [gossip.discovery] handleAliveMessage -> DEBU 43df Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:38.523 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e1 updating membership: timestamp: " +"2019-09-24 01:05:38.524 UTC [gossip.gossip] handleMessage -> DEBU 43e2 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.524 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e3 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:38.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:38.524 UTC [gossip.comm] func1 -> DEBU 43e4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.526 UTC [gossip.discovery] learnExistingMembers -> DEBU 43e6 Exiting" +"2019-09-24 01:05:38.527 UTC [gossip.discovery] handleAliveMessage -> DEBU 43e7 Exiting" +"2019-09-24 01:05:38.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43e8 Exiting" +"2019-09-24 01:05:38.527 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43e9 Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.527 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 43eb Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:38.528 UTC [msp.identity] Verify -> DEBU 43ec Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +"2019-09-24 01:05:38.528 UTC [msp.identity] Verify -> DEBU 43ed Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +"2019-09-24 01:05:38.527 UTC [gossip.gossip] handleMessage -> DEBU 43ea Exiting" +"2019-09-24 01:05:38.529 UTC [msp.identity] Verify -> DEBU 43ee Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:38.531 UTC [gossip.gossip] handleMessage -> DEBU 43ef Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.531 UTC [msp.identity] Verify -> DEBU 43f0 Verify: sig = 00000000 30 44 02 20 32 db da 7b ef d1 81 60 d0 e2 9c a7 |0D. 2..{...`....| +00000010 cf b6 00 7b 1e dd 9a 9c a5 78 33 21 1c fa 67 6c |...{.....x3!..gl| +00000020 33 c6 6f d4 02 20 3c 28 eb f9 bd 9b bb 7a 09 57 |3.o.. <(.....z.W| +00000030 c6 30 5a 99 c6 e3 9b a5 be b5 4b 72 ad 02 c3 e5 |.0Z.......Kr....| +00000040 0a 2c 09 92 86 83 |.,....|" +"2019-09-24 01:05:38.533 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:38.533 UTC [gossip.comm] func1 -> DEBU 43f2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f4 updating membership: timestamp: " +"2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:38.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:38.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 43f7 Exiting" +"2019-09-24 01:05:38.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 43f8 Exiting" +"2019-09-24 01:05:38.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43f9 Exiting" +"2019-09-24 01:05:38.536 UTC [gossip.discovery] sendMemResponse -> DEBU 43fa Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:38.536 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43fb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.537 UTC [gossip.discovery] handleMsgFromComm -> DEBU 43fd Exiting" +"2019-09-24 01:05:38.537 UTC [gossip.gossip] handleMessage -> DEBU 43fc Exiting" +"2019-09-24 01:05:38.538 UTC [gossip.gossip] handleMessage -> DEBU 43fe Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.538 UTC [gossip.gossip] handleMessage -> DEBU 43ff Exiting" +"2019-09-24 01:05:38.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4400 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.539 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4401 Exiting" +"2019-09-24 01:05:38.540 UTC [msp] DeserializeIdentity -> DEBU 4402 Obtaining identity" +"2019-09-24 01:05:38.540 UTC [msp] DeserializeIdentity -> DEBU 4403 Obtaining identity" +"2019-09-24 01:05:38.540 UTC [gossip.comm] Send -> DEBU 4404 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.541 UTC [gossip.comm] sendToEndpoint -> DEBU 4405 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.541 UTC [gossip.comm] sendToEndpoint -> DEBU 4406 Exiting" +"2019-09-24 01:05:38.541 UTC [gossip.discovery] sendMemResponse -> DEBU 4407 Exiting, replying with alive: > alive: " +"2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 4408 Obtaining identity" +"2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 4409 Obtaining identity" +"2019-09-24 01:05:38.543 UTC [msp] DeserializeIdentity -> DEBU 440a Obtaining identity" +"2019-09-24 01:05:38.544 UTC [gossip.comm] Send -> DEBU 440b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:38.544 UTC [msp] DeserializeIdentity -> DEBU 440c Obtaining identity" +"2019-09-24 01:05:38.545 UTC [gossip.comm] Send -> DEBU 440e Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:38.546 UTC [gossip.comm] sendToEndpoint -> DEBU 440f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.546 UTC [gossip.comm] sendToEndpoint -> DEBU 4410 Exiting" +"2019-09-24 01:05:38.545 UTC [gossip.comm] sendToEndpoint -> DEBU 440d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.547 UTC [gossip.comm] sendToEndpoint -> DEBU 4411 Exiting" +"2019-09-24 01:05:38.786 UTC [gossip.comm] func1 -> DEBU 4412 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.786 UTC [gossip.gossip] handleMessage -> DEBU 4413 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.787 UTC [gossip.pull] HandleMessage -> DEBU 4414 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.787 UTC [msp] DeserializeIdentity -> DEBU 4415 Obtaining identity" +"2019-09-24 01:05:38.787 UTC [msp] DeserializeIdentity -> DEBU 4416 Obtaining identity" +"2019-09-24 01:05:38.788 UTC [msp] DeserializeIdentity -> DEBU 4417 Obtaining identity" +"2019-09-24 01:05:38.788 UTC [msp] DeserializeIdentity -> DEBU 4418 Obtaining identity" +"2019-09-24 01:05:38.789 UTC [msp] DeserializeIdentity -> DEBU 4419 Obtaining identity" +"2019-09-24 01:05:38.789 UTC [msp] DeserializeIdentity -> DEBU 441a Obtaining identity" +"2019-09-24 01:05:38.790 UTC [gossip.pull] SendDigest -> DEBU 441b Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:38.791 UTC [gossip.gossip] handleMessage -> DEBU 441c Exiting" +"2019-09-24 01:05:38.804 UTC [gossip.comm] func1 -> DEBU 441d Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.804 UTC [gossip.gossip] handleMessage -> DEBU 441e Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.805 UTC [gossip.gossip] handleMessage -> DEBU 441f Exiting" +"2019-09-24 01:05:38.805 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4420 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.805 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4421 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:38.805 UTC [msp] DeserializeIdentity -> DEBU 4422 Obtaining identity" +"2019-09-24 01:05:38.805 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4423 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4424 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.806 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4425 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4426 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4427 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4428 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 4429 0xc0024fe180 gate 1569287138806374700 evaluation starts" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442a 0xc0024fe180 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442b 0xc0024fe180 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442c 0xc0024fe180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func2 -> DEBU 442d 0xc0024fe180 principal evaluation fails" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 442e 0xc0024fe180 gate 1569287138806374700 evaluation fails" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 442f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4430 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.806 UTC [policies] Evaluate -> DEBU 4431 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.806 UTC [cauthdsl] func1 -> DEBU 4432 0xc0024fe9c0 gate 1569287138806858800 evaluation starts" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4433 0xc0024fe9c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4434 0xc0024fe9c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4435 0xc0024fe9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4436 0xc0024fe9c0 principal evaluation fails" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 4437 0xc0024fe9c0 gate 1569287138806858800 evaluation fails" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4438 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4439 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 443a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 443b 0xc0024ff200 gate 1569287138807303700 evaluation starts" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443c 0xc0024ff200 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443d 0xc0024ff200 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 443e 0xc0024ff200 principal matched by identity 0" +"2019-09-24 01:05:38.807 UTC [msp.identity] Verify -> DEBU 443f Verify: digest = 00000000 cc 9c dc 03 6f 9c 5c a5 68 52 33 e0 b4 6e 52 e1 |....o.\.hR3..nR.| +00000010 87 9f 17 53 34 90 73 8b 52 20 a1 ca 64 9e 50 20 |...S4.s.R ..d.P |" +"2019-09-24 01:05:38.807 UTC [msp.identity] Verify -> DEBU 4440 Verify: sig = 00000000 30 45 02 21 00 9a 84 47 2b 0f 2f d9 fb e4 db 31 |0E.!...G+./....1| +00000010 eb 37 e5 c1 09 19 54 3d 92 57 ff 7a c8 09 b4 ec |.7....T=.W.z....| +00000020 49 83 a0 fa 2c 02 20 2b 7e 93 60 7a ab 87 e9 00 |I...,. +~.`z....| +00000030 07 68 53 57 71 c9 e0 a5 30 07 57 31 ac 45 38 09 |.hSWq...0.W1.E8.| +00000040 2c fd d0 61 f0 32 b9 |,..a.2.|" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func2 -> DEBU 4441 0xc0024ff200 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.807 UTC [cauthdsl] func1 -> DEBU 4442 0xc0024ff200 gate 1569287138807303700 evaluation succeeds" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4443 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4444 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.807 UTC [policies] Evaluate -> DEBU 4445 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.808 UTC [policies] Evaluate -> DEBU 4446 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.808 UTC [gossip.discovery] handleAliveMessage -> DEBU 4447 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 4448 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 4449 updating membership: timestamp: " +"2019-09-24 01:05:38.808 UTC [gossip.discovery] learnExistingMembers -> DEBU 444a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:38.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 444b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:38.809 UTC [gossip.discovery] learnExistingMembers -> DEBU 444c Exiting" +"2019-09-24 01:05:38.809 UTC [gossip.discovery] handleAliveMessage -> DEBU 444d Exiting" +"2019-09-24 01:05:38.809 UTC [gossip.discovery] handleMsgFromComm -> DEBU 444e Exiting" +"2019-09-24 01:05:38.809 UTC [gossip.discovery] sendMemResponse -> DEBU 444f Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:38.809 UTC [msp] DeserializeIdentity -> DEBU 4450 Obtaining identity" +"2019-09-24 01:05:38.809 UTC [msp] DeserializeIdentity -> DEBU 4451 Obtaining identity" +"2019-09-24 01:05:38.810 UTC [msp] DeserializeIdentity -> DEBU 4452 Obtaining identity" +"2019-09-24 01:05:38.810 UTC [gossip.comm] Send -> DEBU 4453 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.810 UTC [gossip.discovery] sendMemResponse -> DEBU 4454 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:38.810 UTC [gossip.comm] sendToEndpoint -> DEBU 4455 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.810 UTC [gossip.comm] sendToEndpoint -> DEBU 4456 Exiting" +"2019-09-24 01:05:38.846 UTC [gossip.comm] func1 -> DEBU 4457 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.847 UTC [gossip.gossip] handleMessage -> DEBU 4458 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.848 UTC [gossip.pull] HandleMessage -> DEBU 4459 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.848 UTC [msp] DeserializeIdentity -> DEBU 445a Obtaining identity" +"2019-09-24 01:05:38.849 UTC [msp] DeserializeIdentity -> DEBU 445b Obtaining identity" +"2019-09-24 01:05:38.849 UTC [msp] DeserializeIdentity -> DEBU 445c Obtaining identity" +"2019-09-24 01:05:38.850 UTC [msp] DeserializeIdentity -> DEBU 445d Obtaining identity" +"2019-09-24 01:05:38.850 UTC [msp] DeserializeIdentity -> DEBU 445e Obtaining identity" +"2019-09-24 01:05:38.851 UTC [msp] DeserializeIdentity -> DEBU 445f Obtaining identity" +"2019-09-24 01:05:38.852 UTC [gossip.pull] SendDigest -> DEBU 4460 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:38.852 UTC [gossip.gossip] handleMessage -> DEBU 4461 Exiting" +"2019-09-24 01:05:38.864 UTC [gossip.pull] Hello -> DEBU 4462 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:38.865 UTC [gossip.comm] Send -> DEBU 4463 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4464 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.865 UTC [gossip.comm] sendToEndpoint -> DEBU 4465 Exiting" +"2019-09-24 01:05:38.869 UTC [gossip.gossip] handleMessage -> DEBU 4466 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.870 UTC [gossip.pull] HandleMessage -> DEBU 4467 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.871 UTC [gossip.comm] func1 -> DEBU 4468 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.865 UTC [gossip.pull] Hello -> DEBU 4469 Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:38.872 UTC [gossip.comm] Send -> DEBU 446a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.873 UTC [gossip.pull] Hello -> DEBU 446b Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:38.873 UTC [gossip.comm] sendToEndpoint -> DEBU 446c Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.873 UTC [gossip.comm] sendToEndpoint -> DEBU 446d Exiting" +"2019-09-24 01:05:38.873 UTC [gossip.comm] Send -> DEBU 446e Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.873 UTC [gossip.gossip] handleMessage -> DEBU 446f Exiting" +"2019-09-24 01:05:38.874 UTC [gossip.gossip] handleMessage -> DEBU 4471 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.874 UTC [gossip.comm] sendToEndpoint -> DEBU 4470 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.874 UTC [gossip.comm] sendToEndpoint -> DEBU 4472 Exiting" +"2019-09-24 01:05:38.874 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4473 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.874 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4474 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:38.874 UTC [msp] DeserializeIdentity -> DEBU 4475 Obtaining identity" +"2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4476 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4477 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.875 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4478 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4479 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 447a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 447b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func1 -> DEBU 447c 0xc003d82490 gate 1569287138875544700 evaluation starts" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447d 0xc003d82490 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447e 0xc003d82490 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 447f 0xc003d82490 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func2 -> DEBU 4480 0xc003d82490 principal evaluation fails" +"2019-09-24 01:05:38.875 UTC [cauthdsl] func1 -> DEBU 4481 0xc003d82490 gate 1569287138875544700 evaluation fails" +"2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4482 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.875 UTC [policies] Evaluate -> DEBU 4483 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 4484 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 4485 0xc003d82cd0 gate 1569287138876133500 evaluation starts" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4486 0xc003d82cd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4487 0xc003d82cd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4488 0xc003d82cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4489 0xc003d82cd0 principal evaluation fails" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 448a 0xc003d82cd0 gate 1569287138876133500 evaluation fails" +"2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.876 UTC [policies] Evaluate -> DEBU 448d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func1 -> DEBU 448e 0xc003d83510 gate 1569287138876735400 evaluation starts" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 448f 0xc003d83510 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.876 UTC [cauthdsl] func2 -> DEBU 4490 0xc003d83510 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.877 UTC [cauthdsl] func2 -> DEBU 4491 0xc003d83510 principal matched by identity 0" +"2019-09-24 01:05:38.877 UTC [msp.identity] Verify -> DEBU 4492 Verify: digest = 00000000 4b 45 6f ef 1f 37 66 69 3c 76 f7 5c 7d 4d eb 42 |KEo..7fi DEBU 4493 Verify: sig = 00000000 30 45 02 21 00 99 a6 3f 69 be 48 7f a7 b5 db e6 |0E.!...?i.H.....| +00000010 f2 79 63 62 92 ca 62 8f 36 a0 52 e4 8e 2d 2d 8a |.ycb..b.6.R..--.| +00000020 42 d5 f7 7e 80 02 20 0a b7 50 e2 5d d0 0b ad 0c |B..~.. ..P.]....| +00000030 10 ef 8d f5 ca 36 53 85 24 b5 eb 64 da 88 8e c6 |.....6S.$..d....| +00000040 44 34 94 a9 b2 15 d4 |D4.....|" +"2019-09-24 01:05:38.877 UTC [cauthdsl] func2 -> DEBU 4494 0xc003d83510 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.877 UTC [cauthdsl] func1 -> DEBU 4495 0xc003d83510 gate 1569287138876735400 evaluation succeeds" +"2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4496 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4497 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4498 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.877 UTC [policies] Evaluate -> DEBU 4499 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.877 UTC [gossip.discovery] handleAliveMessage -> DEBU 449a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449c updating membership: timestamp: " +"2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449d Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 449f Exiting" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 44a0 Exiting" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44a1 Exiting" +"2019-09-24 01:05:38.878 UTC [gossip.discovery] sendMemResponse -> DEBU 44a2 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a3 Obtaining identity" +"2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a4 Obtaining identity" +"2019-09-24 01:05:38.878 UTC [msp] DeserializeIdentity -> DEBU 44a5 Obtaining identity" +"2019-09-24 01:05:38.878 UTC [gossip.comm] Send -> DEBU 44a6 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.879 UTC [gossip.discovery] sendMemResponse -> DEBU 44a7 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:38.874 UTC [gossip.gossip] handleMessage -> DEBU 44a8 Exiting" +"2019-09-24 01:05:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 44a9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.879 UTC [gossip.comm] sendToEndpoint -> DEBU 44aa Exiting" +"2019-09-24 01:05:38.879 UTC [gossip.comm] func1 -> DEBU 44ab Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.879 UTC [gossip.gossip] handleMessage -> DEBU 44ac Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.880 UTC [gossip.pull] HandleMessage -> DEBU 44ad GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.880 UTC [gossip.gossip] handleMessage -> DEBU 44ae Exiting" +"2019-09-24 01:05:38.880 UTC [gossip.comm] func1 -> DEBU 44af Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.881 UTC [gossip.gossip] handleMessage -> DEBU 44b0 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.881 UTC [gossip.pull] HandleMessage -> DEBU 44b1 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.881 UTC [gossip.gossip] handleMessage -> DEBU 44b2 Exiting" +"2019-09-24 01:05:38.901 UTC [msp] GetDefaultSigningIdentity -> DEBU 44b3 Obtaining default signing identity" +"2019-09-24 01:05:38.906 UTC [msp.identity] Sign -> DEBU 44b4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151032 " +"2019-09-24 01:05:38.906 UTC [msp.identity] Sign -> DEBU 44b5 Sign: digest: 65D0A0CBB8501BC902FBAF68B7A12E9BC04B6A9EB5C04CAC0092A15DE680DDA4 " +"2019-09-24 01:05:38.907 UTC [msp] GetDefaultSigningIdentity -> DEBU 44b6 Obtaining default signing identity" +"2019-09-24 01:05:38.907 UTC [msp.identity] Sign -> DEBU 44b7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:38.907 UTC [msp.identity] Sign -> DEBU 44b8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:38.908 UTC [msp] DeserializeIdentity -> DEBU 44b9 Obtaining identity" +"2019-09-24 01:05:38.908 UTC [gossip.comm] Send -> DEBU 44ba Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.909 UTC [msp] DeserializeIdentity -> DEBU 44bb Obtaining identity" +"2019-09-24 01:05:38.909 UTC [gossip.comm] Send -> DEBU 44bc Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44bd Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44be Exiting" +"2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44bf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.910 UTC [gossip.comm] sendToEndpoint -> DEBU 44c0 Exiting" +"2019-09-24 01:05:38.910 UTC [gossip.comm] Send -> DEBU 44c1 Entering, sending GossipMessage: tag:EMPTY mem_req:\002 h\023\024\262f\371\327\340\376\001\214M\276I\r\310\264\002\t\333\020a)\327\265{\337\276\036\217\266\264" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:38.913 UTC [gossip.comm] func1 -> DEBU 44c2 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.914 UTC [gossip.gossip] handleMessage -> DEBU 44c3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.913 UTC [gossip.comm] sendToEndpoint -> DEBU 44c4 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002 h\023\024\262f\371\327\340\376\001\214M\276I\r\310\264\002\t\333\020a)\327\265{\337\276\036\217\266\264" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.914 UTC [gossip.comm] sendToEndpoint -> DEBU 44c7 Exiting" +"2019-09-24 01:05:38.915 UTC [gossip.comm] func1 -> DEBU 44c8 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.914 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44c6 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.916 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44c9 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:38.916 UTC [msp.identity] Verify -> DEBU 44ca Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +"2019-09-24 01:05:38.917 UTC [msp.identity] Verify -> DEBU 44cb Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +00000040 18 72 92 68 59 fd |.r.hY.|" +"2019-09-24 01:05:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 44cc Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.917 UTC [gossip.discovery] isSentByMe -> DEBU 44cd Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.917 UTC [gossip.discovery] handleAliveMessage -> DEBU 44ce Exiting" +"2019-09-24 01:05:38.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44cf Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:38.918 UTC [msp] DeserializeIdentity -> DEBU 44d0 Obtaining identity" +"2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 44d1 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d2 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.918 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 44d3 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.919 UTC [policies] Evaluate -> DEBU 44d6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.919 UTC [cauthdsl] func1 -> DEBU 44d7 0xc003d3f870 gate 1569287138919520100 evaluation starts" +"2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44d8 0xc003d3f870 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44d9 0xc003d3f870 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.919 UTC [cauthdsl] func2 -> DEBU 44da 0xc003d3f870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44db 0xc003d3f870 principal evaluation fails" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44dc 0xc003d3f870 gate 1569287138919520100 evaluation fails" +"2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44dd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44de == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44df == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44e0 0xc003eae0b0 gate 1569287138920448900 evaluation starts" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e1 0xc003eae0b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e2 0xc003eae0b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e3 0xc003eae0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func2 -> DEBU 44e4 0xc003eae0b0 principal evaluation fails" +"2019-09-24 01:05:38.920 UTC [cauthdsl] func1 -> DEBU 44e5 0xc003eae0b0 gate 1569287138920448900 evaluation fails" +"2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44e6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.920 UTC [policies] Evaluate -> DEBU 44e7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.921 UTC [policies] Evaluate -> DEBU 44e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.921 UTC [cauthdsl] func1 -> DEBU 44e9 0xc003eae8f0 gate 1569287138921128900 evaluation starts" +"2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44ea 0xc003eae8f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44eb 0xc003eae8f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.921 UTC [cauthdsl] func2 -> DEBU 44ec 0xc003eae8f0 principal matched by identity 0" +"2019-09-24 01:05:38.921 UTC [msp.identity] Verify -> DEBU 44ed Verify: digest = 00000000 4b 45 6f ef 1f 37 66 69 3c 76 f7 5c 7d 4d eb 42 |KEo..7fi DEBU 44ee Verify: sig = 00000000 30 45 02 21 00 99 a6 3f 69 be 48 7f a7 b5 db e6 |0E.!...?i.H.....| +00000010 f2 79 63 62 92 ca 62 8f 36 a0 52 e4 8e 2d 2d 8a |.ycb..b.6.R..--.| +00000020 42 d5 f7 7e 80 02 20 0a b7 50 e2 5d d0 0b ad 0c |B..~.. ..P.]....| +00000030 10 ef 8d f5 ca 36 53 85 24 b5 eb 64 da 88 8e c6 |.....6S.$..d....| +00000040 44 34 94 a9 b2 15 d4 |D4.....|" +"2019-09-24 01:05:38.922 UTC [cauthdsl] func2 -> DEBU 44ef 0xc003eae8f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.922 UTC [cauthdsl] func1 -> DEBU 44f0 0xc003eae8f0 gate 1569287138921128900 evaluation succeeds" +"2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f1 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f3 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.922 UTC [policies] Evaluate -> DEBU 44f4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f5 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44f6 Exiting" +"2019-09-24 01:05:38.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 44f7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:38.923 UTC [msp.identity] Verify -> DEBU 44f8 Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +"2019-09-24 01:05:38.923 UTC [msp.identity] Verify -> DEBU 44f9 Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +"2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 44fb Exiting" +"2019-09-24 01:05:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44fc Exiting" +"2019-09-24 01:05:38.914 UTC [gossip.gossip] handleMessage -> DEBU 44c5 Exiting" +"2019-09-24 01:05:38.924 UTC [gossip.gossip] handleMessage -> DEBU 44fd Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.924 UTC [gossip.gossip] handleMessage -> DEBU 44fe Exiting" +"2019-09-24 01:05:38.924 UTC [gossip.discovery] handleMsgFromComm -> DEBU 44ff Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4500 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:38.924 UTC [msp.identity] Verify -> DEBU 4501 Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +"2019-09-24 01:05:38.924 UTC [msp.identity] Verify -> DEBU 4502 Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +00000040 18 72 92 68 59 fd |.r.hY.|" +"2019-09-24 01:05:38.925 UTC [msp.identity] Verify -> DEBU 4503 Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:38.925 UTC [msp.identity] Verify -> DEBU 4504 Verify: sig = 00000000 30 45 02 21 00 ca f7 d6 bf 1a 76 b5 cf e8 ac f3 |0E.!......v.....| +00000010 22 e0 d2 13 22 ab 1c aa dd d8 04 7a 64 ee 89 e7 |"..."......zd...| +00000020 15 58 30 72 3e 02 20 68 13 14 b2 66 f9 d7 e0 fe |.X0r>. h...f....| +00000030 01 8c 4d be 49 0d c8 b4 02 09 db 10 61 29 d7 b5 |..M.I.......a)..| +00000040 7b df be 1e 8f b6 b4 |{......|" +"2019-09-24 01:05:38.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4505 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:38.925 UTC [gossip.discovery] isSentByMe -> DEBU 4506 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:38.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4507 Exiting" +"2019-09-24 01:05:38.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4508 Exiting" +"2019-09-24 01:05:38.931 UTC [gossip.gossip] handleMessage -> DEBU 4509 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 450b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:38.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 450c Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:38.933 UTC [msp.identity] Verify -> DEBU 450d Verify: digest = 00000000 65 d0 a0 cb b8 50 1b c9 02 fb af 68 b7 a1 2e 9b |e....P.....h....| +00000010 c0 4b 6a 9e b5 c0 4c ac 00 92 a1 5d e6 80 dd a4 |.Kj...L....]....|" +"2019-09-24 01:05:38.933 UTC [msp.identity] Verify -> DEBU 450e Verify: sig = 00000000 30 44 02 20 7b 8a bf 88 67 79 c2 c1 17 18 9b 8b |0D. {...gy......| +00000010 bb 68 21 ef ae a5 5b 4c 63 78 d1 f5 d5 47 3a 74 |.h!...[Lcx...G:t| +00000020 ed 66 f5 ea 02 20 56 68 cc 79 1b 3c db 05 00 c1 |.f... Vh.y.<....| +00000030 a8 ad 63 aa 7c 2d 64 5f d3 b5 98 6e 73 57 46 23 |..c.|-d_...nsWF#| +00000040 18 72 92 68 59 fd |.r.hY.|" +"2019-09-24 01:05:38.934 UTC [gossip.discovery] handleAliveMessage -> DEBU 450f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.935 UTC [gossip.discovery] isSentByMe -> DEBU 4510 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:38.935 UTC [gossip.discovery] handleAliveMessage -> DEBU 4511 Exiting" +"2019-09-24 01:05:38.936 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4512 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:38.936 UTC [msp] DeserializeIdentity -> DEBU 4513 Obtaining identity" +"2019-09-24 01:05:38.937 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4514 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:38.937 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4515 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.938 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4516 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4517 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4518 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:38.938 UTC [policies] Evaluate -> DEBU 4519 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:38.939 UTC [cauthdsl] func1 -> DEBU 451a 0xc003d23070 gate 1569287138939855000 evaluation starts" +"2019-09-24 01:05:38.940 UTC [cauthdsl] func2 -> DEBU 451b 0xc003d23070 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.940 UTC [cauthdsl] func2 -> DEBU 451c 0xc003d23070 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.941 UTC [cauthdsl] func2 -> DEBU 451d 0xc003d23070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:38.941 UTC [cauthdsl] func2 -> DEBU 451e 0xc003d23070 principal evaluation fails" +"2019-09-24 01:05:38.941 UTC [cauthdsl] func1 -> DEBU 451f 0xc003d23070 gate 1569287138939855000 evaluation fails" +"2019-09-24 01:05:38.942 UTC [policies] Evaluate -> DEBU 4520 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.942 UTC [policies] Evaluate -> DEBU 4521 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:38.943 UTC [policies] Evaluate -> DEBU 4522 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:38.943 UTC [cauthdsl] func1 -> DEBU 4523 0xc003d238b0 gate 1569287138943650400 evaluation starts" +"2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4524 0xc003d238b0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4525 0xc003d238b0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.944 UTC [cauthdsl] func2 -> DEBU 4526 0xc003d238b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:38.945 UTC [cauthdsl] func2 -> DEBU 4527 0xc003d238b0 principal evaluation fails" +"2019-09-24 01:05:38.945 UTC [cauthdsl] func1 -> DEBU 4528 0xc003d238b0 gate 1569287138943650400 evaluation fails" +"2019-09-24 01:05:38.945 UTC [policies] Evaluate -> DEBU 4529 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.946 UTC [policies] Evaluate -> DEBU 452a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:38.946 UTC [policies] Evaluate -> DEBU 452b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:38.946 UTC [cauthdsl] func1 -> DEBU 452c 0xc003f9c0f0 gate 1569287138946963500 evaluation starts" +"2019-09-24 01:05:38.947 UTC [cauthdsl] func2 -> DEBU 452d 0xc003f9c0f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:38.947 UTC [cauthdsl] func2 -> DEBU 452e 0xc003f9c0f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:38.948 UTC [cauthdsl] func2 -> DEBU 452f 0xc003f9c0f0 principal matched by identity 0" +"2019-09-24 01:05:38.948 UTC [msp.identity] Verify -> DEBU 4530 Verify: digest = 00000000 cc 9c dc 03 6f 9c 5c a5 68 52 33 e0 b4 6e 52 e1 |....o.\.hR3..nR.| +00000010 87 9f 17 53 34 90 73 8b 52 20 a1 ca 64 9e 50 20 |...S4.s.R ..d.P |" +"2019-09-24 01:05:38.948 UTC [msp.identity] Verify -> DEBU 4531 Verify: sig = 00000000 30 45 02 21 00 9a 84 47 2b 0f 2f d9 fb e4 db 31 |0E.!...G+./....1| +00000010 eb 37 e5 c1 09 19 54 3d 92 57 ff 7a c8 09 b4 ec |.7....T=.W.z....| +00000020 49 83 a0 fa 2c 02 20 2b 7e 93 60 7a ab 87 e9 00 |I...,. +~.`z....| +00000030 07 68 53 57 71 c9 e0 a5 30 07 57 31 ac 45 38 09 |.hSWq...0.W1.E8.| +00000040 2c fd d0 61 f0 32 b9 |,..a.2.|" +"2019-09-24 01:05:38.948 UTC [cauthdsl] func2 -> DEBU 4532 0xc003f9c0f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:38.949 UTC [cauthdsl] func1 -> DEBU 4533 0xc003f9c0f0 gate 1569287138946963500 evaluation succeeds" +"2019-09-24 01:05:38.931 UTC [gossip.gossip] handleMessage -> DEBU 450a Exiting" +"2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4534 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4535 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:38.952 UTC [policies] Evaluate -> DEBU 4536 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:38.953 UTC [policies] Evaluate -> DEBU 4537 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4538 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.953 UTC [gossip.discovery] handleAliveMessage -> DEBU 4539 Exiting" +"2019-09-24 01:05:38.953 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 453a Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:38.954 UTC [msp.identity] Verify -> DEBU 453b Verify: digest = 00000000 a9 71 62 30 5a d5 74 45 9a 4c 61 ef 6b ea 77 de |.qb0Z.tE.La.k.w.| +00000010 2b 95 0e 72 c0 ba ef 7c ee 9a 08 b1 ff 67 88 04 |+..r...|.....g..|" +"2019-09-24 01:05:38.954 UTC [msp.identity] Verify -> DEBU 453c Verify: sig = 00000000 30 45 02 21 00 e3 21 94 3f 2a 2a db ad 41 9b fa |0E.!..!.?**..A..| +00000010 54 86 62 24 ab d0 53 e4 e3 3b 54 cf 29 2b 62 8e |T.b$..S..;T.)+b.| +00000020 c5 89 eb 9f 46 02 20 22 92 3a b8 d7 52 47 db 06 |....F. ".:..RG..| +00000030 ce a2 80 15 0d 6f f0 d9 9e 2d d4 46 1f 2f c2 d6 |.....o...-.F./..| +00000040 85 73 ca 21 5e d8 93 |.s.!^..|" +"2019-09-24 01:05:38.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 453d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:38.955 UTC [gossip.discovery] handleAliveMessage -> DEBU 453e Exiting" +"2019-09-24 01:05:38.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 453f Exiting" +"2019-09-24 01:05:39.141 UTC [gossip.comm] func1 -> DEBU 4540 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.142 UTC [gossip.gossip] handleMessage -> DEBU 4541 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.143 UTC [gossip.gossip] handleMessage -> DEBU 4542 Exiting" +"2019-09-24 01:05:39.143 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4543 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.146 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4544 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:39.146 UTC [msp] DeserializeIdentity -> DEBU 4545 Obtaining identity" +"2019-09-24 01:05:39.147 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4546 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:39.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4547 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:39.148 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4548 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:39.148 UTC [policies] Evaluate -> DEBU 4549 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:39.149 UTC [policies] Evaluate -> DEBU 454a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.150 UTC [policies] Evaluate -> DEBU 454b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:39.150 UTC [cauthdsl] func1 -> DEBU 454c 0xc003d39850 gate 1569287139150867200 evaluation starts" +"2019-09-24 01:05:39.152 UTC [cauthdsl] func2 -> DEBU 454d 0xc003d39850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.152 UTC [cauthdsl] func2 -> DEBU 454e 0xc003d39850 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.153 UTC [cauthdsl] func2 -> DEBU 454f 0xc003d39850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:39.153 UTC [cauthdsl] func2 -> DEBU 4550 0xc003d39850 principal evaluation fails" +"2019-09-24 01:05:39.154 UTC [cauthdsl] func1 -> DEBU 4551 0xc003d39850 gate 1569287139150867200 evaluation fails" +"2019-09-24 01:05:39.155 UTC [policies] Evaluate -> DEBU 4552 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.158 UTC [policies] Evaluate -> DEBU 4553 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.158 UTC [policies] Evaluate -> DEBU 4554 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:39.159 UTC [cauthdsl] func1 -> DEBU 4555 0xc003fbe090 gate 1569287139158935800 evaluation starts" +"2019-09-24 01:05:39.159 UTC [cauthdsl] func2 -> DEBU 4556 0xc003fbe090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4557 0xc003fbe090 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4558 0xc003fbe090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:39.160 UTC [cauthdsl] func2 -> DEBU 4559 0xc003fbe090 principal evaluation fails" +"2019-09-24 01:05:39.161 UTC [cauthdsl] func1 -> DEBU 455a 0xc003fbe090 gate 1569287139158935800 evaluation fails" +"2019-09-24 01:05:39.161 UTC [policies] Evaluate -> DEBU 455b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.162 UTC [policies] Evaluate -> DEBU 455c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.162 UTC [policies] Evaluate -> DEBU 455d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:39.163 UTC [cauthdsl] func1 -> DEBU 455e 0xc003fbe8d0 gate 1569287139163410800 evaluation starts" +"2019-09-24 01:05:39.163 UTC [cauthdsl] func2 -> DEBU 455f 0xc003fbe8d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.164 UTC [cauthdsl] func2 -> DEBU 4560 0xc003fbe8d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.164 UTC [cauthdsl] func2 -> DEBU 4561 0xc003fbe8d0 principal matched by identity 0" +"2019-09-24 01:05:39.164 UTC [msp.identity] Verify -> DEBU 4562 Verify: digest = 00000000 98 86 81 1c a3 fa ac 03 00 85 76 a2 41 0c 21 e3 |..........v.A.!.| +00000010 30 46 ef e2 31 ba 8c 7d 22 37 c8 e7 d4 ac bf ea |0F..1..}"7......|" +"2019-09-24 01:05:39.165 UTC [msp.identity] Verify -> DEBU 4563 Verify: sig = 00000000 30 45 02 21 00 de 95 5e 95 e9 14 4a 0e 98 38 60 |0E.!...^...J..8`| +00000010 f5 d0 b2 ba 30 66 5d 6b 4b ad 60 8e 48 6e 37 70 |....0f]kK.`.Hn7p| +00000020 7c f5 e9 04 ae 02 20 2c 91 f5 44 0c 2f ed 09 83 ||..... ,..D./...| +00000030 d8 14 19 39 fe 96 c2 4f 13 9b 82 59 5c 5f 13 6a |...9...O...Y\_.j| +00000040 1b 78 d2 55 47 0e 6b |.x.UG.k|" +"2019-09-24 01:05:39.166 UTC [cauthdsl] func2 -> DEBU 4564 0xc003fbe8d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.166 UTC [cauthdsl] func1 -> DEBU 4565 0xc003fbe8d0 gate 1569287139163410800 evaluation succeeds" +"2019-09-24 01:05:39.166 UTC [policies] Evaluate -> DEBU 4566 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.166 UTC [policies] Evaluate -> DEBU 4567 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.167 UTC [policies] Evaluate -> DEBU 4568 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:39.167 UTC [policies] Evaluate -> DEBU 4569 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:39.167 UTC [gossip.discovery] handleAliveMessage -> DEBU 456a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.167 UTC [gossip.discovery] learnExistingMembers -> DEBU 456b Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456c updating membership: timestamp: " +"2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456d Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:39.168 UTC [gossip.discovery] learnExistingMembers -> DEBU 456e Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:39.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 456f Exiting" +"2019-09-24 01:05:39.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 4570 Exiting" +"2019-09-24 01:05:39.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4571 Exiting" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4572 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4573 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4574 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4575 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4576 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4577 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [gossip.comm] Send -> DEBU 4578 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 4579 Obtaining identity" +"2019-09-24 01:05:39.170 UTC [msp] DeserializeIdentity -> DEBU 457a Obtaining identity" +"2019-09-24 01:05:39.171 UTC [gossip.comm] Send -> DEBU 457b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 457c Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 457d Exiting" +"2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 457e Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 457f Exiting" +"2019-09-24 01:05:39.171 UTC [gossip.gossip] handleMessage -> DEBU 4580 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4581 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 4582 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4583 Exiting" +"2019-09-24 01:05:39.171 UTC [gossip.comm] sendToEndpoint -> DEBU 4584 Exiting" +"2019-09-24 01:05:39.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4585 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.171 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4586 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:39.171 UTC [msp] DeserializeIdentity -> DEBU 4587 Obtaining identity" +"2019-09-24 01:05:39.171 UTC [gossip.comm] func1 -> DEBU 4588 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.171 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4589 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:39.171 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:39.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 458b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 458e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 458f 0xc003df2bc0 gate 1569287139172148000 evaluation starts" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4590 0xc003df2bc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4591 0xc003df2bc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4592 0xc003df2bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4593 0xc003df2bc0 principal evaluation fails" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 4594 0xc003df2bc0 gate 1569287139172148000 evaluation fails" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4595 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4596 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 4597 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 4598 0xc003df3400 gate 1569287139172405900 evaluation starts" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 4599 0xc003df3400 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459a 0xc003df3400 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459b 0xc003df3400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 459c 0xc003df3400 principal evaluation fails" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 459d 0xc003df3400 gate 1569287139172405900 evaluation fails" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 459e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 459f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:39.172 UTC [policies] Evaluate -> DEBU 45a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func1 -> DEBU 45a1 0xc003df3c40 gate 1569287139172649000 evaluation starts" +"2019-09-24 01:05:39.172 UTC [cauthdsl] func2 -> DEBU 45a2 0xc003df3c40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:39.180 UTC [cauthdsl] func2 -> DEBU 45a6 0xc003df3c40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:39.177 UTC [gossip.comm] func1 -> DEBU 45a3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.178 UTC [gossip.comm] func1 -> DEBU 45a4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.179 UTC [gossip.gossip] handleMessage -> DEBU 45a5 Exiting" +"2019-09-24 01:05:39.182 UTC [gossip.gossip] handleMessage -> DEBU 45a7 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.182 UTC [cauthdsl] func2 -> DEBU 45a8 0xc003df3c40 principal matched by identity 0" +"2019-09-24 01:05:39.182 UTC [msp.identity] Verify -> DEBU 45a9 Verify: digest = 00000000 17 80 38 45 ea c9 00 09 d9 8e d0 e0 03 af c6 39 |..8E...........9| +00000010 17 d9 af 28 59 3d 50 8c 0e dc 48 07 ac bf 8b 67 |...(Y=P...H....g|" +"2019-09-24 01:05:39.183 UTC [msp.identity] Verify -> DEBU 45aa Verify: sig = 00000000 30 44 02 20 7d 45 7e 8c 6f a9 68 f6 5a 9b 60 65 |0D. }E~.o.h.Z.`e| +00000010 05 7d 58 48 1b 9c 5e 8a 2a 6d ba f2 6b 16 f9 dc |.}XH..^.*m..k...| +00000020 3d bc 4b 3b 02 20 41 8f 5c 9a ec ae d7 b6 e1 a7 |=.K;. A.\.......| +00000030 92 8a 34 0f 3d ba 3b 15 c4 ad cb 82 31 b7 47 33 |..4.=.;.....1.G3| +00000040 b5 ad b1 a2 ef 9f |......|" +"2019-09-24 01:05:39.183 UTC [cauthdsl] func2 -> DEBU 45ab 0xc003df3c40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:39.184 UTC [cauthdsl] func1 -> DEBU 45ac 0xc003df3c40 gate 1569287139172649000 evaluation succeeds" +"2019-09-24 01:05:39.184 UTC [policies] Evaluate -> DEBU 45ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.185 UTC [policies] Evaluate -> DEBU 45ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:39.185 UTC [policies] Evaluate -> DEBU 45af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:39.186 UTC [policies] Evaluate -> DEBU 45b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:39.189 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.189 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b3 updating membership: timestamp: " +"2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b4 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:39.190 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:39.191 UTC [gossip.discovery] learnExistingMembers -> DEBU 45b6 Exiting" +"2019-09-24 01:05:39.191 UTC [gossip.discovery] handleAliveMessage -> DEBU 45b7 Exiting" +"2019-09-24 01:05:39.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b8 Exiting" +"2019-09-24 01:05:39.191 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45b9 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.192 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45bb Exiting" +"2019-09-24 01:05:39.191 UTC [gossip.gossip] handleMessage -> DEBU 45ba Exiting" +"2019-09-24 01:05:39.192 UTC [msp] DeserializeIdentity -> DEBU 45bc Obtaining identity" +"2019-09-24 01:05:39.193 UTC [gossip.gossip] handleMessage -> DEBU 45bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45be Obtaining identity" +"2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45c0 Obtaining identity" +"2019-09-24 01:05:39.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.194 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c3 Exiting" +"2019-09-24 01:05:39.194 UTC [msp] DeserializeIdentity -> DEBU 45c2 Obtaining identity" +"2019-09-24 01:05:39.194 UTC [gossip.gossip] handleMessage -> DEBU 45bf Exiting" +"2019-09-24 01:05:39.195 UTC [gossip.gossip] handleMessage -> DEBU 45c4 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.196 UTC [msp] DeserializeIdentity -> DEBU 45c5 Obtaining identity" +"2019-09-24 01:05:39.197 UTC [msp] DeserializeIdentity -> DEBU 45c8 Obtaining identity" +"2019-09-24 01:05:39.197 UTC [msp] DeserializeIdentity -> DEBU 45c9 Obtaining identity" +"2019-09-24 01:05:39.195 UTC [gossip.gossip] handleMessage -> DEBU 45c6 Exiting" +"2019-09-24 01:05:39.196 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45c7 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.197 UTC [gossip.comm] Send -> DEBU 45ca Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:39.198 UTC [msp] DeserializeIdentity -> DEBU 45cc Obtaining identity" +"2019-09-24 01:05:39.198 UTC [msp] DeserializeIdentity -> DEBU 45cd Obtaining identity" +"2019-09-24 01:05:39.198 UTC [gossip.comm] Send -> DEBU 45ce Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:39.198 UTC [gossip.comm] sendToEndpoint -> DEBU 45cf Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.198 UTC [gossip.comm] sendToEndpoint -> DEBU 45d0 Exiting" +"2019-09-24 01:05:39.197 UTC [gossip.discovery] handleMsgFromComm -> DEBU 45cb Exiting" +"2019-09-24 01:05:39.199 UTC [gossip.comm] sendToEndpoint -> DEBU 45d1 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:39.199 UTC [gossip.comm] sendToEndpoint -> DEBU 45d2 Exiting" +"2019-09-24 01:05:39.235 UTC [msp] GetDefaultSigningIdentity -> DEBU 45d3 Obtaining default signing identity" +"2019-09-24 01:05:39.235 UTC [msp.identity] Sign -> DEBU 45d4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151033 " +"2019-09-24 01:05:39.236 UTC [msp.identity] Sign -> DEBU 45d5 Sign: digest: B84C49A82B49ADC37F86B155BFFE4074C297B4CB5EA78A0AD0F0E891B92E074E " +"2019-09-24 01:05:39.236 UTC [msp] GetDefaultSigningIdentity -> DEBU 45d6 Obtaining default signing identity" +"2019-09-24 01:05:39.236 UTC [msp.identity] Sign -> DEBU 45d7 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:39.237 UTC [msp.identity] Sign -> DEBU 45d8 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:39.237 UTC [gossip.discovery] periodicalSendAlive -> DEBU 45d9 Sleeping 5s" +"2019-09-24 01:05:39.239 UTC [msp] DeserializeIdentity -> DEBU 45da Obtaining identity" +"2019-09-24 01:05:39.240 UTC [msp] DeserializeIdentity -> DEBU 45db Obtaining identity" +"2019-09-24 01:05:39.240 UTC [gossip.comm] Send -> DEBU 45dc Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:39.241 UTC [msp] DeserializeIdentity -> DEBU 45dd Obtaining identity" +"2019-09-24 01:05:39.241 UTC [gossip.comm] sendToEndpoint -> DEBU 45de Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:39.241 UTC [gossip.comm] sendToEndpoint -> DEBU 45df Exiting" +"2019-09-24 01:05:39.241 UTC [gossip.comm] Send -> DEBU 45e0 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:39.242 UTC [msp] DeserializeIdentity -> DEBU 45e1 Obtaining identity" +"2019-09-24 01:05:39.242 UTC [gossip.comm] sendToEndpoint -> DEBU 45e2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.242 UTC [gossip.comm] sendToEndpoint -> DEBU 45e3 Exiting" +"2019-09-24 01:05:39.243 UTC [gossip.comm] Send -> DEBU 45e4 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:39.244 UTC [gossip.comm] sendToEndpoint -> DEBU 45e5 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:39.245 UTC [gossip.comm] sendToEndpoint -> DEBU 45e6 Exiting" +"2019-09-24 01:05:41.661 UTC [msp] DeserializeIdentity -> DEBU 45e7 Obtaining identity" +"2019-09-24 01:05:41.662 UTC [msp] DeserializeIdentity -> DEBU 45e8 Obtaining identity" +"2019-09-24 01:05:41.663 UTC [gossip.comm] Send -> DEBU 45e9 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:41.664 UTC [gossip.comm] sendToEndpoint -> DEBU 45ea Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.664 UTC [gossip.comm] sendToEndpoint -> DEBU 45eb Exiting" +"2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ec Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ed Exiting" +"2019-09-24 01:05:41.665 UTC [gossip.comm] sendToEndpoint -> DEBU 45ee Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.666 UTC [gossip.comm] sendToEndpoint -> DEBU 45ef Exiting" +"2019-09-24 01:05:41.667 UTC [gossip.gossip] handleMessage -> DEBU 45f0 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.668 UTC [msp.identity] Verify -> DEBU 45f1 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:41.668 UTC [msp.identity] Verify -> DEBU 45f2 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:41.671 UTC [gossip.comm] func1 -> DEBU 45f3 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.671 UTC [gossip.comm] func1 -> DEBU 45f4 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.672 UTC [msp.identity] Verify -> DEBU 45f5 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:41.672 UTC [msp.identity] Verify -> DEBU 45f6 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:41.673 UTC [msp] DeserializeIdentity -> DEBU 45f7 Obtaining identity" +"2019-09-24 01:05:41.673 UTC [msp] DeserializeIdentity -> DEBU 45f8 Obtaining identity" +"2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 45f9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45fa Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.674 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 45fb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.675 UTC [policies] Evaluate -> DEBU 45fe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.680 UTC [cauthdsl] func1 -> DEBU 45ff 0xc003aa2950 gate 1569287141680073200 evaluation starts" +"2019-09-24 01:05:41.680 UTC [cauthdsl] func2 -> DEBU 4600 0xc003aa2950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.680 UTC [cauthdsl] func2 -> DEBU 4601 0xc003aa2950 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.681 UTC [cauthdsl] func2 -> DEBU 4602 0xc003aa2950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.681 UTC [cauthdsl] func2 -> DEBU 4603 0xc003aa2950 principal evaluation fails" +"2019-09-24 01:05:41.681 UTC [cauthdsl] func1 -> DEBU 4604 0xc003aa2950 gate 1569287141680073200 evaluation fails" +"2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4605 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4606 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.682 UTC [policies] Evaluate -> DEBU 4607 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.682 UTC [cauthdsl] func1 -> DEBU 4608 0xc003aa3190 gate 1569287141682801000 evaluation starts" +"2019-09-24 01:05:41.682 UTC [cauthdsl] func2 -> DEBU 4609 0xc003aa3190 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460a 0xc003aa3190 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460b 0xc003aa3190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.683 UTC [cauthdsl] func2 -> DEBU 460c 0xc003aa3190 principal evaluation fails" +"2019-09-24 01:05:41.683 UTC [cauthdsl] func1 -> DEBU 460d 0xc003aa3190 gate 1569287141682801000 evaluation fails" +"2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 460e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 460f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.684 UTC [policies] Evaluate -> DEBU 4610 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.693 UTC [cauthdsl] func1 -> DEBU 4611 0xc003aa39d0 gate 1569287141693386900 evaluation starts" +"2019-09-24 01:05:41.693 UTC [cauthdsl] func2 -> DEBU 4612 0xc003aa39d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.694 UTC [cauthdsl] func2 -> DEBU 4613 0xc003aa39d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.694 UTC [cauthdsl] func2 -> DEBU 4614 0xc003aa39d0 principal matched by identity 0" +"2019-09-24 01:05:41.694 UTC [msp.identity] Verify -> DEBU 4615 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:41.694 UTC [msp.identity] Verify -> DEBU 4616 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:41.695 UTC [cauthdsl] func2 -> DEBU 4617 0xc003aa39d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.695 UTC [cauthdsl] func1 -> DEBU 4618 0xc003aa39d0 gate 1569287141693386900 evaluation succeeds" +"2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 4619 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 461a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.696 UTC [policies] Evaluate -> DEBU 461b Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.698 UTC [policies] Evaluate -> DEBU 461c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.698 UTC [msp] DeserializeIdentity -> DEBU 461d Obtaining identity" +"2019-09-24 01:05:41.699 UTC [msp] DeserializeIdentity -> DEBU 461e Obtaining identity" +"2019-09-24 01:05:41.699 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 461f Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4620 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.702 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4621 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4622 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4623 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.703 UTC [policies] Evaluate -> DEBU 4624 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.704 UTC [cauthdsl] func1 -> DEBU 4625 0xc0037151a0 gate 1569287141704048100 evaluation starts" +"2019-09-24 01:05:41.704 UTC [cauthdsl] func2 -> DEBU 4626 0xc0037151a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.704 UTC [cauthdsl] func2 -> DEBU 4627 0xc0037151a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.705 UTC [cauthdsl] func2 -> DEBU 4628 0xc0037151a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.705 UTC [cauthdsl] func2 -> DEBU 4629 0xc0037151a0 principal evaluation fails" +"2019-09-24 01:05:41.705 UTC [cauthdsl] func1 -> DEBU 462a 0xc0037151a0 gate 1569287141704048100 evaluation fails" +"2019-09-24 01:05:41.705 UTC [policies] Evaluate -> DEBU 462b Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.706 UTC [policies] Evaluate -> DEBU 462c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.707 UTC [policies] Evaluate -> DEBU 462d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.707 UTC [cauthdsl] func1 -> DEBU 462e 0xc0037159e0 gate 1569287141707456400 evaluation starts" +"2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 462f 0xc0037159e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 4630 0xc0037159e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.708 UTC [cauthdsl] func2 -> DEBU 4631 0xc0037159e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.709 UTC [cauthdsl] func2 -> DEBU 4632 0xc0037159e0 principal evaluation fails" +"2019-09-24 01:05:41.710 UTC [cauthdsl] func1 -> DEBU 4633 0xc0037159e0 gate 1569287141707456400 evaluation fails" +"2019-09-24 01:05:41.710 UTC [policies] Evaluate -> DEBU 4634 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.710 UTC [policies] Evaluate -> DEBU 4635 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.711 UTC [policies] Evaluate -> DEBU 4636 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.711 UTC [cauthdsl] func1 -> DEBU 4637 0xc00372a220 gate 1569287141711467900 evaluation starts" +"2019-09-24 01:05:41.712 UTC [cauthdsl] func2 -> DEBU 4638 0xc00372a220 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.713 UTC [cauthdsl] func2 -> DEBU 4639 0xc00372a220 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.714 UTC [cauthdsl] func2 -> DEBU 463a 0xc00372a220 principal matched by identity 0" +"2019-09-24 01:05:41.715 UTC [msp.identity] Verify -> DEBU 463b Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:41.715 UTC [msp.identity] Verify -> DEBU 463c Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:41.716 UTC [cauthdsl] func2 -> DEBU 463d 0xc00372a220 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.716 UTC [cauthdsl] func1 -> DEBU 463e 0xc00372a220 gate 1569287141711467900 evaluation succeeds" +"2019-09-24 01:05:41.717 UTC [policies] Evaluate -> DEBU 463f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.717 UTC [policies] Evaluate -> DEBU 4640 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.718 UTC [policies] Evaluate -> DEBU 4641 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.718 UTC [policies] Evaluate -> DEBU 4642 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.718 UTC [gossip.gossip] handleMessage -> DEBU 4643 Exiting" +"2019-09-24 01:05:41.719 UTC [gossip.gossip] handleMessage -> DEBU 4644 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.719 UTC [msp] DeserializeIdentity -> DEBU 4645 Obtaining identity" +"2019-09-24 01:05:41.719 UTC [msp] DeserializeIdentity -> DEBU 4646 Obtaining identity" +"2019-09-24 01:05:41.720 UTC [msp] DeserializeIdentity -> DEBU 4647 Obtaining identity" +"2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4648 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4649 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.721 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 464a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.722 UTC [policies] Evaluate -> DEBU 464b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.722 UTC [policies] Evaluate -> DEBU 464c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.723 UTC [policies] Evaluate -> DEBU 464d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.723 UTC [cauthdsl] func1 -> DEBU 464e 0xc00372bd30 gate 1569287141723289700 evaluation starts" +"2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 464f 0xc00372bd30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 4650 0xc00372bd30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.723 UTC [cauthdsl] func2 -> DEBU 4651 0xc00372bd30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.724 UTC [cauthdsl] func2 -> DEBU 4652 0xc00372bd30 principal evaluation fails" +"2019-09-24 01:05:41.725 UTC [cauthdsl] func1 -> DEBU 4653 0xc00372bd30 gate 1569287141723289700 evaluation fails" +"2019-09-24 01:05:41.725 UTC [policies] Evaluate -> DEBU 4654 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.726 UTC [policies] Evaluate -> DEBU 4655 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.726 UTC [policies] Evaluate -> DEBU 4656 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.726 UTC [cauthdsl] func1 -> DEBU 4657 0xc003744570 gate 1569287141726708300 evaluation starts" +"2019-09-24 01:05:41.726 UTC [cauthdsl] func2 -> DEBU 4658 0xc003744570 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 4659 0xc003744570 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 465a 0xc003744570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.727 UTC [cauthdsl] func2 -> DEBU 465b 0xc003744570 principal evaluation fails" +"2019-09-24 01:05:41.728 UTC [cauthdsl] func1 -> DEBU 465c 0xc003744570 gate 1569287141726708300 evaluation fails" +"2019-09-24 01:05:41.728 UTC [policies] Evaluate -> DEBU 465f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.728 UTC [gossip.election] waitForInterrupt -> DEBU 465d d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:41.732 UTC [gossip.election] IsLeader -> DEBU 4660 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:41.733 UTC [msp] GetDefaultSigningIdentity -> DEBU 4661 Obtaining default signing identity" +"2019-09-24 01:05:41.733 UTC [msp.identity] Sign -> DEBU 4662 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510101801 " +"2019-09-24 01:05:41.733 UTC [msp.identity] Sign -> DEBU 4663 Sign: digest: 740CFEDA073FC3B70460A8930376A395A79C056501F0C94824D114E1C60A9B09 " +"2019-09-24 01:05:41.734 UTC [gossip.election] waitForInterrupt -> DEBU 4664 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:41.728 UTC [msp] DeserializeIdentity -> DEBU 465e Obtaining identity" +"2019-09-24 01:05:41.735 UTC [msp] DeserializeIdentity -> DEBU 4665 Obtaining identity" +"2019-09-24 01:05:41.735 UTC [gossip.pull] Hello -> DEBU 4666 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:41.736 UTC [msp] DeserializeIdentity -> DEBU 4667 Obtaining identity" +"2019-09-24 01:05:41.736 UTC [msp] DeserializeIdentity -> DEBU 4668 Obtaining identity" +"2019-09-24 01:05:41.737 UTC [gossip.comm] Send -> DEBU 4669 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:41.737 UTC [gossip.comm] sendToEndpoint -> DEBU 466a Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.738 UTC [gossip.comm] sendToEndpoint -> DEBU 466b Exiting" +"2019-09-24 01:05:41.738 UTC [msp] DeserializeIdentity -> DEBU 466c Obtaining identity" +"2019-09-24 01:05:41.739 UTC [msp] DeserializeIdentity -> DEBU 466d Obtaining identity" +"2019-09-24 01:05:41.739 UTC [msp] DeserializeIdentity -> DEBU 466e Obtaining identity" +"2019-09-24 01:05:41.740 UTC [msp] DeserializeIdentity -> DEBU 466f Obtaining identity" +"2019-09-24 01:05:41.740 UTC [gossip.comm] Send -> DEBU 4670 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:41.742 UTC [msp] DeserializeIdentity -> DEBU 4671 Obtaining identity" +"2019-09-24 01:05:41.743 UTC [msp] DeserializeIdentity -> DEBU 4672 Obtaining identity" +"2019-09-24 01:05:41.743 UTC [gossip.comm] sendToEndpoint -> DEBU 4673 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:41.744 UTC [gossip.comm] sendToEndpoint -> DEBU 4674 Exiting" +"2019-09-24 01:05:41.729 UTC [policies] Evaluate -> DEBU 4675 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.745 UTC [policies] Evaluate -> DEBU 4676 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.746 UTC [cauthdsl] func1 -> DEBU 4677 0xc003744db0 gate 1569287141745892100 evaluation starts" +"2019-09-24 01:05:41.746 UTC [cauthdsl] func2 -> DEBU 4678 0xc003744db0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.747 UTC [cauthdsl] func2 -> DEBU 4679 0xc003744db0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.747 UTC [cauthdsl] func2 -> DEBU 467a 0xc003744db0 principal matched by identity 0" +"2019-09-24 01:05:41.748 UTC [msp.identity] Verify -> DEBU 467b Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:41.749 UTC [msp.identity] Verify -> DEBU 467c Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:41.749 UTC [cauthdsl] func2 -> DEBU 467d 0xc003744db0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.749 UTC [cauthdsl] func1 -> DEBU 467e 0xc003744db0 gate 1569287141745892100 evaluation succeeds" +"2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 467f Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 4680 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.750 UTC [policies] Evaluate -> DEBU 4681 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.751 UTC [policies] Evaluate -> DEBU 4682 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.751 UTC [msp.identity] Verify -> DEBU 4683 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:41.753 UTC [msp.identity] Verify -> DEBU 4684 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:41.754 UTC [msp.identity] Verify -> DEBU 4685 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:41.754 UTC [msp.identity] Verify -> DEBU 4686 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:41.755 UTC [msp] DeserializeIdentity -> DEBU 4687 Obtaining identity" +"2019-09-24 01:05:41.755 UTC [msp] DeserializeIdentity -> DEBU 4688 Obtaining identity" +"2019-09-24 01:05:41.755 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4689 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 468a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.756 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 468b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.760 UTC [policies] Evaluate -> DEBU 468e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.760 UTC [cauthdsl] func1 -> DEBU 468f 0xc0040c93c0 gate 1569287141760912100 evaluation starts" +"2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4690 0xc0040c93c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4691 0xc0040c93c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.761 UTC [cauthdsl] func2 -> DEBU 4692 0xc0040c93c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.762 UTC [cauthdsl] func2 -> DEBU 4693 0xc0040c93c0 principal evaluation fails" +"2019-09-24 01:05:41.762 UTC [cauthdsl] func1 -> DEBU 4694 0xc0040c93c0 gate 1569287141760912100 evaluation fails" +"2019-09-24 01:05:41.762 UTC [policies] Evaluate -> DEBU 4695 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.762 UTC [policies] Evaluate -> DEBU 4696 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.763 UTC [policies] Evaluate -> DEBU 4697 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.763 UTC [cauthdsl] func1 -> DEBU 4698 0xc0040c9c00 gate 1569287141763693700 evaluation starts" +"2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 4699 0xc0040c9c00 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 469a 0xc0040c9c00 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.764 UTC [cauthdsl] func2 -> DEBU 469b 0xc0040c9c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.765 UTC [cauthdsl] func2 -> DEBU 469c 0xc0040c9c00 principal evaluation fails" +"2019-09-24 01:05:41.765 UTC [cauthdsl] func1 -> DEBU 469d 0xc0040c9c00 gate 1569287141763693700 evaluation fails" +"2019-09-24 01:05:41.766 UTC [policies] Evaluate -> DEBU 469e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.766 UTC [policies] Evaluate -> DEBU 469f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func1 -> DEBU 46a1 0xc0040dc440 gate 1569287141768069300 evaluation starts" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a2 0xc0040dc440 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a3 0xc0040dc440 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a4 0xc0040dc440 principal matched by identity 0" +"2019-09-24 01:05:41.768 UTC [msp.identity] Verify -> DEBU 46a5 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:41.768 UTC [msp.identity] Verify -> DEBU 46a6 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func2 -> DEBU 46a7 0xc0040dc440 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.768 UTC [cauthdsl] func1 -> DEBU 46a8 0xc0040dc440 gate 1569287141768069300 evaluation succeeds" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46a9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46ab Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.768 UTC [gossip.gossip] handleMessage -> DEBU 46ad Exiting" +"2019-09-24 01:05:41.768 UTC [gossip.gossip] handleMessage -> DEBU 46ae Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46af Obtaining identity" +"2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46b0 Obtaining identity" +"2019-09-24 01:05:41.768 UTC [msp] DeserializeIdentity -> DEBU 46b1 Obtaining identity" +"2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46b2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46b3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.768 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46b4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.768 UTC [policies] Evaluate -> DEBU 46b7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46b8 0xc0040ddf50 gate 1569287141769000800 evaluation starts" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46b9 0xc0040ddf50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46ba 0xc0040ddf50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46bb 0xc0040ddf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46bc 0xc0040ddf50 principal evaluation fails" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46bd 0xc0040ddf50 gate 1569287141769000800 evaluation fails" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46be Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46bf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46c1 0xc0040f0790 gate 1569287141769300500 evaluation starts" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c2 0xc0040f0790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c3 0xc0040f0790 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c4 0xc0040f0790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46c5 0xc0040f0790 principal evaluation fails" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46c6 0xc0040f0790 gate 1569287141769300500 evaluation fails" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46c9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46ca 0xc0040f0fd0 gate 1569287141769591500 evaluation starts" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cb 0xc0040f0fd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cc 0xc0040f0fd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46cd 0xc0040f0fd0 principal matched by identity 0" +"2019-09-24 01:05:41.769 UTC [msp.identity] Verify -> DEBU 46ce Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:41.769 UTC [msp.identity] Verify -> DEBU 46cf Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func2 -> DEBU 46d0 0xc0040f0fd0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.769 UTC [cauthdsl] func1 -> DEBU 46d1 0xc0040f0fd0 gate 1569287141769591500 evaluation succeeds" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.769 UTC [policies] Evaluate -> DEBU 46d4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.770 UTC [policies] Evaluate -> DEBU 46d5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d6 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d7 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d8 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:41.770 UTC [msp.identity] Verify -> DEBU 46d9 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:41.770 UTC [msp] DeserializeIdentity -> DEBU 46da Obtaining identity" +"2019-09-24 01:05:41.779 UTC [msp] DeserializeIdentity -> DEBU 46db Obtaining identity" +"2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 46dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46dd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.780 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 46de Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:41.781 UTC [policies] Evaluate -> DEBU 46e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:41.782 UTC [cauthdsl] func1 -> DEBU 46e2 0xc0041055e0 gate 1569287141782180300 evaluation starts" +"2019-09-24 01:05:41.782 UTC [cauthdsl] func2 -> DEBU 46e3 0xc0041055e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e4 0xc0041055e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e5 0xc0041055e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:41.783 UTC [cauthdsl] func2 -> DEBU 46e6 0xc0041055e0 principal evaluation fails" +"2019-09-24 01:05:41.783 UTC [cauthdsl] func1 -> DEBU 46e7 0xc0041055e0 gate 1569287141782180300 evaluation fails" +"2019-09-24 01:05:41.784 UTC [policies] Evaluate -> DEBU 46e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.784 UTC [policies] Evaluate -> DEBU 46e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:41.785 UTC [policies] Evaluate -> DEBU 46ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:41.785 UTC [cauthdsl] func1 -> DEBU 46eb 0xc004105e20 gate 1569287141785662500 evaluation starts" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ec 0xc004105e20 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ed 0xc004105e20 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ee 0xc004105e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46ef 0xc004105e20 principal evaluation fails" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func1 -> DEBU 46f0 0xc004105e20 gate 1569287141785662500 evaluation fails" +"2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:41.786 UTC [policies] Evaluate -> DEBU 46f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func1 -> DEBU 46f4 0xc00411c660 gate 1569287141786387200 evaluation starts" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f5 0xc00411c660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f6 0xc00411c660 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46f7 0xc00411c660 principal matched by identity 0" +"2019-09-24 01:05:41.786 UTC [msp.identity] Verify -> DEBU 46f8 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:41.786 UTC [msp.identity] Verify -> DEBU 46f9 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:41.786 UTC [cauthdsl] func2 -> DEBU 46fa 0xc00411c660 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:41.787 UTC [cauthdsl] func1 -> DEBU 46fb 0xc00411c660 gate 1569287141786387200 evaluation succeeds" +"2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46fe Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:41.787 UTC [policies] Evaluate -> DEBU 46ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4700 Exiting" +"2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4701 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.787 UTC [gossip.pull] HandleMessage -> DEBU 4702 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.787 UTC [gossip.gossip] handleMessage -> DEBU 4703 Exiting" +"2019-09-24 01:05:41.838 UTC [gossip.gossip] handleMessage -> DEBU 4704 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.839 UTC [msp] DeserializeIdentity -> DEBU 4705 Obtaining identity" +"2019-09-24 01:05:41.841 UTC [msp] DeserializeIdentity -> DEBU 4706 Obtaining identity" +"2019-09-24 01:05:41.842 UTC [gossip.gossip] handleMessage -> DEBU 4707 Exiting" +"2019-09-24 01:05:41.865 UTC [gossip.gossip] handleMessage -> DEBU 4708 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.865 UTC [gossip.pull] HandleMessage -> DEBU 4709 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:41.865 UTC [gossip.pull] SendDigest -> DEBU 470a Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:41.866 UTC [gossip.gossip] handleMessage -> DEBU 470b Exiting" +"2019-09-24 01:05:42.042 UTC [gossip.comm] func1 -> DEBU 470c Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.043 UTC [gossip.gossip] handleMessage -> DEBU 470d Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.043 UTC [msp] DeserializeIdentity -> DEBU 470e Obtaining identity" +"2019-09-24 01:05:42.044 UTC [msp] DeserializeIdentity -> DEBU 470f Obtaining identity" +"2019-09-24 01:05:42.044 UTC [msp] DeserializeIdentity -> DEBU 4710 Obtaining identity" +"2019-09-24 01:05:42.045 UTC [gossip.gossip] handleMessage -> DEBU 4711 Exiting" +"2019-09-24 01:05:42.240 UTC [gossip.comm] func1 -> DEBU 4712 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.240 UTC [gossip.gossip] handleMessage -> DEBU 4713 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.241 UTC [msp] DeserializeIdentity -> DEBU 4714 Obtaining identity" +"2019-09-24 01:05:42.241 UTC [msp] DeserializeIdentity -> DEBU 4715 Obtaining identity" +"2019-09-24 01:05:42.242 UTC [msp] DeserializeIdentity -> DEBU 4716 Obtaining identity" +"2019-09-24 01:05:42.243 UTC [gossip.gossip] handleMessage -> DEBU 4717 Exiting" +"2019-09-24 01:05:42.492 UTC [gossip.gossip] handleMessage -> DEBU 4718 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.493 UTC [gossip.pull] HandleMessage -> DEBU 4719 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.494 UTC [gossip.pull] SendDigest -> DEBU 471a Sending IDENTITY_MSG digest: [415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:42.495 UTC [gossip.gossip] handleMessage -> DEBU 471b Exiting" +"2019-09-24 01:05:42.524 UTC [gossip.gossip] handleMessage -> DEBU 471c Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:Y=a\244\235" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.525 UTC [gossip.gossip] handleMessage -> DEBU 471d Exiting" +"2019-09-24 01:05:42.526 UTC [gossip.discovery] handleMsgFromComm -> DEBU 471e Got message: GossipMessage: tag:EMPTY mem_req:Y=a\244\235" > > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.526 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 471f Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:42.527 UTC [msp.identity] Verify -> DEBU 4720 Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +"2019-09-24 01:05:42.529 UTC [msp.identity] Verify -> DEBU 4721 Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +00000040 1e 77 26 bb 94 c9 |.w&...|" +"2019-09-24 01:05:42.531 UTC [msp.identity] Verify -> DEBU 4722 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:42.531 UTC [msp.identity] Verify -> DEBU 4723 Verify: sig = 00000000 30 45 02 21 00 c6 9e 9e 8f 9e 1f cd 26 02 96 9f |0E.!........&...| +00000010 b7 76 41 a5 71 31 d1 d4 a9 11 20 0c 2d af c6 81 |.vA.q1.... .-...| +00000020 c4 a3 1f 14 d9 02 20 71 02 8b 6b 75 12 48 a9 00 |...... q..ku.H..| +00000030 61 f7 93 0e 6d ca cb 4e 7d fe 6d d1 2a 86 4e bc |a...m..N}.m.*.N.| +00000040 71 3e 59 3d 61 a4 9d |q>Y=a..|" +"2019-09-24 01:05:42.532 UTC [gossip.discovery] handleAliveMessage -> DEBU 4724 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:42.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4725 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}" +"2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4726 updating membership: timestamp: " +"2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4727 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:42.533 UTC [gossip.discovery] learnExistingMembers -> DEBU 4728 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:42.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 4729 Exiting" +"2019-09-24 01:05:42.534 UTC [gossip.discovery] handleAliveMessage -> DEBU 472a Exiting" +"2019-09-24 01:05:42.534 UTC [gossip.discovery] sendMemResponse -> DEBU 472b Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:42.535 UTC [msp] DeserializeIdentity -> DEBU 472c Obtaining identity" +"2019-09-24 01:05:42.535 UTC [msp] DeserializeIdentity -> DEBU 472d Obtaining identity" +"2019-09-24 01:05:42.535 UTC [gossip.comm] Send -> DEBU 472e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.536 UTC [gossip.discovery] sendMemResponse -> DEBU 472f Exiting, replying with alive:Y=a\244\235" > > alive: " +"2019-09-24 01:05:42.536 UTC [gossip.comm] sendToEndpoint -> DEBU 4730 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.536 UTC [gossip.comm] sendToEndpoint -> DEBU 4731 Exiting" +"2019-09-24 01:05:42.534 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4732 Exiting" +"2019-09-24 01:05:42.856 UTC [gossip.comm] func1 -> DEBU 4733 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.857 UTC [gossip.gossip] handleMessage -> DEBU 4734 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.857 UTC [gossip.pull] HandleMessage -> DEBU 4735 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4736 Obtaining identity" +"2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4737 Obtaining identity" +"2019-09-24 01:05:42.858 UTC [msp] DeserializeIdentity -> DEBU 4738 Obtaining identity" +"2019-09-24 01:05:42.861 UTC [msp] DeserializeIdentity -> DEBU 4739 Obtaining identity" +"2019-09-24 01:05:42.862 UTC [msp] DeserializeIdentity -> DEBU 473a Obtaining identity" +"2019-09-24 01:05:42.862 UTC [msp] DeserializeIdentity -> DEBU 473b Obtaining identity" +"2019-09-24 01:05:42.862 UTC [gossip.pull] SendDigest -> DEBU 473c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:42.863 UTC [gossip.gossip] handleMessage -> DEBU 473d Exiting" +"2019-09-24 01:05:42.866 UTC [gossip.comm] func1 -> DEBU 473e Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.867 UTC [gossip.gossip] handleMessage -> DEBU 473f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.870 UTC [gossip.gossip] handleMessage -> DEBU 4740 Exiting" +"2019-09-24 01:05:42.871 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4741 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4742 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:42.871 UTC [msp] DeserializeIdentity -> DEBU 4743 Obtaining identity" +"2019-09-24 01:05:42.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4744 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:42.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4745 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4746 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.874 UTC [policies] Evaluate -> DEBU 4747 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:42.875 UTC [policies] Evaluate -> DEBU 4748 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:42.876 UTC [policies] Evaluate -> DEBU 4749 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:42.877 UTC [cauthdsl] func1 -> DEBU 474a 0xc004050300 gate 1569287142877328100 evaluation starts" +"2019-09-24 01:05:42.877 UTC [cauthdsl] func2 -> DEBU 474b 0xc004050300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474c 0xc004050300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474d 0xc004050300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:42.878 UTC [cauthdsl] func2 -> DEBU 474e 0xc004050300 principal evaluation fails" +"2019-09-24 01:05:42.879 UTC [cauthdsl] func1 -> DEBU 474f 0xc004050300 gate 1569287142877328100 evaluation fails" +"2019-09-24 01:05:42.880 UTC [policies] Evaluate -> DEBU 4750 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.880 UTC [policies] Evaluate -> DEBU 4751 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.881 UTC [policies] Evaluate -> DEBU 4752 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:42.881 UTC [cauthdsl] func1 -> DEBU 4753 0xc004050b40 gate 1569287142881205000 evaluation starts" +"2019-09-24 01:05:42.881 UTC [cauthdsl] func2 -> DEBU 4754 0xc004050b40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.882 UTC [cauthdsl] func2 -> DEBU 4755 0xc004050b40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.883 UTC [cauthdsl] func2 -> DEBU 4756 0xc004050b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:42.883 UTC [cauthdsl] func2 -> DEBU 4757 0xc004050b40 principal evaluation fails" +"2019-09-24 01:05:42.883 UTC [cauthdsl] func1 -> DEBU 4758 0xc004050b40 gate 1569287142881205000 evaluation fails" +"2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 4759 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 475a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.884 UTC [policies] Evaluate -> DEBU 475b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:42.902 UTC [cauthdsl] func1 -> DEBU 475c 0xc004051380 gate 1569287142902808800 evaluation starts" +"2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475d 0xc004051380 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475e 0xc004051380 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.902 UTC [cauthdsl] func2 -> DEBU 475f 0xc004051380 principal matched by identity 0" +"2019-09-24 01:05:42.903 UTC [msp.identity] Verify -> DEBU 4760 Verify: digest = 00000000 1e 58 1f fd 58 15 86 f0 88 40 39 67 29 4a 2c be |.X..X....@9g)J,.| +00000010 e7 d3 44 a7 7d 48 4a d1 47 d1 ea 87 f3 56 1e af |..D.}HJ.G....V..|" +"2019-09-24 01:05:42.903 UTC [msp.identity] Verify -> DEBU 4761 Verify: sig = 00000000 30 44 02 20 0d e6 50 29 de 95 fd 84 00 24 0d f8 |0D. ..P).....$..| +00000010 ae 4d 85 8e e6 d7 3d 6b d7 06 e7 c8 32 e2 97 d3 |.M....=k....2...| +00000020 b7 59 dd 1d 02 20 48 84 ef c0 5e 0a 3b 46 aa c1 |.Y... H...^.;F..| +00000030 8b 35 4f b7 86 3b 1b 5a 5d 9d 98 7e fa 50 6d a9 |.5O..;.Z]..~.Pm.| +00000040 2e f5 61 fe b2 4c |..a..L|" +"2019-09-24 01:05:42.903 UTC [cauthdsl] func2 -> DEBU 4762 0xc004051380 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:42.903 UTC [cauthdsl] func1 -> DEBU 4763 0xc004051380 gate 1569287142902808800 evaluation succeeds" +"2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4764 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4765 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4766 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:42.903 UTC [policies] Evaluate -> DEBU 4767 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4768 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 4769 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476a updating membership: timestamp: " +"2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476b Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476c Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 476d Exiting" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 476e Exiting" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 476f Exiting" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] sendMemResponse -> DEBU 4770 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4771 Obtaining identity" +"2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4772 Obtaining identity" +"2019-09-24 01:05:42.903 UTC [msp] DeserializeIdentity -> DEBU 4773 Obtaining identity" +"2019-09-24 01:05:42.903 UTC [gossip.comm] Send -> DEBU 4774 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.903 UTC [gossip.discovery] sendMemResponse -> DEBU 4775 Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:42.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4776 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4777 Exiting" +"2019-09-24 01:05:42.904 UTC [gossip.comm] func1 -> DEBU 4778 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.904 UTC [gossip.gossip] handleMessage -> DEBU 4779 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.904 UTC [gossip.gossip] handleMessage -> DEBU 477a Exiting" +"2019-09-24 01:05:42.904 UTC [gossip.discovery] handleMsgFromComm -> DEBU 477b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.904 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 477c Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:42.904 UTC [msp] DeserializeIdentity -> DEBU 477d Obtaining identity" +"2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 477e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 477f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.904 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4780 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4781 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4782 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 4783 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 4784 0xc004061f50 gate 1569287142904729500 evaluation starts" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4785 0xc004061f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4786 0xc004061f50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4787 0xc004061f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func2 -> DEBU 4788 0xc004061f50 principal evaluation fails" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 4789 0xc004061f50 gate 1569287142904729500 evaluation fails" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.904 UTC [policies] Evaluate -> DEBU 478c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:42.904 UTC [cauthdsl] func1 -> DEBU 478d 0xc004086790 gate 1569287142904985400 evaluation starts" +"2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 478e 0xc004086790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 478f 0xc004086790 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 4790 0xc004086790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:42.905 UTC [cauthdsl] func2 -> DEBU 4791 0xc004086790 principal evaluation fails" +"2019-09-24 01:05:42.905 UTC [cauthdsl] func1 -> DEBU 4792 0xc004086790 gate 1569287142904985400 evaluation fails" +"2019-09-24 01:05:42.867 UTC [gossip.comm] func1 -> DEBU 4793 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.911 UTC [gossip.gossip] handleMessage -> DEBU 4794 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.912 UTC [gossip.pull] HandleMessage -> DEBU 4795 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4796 Obtaining identity" +"2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4797 Obtaining identity" +"2019-09-24 01:05:42.912 UTC [msp] DeserializeIdentity -> DEBU 4798 Obtaining identity" +"2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 4799 Obtaining identity" +"2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 479a Obtaining identity" +"2019-09-24 01:05:42.913 UTC [msp] DeserializeIdentity -> DEBU 479b Obtaining identity" +"2019-09-24 01:05:42.913 UTC [gossip.pull] SendDigest -> DEBU 479c Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:42.913 UTC [gossip.gossip] handleMessage -> DEBU 479d Exiting" +"2019-09-24 01:05:42.916 UTC [msp] GetDefaultSigningIdentity -> DEBU 479e Obtaining default signing identity" +"2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 479f Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151034 " +"2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a0 Sign: digest: 0A592601F0C26BE053997727180E5831F0747796E496F26C2865525B60DDD97A " +"2019-09-24 01:05:42.917 UTC [msp] GetDefaultSigningIdentity -> DEBU 47a1 Obtaining default signing identity" +"2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a2 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:42.917 UTC [msp.identity] Sign -> DEBU 47a3 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a4 Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.917 UTC [msp] DeserializeIdentity -> DEBU 47a5 Obtaining identity" +"2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a6 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.917 UTC [msp] DeserializeIdentity -> DEBU 47a7 Obtaining identity" +"2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47a8 Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.917 UTC [gossip.comm] sendToEndpoint -> DEBU 47a9 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.917 UTC [gossip.comm] sendToEndpoint -> DEBU 47aa Exiting" +"2019-09-24 01:05:42.917 UTC [gossip.pull] Hello -> DEBU 47ab Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47ac Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.917 UTC [gossip.pull] Hello -> DEBU 47ad Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:42.917 UTC [gossip.comm] Send -> DEBU 47ae Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.918 UTC [gossip.pull] Hello -> DEBU 47af Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:42.918 UTC [gossip.comm] Send -> DEBU 47b0 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b2 Exiting" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b3 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b4 Exiting" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b5 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b6 Exiting" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b7 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b8 Exiting" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47b9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.918 UTC [gossip.comm] sendToEndpoint -> DEBU 47ba Exiting" +"2019-09-24 01:05:42.932 UTC [gossip.comm] func1 -> DEBU 47bb Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.933 UTC [gossip.comm] func1 -> DEBU 47bc Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.933 UTC [gossip.gossip] handleMessage -> DEBU 47bd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.934 UTC [gossip.comm] func1 -> DEBU 47be Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.934 UTC [gossip.comm] func1 -> DEBU 47bf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.905 UTC [policies] Evaluate -> DEBU 47c0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.935 UTC [policies] Evaluate -> DEBU 47c1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.935 UTC [policies] Evaluate -> DEBU 47c2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:42.935 UTC [cauthdsl] func1 -> DEBU 47c3 0xc004086fd0 gate 1569287142935872100 evaluation starts" +"2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c4 0xc004086fd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c5 0xc004086fd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.935 UTC [cauthdsl] func2 -> DEBU 47c6 0xc004086fd0 principal matched by identity 0" +"2019-09-24 01:05:42.936 UTC [msp.identity] Verify -> DEBU 47c7 Verify: digest = 00000000 fc da f1 d7 a9 4a 40 a2 b4 91 8b f6 95 af bf 1d |.....J@.........| +00000010 42 da f1 ee 1b f8 e4 20 64 94 6d 37 57 75 05 ef |B...... d.m7Wu..|" +"2019-09-24 01:05:42.936 UTC [msp.identity] Verify -> DEBU 47c8 Verify: sig = 00000000 30 45 02 21 00 8d 0b 5b 7b f0 d9 44 2b ad 3b 39 |0E.!...[{..D+.;9| +00000010 46 ca 1a cd 1d 99 c0 ae 08 2c 62 b8 6b 65 fa 10 |F........,b.ke..| +00000020 99 be dc c2 32 02 20 2a 98 f2 2b 91 a7 9f 8d d8 |....2. *..+.....| +00000030 4a 9a 7d 2c 9d 21 9e 41 5d 6c 1f 93 4d 93 d9 65 |J.},.!.A]l..M..e| +00000040 38 ec b5 7d 0b 41 1f |8..}.A.|" +"2019-09-24 01:05:42.936 UTC [cauthdsl] func2 -> DEBU 47c9 0xc004086fd0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:42.936 UTC [cauthdsl] func1 -> DEBU 47ca 0xc004086fd0 gate 1569287142935872100 evaluation succeeds" +"2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cb Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47cd Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:42.936 UTC [policies] Evaluate -> DEBU 47ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:42.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 47cf Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d0 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d1 updating membership: timestamp: " +"2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d2 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d3 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:42.936 UTC [gossip.discovery] learnExistingMembers -> DEBU 47d4 Exiting" +"2019-09-24 01:05:42.936 UTC [gossip.discovery] handleAliveMessage -> DEBU 47d5 Exiting" +"2019-09-24 01:05:42.937 UTC [gossip.discovery] sendMemResponse -> DEBU 47d6 Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d7 Obtaining identity" +"2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d8 Obtaining identity" +"2019-09-24 01:05:42.938 UTC [msp] DeserializeIdentity -> DEBU 47d9 Obtaining identity" +"2019-09-24 01:05:42.938 UTC [gossip.comm] Send -> DEBU 47da Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:42.939 UTC [gossip.discovery] sendMemResponse -> DEBU 47db Exiting, replying with alive: alive: alive: alive: " +"2019-09-24 01:05:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 47dc Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.939 UTC [gossip.comm] sendToEndpoint -> DEBU 47dd Exiting" +"2019-09-24 01:05:42.937 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47de Exiting" +"2019-09-24 01:05:42.942 UTC [gossip.discovery] handleMsgFromComm -> DEBU 47df Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.943 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 47e1 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:42.943 UTC [msp] DeserializeIdentity -> DEBU 47e2 Obtaining identity" +"2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 47e3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47e4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.943 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 47e5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:42.943 UTC [policies] Evaluate -> DEBU 47e8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:42.943 UTC [cauthdsl] func1 -> DEBU 47e9 0xc00419f050 gate 1569287142943745300 evaluation starts" +"2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ea 0xc00419f050 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47eb 0xc00419f050 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ec 0xc00419f050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:42.943 UTC [cauthdsl] func2 -> DEBU 47ed 0xc00419f050 principal evaluation fails" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47ee 0xc00419f050 gate 1569287142943745300 evaluation fails" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47ef Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47f2 0xc00419f890 gate 1569287142944195400 evaluation starts" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f3 0xc00419f890 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f4 0xc00419f890 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f5 0xc00419f890 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47f6 0xc00419f890 principal evaluation fails" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47f7 0xc00419f890 gate 1569287142944195400 evaluation fails" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47f9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.944 UTC [policies] Evaluate -> DEBU 47fa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func1 -> DEBU 47fb 0xc0041c00d0 gate 1569287142944590300 evaluation starts" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 47fc 0xc0041c00d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.942 UTC [gossip.gossip] handleMessage -> DEBU 47e0 Exiting" +"2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 47fd Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.945 UTC [gossip.pull] HandleMessage -> DEBU 47fe GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 47ff Exiting" +"2019-09-24 01:05:42.945 UTC [gossip.gossip] handleMessage -> DEBU 4800 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.946 UTC [gossip.pull] HandleMessage -> DEBU 4801 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.946 UTC [gossip.gossip] handleMessage -> DEBU 4802 Exiting" +"2019-09-24 01:05:42.946 UTC [gossip.gossip] handleMessage -> DEBU 4803 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.944 UTC [cauthdsl] func2 -> DEBU 4804 0xc0041c00d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.946 UTC [cauthdsl] func2 -> DEBU 4805 0xc0041c00d0 principal matched by identity 0" +"2019-09-24 01:05:42.946 UTC [msp.identity] Verify -> DEBU 4806 Verify: digest = 00000000 fc da f1 d7 a9 4a 40 a2 b4 91 8b f6 95 af bf 1d |.....J@.........| +00000010 42 da f1 ee 1b f8 e4 20 64 94 6d 37 57 75 05 ef |B...... d.m7Wu..|" +"2019-09-24 01:05:42.946 UTC [msp.identity] Verify -> DEBU 4807 Verify: sig = 00000000 30 45 02 21 00 8d 0b 5b 7b f0 d9 44 2b ad 3b 39 |0E.!...[{..D+.;9| +00000010 46 ca 1a cd 1d 99 c0 ae 08 2c 62 b8 6b 65 fa 10 |F........,b.ke..| +00000020 99 be dc c2 32 02 20 2a 98 f2 2b 91 a7 9f 8d d8 |....2. *..+.....| +00000030 4a 9a 7d 2c 9d 21 9e 41 5d 6c 1f 93 4d 93 d9 65 |J.},.!.A]l..M..e| +00000040 38 ec b5 7d 0b 41 1f |8..}.A.|" +"2019-09-24 01:05:42.947 UTC [cauthdsl] func2 -> DEBU 4808 0xc0041c00d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:42.947 UTC [cauthdsl] func1 -> DEBU 4809 0xc0041c00d0 gate 1569287142944590300 evaluation succeeds" +"2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:42.947 UTC [policies] Evaluate -> DEBU 480d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 480e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 480f Exiting" +"2019-09-24 01:05:42.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4810 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4811 Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +"2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4812 Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +00000040 1e 77 26 bb 94 c9 |.w&...|" +"2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 4813 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.947 UTC [gossip.discovery] handleAliveMessage -> DEBU 4814 Exiting" +"2019-09-24 01:05:42.947 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4815 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4816 Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +"2019-09-24 01:05:42.947 UTC [msp.identity] Verify -> DEBU 4817 Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +00000040 6e b4 c8 cf 74 b2 |n...t.|" +"2019-09-24 01:05:42.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 4818 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.948 UTC [gossip.discovery] isSentByMe -> DEBU 4819 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.948 UTC [gossip.discovery] handleAliveMessage -> DEBU 481a Exiting" +"2019-09-24 01:05:42.948 UTC [gossip.discovery] handleMsgFromComm -> DEBU 481b Exiting" +"2019-09-24 01:05:42.949 UTC [gossip.discovery] handleMsgFromComm -> DEBU 481c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.949 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 481d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:42.949 UTC [msp.identity] Verify -> DEBU 481e Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +"2019-09-24 01:05:42.949 UTC [msp.identity] Verify -> DEBU 481f Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +00000040 6e b4 c8 cf 74 b2 |n...t.|" +"2019-09-24 01:05:42.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4820 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.950 UTC [gossip.discovery] isSentByMe -> DEBU 4821 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.950 UTC [gossip.discovery] handleAliveMessage -> DEBU 4822 Exiting" +"2019-09-24 01:05:42.950 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4823 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:42.950 UTC [msp] DeserializeIdentity -> DEBU 4824 Obtaining identity" +"2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4825 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4826 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.950 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4827 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4828 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4829 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 482a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 482b 0xc0041dcac0 gate 1569287142950581800 evaluation starts" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482c 0xc0041dcac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482d 0xc0041dcac0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482e 0xc0041dcac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 482f 0xc0041dcac0 principal evaluation fails" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 4830 0xc0041dcac0 gate 1569287142950581800 evaluation fails" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4831 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4832 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:42.950 UTC [policies] Evaluate -> DEBU 4833 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func1 -> DEBU 4834 0xc0041dd300 gate 1569287142950907400 evaluation starts" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 4835 0xc0041dd300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.950 UTC [cauthdsl] func2 -> DEBU 4836 0xc0041dd300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4837 0xc0041dd300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4838 0xc0041dd300 principal evaluation fails" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 4839 0xc0041dd300 gate 1569287142950907400 evaluation fails" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 483c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 483d 0xc0041ddb40 gate 1569287142951236600 evaluation starts" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 483e 0xc0041ddb40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 483f 0xc0041ddb40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4840 0xc0041ddb40 principal matched by identity 0" +"2019-09-24 01:05:42.951 UTC [msp.identity] Verify -> DEBU 4841 Verify: digest = 00000000 1e 58 1f fd 58 15 86 f0 88 40 39 67 29 4a 2c be |.X..X....@9g)J,.| +00000010 e7 d3 44 a7 7d 48 4a d1 47 d1 ea 87 f3 56 1e af |..D.}HJ.G....V..|" +"2019-09-24 01:05:42.951 UTC [msp.identity] Verify -> DEBU 4842 Verify: sig = 00000000 30 44 02 20 0d e6 50 29 de 95 fd 84 00 24 0d f8 |0D. ..P).....$..| +00000010 ae 4d 85 8e e6 d7 3d 6b d7 06 e7 c8 32 e2 97 d3 |.M....=k....2...| +00000020 b7 59 dd 1d 02 20 48 84 ef c0 5e 0a 3b 46 aa c1 |.Y... H...^.;F..| +00000030 8b 35 4f b7 86 3b 1b 5a 5d 9d 98 7e fa 50 6d a9 |.5O..;.Z]..~.Pm.| +00000040 2e f5 61 fe b2 4c |..a..L|" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func2 -> DEBU 4843 0xc0041ddb40 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:42.951 UTC [cauthdsl] func1 -> DEBU 4844 0xc0041ddb40 gate 1569287142951236600 evaluation succeeds" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4845 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4846 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4847 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:42.951 UTC [policies] Evaluate -> DEBU 4848 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 4849 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.951 UTC [gossip.discovery] handleAliveMessage -> DEBU 484a Exiting" +"2019-09-24 01:05:42.952 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 484b Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:42.952 UTC [msp.identity] Verify -> DEBU 484c Verify: digest = 00000000 b2 1d 64 f2 03 6b 53 a7 50 d4 94 b3 12 45 11 50 |..d..kS.P....E.P| +00000010 41 df d1 05 d2 99 da de 10 40 78 d9 d8 7e b0 a8 |A........@x..~..|" +"2019-09-24 01:05:42.952 UTC [msp.identity] Verify -> DEBU 484d Verify: sig = 00000000 30 44 02 20 78 4c 9d 65 10 70 5b 85 5d 6c 77 b0 |0D. xL.e.p[.]lw.| +00000010 ea 7f 6a 89 31 14 81 3c ce a1 36 90 89 95 c6 df |..j.1..<..6.....| +00000020 31 28 1e 8e 02 20 6a d3 46 15 92 a4 2a 1a 5b e6 |1(... j.F...*.[.| +00000030 82 81 74 82 0b d5 7b 1d 0f 2a f0 42 09 ab a3 e9 |..t...{..*.B....| +00000040 1e 77 26 bb 94 c9 |.w&...|" +"2019-09-24 01:05:42.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 484e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:42.954 UTC [gossip.discovery] handleAliveMessage -> DEBU 484f Exiting" +"2019-09-24 01:05:42.955 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4850 Exiting" +"2019-09-24 01:05:42.949 UTC [gossip.gossip] handleMessage -> DEBU 4851 Exiting" +"2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4852 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.956 UTC [gossip.pull] HandleMessage -> DEBU 4853 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4854 Exiting" +"2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4855 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.956 UTC [gossip.gossip] handleMessage -> DEBU 4856 Exiting" +"2019-09-24 01:05:42.956 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4857 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:42.956 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4858 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:42.957 UTC [msp.identity] Verify -> DEBU 4859 Verify: digest = 00000000 0a 59 26 01 f0 c2 6b e0 53 99 77 27 18 0e 58 31 |.Y&...k.S.w'..X1| +00000010 f0 74 77 96 e4 96 f2 6c 28 65 52 5b 60 dd d9 7a |.tw....l(eR[`..z|" +"2019-09-24 01:05:42.957 UTC [msp.identity] Verify -> DEBU 485a Verify: sig = 00000000 30 44 02 20 3a 26 de 89 4f e1 f5 b3 11 fb c9 1f |0D. :&..O.......| +00000010 73 90 aa 08 15 53 69 bb 57 12 0c 35 39 9d 82 60 |s....Si.W..59..`| +00000020 a0 da 5b de 02 20 37 97 91 75 30 06 d8 11 0b 2a |..[.. 7..u0....*| +00000030 c9 76 3a 71 ee 31 90 c1 7e 11 9d 3a de a8 fa 34 |.v:q.1..~..:...4| +00000040 6e b4 c8 cf 74 b2 |n...t.|" +"2019-09-24 01:05:42.958 UTC [msp.identity] Verify -> DEBU 485b Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:42.958 UTC [msp.identity] Verify -> DEBU 485c Verify: sig = 00000000 30 44 02 20 79 4d 9d 79 8c 05 e0 8d 69 6e ca 31 |0D. yM.y....in.1| +00000010 8e 1a 85 7f ec c6 f0 50 3a 31 82 a0 77 32 6c df |.......P:1..w2l.| +00000020 b7 ee 1a 80 02 20 3a ac 58 5b 37 4f 28 75 2e 11 |..... :.X[7O(u..| +00000030 bc d1 db 60 6f 63 be 0e 23 06 d5 0e 66 3d 92 a3 |...`oc..#...f=..| +00000040 7b 47 5e e3 8d 2a |{G^..*|" +"2019-09-24 01:05:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 485d Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:42.958 UTC [gossip.discovery] isSentByMe -> DEBU 485e Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:42.958 UTC [gossip.discovery] handleAliveMessage -> DEBU 485f Exiting" +"2019-09-24 01:05:42.958 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4860 Exiting" +"2019-09-24 01:05:43.521 UTC [gossip.gossip] handleMessage -> DEBU 4861 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.521 UTC [gossip.gossip] handleMessage -> DEBU 4862 Exiting" +"2019-09-24 01:05:43.521 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4863 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.521 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4864 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:43.521 UTC [msp.identity] Verify -> DEBU 4865 Verify: digest = 00000000 d5 bd e5 ef d9 d1 d3 c9 e6 35 d6 14 8d 50 c7 03 |.........5...P..| +00000010 1d 6b 32 28 66 cd 72 5d 6d ef 68 ab 9c bf b5 4b |.k2(f.r]m.h....K|" +"2019-09-24 01:05:43.521 UTC [msp.identity] Verify -> DEBU 4866 Verify: sig = 00000000 30 44 02 20 6b d2 6f e0 48 84 1a 5c 43 51 1d 58 |0D. k.o.H..\CQ.X| +00000010 d9 59 2c 56 36 c9 f7 71 94 5f 61 d0 f5 21 3b b5 |.Y,V6..q._a..!;.| +00000020 50 1e 9b c5 02 20 2a e9 b4 45 98 d6 ed 01 df df |P.... *..E......| +00000030 3c dd e2 3f 02 6e 1c 97 c9 35 98 f5 0b c8 b4 5b |<..?.n...5.....[| +00000040 e5 85 a7 5b 95 1c |...[..|" +"2019-09-24 01:05:43.521 UTC [gossip.discovery] handleAliveMessage -> DEBU 4867 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 4868 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 4869 updating membership: timestamp: " +"2019-09-24 01:05:43.521 UTC [gossip.discovery] learnExistingMembers -> DEBU 486a Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:43.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 486b Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:43.522 UTC [gossip.discovery] learnExistingMembers -> DEBU 486c Exiting" +"2019-09-24 01:05:43.522 UTC [gossip.discovery] handleAliveMessage -> DEBU 486d Exiting" +"2019-09-24 01:05:43.522 UTC [gossip.discovery] handleMsgFromComm -> DEBU 486e Exiting" +"2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 486f Obtaining identity" +"2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 4870 Obtaining identity" +"2019-09-24 01:05:43.528 UTC [msp] DeserializeIdentity -> DEBU 4871 Obtaining identity" +"2019-09-24 01:05:43.528 UTC [gossip.comm] Send -> DEBU 4872 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:43.529 UTC [msp] DeserializeIdentity -> DEBU 4873 Obtaining identity" +"2019-09-24 01:05:43.529 UTC [gossip.comm] Send -> DEBU 4874 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4875 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4876 Exiting" +"2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4877 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.529 UTC [gossip.comm] sendToEndpoint -> DEBU 4878 Exiting" +"2019-09-24 01:05:43.533 UTC [gossip.comm] func1 -> DEBU 4879 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487b Exiting" +"2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487c Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 487d Exiting" +"2019-09-24 01:05:43.533 UTC [gossip.comm] func1 -> DEBU 487e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 487f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.gossip] handleMessage -> DEBU 4880 Exiting" +"2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4881 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:43.533 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4882 Exiting" +"2019-09-24 01:05:44.145 UTC [gossip.comm] func1 -> DEBU 4883 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.147 UTC [gossip.gossip] handleMessage -> DEBU 4884 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.148 UTC [gossip.gossip] handleMessage -> DEBU 4885 Exiting" +"2019-09-24 01:05:44.149 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4886 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.150 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4887 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:44.151 UTC [msp] DeserializeIdentity -> DEBU 4888 Obtaining identity" +"2019-09-24 01:05:44.156 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4889 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:44.158 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 488c Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:44.157 UTC [gossip.gossip] handleMessage -> DEBU 488a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.157 UTC [gossip.comm] func1 -> DEBU 488b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.160 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 488d Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:44.161 UTC [policies] Evaluate -> DEBU 488f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:44.161 UTC [policies] Evaluate -> DEBU 4890 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:44.160 UTC [gossip.comm] func1 -> DEBU 488e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.162 UTC [policies] Evaluate -> DEBU 4891 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:44.163 UTC [cauthdsl] func1 -> DEBU 4892 0xc00422cf90 gate 1569287144163215500 evaluation starts" +"2019-09-24 01:05:44.163 UTC [gossip.comm] func1 -> DEBU 4893 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.164 UTC [cauthdsl] func2 -> DEBU 4894 0xc00422cf90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.165 UTC [cauthdsl] func2 -> DEBU 4895 0xc00422cf90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.166 UTC [cauthdsl] func2 -> DEBU 4896 0xc00422cf90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:44.166 UTC [cauthdsl] func2 -> DEBU 4897 0xc00422cf90 principal evaluation fails" +"2019-09-24 01:05:44.167 UTC [cauthdsl] func1 -> DEBU 4898 0xc00422cf90 gate 1569287144163215500 evaluation fails" +"2019-09-24 01:05:44.167 UTC [policies] Evaluate -> DEBU 4899 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 489a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 489b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 489c 0xc00422d7d0 gate 1569287144168572900 evaluation starts" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489d 0xc00422d7d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489e 0xc00422d7d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 489f 0xc00422d7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a0 0xc00422d7d0 principal evaluation fails" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 48a1 0xc00422d7d0 gate 1569287144168572900 evaluation fails" +"2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:44.168 UTC [policies] Evaluate -> DEBU 48a4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func1 -> DEBU 48a5 0xc004246010 gate 1569287144168819200 evaluation starts" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a6 0xc004246010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a7 0xc004246010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.168 UTC [cauthdsl] func2 -> DEBU 48a8 0xc004246010 principal matched by identity 0" +"2019-09-24 01:05:44.168 UTC [msp.identity] Verify -> DEBU 48a9 Verify: digest = 00000000 72 39 c3 3a 84 86 f5 12 15 bb 92 ac 9a 03 83 04 |r9.:............| +00000010 d4 73 89 06 9f be b6 b9 6e 1a 6e ae 8f 6c 10 8e |.s......n.n..l..|" +"2019-09-24 01:05:44.168 UTC [msp.identity] Verify -> DEBU 48aa Verify: sig = 00000000 30 45 02 21 00 9a 5e 5b 25 b7 aa 21 48 4a 7d 98 |0E.!..^[%..!HJ}.| +00000010 f0 c8 05 7f 16 f8 57 7b a7 fd c6 bf 81 1b 79 6d |......W{......ym| +00000020 32 b1 a2 63 6e 02 20 1f c7 f3 ca 5a 6f 18 64 3e |2..cn. ....Zo.d>| +00000030 b9 20 97 45 cc 8d 16 1b bf 4d 8a 81 a8 e7 26 15 |. .E.....M....&.| +00000040 30 73 57 d2 f5 b6 ae |0sW....|" +"2019-09-24 01:05:44.169 UTC [cauthdsl] func2 -> DEBU 48ab 0xc004246010 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:44.169 UTC [cauthdsl] func1 -> DEBU 48ac 0xc004246010 gate 1569287144168819200 evaluation succeeds" +"2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48ad Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48af Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:44.169 UTC [policies] Evaluate -> DEBU 48b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 48b1 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b2 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b3 updating membership: timestamp: " +"2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b4 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b5 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] learnExistingMembers -> DEBU 48b6 Exiting" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] handleAliveMessage -> DEBU 48b7 Exiting" +"2019-09-24 01:05:44.169 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48b8 Exiting" +"2019-09-24 01:05:44.170 UTC [gossip.gossip] handleMessage -> DEBU 48b9 Exiting" +"2019-09-24 01:05:44.170 UTC [gossip.gossip] handleMessage -> DEBU 48ba Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.171 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bb Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bc Exiting" +"2019-09-24 01:05:44.172 UTC [gossip.gossip] handleMessage -> DEBU 48bd Exiting" +"2019-09-24 01:05:44.172 UTC [gossip.gossip] handleMessage -> DEBU 48be Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.172 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48bf Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.172 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 48c0 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:44.172 UTC [msp] DeserializeIdentity -> DEBU 48c1 Obtaining identity" +"2019-09-24 01:05:44.172 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 48c2 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:44.172 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48c3 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:44.173 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 48c4 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48c7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48c8 0xc004260250 gate 1569287144173127300 evaluation starts" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48c9 0xc004260250 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48ca 0xc004260250 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48cb 0xc004260250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48cc 0xc004260250 principal evaluation fails" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48cd 0xc004260250 gate 1569287144173127300 evaluation fails" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48ce Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48cf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48d1 0xc004260a90 gate 1569287144173376300 evaluation starts" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d2 0xc004260a90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d3 0xc004260a90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d4 0xc004260a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48d5 0xc004260a90 principal evaluation fails" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48d6 0xc004260a90 gate 1569287144173376300 evaluation fails" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d7 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48d9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48da 0xc0042612d0 gate 1569287144173624100 evaluation starts" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48db 0xc0042612d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48dc 0xc0042612d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48dd 0xc0042612d0 principal matched by identity 0" +"2019-09-24 01:05:44.173 UTC [msp.identity] Verify -> DEBU 48de Verify: digest = 00000000 46 42 6b 40 9e c0 72 f2 43 8e fd a7 d2 aa a5 02 |FBk@..r.C.......| +00000010 ce c9 14 db a7 c0 8d 57 81 5b 97 de cd 8a 6a 8e |.......W.[....j.|" +"2019-09-24 01:05:44.173 UTC [msp.identity] Verify -> DEBU 48df Verify: sig = 00000000 30 45 02 21 00 bf 5e e2 cf ce 3d 08 a0 28 b7 0a |0E.!..^...=..(..| +00000010 04 6b ee db e5 b5 32 03 0c 5a 8f 15 f3 52 e2 22 |.k....2..Z...R."| +00000020 ce f5 ee b8 66 02 20 4b a4 ec e5 03 b9 14 e4 3c |....f. K.......<| +00000030 d2 64 c5 b2 0b c1 ea 1c f6 56 24 ba 43 4f 30 ed |.d.......V$.CO0.| +00000040 67 b8 1b 16 b9 78 c4 |g....x.|" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func2 -> DEBU 48e0 0xc0042612d0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:44.173 UTC [cauthdsl] func1 -> DEBU 48e1 0xc0042612d0 gate 1569287144173624100 evaluation succeeds" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e2 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:44.173 UTC [policies] Evaluate -> DEBU 48e4 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:44.174 UTC [policies] Evaluate -> DEBU 48e5 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 48e6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e7 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e8 updating membership: timestamp: " +"2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48e9 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48ea Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] learnExistingMembers -> DEBU 48eb Exiting" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] handleAliveMessage -> DEBU 48ec Exiting" +"2019-09-24 01:05:44.174 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48ed Exiting" +"2019-09-24 01:05:44.174 UTC [gossip.gossip] handleMessage -> DEBU 48ee Exiting" +"2019-09-24 01:05:44.175 UTC [gossip.gossip] handleMessage -> DEBU 48ef Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 48f0 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.179 UTC [msp] DeserializeIdentity -> DEBU 48f1 Obtaining identity" +"2019-09-24 01:05:44.179 UTC [msp] DeserializeIdentity -> DEBU 48f2 Obtaining identity" +"2019-09-24 01:05:44.180 UTC [msp] DeserializeIdentity -> DEBU 48f3 Obtaining identity" +"2019-09-24 01:05:44.180 UTC [msp] DeserializeIdentity -> DEBU 48f4 Obtaining identity" +"2019-09-24 01:05:44.181 UTC [msp] DeserializeIdentity -> DEBU 48f5 Obtaining identity" +"2019-09-24 01:05:44.181 UTC [msp] DeserializeIdentity -> DEBU 48f6 Obtaining identity" +"2019-09-24 01:05:44.181 UTC [gossip.comm] Send -> DEBU 48f7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.182 UTC [msp] DeserializeIdentity -> DEBU 48f8 Obtaining identity" +"2019-09-24 01:05:44.183 UTC [msp] DeserializeIdentity -> DEBU 48fa Obtaining identity" +"2019-09-24 01:05:44.183 UTC [gossip.comm] Send -> DEBU 48fb Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.183 UTC [msp] DeserializeIdentity -> DEBU 48fc Obtaining identity" +"2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48fd Obtaining identity" +"2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48fe Obtaining identity" +"2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 48ff Obtaining identity" +"2019-09-24 01:05:44.184 UTC [msp] DeserializeIdentity -> DEBU 4900 Obtaining identity" +"2019-09-24 01:05:44.185 UTC [gossip.comm] Send -> DEBU 4901 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.185 UTC [msp] DeserializeIdentity -> DEBU 4902 Obtaining identity" +"2019-09-24 01:05:44.185 UTC [msp] DeserializeIdentity -> DEBU 4903 Obtaining identity" +"2019-09-24 01:05:44.185 UTC [gossip.comm] Send -> DEBU 4904 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4905 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4906 Exiting" +"2019-09-24 01:05:44.183 UTC [gossip.comm] sendToEndpoint -> DEBU 48f9 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4907 Exiting" +"2019-09-24 01:05:44.186 UTC [gossip.comm] sendToEndpoint -> DEBU 4908 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 4909 Exiting" +"2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 490a Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.187 UTC [gossip.comm] sendToEndpoint -> DEBU 490b Exiting" +"2019-09-24 01:05:44.175 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490c Exiting" +"2019-09-24 01:05:44.188 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490d Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.189 UTC [gossip.discovery] handleMsgFromComm -> DEBU 490e Exiting" +"2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 490f Exiting" +"2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 4910 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.189 UTC [gossip.gossip] handleMessage -> DEBU 4911 Exiting" +"2019-09-24 01:05:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4912 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.190 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4913 Exiting" +"2019-09-24 01:05:44.238 UTC [msp] GetDefaultSigningIdentity -> DEBU 4914 Obtaining default signing identity" +"2019-09-24 01:05:44.238 UTC [msp.identity] Sign -> DEBU 4915 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151035 " +"2019-09-24 01:05:44.238 UTC [msp.identity] Sign -> DEBU 4916 Sign: digest: 89F566866FFDE77DD84B8762FA7E444D455C61AEFADC0007B8B1B9F2DD71AB5D " +"2019-09-24 01:05:44.239 UTC [msp] GetDefaultSigningIdentity -> DEBU 4917 Obtaining default signing identity" +"2019-09-24 01:05:44.239 UTC [msp.identity] Sign -> DEBU 4918 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:44.239 UTC [msp.identity] Sign -> DEBU 4919 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:44.239 UTC [gossip.discovery] periodicalSendAlive -> DEBU 491a Sleeping 5s" +"2019-09-24 01:05:44.246 UTC [msp] DeserializeIdentity -> DEBU 491b Obtaining identity" +"2019-09-24 01:05:44.246 UTC [msp] DeserializeIdentity -> DEBU 491c Obtaining identity" +"2019-09-24 01:05:44.247 UTC [gossip.comm] Send -> DEBU 491d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.247 UTC [msp] DeserializeIdentity -> DEBU 491e Obtaining identity" +"2019-09-24 01:05:44.248 UTC [gossip.comm] Send -> DEBU 4920 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.248 UTC [msp] DeserializeIdentity -> DEBU 4921 Obtaining identity" +"2019-09-24 01:05:44.248 UTC [gossip.comm] Send -> DEBU 4922 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 4923 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 4924 Exiting" +"2019-09-24 01:05:44.248 UTC [gossip.comm] sendToEndpoint -> DEBU 491f Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes" +"2019-09-24 01:05:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 4925 Exiting" +"2019-09-24 01:05:44.249 UTC [gossip.comm] sendToEndpoint -> DEBU 4926 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:44.250 UTC [gossip.comm] sendToEndpoint -> DEBU 4927 Exiting" +"2019-09-24 01:05:45.654 UTC [msp] DeserializeIdentity -> DEBU 4928 Obtaining identity" +"2019-09-24 01:05:45.654 UTC [msp] DeserializeIdentity -> DEBU 4929 Obtaining identity" +"2019-09-24 01:05:45.654 UTC [gossip.comm] Send -> DEBU 492a Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492c Exiting" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492d Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492e Exiting" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 492f Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.655 UTC [gossip.comm] sendToEndpoint -> DEBU 4930 Exiting" +"2019-09-24 01:05:45.658 UTC [gossip.gossip] handleMessage -> DEBU 4931 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.659 UTC [msp.identity] Verify -> DEBU 4932 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:45.659 UTC [msp.identity] Verify -> DEBU 4933 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:45.660 UTC [msp.identity] Verify -> DEBU 4934 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:45.660 UTC [msp.identity] Verify -> DEBU 4935 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:45.660 UTC [msp] DeserializeIdentity -> DEBU 4936 Obtaining identity" +"2019-09-24 01:05:45.660 UTC [msp] DeserializeIdentity -> DEBU 4937 Obtaining identity" +"2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4938 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4939 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.661 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 493a Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 493d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 493e 0xc0042c1280 gate 1569287145661559900 evaluation starts" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 493f 0xc0042c1280 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4940 0xc0042c1280 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4941 0xc0042c1280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4942 0xc0042c1280 principal evaluation fails" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 4943 0xc0042c1280 gate 1569287145661559900 evaluation fails" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4944 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4945 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.661 UTC [policies] Evaluate -> DEBU 4946 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func1 -> DEBU 4947 0xc0042c1ac0 gate 1569287145661928100 evaluation starts" +"2019-09-24 01:05:45.661 UTC [cauthdsl] func2 -> DEBU 4948 0xc0042c1ac0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4949 0xc0042c1ac0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 494a 0xc0042c1ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 494b 0xc0042c1ac0 principal evaluation fails" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func1 -> DEBU 494c 0xc0042c1ac0 gate 1569287145661928100 evaluation fails" +"2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.662 UTC [policies] Evaluate -> DEBU 494f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func1 -> DEBU 4950 0xc0042d0300 gate 1569287145662212200 evaluation starts" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4951 0xc0042d0300 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4952 0xc0042d0300 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4953 0xc0042d0300 principal matched by identity 0" +"2019-09-24 01:05:45.662 UTC [msp.identity] Verify -> DEBU 4954 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:45.662 UTC [msp.identity] Verify -> DEBU 4955 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:45.663 UTC [gossip.comm] func1 -> DEBU 4956 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.663 UTC [gossip.comm] func1 -> DEBU 4957 Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.662 UTC [cauthdsl] func2 -> DEBU 4958 0xc0042d0300 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.664 UTC [cauthdsl] func1 -> DEBU 4959 0xc0042d0300 gate 1569287145662212200 evaluation succeeds" +"2019-09-24 01:05:45.664 UTC [policies] Evaluate -> DEBU 495a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.664 UTC [policies] Evaluate -> DEBU 495b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.665 UTC [policies] Evaluate -> DEBU 495c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.665 UTC [policies] Evaluate -> DEBU 495d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.665 UTC [msp] DeserializeIdentity -> DEBU 495e Obtaining identity" +"2019-09-24 01:05:45.665 UTC [msp] DeserializeIdentity -> DEBU 495f Obtaining identity" +"2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4960 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4961 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.667 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4962 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4963 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4964 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.668 UTC [policies] Evaluate -> DEBU 4965 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.668 UTC [cauthdsl] func1 -> DEBU 4966 0xc0042d1ad0 gate 1569287145668791900 evaluation starts" +"2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4967 0xc0042d1ad0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4968 0xc0042d1ad0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 4969 0xc0042d1ad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.668 UTC [cauthdsl] func2 -> DEBU 496a 0xc0042d1ad0 principal evaluation fails" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 496b 0xc0042d1ad0 gate 1569287145668791900 evaluation fails" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 496e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 496f 0xc0042e6310 gate 1569287145669175600 evaluation starts" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4970 0xc0042e6310 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4971 0xc0042e6310 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4972 0xc0042e6310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4973 0xc0042e6310 principal evaluation fails" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 4974 0xc0042e6310 gate 1569287145669175600 evaluation fails" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4975 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4976 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4977 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 4978 0xc0042e6b50 gate 1569287145669420300 evaluation starts" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 4979 0xc0042e6b50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497a 0xc0042e6b50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497b 0xc0042e6b50 principal matched by identity 0" +"2019-09-24 01:05:45.669 UTC [msp.identity] Verify -> DEBU 497c Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:45.669 UTC [msp.identity] Verify -> DEBU 497d Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func2 -> DEBU 497e 0xc0042e6b50 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.669 UTC [cauthdsl] func1 -> DEBU 497f 0xc0042e6b50 gate 1569287145669420300 evaluation succeeds" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4980 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4981 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4982 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.669 UTC [policies] Evaluate -> DEBU 4983 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4984 Exiting" +"2019-09-24 01:05:45.669 UTC [gossip.gossip] handleMessage -> DEBU 4985 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.669 UTC [msp] DeserializeIdentity -> DEBU 4986 Obtaining identity" +"2019-09-24 01:05:45.669 UTC [msp] DeserializeIdentity -> DEBU 4987 Obtaining identity" +"2019-09-24 01:05:45.670 UTC [msp] DeserializeIdentity -> DEBU 4988 Obtaining identity" +"2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4989 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 498a Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.670 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 498b Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 498e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 498f 0xc0042f6660 gate 1569287145670345900 evaluation starts" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4990 0xc0042f6660 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4991 0xc0042f6660 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4992 0xc0042f6660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4993 0xc0042f6660 principal evaluation fails" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 4994 0xc0042f6660 gate 1569287145670345900 evaluation fails" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4995 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4996 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 4997 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 4998 0xc0042f6ea0 gate 1569287145670592600 evaluation starts" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 4999 0xc0042f6ea0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499a 0xc0042f6ea0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499b 0xc0042f6ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func2 -> DEBU 499c 0xc0042f6ea0 principal evaluation fails" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 499d 0xc0042f6ea0 gate 1569287145670592600 evaluation fails" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 499e Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 499f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.670 UTC [policies] Evaluate -> DEBU 49a0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.670 UTC [cauthdsl] func1 -> DEBU 49a1 0xc0042f76e0 gate 1569287145670973400 evaluation starts" +"2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a2 0xc0042f76e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a3 0xc0042f76e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a4 0xc0042f76e0 principal matched by identity 0" +"2019-09-24 01:05:45.671 UTC [msp.identity] Verify -> DEBU 49a5 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:45.671 UTC [msp.identity] Verify -> DEBU 49a6 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:45.671 UTC [cauthdsl] func2 -> DEBU 49a7 0xc0042f76e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.671 UTC [cauthdsl] func1 -> DEBU 49a8 0xc0042f76e0 gate 1569287145670973400 evaluation succeeds" +"2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49a9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49ab Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.671 UTC [policies] Evaluate -> DEBU 49ac == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.675 UTC [msp.identity] Verify -> DEBU 49ad Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:45.675 UTC [msp.identity] Verify -> DEBU 49ae Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:45.676 UTC [msp.identity] Verify -> DEBU 49af Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:45.676 UTC [msp.identity] Verify -> DEBU 49b0 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:45.679 UTC [msp] DeserializeIdentity -> DEBU 49b1 Obtaining identity" +"2019-09-24 01:05:45.680 UTC [msp] DeserializeIdentity -> DEBU 49b2 Obtaining identity" +"2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49b3 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b4 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.680 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49b5 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.681 UTC [policies] Evaluate -> DEBU 49b8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.681 UTC [cauthdsl] func1 -> DEBU 49b9 0xc004305cf0 gate 1569287145681423900 evaluation starts" +"2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49ba 0xc004305cf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49bb 0xc004305cf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.681 UTC [cauthdsl] func2 -> DEBU 49bc 0xc004305cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49bd 0xc004305cf0 principal evaluation fails" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49be 0xc004305cf0 gate 1569287145681423900 evaluation fails" +"2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49bf Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49c2 0xc004322530 gate 1569287145682290700 evaluation starts" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c3 0xc004322530 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c4 0xc004322530 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c5 0xc004322530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func2 -> DEBU 49c6 0xc004322530 principal evaluation fails" +"2019-09-24 01:05:45.682 UTC [cauthdsl] func1 -> DEBU 49c7 0xc004322530 gate 1569287145682290700 evaluation fails" +"2019-09-24 01:05:45.682 UTC [policies] Evaluate -> DEBU 49c8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.683 UTC [policies] Evaluate -> DEBU 49c9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.683 UTC [policies] Evaluate -> DEBU 49ca == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.683 UTC [cauthdsl] func1 -> DEBU 49cb 0xc004322d70 gate 1569287145683492500 evaluation starts" +"2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49cc 0xc004322d70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49cd 0xc004322d70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.683 UTC [cauthdsl] func2 -> DEBU 49ce 0xc004322d70 principal matched by identity 0" +"2019-09-24 01:05:45.683 UTC [msp.identity] Verify -> DEBU 49cf Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:45.684 UTC [msp.identity] Verify -> DEBU 49d0 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:45.684 UTC [cauthdsl] func2 -> DEBU 49d1 0xc004322d70 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.684 UTC [cauthdsl] func1 -> DEBU 49d2 0xc004322d70 gate 1569287145683492500 evaluation succeeds" +"2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.684 UTC [policies] Evaluate -> DEBU 49d5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.685 UTC [policies] Evaluate -> DEBU 49d6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.685 UTC [gossip.gossip] handleMessage -> DEBU 49d7 Exiting" +"2019-09-24 01:05:45.685 UTC [gossip.gossip] handleMessage -> DEBU 49d8 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49d9 Obtaining identity" +"2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49da Obtaining identity" +"2019-09-24 01:05:45.685 UTC [msp] DeserializeIdentity -> DEBU 49db Obtaining identity" +"2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 49dc Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49dd Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.686 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 49de Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49df == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49e0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.686 UTC [policies] Evaluate -> DEBU 49e1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49e2 0xc004330880 gate 1569287145687112700 evaluation starts" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e3 0xc004330880 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e4 0xc004330880 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e5 0xc004330880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func2 -> DEBU 49e6 0xc004330880 principal evaluation fails" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49e7 0xc004330880 gate 1569287145687112700 evaluation fails" +"2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49e8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49e9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.687 UTC [policies] Evaluate -> DEBU 49ea == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.687 UTC [cauthdsl] func1 -> DEBU 49eb 0xc0043310c0 gate 1569287145687441000 evaluation starts" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ec 0xc0043310c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ed 0xc0043310c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ee 0xc0043310c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func2 -> DEBU 49ef 0xc0043310c0 principal evaluation fails" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func1 -> DEBU 49f0 0xc0043310c0 gate 1569287145687441000 evaluation fails" +"2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.688 UTC [policies] Evaluate -> DEBU 49f3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.688 UTC [cauthdsl] func1 -> DEBU 49f4 0xc004331900 gate 1569287145688736900 evaluation starts" +"2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f5 0xc004331900 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f6 0xc004331900 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.689 UTC [cauthdsl] func2 -> DEBU 49f7 0xc004331900 principal matched by identity 0" +"2019-09-24 01:05:45.689 UTC [msp.identity] Verify -> DEBU 49f8 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:45.689 UTC [msp.identity] Verify -> DEBU 49f9 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:45.690 UTC [cauthdsl] func2 -> DEBU 49fa 0xc004331900 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.690 UTC [cauthdsl] func1 -> DEBU 49fb 0xc004331900 gate 1569287145688736900 evaluation succeeds" +"2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49fe Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.690 UTC [policies] Evaluate -> DEBU 49ff == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a00 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a01 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a02 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:45.690 UTC [msp.identity] Verify -> DEBU 4a03 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:45.691 UTC [msp] DeserializeIdentity -> DEBU 4a04 Obtaining identity" +"2019-09-24 01:05:45.691 UTC [msp] DeserializeIdentity -> DEBU 4a05 Obtaining identity" +"2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a06 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a07 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.691 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a08 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a0b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a0c 0xc004341f10 gate 1569287145691569600 evaluation starts" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0d 0xc004341f10 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0e 0xc004341f10 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a0f 0xc004341f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a10 0xc004341f10 principal evaluation fails" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a11 0xc004341f10 gate 1569287145691569600 evaluation fails" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a12 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a13 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:45.691 UTC [policies] Evaluate -> DEBU 4a14 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func1 -> DEBU 4a15 0xc004366750 gate 1569287145691860000 evaluation starts" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a16 0xc004366750 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a17 0xc004366750 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a18 0xc004366750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:45.691 UTC [cauthdsl] func2 -> DEBU 4a19 0xc004366750 principal evaluation fails" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a1a 0xc004366750 gate 1569287145691860000 evaluation fails" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a1d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a1e 0xc004366f90 gate 1569287145692223500 evaluation starts" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a1f 0xc004366f90 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a20 0xc004366f90 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a21 0xc004366f90 principal matched by identity 0" +"2019-09-24 01:05:45.692 UTC [msp.identity] Verify -> DEBU 4a22 Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:45.692 UTC [msp.identity] Verify -> DEBU 4a23 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func2 -> DEBU 4a24 0xc004366f90 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:45.692 UTC [cauthdsl] func1 -> DEBU 4a25 0xc004366f90 gate 1569287145692223500 evaluation succeeds" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a26 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a27 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a28 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:45.692 UTC [policies] Evaluate -> DEBU 4a29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:45.692 UTC [gossip.gossip] handleMessage -> DEBU 4a2a Exiting" +"2019-09-24 01:05:45.738 UTC [msp] DeserializeIdentity -> DEBU 4a2b Obtaining identity" +"2019-09-24 01:05:45.742 UTC [msp] DeserializeIdentity -> DEBU 4a2c Obtaining identity" +"2019-09-24 01:05:45.743 UTC [gossip.pull] Hello -> DEBU 4a2d Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:45.745 UTC [msp] DeserializeIdentity -> DEBU 4a2e Obtaining identity" +"2019-09-24 01:05:45.745 UTC [msp] DeserializeIdentity -> DEBU 4a2f Obtaining identity" +"2019-09-24 01:05:45.746 UTC [gossip.comm] Send -> DEBU 4a30 Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:45.746 UTC [gossip.comm] sendToEndpoint -> DEBU 4a31 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.747 UTC [gossip.comm] sendToEndpoint -> DEBU 4a32 Exiting" +"2019-09-24 01:05:45.750 UTC [gossip.gossip] handleMessage -> DEBU 4a33 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.751 UTC [gossip.pull] HandleMessage -> DEBU 4a34 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.751 UTC [gossip.gossip] handleMessage -> DEBU 4a35 Exiting" +"2019-09-24 01:05:45.844 UTC [gossip.gossip] handleMessage -> DEBU 4a36 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.850 UTC [msp] DeserializeIdentity -> DEBU 4a37 Obtaining identity" +"2019-09-24 01:05:45.850 UTC [msp] DeserializeIdentity -> DEBU 4a38 Obtaining identity" +"2019-09-24 01:05:45.853 UTC [gossip.gossip] handleMessage -> DEBU 4a39 Exiting" +"2019-09-24 01:05:45.865 UTC [gossip.gossip] handleMessage -> DEBU 4a3a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.866 UTC [gossip.pull] HandleMessage -> DEBU 4a3b GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:45.866 UTC [gossip.pull] SendDigest -> DEBU 4a3c Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:45.866 UTC [gossip.gossip] handleMessage -> DEBU 4a3d Exiting" +"2019-09-24 01:05:46.040 UTC [gossip.comm] func1 -> DEBU 4a3e Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.041 UTC [gossip.gossip] handleMessage -> DEBU 4a3f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.041 UTC [msp] DeserializeIdentity -> DEBU 4a40 Obtaining identity" +"2019-09-24 01:05:46.042 UTC [msp] DeserializeIdentity -> DEBU 4a41 Obtaining identity" +"2019-09-24 01:05:46.042 UTC [msp] DeserializeIdentity -> DEBU 4a42 Obtaining identity" +"2019-09-24 01:05:46.042 UTC [gossip.gossip] handleMessage -> DEBU 4a43 Exiting" +"2019-09-24 01:05:46.241 UTC [gossip.comm] func1 -> DEBU 4a44 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.241 UTC [gossip.gossip] handleMessage -> DEBU 4a45 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a46 Obtaining identity" +"2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a47 Obtaining identity" +"2019-09-24 01:05:46.241 UTC [msp] DeserializeIdentity -> DEBU 4a48 Obtaining identity" +"2019-09-24 01:05:46.241 UTC [gossip.gossip] handleMessage -> DEBU 4a49 Exiting" +"2019-09-24 01:05:46.493 UTC [gossip.gossip] handleMessage -> DEBU 4a4a Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.493 UTC [gossip.pull] HandleMessage -> DEBU 4a4b GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.493 UTC [gossip.pull] SendDigest -> DEBU 4a4c Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:46.493 UTC [gossip.gossip] handleMessage -> DEBU 4a4d Exiting" +"2019-09-24 01:05:46.529 UTC [gossip.gossip] handleMessage -> DEBU 4a4e Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.529 UTC [gossip.gossip] handleMessage -> DEBU 4a4f Exiting" +"2019-09-24 01:05:46.529 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a50 Got message: GossipMessage: tag:EMPTY mem_req:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.529 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a51 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a52 Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +"2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a53 Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +00000040 e4 6b 15 e0 e8 e4 |.k....|" +"2019-09-24 01:05:46.529 UTC [msp.identity] Verify -> DEBU 4a54 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:46.531 UTC [msp.identity] Verify -> DEBU 4a55 Verify: sig = 00000000 30 44 02 20 39 6d 2d 6d dd 3c 60 9d 83 5e 16 02 |0D. 9m-m.<`..^..| +00000010 0a 56 d9 c3 45 ea 9f e7 45 c1 f6 13 3e 8c c8 7e |.V..E...E...>..~| +00000020 84 09 8f cf 02 20 13 42 0f 1c a6 63 b8 06 4d 6a |..... .B...c..Mj| +00000030 7a b9 75 31 f4 f4 e8 da 4c 26 8d 87 bd 6f 4b 70 |z.u1....L&...oKp| +00000040 5e 2a 43 e7 99 ba |^*C...|" +"2019-09-24 01:05:46.531 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a56 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:46.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a57 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:46.532 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a58 updating membership: timestamp: " +"2019-09-24 01:05:46.534 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a59 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:46.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a5a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:46.535 UTC [gossip.discovery] learnExistingMembers -> DEBU 4a5b Exiting" +"2019-09-24 01:05:46.535 UTC [gossip.discovery] handleAliveMessage -> DEBU 4a5c Exiting" +"2019-09-24 01:05:46.535 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a5d Exiting" +"2019-09-24 01:05:46.535 UTC [gossip.discovery] sendMemResponse -> DEBU 4a5e Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:46.535 UTC [msp] DeserializeIdentity -> DEBU 4a5f Obtaining identity" +"2019-09-24 01:05:46.535 UTC [msp] DeserializeIdentity -> DEBU 4a60 Obtaining identity" +"2019-09-24 01:05:46.535 UTC [gossip.comm] Send -> DEBU 4a61 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.535 UTC [gossip.discovery] sendMemResponse -> DEBU 4a62 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" secret_envelope:\214\310~\204\t\217\317\002 \023B\017\034\246c\270\006Mjz\271u1\364\364\350\332L&\215\207\275oKp^*C\347\231\272" > > alive: " +"2019-09-24 01:05:46.535 UTC [gossip.comm] sendToEndpoint -> DEBU 4a63 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.535 UTC [gossip.comm] sendToEndpoint -> DEBU 4a64 Exiting" +"2019-09-24 01:05:46.736 UTC [gossip.election] waitForInterrupt -> DEBU 4a65 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Exiting" +"2019-09-24 01:05:46.736 UTC [gossip.election] IsLeader -> DEBU 4a66 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Returning true" +"2019-09-24 01:05:46.736 UTC [msp] GetDefaultSigningIdentity -> DEBU 4a67 Obtaining default signing identity" +"2019-09-24 01:05:46.736 UTC [msp.identity] Sign -> DEBU 4a68 Sign: plaintext: 120F627573696E6573736368616E6E65...120C08F4AAA7C9D9C8CEE31510111801 " +"2019-09-24 01:05:46.736 UTC [msp.identity] Sign -> DEBU 4a69 Sign: digest: 075313BF4445762D432EF13F5431A5C5529AE7D54745CC05E5657CCD5C8237EF " +"2019-09-24 01:05:46.737 UTC [gossip.election] waitForInterrupt -> DEBU 4a6a d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f : Entering" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6b Obtaining identity" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6c Obtaining identity" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6d Obtaining identity" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a6e Obtaining identity" +"2019-09-24 01:05:46.739 UTC [gossip.comm] Send -> DEBU 4a6f Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a70 Obtaining identity" +"2019-09-24 01:05:46.739 UTC [msp] DeserializeIdentity -> DEBU 4a71 Obtaining identity" +"2019-09-24 01:05:46.739 UTC [gossip.comm] sendToEndpoint -> DEBU 4a72 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.739 UTC [gossip.comm] sendToEndpoint -> DEBU 4a73 Exiting" +"2019-09-24 01:05:46.857 UTC [gossip.comm] func1 -> DEBU 4a74 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.857 UTC [gossip.gossip] handleMessage -> DEBU 4a75 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.857 UTC [gossip.pull] HandleMessage -> DEBU 4a76 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.857 UTC [msp] DeserializeIdentity -> DEBU 4a77 Obtaining identity" +"2019-09-24 01:05:46.858 UTC [msp] DeserializeIdentity -> DEBU 4a78 Obtaining identity" +"2019-09-24 01:05:46.858 UTC [msp] DeserializeIdentity -> DEBU 4a79 Obtaining identity" +"2019-09-24 01:05:46.840 UTC [msp] DeserializeIdentity -> DEBU 4a7a Obtaining identity" +"2019-09-24 01:05:46.841 UTC [msp] DeserializeIdentity -> DEBU 4a7b Obtaining identity" +"2019-09-24 01:05:46.842 UTC [msp] DeserializeIdentity -> DEBU 4a7c Obtaining identity" +"2019-09-24 01:05:46.842 UTC [gossip.pull] SendDigest -> DEBU 4a7d Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:46.844 UTC [gossip.gossip] handleMessage -> DEBU 4a7e Exiting" +"2019-09-24 01:05:46.845 UTC [gossip.comm] func1 -> DEBU 4a7f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.852 UTC [gossip.gossip] handleMessage -> DEBU 4a80 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.861 UTC [gossip.gossip] handleMessage -> DEBU 4a81 Exiting" +"2019-09-24 01:05:46.867 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4a82 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.871 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4a83 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:46.871 UTC [msp] DeserializeIdentity -> DEBU 4a84 Obtaining identity" +"2019-09-24 01:05:46.872 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4a85 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:46.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a86 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.874 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4a87 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a88 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a89 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a8a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a8b 0xc0043b9840 gate 1569287146874546000 evaluation starts" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8c 0xc0043b9840 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8d 0xc0043b9840 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8e 0xc0043b9840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a8f 0xc0043b9840 principal evaluation fails" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a90 0xc0043b9840 gate 1569287146874546000 evaluation fails" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a91 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a92 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.874 UTC [policies] Evaluate -> DEBU 4a93 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func1 -> DEBU 4a94 0xc0043ea080 gate 1569287146874861100 evaluation starts" +"2019-09-24 01:05:46.874 UTC [cauthdsl] func2 -> DEBU 4a95 0xc0043ea080 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a96 0xc0043ea080 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a97 0xc0043ea080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a98 0xc0043ea080 principal evaluation fails" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func1 -> DEBU 4a99 0xc0043ea080 gate 1569287146874861100 evaluation fails" +"2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.875 UTC [policies] Evaluate -> DEBU 4a9c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func1 -> DEBU 4a9d 0xc0043ea8c0 gate 1569287146875558600 evaluation starts" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a9e 0xc0043ea8c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4a9f 0xc0043ea8c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.875 UTC [cauthdsl] func2 -> DEBU 4aa0 0xc0043ea8c0 principal matched by identity 0" +"2019-09-24 01:05:46.875 UTC [msp.identity] Verify -> DEBU 4aa1 Verify: digest = 00000000 73 28 4c 14 a7 72 65 05 46 77 5c 1a a0 cb 81 55 |s(L..re.Fw\....U| +00000010 ee 95 08 55 88 00 01 1f 5f 82 1a df 8f 6d ce 89 |...U...._....m..|" +"2019-09-24 01:05:46.875 UTC [msp.identity] Verify -> DEBU 4aa2 Verify: sig = 00000000 30 44 02 20 44 fb 18 ba 8c 1d e1 c5 40 ed fe 3c |0D. D.......@..<| +00000010 70 3c f9 63 e7 19 ab 47 a3 05 74 56 f4 c0 ce 5b |p<.c...G..tV...[| +00000020 bf 35 88 8e 02 20 39 40 15 31 33 2f d1 05 38 68 |.5... 9@.13/..8h| +00000030 cd 58 0e c0 1d a6 a7 03 36 dd 88 29 1a 16 58 e9 |.X......6..)..X.| +00000040 33 c1 56 21 b8 77 |3.V!.w|" +"2019-09-24 01:05:46.876 UTC [cauthdsl] func2 -> DEBU 4aa3 0xc0043ea8c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:46.876 UTC [cauthdsl] func1 -> DEBU 4aa4 0xc0043ea8c0 gate 1569287146875558600 evaluation succeeds" +"2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa5 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa7 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:46.876 UTC [policies] Evaluate -> DEBU 4aa8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:46.876 UTC [gossip.discovery] handleAliveMessage -> DEBU 4aa9 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.877 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aaa Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:46.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aab updating membership: timestamp: " +"2019-09-24 01:05:46.881 UTC [gossip.comm] func1 -> DEBU 4aac Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.882 UTC [gossip.gossip] handleMessage -> DEBU 4aad Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.882 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aae Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:46.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4aaf Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:46.883 UTC [gossip.discovery] learnExistingMembers -> DEBU 4ab0 Exiting" +"2019-09-24 01:05:46.884 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ab2 Exiting" +"2019-09-24 01:05:46.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ab3 Exiting" +"2019-09-24 01:05:46.884 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab1 Obtaining default signing identity" +"2019-09-24 01:05:46.884 UTC [msp.identity] Sign -> DEBU 4ab5 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151036 " +"2019-09-24 01:05:46.884 UTC [msp.identity] Sign -> DEBU 4ab6 Sign: digest: 20781E8C0D3DA179EFFD34C1ACEACE8C4F7C935980AE40FA7B16512F8B5AEE83 " +"2019-09-24 01:05:46.885 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ab7 Obtaining default signing identity" +"2019-09-24 01:05:46.885 UTC [msp.identity] Sign -> DEBU 4ab8 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:46.885 UTC [msp.identity] Sign -> DEBU 4ab9 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:46.884 UTC [gossip.discovery] sendMemResponse -> DEBU 4ab4 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:46.887 UTC [gossip.pull] Hello -> DEBU 4aba Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:46.888 UTC [gossip.gossip] handleMessage -> DEBU 4abb Exiting" +"2019-09-24 01:05:46.890 UTC [gossip.comm] func1 -> DEBU 4abc Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.891 UTC [gossip.gossip] handleMessage -> DEBU 4ac0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.891 UTC [gossip.pull] HandleMessage -> DEBU 4ac1 GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac2 Obtaining identity" +"2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac3 Obtaining identity" +"2019-09-24 01:05:46.891 UTC [msp] DeserializeIdentity -> DEBU 4ac4 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac5 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac6 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ac7 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [gossip.pull] SendDigest -> DEBU 4ac8 Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:46.892 UTC [gossip.gossip] handleMessage -> DEBU 4ac9 Exiting" +"2019-09-24 01:05:46.890 UTC [gossip.comm] Send -> DEBU 4abd Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4aca Obtaining identity" +"2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4acb Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4acc Obtaining identity" +"2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4acd Entering, sending GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 4ace Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.892 UTC [gossip.comm] sendToEndpoint -> DEBU 4acf Exiting" +"2019-09-24 01:05:46.890 UTC [msp] DeserializeIdentity -> DEBU 4abe Obtaining identity" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ad0 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [msp] DeserializeIdentity -> DEBU 4ad1 Obtaining identity" +"2019-09-24 01:05:46.892 UTC [gossip.comm] Send -> DEBU 4ad2 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.893 UTC [gossip.discovery] sendMemResponse -> DEBU 4ad3 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" > alive: alive: alive: " +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad4 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad5 Exiting" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad6 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad7 Exiting" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad8 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:i\222]v\3060\227\320\213\002 5\227\367\264\315o\325[\236\022,|\212\317!70\267\302\277\307S>PY\233\334\005q\310O\216" > > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ad9 Exiting" +"2019-09-24 01:05:46.891 UTC [gossip.comm] Send -> DEBU 4abf Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.893 UTC [gossip.pull] Hello -> DEBU 4ada Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:46.893 UTC [gossip.comm] Send -> DEBU 4adb Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.893 UTC [gossip.pull] Hello -> DEBU 4adc Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:46.893 UTC [gossip.comm] Send -> DEBU 4add Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4ade Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.893 UTC [gossip.comm] sendToEndpoint -> DEBU 4adf Exiting" +"2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae0 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae1 Exiting" +"2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae2 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.894 UTC [gossip.comm] sendToEndpoint -> DEBU 4ae3 Exiting" +"2019-09-24 01:05:46.884 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ae4 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.895 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ae5 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:46.895 UTC [msp] DeserializeIdentity -> DEBU 4ae6 Obtaining identity" +"2019-09-24 01:05:46.895 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ae7 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:46.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae8 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.896 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ae9 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aea == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aeb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4aec == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4aed 0xc004426910 gate 1569287146896224800 evaluation starts" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4aee 0xc004426910 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4aef 0xc004426910 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af0 0xc004426910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af1 0xc004426910 principal evaluation fails" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4af2 0xc004426910 gate 1569287146896224800 evaluation fails" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af3 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4af5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4af6 0xc004427150 gate 1569287146896537600 evaluation starts" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af7 0xc004427150 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af8 0xc004427150 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4af9 0xc004427150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func2 -> DEBU 4afa 0xc004427150 principal evaluation fails" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4afb 0xc004427150 gate 1569287146896537600 evaluation fails" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afc Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.896 UTC [policies] Evaluate -> DEBU 4afe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:46.896 UTC [cauthdsl] func1 -> DEBU 4aff 0xc004427990 gate 1569287146896920400 evaluation starts" +"2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b00 0xc004427990 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b01 0xc004427990 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b02 0xc004427990 principal matched by identity 0" +"2019-09-24 01:05:46.897 UTC [msp.identity] Verify -> DEBU 4b03 Verify: digest = 00000000 27 4e ab 39 e0 3e 38 28 f5 1b cc 77 95 17 6f 0f |'N.9.>8(...w..o.| +00000010 50 2a b7 62 45 27 4a ee 25 cf fe 82 28 27 67 f8 |P*.bE'J.%...('g.|" +"2019-09-24 01:05:46.897 UTC [msp.identity] Verify -> DEBU 4b04 Verify: sig = 00000000 30 44 02 20 0f da 81 8b 80 52 67 83 ca 12 9f 89 |0D. .....Rg.....| +00000010 ec f4 bc ba da ef 35 85 fc 7b 25 c9 f5 3c f5 60 |......5..{%..<.`| +00000020 8b 8a 14 de 02 20 15 40 da 99 3f c8 2c 2e c6 38 |..... .@..?.,..8| +00000030 15 fa b7 c4 ce 49 0b 29 2e ba a5 ff e6 d5 00 0b |.....I.)........| +00000040 47 3c a9 90 34 19 |G<..4.|" +"2019-09-24 01:05:46.897 UTC [cauthdsl] func2 -> DEBU 4b05 0xc004427990 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:46.897 UTC [cauthdsl] func1 -> DEBU 4b06 0xc004427990 gate 1569287146896920400 evaluation succeeds" +"2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b07 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.897 UTC [policies] Evaluate -> DEBU 4b09 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:46.901 UTC [policies] Evaluate -> DEBU 4b0a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:46.901 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b0b Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b0c Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:46.902 UTC [gossip.comm] func1 -> DEBU 4b0d Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b0e updating membership: timestamp: " +"2019-09-24 01:05:46.902 UTC [gossip.gossip] handleMessage -> DEBU 4b0f Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b10 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:46.902 UTC [gossip.pull] HandleMessage -> DEBU 4b11 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.902 UTC [gossip.gossip] handleMessage -> DEBU 4b12 Exiting" +"2019-09-24 01:05:46.902 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b13 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:46.903 UTC [gossip.discovery] learnExistingMembers -> DEBU 4b14 Exiting" +"2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b15 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.903 UTC [gossip.pull] HandleMessage -> DEBU 4b17 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b18 Exiting" +"2019-09-24 01:05:46.903 UTC [gossip.gossip] handleMessage -> DEBU 4b19 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.903 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b16 Exiting" +"2019-09-24 01:05:46.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b1a Exiting" +"2019-09-24 01:05:46.903 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b1b Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.904 UTC [gossip.comm] func1 -> DEBU 4b1c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.904 UTC [gossip.discovery] sendMemResponse -> DEBU 4b1d Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:46.904 UTC [msp] DeserializeIdentity -> DEBU 4b1e Obtaining identity" +"2019-09-24 01:05:46.905 UTC [msp] DeserializeIdentity -> DEBU 4b1f Obtaining identity" +"2019-09-24 01:05:46.905 UTC [msp] DeserializeIdentity -> DEBU 4b20 Obtaining identity" +"2019-09-24 01:05:46.905 UTC [gossip.comm] Send -> DEBU 4b21 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:46.905 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b22 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:46.906 UTC [gossip.discovery] sendMemResponse -> DEBU 4b23 Exiting, replying with alive:\252|H\220\354\343\320\357\303qCkv\274i;\337\002\316\202\2546A[B\002 \"\n\026\367jpP\260\223j\367\223\365\200p4lO\324'$\312E\010\263\253\344k\025\340\350\344" > alive: alive: alive: " +"2019-09-24 01:05:46.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4b24 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4b25 Exiting" +"2019-09-24 01:05:46.906 UTC [gossip.gossip] handleMessage -> DEBU 4b26 Exiting" +"2019-09-24 01:05:46.906 UTC [gossip.gossip] handleMessage -> DEBU 4b27 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.906 UTC [msp.identity] Verify -> DEBU 4b28 Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +"2019-09-24 01:05:46.913 UTC [msp.identity] Verify -> DEBU 4b29 Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +00000040 dc 05 71 c8 4f 8e |..q.O.|" +"2019-09-24 01:05:46.914 UTC [msp.identity] Verify -> DEBU 4b2a Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:46.914 UTC [msp.identity] Verify -> DEBU 4b2b Verify: sig = 00000000 30 44 02 20 53 05 21 b6 28 95 1d 64 6c 7f 0b b5 |0D. S.!.(..dl...| +00000010 bc e0 44 6c 36 a7 d5 6d 20 ab 25 d6 e8 ba 31 f3 |..Dl6..m .%...1.| +00000020 55 a2 d8 9f 02 20 45 1b 6f a9 14 29 03 df d8 a9 |U.... E.o..)....| +00000030 e5 7e a8 d0 1a 00 df 33 1f 95 fa b6 7a 86 31 8f |.~.....3....z.1.| +00000040 86 8f 23 9e f8 5a |..#..Z|" +"2019-09-24 01:05:46.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b2c Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:46.916 UTC [gossip.discovery] isSentByMe -> DEBU 4b2d Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:46.916 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b2e Exiting" +"2019-09-24 01:05:46.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b2f Exiting" +"2019-09-24 01:05:46.916 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b30 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.917 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b31 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:46.917 UTC [msp.identity] Verify -> DEBU 4b32 Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +"2019-09-24 01:05:46.917 UTC [msp.identity] Verify -> DEBU 4b33 Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +00000040 dc 05 71 c8 4f 8e |..q.O.|" +"2019-09-24 01:05:46.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b34 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.918 UTC [gossip.discovery] isSentByMe -> DEBU 4b35 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b36 Exiting" +"2019-09-24 01:05:46.919 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b37 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:46.919 UTC [msp] DeserializeIdentity -> DEBU 4b38 Obtaining identity" +"2019-09-24 01:05:46.919 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b39 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:46.920 UTC [gossip.gossip] handleMessage -> DEBU 4b3a Exiting" +"2019-09-24 01:05:46.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b3b Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.920 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b3c Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b3f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func1 -> DEBU 4b40 0xc00445b960 gate 1569287146920360100 evaluation starts" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b41 0xc00445b960 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b42 0xc00445b960 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b43 0xc00445b960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func2 -> DEBU 4b44 0xc00445b960 principal evaluation fails" +"2019-09-24 01:05:46.920 UTC [cauthdsl] func1 -> DEBU 4b45 0xc00445b960 gate 1569287146920360100 evaluation fails" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b46 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b47 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.920 UTC [policies] Evaluate -> DEBU 4b48 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:46.921 UTC [cauthdsl] func1 -> DEBU 4b49 0xc0044681a0 gate 1569287146921074200 evaluation starts" +"2019-09-24 01:05:46.921 UTC [cauthdsl] func2 -> DEBU 4b4a 0xc0044681a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4b 0xc0044681a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4c 0xc0044681a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:46.922 UTC [cauthdsl] func2 -> DEBU 4b4d 0xc0044681a0 principal evaluation fails" +"2019-09-24 01:05:46.922 UTC [cauthdsl] func1 -> DEBU 4b4e 0xc0044681a0 gate 1569287146921074200 evaluation fails" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b4f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b50 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b51 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func1 -> DEBU 4b52 0xc0044689e0 gate 1569287146923123000 evaluation starts" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b53 0xc0044689e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b54 0xc0044689e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b55 0xc0044689e0 principal matched by identity 0" +"2019-09-24 01:05:46.923 UTC [msp.identity] Verify -> DEBU 4b56 Verify: digest = 00000000 73 28 4c 14 a7 72 65 05 46 77 5c 1a a0 cb 81 55 |s(L..re.Fw\....U| +00000010 ee 95 08 55 88 00 01 1f 5f 82 1a df 8f 6d ce 89 |...U...._....m..|" +"2019-09-24 01:05:46.923 UTC [msp.identity] Verify -> DEBU 4b57 Verify: sig = 00000000 30 44 02 20 44 fb 18 ba 8c 1d e1 c5 40 ed fe 3c |0D. D.......@..<| +00000010 70 3c f9 63 e7 19 ab 47 a3 05 74 56 f4 c0 ce 5b |p<.c...G..tV...[| +00000020 bf 35 88 8e 02 20 39 40 15 31 33 2f d1 05 38 68 |.5... 9@.13/..8h| +00000030 cd 58 0e c0 1d a6 a7 03 36 dd 88 29 1a 16 58 e9 |.X......6..)..X.| +00000040 33 c1 56 21 b8 77 |3.V!.w|" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func2 -> DEBU 4b58 0xc0044689e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:46.923 UTC [cauthdsl] func1 -> DEBU 4b59 0xc0044689e0 gate 1569287146923123000 evaluation succeeds" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5a Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5c Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:46.923 UTC [policies] Evaluate -> DEBU 4b5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:46.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b5e Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b5f Exiting" +"2019-09-24 01:05:46.924 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b60 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:46.925 UTC [msp.identity] Verify -> DEBU 4b61 Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +"2019-09-24 01:05:46.925 UTC [msp.identity] Verify -> DEBU 4b62 Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +00000040 e4 6b 15 e0 e8 e4 |.k....|" +"2019-09-24 01:05:46.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b63 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b64 Exiting" +"2019-09-24 01:05:46.925 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b65 Exiting" +"2019-09-24 01:05:46.930 UTC [gossip.comm] func1 -> DEBU 4b66 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.930 UTC [gossip.comm] func1 -> DEBU 4b67 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.930 UTC [gossip.gossip] handleMessage -> DEBU 4b68 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.931 UTC [gossip.pull] HandleMessage -> DEBU 4b69 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.931 UTC [gossip.gossip] handleMessage -> DEBU 4b6a Exiting" +"2019-09-24 01:05:46.931 UTC [gossip.gossip] handleMessage -> DEBU 4b6b Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.932 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4b6c Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:46.932 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b6d Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:46.933 UTC [msp.identity] Verify -> DEBU 4b6e Verify: digest = 00000000 20 78 1e 8c 0d 3d a1 79 ef fd 34 c1 ac ea ce 8c | x...=.y..4.....| +00000010 4f 7c 93 59 80 ae 40 fa 7b 16 51 2f 8b 5a ee 83 |O|.Y..@.{.Q/.Z..|" +"2019-09-24 01:05:46.933 UTC [msp.identity] Verify -> DEBU 4b6f Verify: sig = 00000000 30 44 02 20 6c de 3c cb 85 75 00 79 8c bf 57 dd |0D. l.<..u.y..W.| +00000010 76 e0 41 ca a6 af af 3a 7f ba 3e 69 92 5d 76 c6 |v.A....:..>i.]v.| +00000020 30 97 d0 8b 02 20 35 97 f7 b4 cd 6f d5 5b 9e 12 |0.... 5....o.[..| +00000030 2c 7c 8a cf 21 37 30 b7 c2 bf c7 53 3e 50 59 9b |,|..!70....S>PY.| +00000040 dc 05 71 c8 4f 8e |..q.O.|" +"2019-09-24 01:05:46.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b70 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.933 UTC [gossip.discovery] isSentByMe -> DEBU 4b71 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.932 UTC [gossip.gossip] handleMessage -> DEBU 4b72 Exiting" +"2019-09-24 01:05:46.933 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b73 Exiting" +"2019-09-24 01:05:46.934 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b74 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:46.934 UTC [msp] DeserializeIdentity -> DEBU 4b75 Obtaining identity" +"2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4b76 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b77 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.934 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4b78 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:46.934 UTC [policies] Evaluate -> DEBU 4b7b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b7c 0xc00447dbf0 gate 1569287146935050800 evaluation starts" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7d 0xc00447dbf0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7e 0xc00447dbf0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b7f 0xc00447dbf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b80 0xc00447dbf0 principal evaluation fails" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b81 0xc00447dbf0 gate 1569287146935050800 evaluation fails" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b82 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b84 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b85 0xc0044a0430 gate 1569287146935590900 evaluation starts" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b86 0xc0044a0430 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b87 0xc0044a0430 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b88 0xc0044a0430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func2 -> DEBU 4b89 0xc0044a0430 principal evaluation fails" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b8a 0xc0044a0430 gate 1569287146935590900 evaluation fails" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8b Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:46.935 UTC [policies] Evaluate -> DEBU 4b8d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:46.935 UTC [cauthdsl] func1 -> DEBU 4b8e 0xc0044a0c70 gate 1569287146935968700 evaluation starts" +"2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b8f 0xc0044a0c70 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b90 0xc0044a0c70 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:46.937 UTC [cauthdsl] func2 -> DEBU 4b91 0xc0044a0c70 principal matched by identity 0" +"2019-09-24 01:05:46.937 UTC [msp.identity] Verify -> DEBU 4b92 Verify: digest = 00000000 27 4e ab 39 e0 3e 38 28 f5 1b cc 77 95 17 6f 0f |'N.9.>8(...w..o.| +00000010 50 2a b7 62 45 27 4a ee 25 cf fe 82 28 27 67 f8 |P*.bE'J.%...('g.|" +"2019-09-24 01:05:46.937 UTC [msp.identity] Verify -> DEBU 4b93 Verify: sig = 00000000 30 44 02 20 0f da 81 8b 80 52 67 83 ca 12 9f 89 |0D. .....Rg.....| +00000010 ec f4 bc ba da ef 35 85 fc 7b 25 c9 f5 3c f5 60 |......5..{%..<.`| +00000020 8b 8a 14 de 02 20 15 40 da 99 3f c8 2c 2e c6 38 |..... .@..?.,..8| +00000030 15 fa b7 c4 ce 49 0b 29 2e ba a5 ff e6 d5 00 0b |.....I.)........| +00000040 47 3c a9 90 34 19 |G<..4.|" +"2019-09-24 01:05:46.938 UTC [cauthdsl] func2 -> DEBU 4b94 0xc0044a0c70 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:46.938 UTC [cauthdsl] func1 -> DEBU 4b95 0xc0044a0c70 gate 1569287146935968700 evaluation succeeds" +"2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b96 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b98 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:46.938 UTC [policies] Evaluate -> DEBU 4b99 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:46.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9a Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9b Exiting" +"2019-09-24 01:05:46.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4b9c Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:46.938 UTC [msp.identity] Verify -> DEBU 4b9d Verify: digest = 00000000 69 9d 22 02 48 1b ae 0f 44 cf 96 d2 c9 ed c6 87 |i.".H...D.......| +00000010 c3 20 8c 63 e3 64 60 79 90 32 d6 c7 ad ee 0d 22 |. .c.d`y.2....."|" +"2019-09-24 01:05:46.939 UTC [msp.identity] Verify -> DEBU 4b9e Verify: sig = 00000000 30 44 02 20 25 26 e9 46 45 6e 3e aa 7c 48 90 ec |0D. %&.FEn>.|H..| +00000010 e3 d0 ef c3 71 43 6b 76 bc 69 3b df 02 ce 82 ac |....qCkv.i;.....| +00000020 36 41 5b 42 02 20 22 0a 16 f7 6a 70 50 b0 93 6a |6A[B. "...jpP..j| +00000030 f7 93 f5 80 70 34 6c 4f d4 27 24 ca 45 08 b3 ab |....p4lO.'$.E...| +00000040 e4 6b 15 e0 e8 e4 |.k....|" +"2019-09-24 01:05:46.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4b9f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:46.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ba0 Exiting" +"2019-09-24 01:05:46.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba1 Exiting" +"2019-09-24 01:05:49.385 UTC [msp] GetDefaultSigningIdentity -> DEBU 4ba2 Obtaining default signing identity" +"2019-09-24 01:05:49.389 UTC [msp.identity] Sign -> DEBU 4ba4 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151037 " +"2019-09-24 01:05:49.389 UTC [gossip.gossip] handleMessage -> DEBU 4ba3 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.390 UTC [gossip.gossip] handleMessage -> DEBU 4ba5 Exiting" +"2019-09-24 01:05:49.390 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ba6 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.390 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ba7 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:49.390 UTC [msp.identity] Verify -> DEBU 4ba8 Verify: digest = 00000000 7b 7f 0c b5 e8 48 6a 34 29 fb 0b e6 d7 93 06 3f |{....Hj4)......?| +00000010 75 7e 93 c0 f1 2b 9e 7e 5f da aa 5b 64 b6 f6 37 |u~...+.~_..[d..7|" +"2019-09-24 01:05:49.391 UTC [msp.identity] Verify -> DEBU 4ba9 Verify: sig = 00000000 30 44 02 20 7f 87 05 6b d9 0d 82 af 79 b2 10 ca |0D. ...k....y...| +00000010 82 4f 78 a4 2c e7 2f 3c 82 9c 1b 93 0d 01 87 87 |.Ox.,./<........| +00000020 f9 6d 4a d4 02 20 2a 02 17 d6 7c 6d 7b 97 19 8e |.mJ.. *...|m{...| +00000030 1a a0 2a 40 6e d7 32 3b d3 41 c1 31 d7 bc a9 29 |..*@n.2;.A.1...)| +00000040 fd 56 ba 3f cd 0e |.V.?..|" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] handleAliveMessage -> DEBU 4baa Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bab Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bac updating membership: timestamp: " +"2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bad Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bae Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] learnExistingMembers -> DEBU 4baf Exiting" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bb0 Exiting" +"2019-09-24 01:05:49.391 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bb1 Exiting" +"2019-09-24 01:05:49.395 UTC [msp] DeserializeIdentity -> DEBU 4bb2 Obtaining identity" +"2019-09-24 01:05:49.397 UTC [msp] DeserializeIdentity -> DEBU 4bb3 Obtaining identity" +"2019-09-24 01:05:49.399 UTC [msp] DeserializeIdentity -> DEBU 4bb4 Obtaining identity" +"2019-09-24 01:05:49.400 UTC [gossip.comm] Send -> DEBU 4bb5 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:49.401 UTC [msp] DeserializeIdentity -> DEBU 4bb6 Obtaining identity" +"2019-09-24 01:05:49.401 UTC [gossip.comm] Send -> DEBU 4bb7 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:49.402 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb8 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.402 UTC [gossip.comm] sendToEndpoint -> DEBU 4bb9 Exiting" +"2019-09-24 01:05:49.403 UTC [gossip.comm] sendToEndpoint -> DEBU 4bba Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.404 UTC [gossip.comm] sendToEndpoint -> DEBU 4bbb Exiting" +"2019-09-24 01:05:49.404 UTC [gossip.comm] func1 -> DEBU 4bbc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.407 UTC [gossip.comm] func1 -> DEBU 4bbd Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bbe Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bbf Exiting" +"2019-09-24 01:05:49.408 UTC [gossip.gossip] handleMessage -> DEBU 4bc0 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.409 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bc1 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.409 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4bc2 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:49.410 UTC [msp] DeserializeIdentity -> DEBU 4bc3 Obtaining identity" +"2019-09-24 01:05:49.410 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4bc4 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bc5 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.411 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4bc6 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.411 UTC [policies] Evaluate -> DEBU 4bc7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.412 UTC [policies] Evaluate -> DEBU 4bc8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.413 UTC [policies] Evaluate -> DEBU 4bc9 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.413 UTC [cauthdsl] func1 -> DEBU 4bca 0xc0044c9360 gate 1569287149413444800 evaluation starts" +"2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcb 0xc0044c9360 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcc 0xc0044c9360 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bcd 0xc0044c9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.414 UTC [cauthdsl] func2 -> DEBU 4bce 0xc0044c9360 principal evaluation fails" +"2019-09-24 01:05:49.415 UTC [cauthdsl] func1 -> DEBU 4bcf 0xc0044c9360 gate 1569287149413444800 evaluation fails" +"2019-09-24 01:05:49.415 UTC [policies] Evaluate -> DEBU 4bd0 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.416 UTC [policies] Evaluate -> DEBU 4bd1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.416 UTC [policies] Evaluate -> DEBU 4bd2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.416 UTC [cauthdsl] func1 -> DEBU 4bd3 0xc0044c9ba0 gate 1569287149416678100 evaluation starts" +"2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd4 0xc0044c9ba0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd5 0xc0044c9ba0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd6 0xc0044c9ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.417 UTC [cauthdsl] func2 -> DEBU 4bd7 0xc0044c9ba0 principal evaluation fails" +"2019-09-24 01:05:49.418 UTC [cauthdsl] func1 -> DEBU 4bd8 0xc0044c9ba0 gate 1569287149416678100 evaluation fails" +"2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bd9 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.418 UTC [policies] Evaluate -> DEBU 4bdb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.419 UTC [cauthdsl] func1 -> DEBU 4bdc 0xc0044dc3e0 gate 1569287149419175400 evaluation starts" +"2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bdd 0xc0044dc3e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bde 0xc0044dc3e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.419 UTC [cauthdsl] func2 -> DEBU 4bdf 0xc0044dc3e0 principal matched by identity 0" +"2019-09-24 01:05:49.419 UTC [msp.identity] Verify -> DEBU 4be0 Verify: digest = 00000000 72 62 52 c5 7b 7d 15 7d 50 9a 43 57 d5 11 18 e3 |rbR.{}.}P.CW....| +00000010 cb 15 dc 1c 41 3a cb a3 99 4e 6d 5b f7 39 92 ff |....A:...Nm[.9..|" +"2019-09-24 01:05:49.420 UTC [msp.identity] Verify -> DEBU 4be1 Verify: sig = 00000000 30 45 02 21 00 d0 e9 64 40 f0 1d 67 34 0e b9 5e |0E.!...d@..g4..^| +00000010 0d f2 3a b9 b7 07 34 cc 8c 11 8b 3f c0 8b a9 1a |..:...4....?....| +00000020 ba 32 62 5c c1 02 20 50 9c 44 1a 56 78 17 97 92 |.2b\.. P.D.Vx...| +00000030 15 90 95 0d 81 ae ac 26 af bf f2 94 c3 10 f9 d9 |.......&........| +00000040 67 55 81 c6 e6 5c 95 |gU...\.|" +"2019-09-24 01:05:49.420 UTC [cauthdsl] func2 -> DEBU 4be2 0xc0044dc3e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.420 UTC [cauthdsl] func1 -> DEBU 4be3 0xc0044dc3e0 gate 1569287149419175400 evaluation succeeds" +"2019-09-24 01:05:49.420 UTC [policies] Evaluate -> DEBU 4be4 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be5 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be6 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.421 UTC [policies] Evaluate -> DEBU 4be7 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.421 UTC [gossip.discovery] handleAliveMessage -> DEBU 4be8 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4be9 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bea updating membership: timestamp: " +"2019-09-24 01:05:49.422 UTC [gossip.discovery] learnExistingMembers -> DEBU 4beb Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:49.423 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bec Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:49.423 UTC [gossip.discovery] learnExistingMembers -> DEBU 4bed Exiting" +"2019-09-24 01:05:49.424 UTC [gossip.discovery] handleAliveMessage -> DEBU 4bee Exiting" +"2019-09-24 01:05:49.425 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf0 Exiting" +"2019-09-24 01:05:49.426 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf4 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.426 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bf5 Exiting" +"2019-09-24 01:05:49.426 UTC [gossip.gossip] handleMessage -> DEBU 4bf6 Exiting" +"2019-09-24 01:05:49.427 UTC [gossip.gossip] handleMessage -> DEBU 4bf7 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.424 UTC [msp.identity] Sign -> DEBU 4bef Sign: digest: 56A51EEECDBAB18C0AADB11091943CA09854C1D71EB0E0EB737057A594FEC98D " +"2019-09-24 01:05:49.427 UTC [gossip.gossip] handleMessage -> DEBU 4bf8 Exiting" +"2019-09-24 01:05:49.428 UTC [msp] GetDefaultSigningIdentity -> DEBU 4bf9 Obtaining default signing identity" +"2019-09-24 01:05:49.429 UTC [msp.identity] Sign -> DEBU 4bfb Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:49.428 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfc Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.430 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4bfe Exiting" +"2019-09-24 01:05:49.425 UTC [msp] DeserializeIdentity -> DEBU 4bf1 Obtaining identity" +"2019-09-24 01:05:49.430 UTC [msp.identity] Sign -> DEBU 4bfd Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:49.428 UTC [gossip.gossip] handleMessage -> DEBU 4bfa Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.431 UTC [gossip.gossip] handleMessage -> DEBU 4c00 Exiting" +"2019-09-24 01:05:49.425 UTC [gossip.comm] func1 -> DEBU 4bf3 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.425 UTC [gossip.comm] func1 -> DEBU 4bf2 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.430 UTC [msp] DeserializeIdentity -> DEBU 4bff Obtaining identity" +"2019-09-24 01:05:49.431 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c01 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.432 UTC [gossip.comm] func1 -> DEBU 4c02 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.433 UTC [msp] DeserializeIdentity -> DEBU 4c03 Obtaining identity" +"2019-09-24 01:05:49.434 UTC [msp] DeserializeIdentity -> DEBU 4c07 Obtaining identity" +"2019-09-24 01:05:49.433 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4c04 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:49.431 UTC [gossip.gossip] handleMessage -> DEBU 4c05 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.434 UTC [gossip.comm] func1 -> DEBU 4c06 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.435 UTC [msp] DeserializeIdentity -> DEBU 4c08 Obtaining identity" +"2019-09-24 01:05:49.436 UTC [msp] DeserializeIdentity -> DEBU 4c0a Obtaining identity" +"2019-09-24 01:05:49.435 UTC [msp] DeserializeIdentity -> DEBU 4c09 Obtaining identity" +"2019-09-24 01:05:49.436 UTC [msp] DeserializeIdentity -> DEBU 4c0b Obtaining identity" +"2019-09-24 01:05:49.437 UTC [gossip.comm] Send -> DEBU 4c0d Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:49.437 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c0c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c0e Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.438 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c0f Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.438 UTC [policies] Evaluate -> DEBU 4c10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.439 UTC [policies] Evaluate -> DEBU 4c12 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.439 UTC [policies] Evaluate -> DEBU 4c13 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.439 UTC [cauthdsl] func1 -> DEBU 4c14 0xc0044ad7a0 gate 1569287149439421400 evaluation starts" +"2019-09-24 01:05:49.439 UTC [cauthdsl] func2 -> DEBU 4c15 0xc0044ad7a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.439 UTC [cauthdsl] func2 -> DEBU 4c16 0xc0044ad7a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.439 UTC [gossip.comm] sendToEndpoint -> DEBU 4c17 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.440 UTC [gossip.comm] sendToEndpoint -> DEBU 4c18 Exiting" +"2019-09-24 01:05:49.440 UTC [cauthdsl] func2 -> DEBU 4c19 0xc0044ad7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.437 UTC [msp] DeserializeIdentity -> DEBU 4c11 Obtaining identity" +"2019-09-24 01:05:49.441 UTC [cauthdsl] func2 -> DEBU 4c1a 0xc0044ad7a0 principal evaluation fails" +"2019-09-24 01:05:49.441 UTC [cauthdsl] func1 -> DEBU 4c1c 0xc0044ad7a0 gate 1569287149439421400 evaluation fails" +"2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1d Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.442 UTC [policies] Evaluate -> DEBU 4c1f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.441 UTC [gossip.comm] Send -> DEBU 4c1b Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:49.442 UTC [gossip.discovery] periodicalSendAlive -> DEBU 4c20 Sleeping 5s" +"2019-09-24 01:05:49.442 UTC [cauthdsl] func1 -> DEBU 4c21 0xc004514100 gate 1569287149442505000 evaluation starts" +"2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c22 0xc004514100 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c23 0xc004514100 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c24 0xc004514100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.444 UTC [cauthdsl] func2 -> DEBU 4c25 0xc004514100 principal evaluation fails" +"2019-09-24 01:05:49.445 UTC [cauthdsl] func1 -> DEBU 4c26 0xc004514100 gate 1569287149442505000 evaluation fails" +"2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c27 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c28 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.445 UTC [policies] Evaluate -> DEBU 4c29 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.445 UTC [cauthdsl] func1 -> DEBU 4c2a 0xc004514950 gate 1569287149445984500 evaluation starts" +"2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2b 0xc004514950 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2c 0xc004514950 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.446 UTC [cauthdsl] func2 -> DEBU 4c2d 0xc004514950 principal matched by identity 0" +"2019-09-24 01:05:49.447 UTC [msp.identity] Verify -> DEBU 4c2e Verify: digest = 00000000 6d f8 1a b0 bc 1a 8c f0 cf 7f ba a4 c3 e0 94 42 |m..............B| +00000010 6a d9 7e 90 3a f1 63 e3 fb 23 69 6f b1 69 7e d8 |j.~.:.c..#io.i~.|" +"2019-09-24 01:05:49.447 UTC [msp.identity] Verify -> DEBU 4c2f Verify: sig = 00000000 30 45 02 21 00 d3 13 3c 5b 02 5d ca 20 f7 eb eb |0E.!...<[.]. ...| +00000010 f7 b2 8e 91 92 70 4f c9 37 33 1d b8 b9 6a 7f a4 |.....pO.73...j..| +00000020 23 80 79 07 03 02 20 7f 6d d3 c9 c0 73 69 b0 18 |#.y... .m...si..| +00000030 9a ae 2a 29 5d 23 4e bc e5 61 db 7f 2a 5f 69 a6 |..*)]#N..a..*_i.| +00000040 5d e8 a0 23 23 9b 13 |]..##..|" +"2019-09-24 01:05:49.448 UTC [cauthdsl] func2 -> DEBU 4c30 0xc004514950 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.448 UTC [cauthdsl] func1 -> DEBU 4c31 0xc004514950 gate 1569287149445984500 evaluation succeeds" +"2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c32 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c33 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.448 UTC [policies] Evaluate -> DEBU 4c34 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.449 UTC [policies] Evaluate -> DEBU 4c35 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.449 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c36 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.449 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c37 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}" +"2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c38 updating membership: timestamp: " +"2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c39 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c3a Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:49.450 UTC [gossip.discovery] learnExistingMembers -> DEBU 4c3b Exiting" +"2019-09-24 01:05:49.451 UTC [gossip.discovery] handleAliveMessage -> DEBU 4c3c Exiting" +"2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3d Exiting" +"2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3e Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.451 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c3f Exiting" +"2019-09-24 01:05:49.451 UTC [gossip.gossip] handleMessage -> DEBU 4c40 Exiting" +"2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c41 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c42 Exiting" +"2019-09-24 01:05:49.452 UTC [gossip.gossip] handleMessage -> DEBU 4c43 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c44 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c45 Exiting" +"2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c46 Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.453 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c47 Exiting" +"2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c48 Exiting" +"2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c49 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.454 UTC [gossip.gossip] handleMessage -> DEBU 4c4a Exiting" +"2019-09-24 01:05:49.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4b Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.455 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4c4c Exiting" +"2019-09-24 01:05:49.455 UTC [gossip.comm] sendToEndpoint -> DEBU 4c4d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.455 UTC [gossip.comm] sendToEndpoint -> DEBU 4c4e Exiting" +"2019-09-24 01:05:49.457 UTC [msp] DeserializeIdentity -> DEBU 4c4f Obtaining identity" +"2019-09-24 01:05:49.458 UTC [msp] DeserializeIdentity -> DEBU 4c50 Obtaining identity" +"2019-09-24 01:05:49.458 UTC [gossip.comm] Send -> DEBU 4c51 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:49.459 UTC [msp] DeserializeIdentity -> DEBU 4c52 Obtaining identity" +"2019-09-24 01:05:49.459 UTC [gossip.comm] Send -> DEBU 4c53 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:49.459 UTC [gossip.comm] sendToEndpoint -> DEBU 4c54 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.459 UTC [gossip.comm] sendToEndpoint -> DEBU 4c55 Exiting" +"2019-09-24 01:05:49.460 UTC [gossip.comm] sendToEndpoint -> DEBU 4c56 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.460 UTC [gossip.comm] sendToEndpoint -> DEBU 4c57 Exiting" +"2019-09-24 01:05:49.460 UTC [msp] DeserializeIdentity -> DEBU 4c58 Obtaining identity" +"2019-09-24 01:05:49.463 UTC [gossip.comm] Send -> DEBU 4c59 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers" +"2019-09-24 01:05:49.463 UTC [msp] DeserializeIdentity -> DEBU 4c5a Obtaining identity" +"2019-09-24 01:05:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4c5b Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:49.464 UTC [gossip.comm] sendToEndpoint -> DEBU 4c5c Exiting" +"2019-09-24 01:05:49.466 UTC [msp] DeserializeIdentity -> DEBU 4c5d Obtaining identity" +"2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c5e Obtaining identity" +"2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c5f Obtaining identity" +"2019-09-24 01:05:49.468 UTC [msp] DeserializeIdentity -> DEBU 4c60 Obtaining identity" +"2019-09-24 01:05:49.469 UTC [gossip.comm] Send -> DEBU 4c61 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:49.469 UTC [msp] DeserializeIdentity -> DEBU 4c62 Obtaining identity" +"2019-09-24 01:05:49.471 UTC [msp] DeserializeIdentity -> DEBU 4c64 Obtaining identity" +"2019-09-24 01:05:49.469 UTC [gossip.comm] sendToEndpoint -> DEBU 4c63 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.471 UTC [gossip.comm] sendToEndpoint -> DEBU 4c66 Exiting" +"2019-09-24 01:05:49.471 UTC [gossip.comm] Send -> DEBU 4c65 Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers" +"2019-09-24 01:05:49.472 UTC [gossip.comm] sendToEndpoint -> DEBU 4c67 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:49.472 UTC [gossip.comm] sendToEndpoint -> DEBU 4c68 Exiting" +"2019-09-24 01:05:49.562 UTC [endorser] ProcessProposal -> DEBU 4c69 Entering: request from 172.18.0.5:50060" +"2019-09-24 01:05:49.562 UTC [protoutils] ValidateProposalMessage -> DEBU 4c6a ValidateProposalMessage starts for signed proposal 0xc0044ab270" +"2019-09-24 01:05:49.563 UTC [protoutils] validateChannelHeader -> DEBU 4c6b validateChannelHeader info: header type 3" +"2019-09-24 01:05:49.563 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6c begin" +"2019-09-24 01:05:49.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6d creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:49.564 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c6e creator is valid" +"2019-09-24 01:05:49.565 UTC [msp.identity] Verify -> DEBU 4c6f Verify: digest = 00000000 43 3d c7 b3 c6 10 82 42 0e 96 71 5c dc 88 e3 07 |C=.....B..q\....| +00000010 ea ec cf db 70 1b e4 1d e1 bc 00 0e 0b 3a 25 22 |....p........:%"|" +"2019-09-24 01:05:49.566 UTC [msp.identity] Verify -> DEBU 4c70 Verify: sig = 00000000 30 45 02 21 00 89 5e 73 7b 92 f4 a0 55 08 7c dc |0E.!..^s{...U.|.| +00000010 bd 5c 80 af de 48 c4 11 55 12 f6 64 ed f7 91 cb |.\...H..U..d....| +00000020 2c cf 1c 40 5e 02 20 24 88 34 a8 cb e6 5a 10 a8 |,..@^. $.4...Z..| +00000030 77 92 63 c3 40 b9 c0 2f d4 e8 fe 1a e0 46 7f 25 |w.c.@../.....F.%| +00000040 9a 51 5f 17 96 bf 1f |.Q_....|" +"2019-09-24 01:05:49.566 UTC [protoutils] checkSignatureFromCreator -> DEBU 4c71 exits successfully" +"2019-09-24 01:05:49.566 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4c72 validateChaincodeProposalMessage starts for proposal 0xc003f1dab0, header 0xc0044ab680" +"2019-09-24 01:05:49.567 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4c73 validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" " +"2019-09-24 01:05:49.568 UTC [endorser] preProcess -> DEBU 4c74 [][94e2a88e] processing txid: 94e2a88e2cc7755cea7ece078cd474aaa6557020c777eb7f6cccde3fd2e4a8b7" +"2019-09-24 01:05:49.568 UTC [endorser] SimulateProposal -> DEBU 4c75 [][94e2a88e] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:49.568 UTC [endorser] callChaincode -> INFO 4c76 [][94e2a88e] Entry chaincode: name:"cscc" " +"2019-09-24 01:05:49.568 UTC [chaincode] Execute -> DEBU 4c77 Entry" +"2019-09-24 01:05:49.569 UTC [cscc] Invoke -> DEBU 4c78 Invoke function: GetChannels" +"2019-09-24 01:05:49.569 UTC [msp.identity] Verify -> DEBU 4c79 Verify: digest = 00000000 43 3d c7 b3 c6 10 82 42 0e 96 71 5c dc 88 e3 07 |C=.....B..q\....| +00000010 ea ec cf db 70 1b e4 1d e1 bc 00 0e 0b 3a 25 22 |....p........:%"|" +"2019-09-24 01:05:49.570 UTC [msp.identity] Verify -> DEBU 4c7a Verify: sig = 00000000 30 45 02 21 00 89 5e 73 7b 92 f4 a0 55 08 7c dc |0E.!..^s{...U.|.| +00000010 bd 5c 80 af de 48 c4 11 55 12 f6 64 ed f7 91 cb |.\...H..U..d....| +00000020 2c cf 1c 40 5e 02 20 24 88 34 a8 cb e6 5a 10 a8 |,..@^. $.4...Z..| +00000030 77 92 63 c3 40 b9 c0 2f d4 e8 fe 1a e0 46 7f 25 |w.c.@../.....F.%| +00000040 9a 51 5f 17 96 bf 1f |.Q_....|" +"2019-09-24 01:05:49.570 UTC [chaincode] handleMessage -> DEBU 4c7b [94e2a88e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:49.570 UTC [chaincode] Notify -> DEBU 4c7c [94e2a88e] notifying Txid:94e2a88e2cc7755cea7ece078cd474aaa6557020c777eb7f6cccde3fd2e4a8b7, channelID:" +"2019-09-24 01:05:49.571 UTC [chaincode] Execute -> DEBU 4c7d Exit" +"2019-09-24 01:05:49.571 UTC [endorser] callChaincode -> INFO 4c7e [][94e2a88e] Exit chaincode: name:"cscc" (2ms)" +"2019-09-24 01:05:49.571 UTC [endorser] SimulateProposal -> DEBU 4c7f [][94e2a88e] Exit" +"2019-09-24 01:05:49.571 UTC [endorser] func1 -> DEBU 4c80 Exit: request from 172.18.0.5:50060" +"2019-09-24 01:05:49.572 UTC [comm.grpc.server] 1 -> INFO 4c81 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:50060 grpc.code=OK grpc.call_duration=10.6648ms +"2019-09-24 01:05:49.577 UTC [grpc] warningf -> DEBU 4c82 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:50060: read: connection reset by peer" +"2019-09-24 01:05:49.577 UTC [grpc] infof -> DEBU 4c83 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:49.619 UTC [msp] DeserializeIdentity -> DEBU 4c84 Obtaining identity" +"2019-09-24 01:05:49.619 UTC [msp] DeserializeIdentity -> DEBU 4c85 Obtaining identity" +"2019-09-24 01:05:49.619 UTC [gossip.comm] Send -> DEBU 4c86 Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c87 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c88 Exiting" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c89 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8a Exiting" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8b Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.619 UTC [gossip.comm] sendToEndpoint -> DEBU 4c8c Exiting" +"2019-09-24 01:05:49.620 UTC [gossip.comm] func1 -> DEBU 4c8d Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.620 UTC [gossip.gossip] handleMessage -> DEBU 4c8f Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c90 Obtaining identity" +"2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c91 Obtaining identity" +"2019-09-24 01:05:49.621 UTC [msp] DeserializeIdentity -> DEBU 4c92 Obtaining identity" +"2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4c93 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c94 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.621 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4c95 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c96 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c97 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c98 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4c99 0xc00454dbb0 gate 1569287149621533300 evaluation starts" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9a 0xc00454dbb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9b 0xc00454dbb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9c 0xc00454dbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4c9d 0xc00454dbb0 principal evaluation fails" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4c9e 0xc00454dbb0 gate 1569287149621533300 evaluation fails" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4c9f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4ca2 0xc0045a43f0 gate 1569287149621798200 evaluation starts" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca3 0xc0045a43f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca4 0xc0045a43f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca5 0xc0045a43f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func2 -> DEBU 4ca6 0xc0045a43f0 principal evaluation fails" +"2019-09-24 01:05:49.621 UTC [cauthdsl] func1 -> DEBU 4ca7 0xc0045a43f0 gate 1569287149621798200 evaluation fails" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca8 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.621 UTC [policies] Evaluate -> DEBU 4ca9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4caa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func1 -> DEBU 4cab 0xc0045a4c30 gate 1569287149622067200 evaluation starts" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cac 0xc0045a4c30 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cad 0xc0045a4c30 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cae 0xc0045a4c30 principal matched by identity 0" +"2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4caf Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb0 Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func2 -> DEBU 4cb1 0xc0045a4c30 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.622 UTC [cauthdsl] func1 -> DEBU 4cb2 0xc0045a4c30 gate 1569287149622067200 evaluation succeeds" +"2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb3 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb4 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb5 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.622 UTC [policies] Evaluate -> DEBU 4cb6 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb7 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:49.622 UTC [msp.identity] Verify -> DEBU 4cb8 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:49.623 UTC [msp.identity] Verify -> DEBU 4cb9 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:49.623 UTC [msp.identity] Verify -> DEBU 4cba Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:49.623 UTC [msp] DeserializeIdentity -> DEBU 4cbb Obtaining identity" +"2019-09-24 01:05:49.623 UTC [msp] DeserializeIdentity -> DEBU 4cbc Obtaining identity" +"2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4cbd Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cbe Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.623 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4cbf Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cc3 0xc0045b9240 gate 1569287149623522800 evaluation starts" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc4 0xc0045b9240 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc5 0xc0045b9240 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc6 0xc0045b9240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cc7 0xc0045b9240 principal evaluation fails" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cc8 0xc0045b9240 gate 1569287149623522800 evaluation fails" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cc9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cca == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4ccb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4ccc 0xc0045b9a80 gate 1569287149623772700 evaluation starts" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4ccd 0xc0045b9a80 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cce 0xc0045b9a80 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4ccf 0xc0045b9a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func2 -> DEBU 4cd0 0xc0045b9a80 principal evaluation fails" +"2019-09-24 01:05:49.623 UTC [cauthdsl] func1 -> DEBU 4cd1 0xc0045b9a80 gate 1569287149623772700 evaluation fails" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.623 UTC [policies] Evaluate -> DEBU 4cd4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func1 -> DEBU 4cd5 0xc0045ca2c0 gate 1569287149624021100 evaluation starts" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd6 0xc0045ca2c0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd7 0xc0045ca2c0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cd8 0xc0045ca2c0 principal matched by identity 0" +"2019-09-24 01:05:49.624 UTC [msp.identity] Verify -> DEBU 4cd9 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:49.624 UTC [msp.identity] Verify -> DEBU 4cda Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func2 -> DEBU 4cdb 0xc0045ca2c0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.624 UTC [cauthdsl] func1 -> DEBU 4cdc 0xc0045ca2c0 gate 1569287149624021100 evaluation succeeds" +"2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cdd Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cde == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4cdf Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.624 UTC [policies] Evaluate -> DEBU 4ce0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.624 UTC [gossip.gossip] handleMessage -> DEBU 4ce1 Exiting" +"2019-09-24 01:05:49.620 UTC [gossip.comm] func1 -> DEBU 4c8e Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.624 UTC [gossip.gossip] handleMessage -> DEBU 4ce2 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce3 Obtaining identity" +"2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce4 Obtaining identity" +"2019-09-24 01:05:49.624 UTC [msp] DeserializeIdentity -> DEBU 4ce5 Obtaining identity" +"2019-09-24 01:05:49.624 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4ce6 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ce7 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.625 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ce8 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4ce9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4ceb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func1 -> DEBU 4cec 0xc0045cbde0 gate 1569287149625212900 evaluation starts" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4ced 0xc0045cbde0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cee 0xc0045cbde0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cef 0xc0045cbde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func2 -> DEBU 4cf0 0xc0045cbde0 principal evaluation fails" +"2019-09-24 01:05:49.625 UTC [cauthdsl] func1 -> DEBU 4cf1 0xc0045cbde0 gate 1569287149625212900 evaluation fails" +"2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cf2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.625 UTC [policies] Evaluate -> DEBU 4cf3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.626 UTC [policies] Evaluate -> DEBU 4cf4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func1 -> DEBU 4cf5 0xc0045e8620 gate 1569287149626335100 evaluation starts" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf6 0xc0045e8620 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf7 0xc0045e8620 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf8 0xc0045e8620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func2 -> DEBU 4cf9 0xc0045e8620 principal evaluation fails" +"2019-09-24 01:05:49.626 UTC [cauthdsl] func1 -> DEBU 4cfa 0xc0045e8620 gate 1569287149626335100 evaluation fails" +"2019-09-24 01:05:49.626 UTC [policies] Evaluate -> DEBU 4cfb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.627 UTC [policies] Evaluate -> DEBU 4cfc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.627 UTC [policies] Evaluate -> DEBU 4cfd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.627 UTC [cauthdsl] func1 -> DEBU 4cfe 0xc0045e8e60 gate 1569287149627301100 evaluation starts" +"2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4cff 0xc0045e8e60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4d00 0xc0045e8e60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.627 UTC [cauthdsl] func2 -> DEBU 4d01 0xc0045e8e60 principal matched by identity 0" +"2019-09-24 01:05:49.627 UTC [msp.identity] Verify -> DEBU 4d02 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:49.627 UTC [msp.identity] Verify -> DEBU 4d03 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:49.628 UTC [cauthdsl] func2 -> DEBU 4d04 0xc0045e8e60 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.628 UTC [cauthdsl] func1 -> DEBU 4d05 0xc0045e8e60 gate 1569287149627301100 evaluation succeeds" +"2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d06 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d07 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d08 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.628 UTC [policies] Evaluate -> DEBU 4d09 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0a Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0b Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0c Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:49.630 UTC [msp.identity] Verify -> DEBU 4d0d Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:49.630 UTC [msp] DeserializeIdentity -> DEBU 4d0e Obtaining identity" +"2019-09-24 01:05:49.630 UTC [msp] DeserializeIdentity -> DEBU 4d0f Obtaining identity" +"2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d10 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d11 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.631 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d12 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d13 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d14 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d16 0xc0045ff470 gate 1569287149631176900 evaluation starts" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d17 0xc0045ff470 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d18 0xc0045ff470 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d19 0xc0045ff470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d1a 0xc0045ff470 principal evaluation fails" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d1b 0xc0045ff470 gate 1569287149631176900 evaluation fails" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1c Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d1f 0xc0045ffcb0 gate 1569287149631448600 evaluation starts" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d20 0xc0045ffcb0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d21 0xc0045ffcb0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d22 0xc0045ffcb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d23 0xc0045ffcb0 principal evaluation fails" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d24 0xc0045ffcb0 gate 1569287149631448600 evaluation fails" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d25 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.631 UTC [policies] Evaluate -> DEBU 4d27 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func1 -> DEBU 4d28 0xc0046104f0 gate 1569287149631708300 evaluation starts" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d29 0xc0046104f0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2a 0xc0046104f0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2b 0xc0046104f0 principal matched by identity 0" +"2019-09-24 01:05:49.631 UTC [msp.identity] Verify -> DEBU 4d2c Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:49.631 UTC [msp.identity] Verify -> DEBU 4d2d Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:49.631 UTC [cauthdsl] func2 -> DEBU 4d2e 0xc0046104f0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.632 UTC [cauthdsl] func1 -> DEBU 4d2f 0xc0046104f0 gate 1569287149631708300 evaluation succeeds" +"2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d30 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d31 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d32 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.632 UTC [policies] Evaluate -> DEBU 4d33 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.632 UTC [gossip.gossip] handleMessage -> DEBU 4d34 Exiting" +"2019-09-24 01:05:49.632 UTC [gossip.gossip] handleMessage -> DEBU 4d35 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d36 Verify: digest = 00000000 ae 26 3e 1e 9c 21 6d ce e5 2c 44 b0 4f 8d 5d eb |.&>..!m..,D.O.].| +00000010 05 c8 d6 d8 05 c1 22 7b 57 f1 53 57 d7 86 9e 0f |......"{W.SW....|" +"2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d37 Verify: sig = 00000000 30 44 02 20 08 8e 9e 99 9f 7a 49 5a 86 b2 73 13 |0D. .....zIZ..s.| +00000010 80 65 d3 1f 33 b2 43 31 d2 12 8e 49 9d 27 ad 90 |.e..3.C1...I.'..| +00000020 c5 34 6f e8 02 20 2d dc 58 5e f3 b0 fa 7f 58 55 |.4o.. -.X^....XU| +00000030 4b 10 fc 53 64 51 c1 10 7c 6d f1 df 13 1f 4f db |K..SdQ..|m....O.| +00000040 c9 51 67 e6 8e 78 |.Qg..x|" +"2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d38 Verify: digest = 00000000 0c 34 5a 82 cb 3b a9 59 a7 9e 2b ee f1 b0 3d d9 |.4Z..;.Y..+...=.| +00000010 e3 34 45 ac 70 ce 28 b5 5b 92 6d 02 70 c6 e0 52 |.4E.p.(.[.m.p..R|" +"2019-09-24 01:05:49.632 UTC [msp.identity] Verify -> DEBU 4d39 Verify: sig = 00000000 30 44 02 20 77 c0 bb ee 88 f3 c6 2e 24 e5 b3 ff |0D. w.......$...| +00000010 38 d4 e6 b3 c3 10 76 c1 f2 06 99 b6 36 0b ff 36 |8.....v.....6..6| +00000020 90 ef a8 7b 02 20 03 22 81 2c 73 00 4e 54 51 44 |...{. .".,s.NTQD| +00000030 00 d4 ec 03 49 0a 3e 0a f9 db ac 7f 10 f8 88 a0 |....I.>.........| +00000040 6d 24 7d bd 89 f8 |m$}...|" +"2019-09-24 01:05:49.633 UTC [msp] DeserializeIdentity -> DEBU 4d3a Obtaining identity" +"2019-09-24 01:05:49.633 UTC [msp] DeserializeIdentity -> DEBU 4d3b Obtaining identity" +"2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d3c Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d3d Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.633 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d3e Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d3f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d40 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.633 UTC [policies] Evaluate -> DEBU 4d41 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.633 UTC [cauthdsl] func1 -> DEBU 4d42 0xc004626d40 gate 1569287149633695700 evaluation starts" +"2019-09-24 01:05:49.633 UTC [cauthdsl] func2 -> DEBU 4d43 0xc004626d40 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.633 UTC [cauthdsl] func2 -> DEBU 4d44 0xc004626d40 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.635 UTC [cauthdsl] func2 -> DEBU 4d45 0xc004626d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.635 UTC [cauthdsl] func2 -> DEBU 4d46 0xc004626d40 principal evaluation fails" +"2019-09-24 01:05:49.636 UTC [cauthdsl] func1 -> DEBU 4d47 0xc004626d40 gate 1569287149633695700 evaluation fails" +"2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d48 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d49 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.636 UTC [policies] Evaluate -> DEBU 4d4a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.636 UTC [cauthdsl] func1 -> DEBU 4d4b 0xc004627580 gate 1569287149636611900 evaluation starts" +"2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4c 0xc004627580 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4d 0xc004627580 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.637 UTC [cauthdsl] func2 -> DEBU 4d4e 0xc004627580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.638 UTC [cauthdsl] func2 -> DEBU 4d4f 0xc004627580 principal evaluation fails" +"2019-09-24 01:05:49.638 UTC [cauthdsl] func1 -> DEBU 4d50 0xc004627580 gate 1569287149636611900 evaluation fails" +"2019-09-24 01:05:49.638 UTC [policies] Evaluate -> DEBU 4d51 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.638 UTC [policies] Evaluate -> DEBU 4d52 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.639 UTC [policies] Evaluate -> DEBU 4d53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.641 UTC [cauthdsl] func1 -> DEBU 4d54 0xc004627dc0 gate 1569287149641071900 evaluation starts" +"2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d55 0xc004627dc0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d56 0xc004627dc0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.651 UTC [cauthdsl] func2 -> DEBU 4d57 0xc004627dc0 principal matched by identity 0" +"2019-09-24 01:05:49.651 UTC [msp.identity] Verify -> DEBU 4d58 Verify: digest = 00000000 4f 0a 60 91 95 c2 ab a2 51 69 51 0b 33 68 71 3c |O.`.....QiQ.3hq<| +00000010 98 a1 0d f1 b7 fb 3e 2b 1d 29 f4 fc 21 05 c3 f1 |......>+.)..!...|" +"2019-09-24 01:05:49.651 UTC [msp.identity] Verify -> DEBU 4d59 Verify: sig = 00000000 30 44 02 20 35 22 a8 f8 d2 b4 84 1b d6 e9 d6 5f |0D. 5"........._| +00000010 84 de 0e ba 8c 3a 06 f9 2b 7f e7 b4 9e 3c 84 11 |.....:..+....<..| +00000020 1f e5 37 f7 02 20 4e 03 12 9d c4 8e d5 51 fb c7 |..7.. N......Q..| +00000030 f2 ae d7 35 f7 bb fc 91 f6 cf e1 6c a5 27 36 61 |...5.......l.'6a| +00000040 56 2b e3 0e fd cb |V+....|" +"2019-09-24 01:05:49.652 UTC [cauthdsl] func2 -> DEBU 4d5a 0xc004627dc0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.652 UTC [cauthdsl] func1 -> DEBU 4d5b 0xc004627dc0 gate 1569287149641071900 evaluation succeeds" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5c Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5e Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.652 UTC [msp] DeserializeIdentity -> DEBU 4d60 Obtaining identity" +"2019-09-24 01:05:49.652 UTC [msp] DeserializeIdentity -> DEBU 4d61 Obtaining identity" +"2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4d62 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d63 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.652 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4d64 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d65 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d66 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:49.652 UTC [policies] Evaluate -> DEBU 4d67 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d68 0xc00463b590 gate 1569287149653020100 evaluation starts" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d69 0xc00463b590 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6a 0xc00463b590 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6b 0xc00463b590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d6c 0xc00463b590 principal evaluation fails" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d6d 0xc00463b590 gate 1569287149653020100 evaluation fails" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d6e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d70 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d71 0xc00463bdd0 gate 1569287149653337400 evaluation starts" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d72 0xc00463bdd0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d73 0xc00463bdd0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d74 0xc00463bdd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d75 0xc00463bdd0 principal evaluation fails" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d76 0xc00463bdd0 gate 1569287149653337400 evaluation fails" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d77 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d78 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:49.653 UTC [policies] Evaluate -> DEBU 4d79 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func1 -> DEBU 4d7a 0xc00464a610 gate 1569287149653649500 evaluation starts" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7b 0xc00464a610 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7c 0xc00464a610 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d7d 0xc00464a610 principal matched by identity 0" +"2019-09-24 01:05:49.653 UTC [msp.identity] Verify -> DEBU 4d7e Verify: digest = 00000000 f4 a8 39 83 00 8f a7 c8 a3 7f bf a9 4f fb 1a 19 |..9.........O...| +00000010 91 0e de 0f d1 10 4b 5b c6 28 80 cd 28 d3 c3 20 |......K[.(..(.. |" +"2019-09-24 01:05:49.653 UTC [msp.identity] Verify -> DEBU 4d7f Verify: sig = 00000000 30 44 02 20 2e 0f a6 da 26 2d aa 30 ad 88 57 45 |0D. ....&-.0..WE| +00000010 5d 6f 02 8f d1 d1 d2 e1 e9 7a f6 4a a5 de 20 d0 |]o.......z.J.. .| +00000020 89 44 28 31 02 20 5c 4d b5 f6 fa f5 46 2c b9 e1 |.D(1. \M....F,..| +00000030 d3 7b ea b1 05 f6 d8 87 f0 87 16 bc f9 e6 99 32 |.{.............2| +00000040 82 7d 0d 15 0e 1f |.}....|" +"2019-09-24 01:05:49.653 UTC [cauthdsl] func2 -> DEBU 4d80 0xc00464a610 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:49.654 UTC [cauthdsl] func1 -> DEBU 4d81 0xc00464a610 gate 1569287149653649500 evaluation succeeds" +"2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d82 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d83 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d84 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:49.654 UTC [policies] Evaluate -> DEBU 4d85 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:49.654 UTC [gossip.gossip] handleMessage -> DEBU 4d86 Exiting" +"2019-09-24 01:05:49.712 UTC [msp] DeserializeIdentity -> DEBU 4d87 Obtaining identity" +"2019-09-24 01:05:49.713 UTC [msp] DeserializeIdentity -> DEBU 4d88 Obtaining identity" +"2019-09-24 01:05:49.713 UTC [gossip.pull] Hello -> DEBU 4d89 Sending BLOCK_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:49.714 UTC [msp] DeserializeIdentity -> DEBU 4d8a Obtaining identity" +"2019-09-24 01:05:49.714 UTC [msp] DeserializeIdentity -> DEBU 4d8b Obtaining identity" +"2019-09-24 01:05:49.715 UTC [gossip.comm] Send -> DEBU 4d8c Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8d Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.715 UTC [gossip.comm] sendToEndpoint -> DEBU 4d8e Exiting" +"2019-09-24 01:05:49.717 UTC [gossip.gossip] handleMessage -> DEBU 4d8f Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.717 UTC [gossip.pull] HandleMessage -> DEBU 4d90 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.718 UTC [gossip.gossip] handleMessage -> DEBU 4d91 Exiting" +"2019-09-24 01:05:49.803 UTC [gossip.gossip] handleMessage -> DEBU 4d92 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.803 UTC [msp] DeserializeIdentity -> DEBU 4d93 Obtaining identity" +"2019-09-24 01:05:49.804 UTC [msp] DeserializeIdentity -> DEBU 4d94 Obtaining identity" +"2019-09-24 01:05:49.804 UTC [gossip.gossip] handleMessage -> DEBU 4d95 Exiting" +"2019-09-24 01:05:49.834 UTC [gossip.gossip] handleMessage -> DEBU 4d96 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.834 UTC [gossip.pull] HandleMessage -> DEBU 4d97 GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes" +"2019-09-24 01:05:49.834 UTC [gossip.pull] SendDigest -> DEBU 4d98 Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:49.835 UTC [gossip.gossip] handleMessage -> DEBU 4d99 Exiting" +"2019-09-24 01:05:50.006 UTC [gossip.comm] func1 -> DEBU 4d9a Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.007 UTC [gossip.gossip] handleMessage -> DEBU 4d9b Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9c Obtaining identity" +"2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9d Obtaining identity" +"2019-09-24 01:05:50.007 UTC [msp] DeserializeIdentity -> DEBU 4d9e Obtaining identity" +"2019-09-24 01:05:50.008 UTC [gossip.gossip] handleMessage -> DEBU 4d9f Exiting" +"2019-09-24 01:05:50.204 UTC [gossip.comm] func1 -> DEBU 4da0 Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.205 UTC [gossip.gossip] handleMessage -> DEBU 4da1 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da2 Obtaining identity" +"2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da3 Obtaining identity" +"2019-09-24 01:05:50.205 UTC [msp] DeserializeIdentity -> DEBU 4da4 Obtaining identity" +"2019-09-24 01:05:50.205 UTC [gossip.gossip] handleMessage -> DEBU 4da5 Exiting" +"2019-09-24 01:05:50.458 UTC [gossip.gossip] handleMessage -> DEBU 4da6 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.458 UTC [gossip.pull] HandleMessage -> DEBU 4da7 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.458 UTC [gossip.pull] SendDigest -> DEBU 4da8 Sending IDENTITY_MSG digest: [9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f] to 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da" +"2019-09-24 01:05:50.458 UTC [gossip.gossip] handleMessage -> DEBU 4da9 Exiting" +"2019-09-24 01:05:50.493 UTC [gossip.gossip] handleMessage -> DEBU 4daa Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.493 UTC [gossip.gossip] handleMessage -> DEBU 4dab Exiting" +"2019-09-24 01:05:50.493 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4dac Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.493 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4dad Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:50.493 UTC [msp.identity] Verify -> DEBU 4dae Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +"2019-09-24 01:05:50.494 UTC [msp.identity] Verify -> DEBU 4daf Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +"2019-09-24 01:05:50.494 UTC [msp.identity] Verify -> DEBU 4db0 Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.|" +"2019-09-24 01:05:50.495 UTC [msp.identity] Verify -> DEBU 4db1 Verify: sig = 00000000 30 44 02 20 64 93 f8 a3 31 7f b2 cd 57 22 b5 f6 |0D. d...1...W"..| +00000010 41 22 b6 38 73 09 5a 4a b1 46 ea 33 74 52 0a 87 |A".8s.ZJ.F.3tR..| +00000020 a4 22 d9 46 02 20 73 44 85 f4 e3 78 03 92 a7 ab |.".F. sD...x....| +00000030 89 10 7f 48 54 b8 bd 6b 17 57 70 26 ff 4a e7 aa |...HT..k.Wp&.J..| +00000040 27 cb c2 c1 4d cd |'...M.|" +"2019-09-24 01:05:50.495 UTC [gossip.discovery] handleAliveMessage -> DEBU 4db2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db3 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}" +"2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db4 updating membership: timestamp: " +"2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db5 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db6 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership" +"2019-09-24 01:05:50.495 UTC [gossip.discovery] learnExistingMembers -> DEBU 4db7 Exiting" +"2019-09-24 01:05:50.496 UTC [gossip.discovery] handleAliveMessage -> DEBU 4db8 Exiting" +"2019-09-24 01:05:50.496 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4db9 Exiting" +"2019-09-24 01:05:50.496 UTC [gossip.discovery] sendMemResponse -> DEBU 4dba Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\234o\304\344X\n8T)\177\225YR\242^\",\237\177:\341\237uO\270\022.\017\217\177\270\332" " +"2019-09-24 01:05:50.496 UTC [msp] DeserializeIdentity -> DEBU 4dbb Obtaining identity" +"2019-09-24 01:05:50.496 UTC [msp] DeserializeIdentity -> DEBU 4dbc Obtaining identity" +"2019-09-24 01:05:50.496 UTC [gossip.comm] Send -> DEBU 4dbd Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.497 UTC [gossip.discovery] sendMemResponse -> DEBU 4dbe Exiting, replying with alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" secret_envelope: > alive: " +"2019-09-24 01:05:50.497 UTC [gossip.comm] sendToEndpoint -> DEBU 4dbf Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.497 UTC [gossip.comm] sendToEndpoint -> DEBU 4dc0 Exiting" +"2019-09-24 01:05:50.519 UTC [endorser] ProcessProposal -> DEBU 4dc1 Entering: request from 172.18.0.5:50068" +"2019-09-24 01:05:50.519 UTC [protoutils] ValidateProposalMessage -> DEBU 4dc2 ValidateProposalMessage starts for signed proposal 0xc0046594f0" +"2019-09-24 01:05:50.519 UTC [protoutils] validateChannelHeader -> DEBU 4dc3 validateChannelHeader info: header type 3" +"2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc4 begin" +"2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc5 creator is &{Org1MSP 33edfa01ef62fc84e4c55539363c6fd84f938201b01ef383d30a44d3a8f4ebcc}" +"2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc6 creator is valid" +"2019-09-24 01:05:50.519 UTC [msp.identity] Verify -> DEBU 4dc7 Verify: digest = 00000000 58 91 2e 54 f2 99 f3 b4 50 98 75 8f 2f 05 a1 30 |X..T....P.u./..0| +00000010 13 d0 5c c7 fb bd 31 5e 24 06 ab 34 0f db f0 b2 |..\...1^$..4....|" +"2019-09-24 01:05:50.519 UTC [msp.identity] Verify -> DEBU 4dc8 Verify: sig = 00000000 30 44 02 20 19 38 d6 cf ba 9e 0b 75 78 a8 8c bc |0D. .8.....ux...| +00000010 9f b6 57 eb b7 75 c5 b6 d0 7d 55 c0 b8 56 dd 66 |..W..u...}U..V.f| +00000020 e1 c9 de db 02 20 5f 57 bd 7a 11 46 01 0f dd 80 |..... _W.z.F....| +00000030 25 d9 4b 3a 54 17 b0 96 95 53 30 fd 30 e1 5c 68 |%.K:T....S0.0.\h| +00000040 27 21 37 20 45 9f |'!7 E.|" +"2019-09-24 01:05:50.519 UTC [protoutils] checkSignatureFromCreator -> DEBU 4dc9 exits successfully" +"2019-09-24 01:05:50.519 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4dca validateChaincodeProposalMessage starts for proposal 0xc0046843f0, header 0xc004659900" +"2019-09-24 01:05:50.519 UTC [protoutils] validateChaincodeProposalMessage -> DEBU 4dcb validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" " +"2019-09-24 01:05:50.519 UTC [endorser] preProcess -> DEBU 4dcc [][6936b647] processing txid: 6936b647092248a2cc40d71d75ceeb19d69fc6873d35289c2700f6e3e1ef341b" +"2019-09-24 01:05:50.519 UTC [endorser] SimulateProposal -> DEBU 4dcd [][6936b647] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:50.520 UTC [endorser] callChaincode -> INFO 4dce [][6936b647] Entry chaincode: name:"qscc" " +"2019-09-24 01:05:50.520 UTC [chaincode] Execute -> DEBU 4dcf Entry" +"2019-09-24 01:05:50.520 UTC [qscc] Invoke -> DEBU 4dd0 Invoke function: GetChainInfo on chain: businesschannel" +"2019-09-24 01:05:50.520 UTC [aclmgmt] CheckACL -> DEBU 4dd1 acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo" +"2019-09-24 01:05:50.520 UTC [aclmgmt] CheckACL -> DEBU 4dd2 acl check(/Channel/Application/Readers)" +"2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:50.520 UTC [policies] Evaluate -> DEBU 4dd5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:50.520 UTC [msp] DeserializeIdentity -> DEBU 4dd6 Obtaining identity" +"2019-09-24 01:05:50.520 UTC [msp.identity] newIdentity -> DEBU 4dd7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIQc8T7H0B7mQZtPI/zb32BFDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xOTA5MjQwMDU5MDBaFw0yOTA5MjEwMDU5MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEA2UGa4AIdC +xyPDALCabDlj3ALaZQmhHU4rKjnW5p9BhV/B73WcCLHTt8Txt2hQon9c2storWeP +o90P8mNNMG6jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIL1UQNALCTKcng7Zgh451ThQhHwBcHU/fdwOUYC9zJgeMAoGCCqGSM49 +BAMCA0cAMEQCIE4sB2gi79gP+H6zC4kFCaO31GYxc/YUQunE3sVkU4oxAiAHjnCP +3EMpvTSNTh2dcsgGkIgRxE2vRekSzfQ5p785Yg== +-----END CERTIFICATE-----" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func1 -> DEBU 4dd8 0xc0046bd860 gate 1569287150521162400 evaluation starts" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4dd9 0xc0046bd860 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4dda 0xc0046bd860 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4ddb 0xc0046bd860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP)" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func2 -> DEBU 4ddc 0xc0046bd860 principal evaluation fails" +"2019-09-24 01:05:50.521 UTC [cauthdsl] func1 -> DEBU 4ddd 0xc0046bd860 gate 1569287150521162400 evaluation fails" +"2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4dde Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4ddf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.521 UTC [policies] Evaluate -> DEBU 4de0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:50.522 UTC [cauthdsl] func1 -> DEBU 4de1 0xc0046d49e0 gate 1569287150522670200 evaluation starts" +"2019-09-24 01:05:50.522 UTC [cauthdsl] func2 -> DEBU 4de2 0xc0046d49e0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.522 UTC [cauthdsl] func2 -> DEBU 4de3 0xc0046d49e0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.522 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 4de4 Checking if identity satisfies MEMBER role for Org1MSP" +"2019-09-24 01:05:50.522 UTC [msp] Validate -> DEBU 4de5 MSP Org1MSP validating identity" +"2019-09-24 01:05:50.523 UTC [msp] getCertificationChain -> DEBU 4de6 MSP Org1MSP getting certification chain" +"2019-09-24 01:05:50.523 UTC [cauthdsl] func2 -> DEBU 4de7 0xc0046d49e0 principal matched by identity 0" +"2019-09-24 01:05:50.523 UTC [msp.identity] Verify -> DEBU 4de8 Verify: digest = 00000000 58 91 2e 54 f2 99 f3 b4 50 98 75 8f 2f 05 a1 30 |X..T....P.u./..0| +00000010 13 d0 5c c7 fb bd 31 5e 24 06 ab 34 0f db f0 b2 |..\...1^$..4....|" +"2019-09-24 01:05:50.523 UTC [msp.identity] Verify -> DEBU 4de9 Verify: sig = 00000000 30 44 02 20 19 38 d6 cf ba 9e 0b 75 78 a8 8c bc |0D. .8.....ux...| +00000010 9f b6 57 eb b7 75 c5 b6 d0 7d 55 c0 b8 56 dd 66 |..W..u...}U..V.f| +00000020 e1 c9 de db 02 20 5f 57 bd 7a 11 46 01 0f dd 80 |..... _W.z.F....| +00000030 25 d9 4b 3a 54 17 b0 96 95 53 30 fd 30 e1 5c 68 |%.K:T....S0.0.\h| +00000040 27 21 37 20 45 9f |'!7 E.|" +"2019-09-24 01:05:50.523 UTC [cauthdsl] func2 -> DEBU 4dea 0xc0046d49e0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:50.523 UTC [cauthdsl] func1 -> DEBU 4deb 0xc0046d49e0 gate 1569287150522670200 evaluation succeeds" +"2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4dec Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4ded == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4dee Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:50.523 UTC [policies] Evaluate -> DEBU 4def == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:50.523 UTC [chaincode] handleMessage -> DEBU 4df0 [6936b647] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready" +"2019-09-24 01:05:50.523 UTC [chaincode] Notify -> DEBU 4df1 [6936b647] notifying Txid:6936b647092248a2cc40d71d75ceeb19d69fc6873d35289c2700f6e3e1ef341b, channelID:" +"2019-09-24 01:05:50.524 UTC [chaincode] Execute -> DEBU 4df2 Exit" +"2019-09-24 01:05:50.524 UTC [endorser] callChaincode -> INFO 4df3 [][6936b647] Exit chaincode: name:"qscc" (4ms)" +"2019-09-24 01:05:50.524 UTC [endorser] SimulateProposal -> DEBU 4df4 [][6936b647] Exit" +"2019-09-24 01:05:50.524 UTC [endorser] func1 -> DEBU 4df5 Exit: request from 172.18.0.5:50068" +"2019-09-24 01:05:50.524 UTC [comm.grpc.server] 1 -> INFO 4df6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.5:50068 grpc.code=OK grpc.call_duration=5.5529ms +"2019-09-24 01:05:50.533 UTC [grpc] warningf -> DEBU 4df7 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.5:50068: read: connection reset by peer" +"2019-09-24 01:05:50.533 UTC [grpc] infof -> DEBU 4df8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2019-09-24 01:05:50.825 UTC [gossip.comm] func1 -> DEBU 4df9 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.825 UTC [gossip.gossip] handleMessage -> DEBU 4dfa Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.825 UTC [gossip.pull] HandleMessage -> DEBU 4dfb GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfc Obtaining identity" +"2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfd Obtaining identity" +"2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dfe Obtaining identity" +"2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4dff Obtaining identity" +"2019-09-24 01:05:50.825 UTC [msp] DeserializeIdentity -> DEBU 4e00 Obtaining identity" +"2019-09-24 01:05:50.826 UTC [msp] DeserializeIdentity -> DEBU 4e01 Obtaining identity" +"2019-09-24 01:05:50.826 UTC [gossip.pull] SendDigest -> DEBU 4e02 Sending IDENTITY_MSG digest: [d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7] to 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2" +"2019-09-24 01:05:50.826 UTC [gossip.gossip] handleMessage -> DEBU 4e03 Exiting" +"2019-09-24 01:05:50.830 UTC [gossip.comm] func1 -> DEBU 4e04 Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.831 UTC [gossip.gossip] handleMessage -> DEBU 4e05 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.831 UTC [gossip.pull] HandleMessage -> DEBU 4e06 GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e07 Obtaining identity" +"2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e08 Obtaining identity" +"2019-09-24 01:05:50.831 UTC [msp] DeserializeIdentity -> DEBU 4e09 Obtaining identity" +"2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0a Obtaining identity" +"2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0b Obtaining identity" +"2019-09-24 01:05:50.832 UTC [msp] DeserializeIdentity -> DEBU 4e0c Obtaining identity" +"2019-09-24 01:05:50.832 UTC [gossip.pull] SendDigest -> DEBU 4e0d Sending IDENTITY_MSG digest: [2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 d925a8d65f6b3c84eac45c3cb1998b380d5b3a35174154851721150ffa5de31f 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da] to 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7" +"2019-09-24 01:05:50.832 UTC [gossip.gossip] handleMessage -> DEBU 4e0e Exiting" +"2019-09-24 01:05:50.838 UTC [gossip.comm] func1 -> DEBU 4e0f Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.839 UTC [gossip.gossip] handleMessage -> DEBU 4e10 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.839 UTC [gossip.gossip] handleMessage -> DEBU 4e11 Exiting" +"2019-09-24 01:05:50.839 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e12 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.839 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e13 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:50.839 UTC [msp] DeserializeIdentity -> DEBU 4e14 Obtaining identity" +"2019-09-24 01:05:50.839 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e15 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:50.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e16 Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.840 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e17 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e18 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e19 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e1a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func1 -> DEBU 4e1b 0xc0046f9710 gate 1569287150840344700 evaluation starts" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1c 0xc0046f9710 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1d 0xc0046f9710 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1e 0xc0046f9710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func2 -> DEBU 4e1f 0xc0046f9710 principal evaluation fails" +"2019-09-24 01:05:50.840 UTC [cauthdsl] func1 -> DEBU 4e20 0xc0046f9710 gate 1569287150840344700 evaluation fails" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e21 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e22 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.840 UTC [policies] Evaluate -> DEBU 4e23 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func1 -> DEBU 4e24 0xc0046f9f50 gate 1569287150841078000 evaluation starts" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e25 0xc0046f9f50 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e26 0xc0046f9f50 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e27 0xc0046f9f50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func2 -> DEBU 4e28 0xc0046f9f50 principal evaluation fails" +"2019-09-24 01:05:50.841 UTC [cauthdsl] func1 -> DEBU 4e29 0xc0046f9f50 gate 1569287150841078000 evaluation fails" +"2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2a Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.841 UTC [policies] Evaluate -> DEBU 4e2c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:50.842 UTC [cauthdsl] func1 -> DEBU 4e2d 0xc00471e790 gate 1569287150841941900 evaluation starts" +"2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e2e 0xc00471e790 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e2f 0xc00471e790 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.842 UTC [cauthdsl] func2 -> DEBU 4e30 0xc00471e790 principal matched by identity 0" +"2019-09-24 01:05:50.842 UTC [msp.identity] Verify -> DEBU 4e31 Verify: digest = 00000000 d5 d5 79 3b 0d 49 85 81 e5 50 bf 6b 99 84 b0 ff |..y;.I...P.k....| +00000010 c7 19 66 35 d3 45 68 5c b0 8b 46 de c2 0b ac ed |..f5.Eh\..F.....|" +"2019-09-24 01:05:50.842 UTC [msp.identity] Verify -> DEBU 4e32 Verify: sig = 00000000 30 44 02 20 5f fe 52 b0 8c 5f 5a d0 23 01 c9 dd |0D. _.R.._Z.#...| +00000010 6a 43 17 ca e7 f7 5a 54 77 6a ab 21 55 5c 7f b8 |jC....ZTwj.!U\..| +00000020 db da 46 ab 02 20 4d c7 4c 0b 8a a4 2e d8 b9 18 |..F.. M.L.......| +00000030 76 2c 17 88 23 39 f9 f7 5e b3 48 d7 51 f7 1b aa |v,..#9..^.H.Q...| +00000040 7d 9a eb 27 dc 37 |}..'.7|" +"2019-09-24 01:05:50.843 UTC [cauthdsl] func2 -> DEBU 4e33 0xc00471e790 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:50.843 UTC [cauthdsl] func1 -> DEBU 4e34 0xc00471e790 gate 1569287150841941900 evaluation succeeds" +"2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e35 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e36 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e37 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:50.843 UTC [policies] Evaluate -> DEBU 4e38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:50.844 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e39 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3a Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3b updating membership: timestamp: " +"2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3c Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:50.844 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3d Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:50.845 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e3e Exiting" +"2019-09-24 01:05:50.845 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e3f Exiting" +"2019-09-24 01:05:50.845 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e40 Exiting" +"2019-09-24 01:05:50.845 UTC [gossip.discovery] sendMemResponse -> DEBU 4e41 Entering endpoint:"peer1.org2.example.com:7051" pki_id:"A^\210\233\216g\210\341\n\031\342\237\004\271\274U\214\242\337\312\222\346:+\212\257aSpq\030\367" " +"2019-09-24 01:05:50.845 UTC [msp] DeserializeIdentity -> DEBU 4e42 Obtaining identity" +"2019-09-24 01:05:50.846 UTC [msp] DeserializeIdentity -> DEBU 4e43 Obtaining identity" +"2019-09-24 01:05:50.846 UTC [msp] DeserializeIdentity -> DEBU 4e44 Obtaining identity" +"2019-09-24 01:05:50.846 UTC [gossip.comm] Send -> DEBU 4e45 Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.846 UTC [gossip.discovery] sendMemResponse -> DEBU 4e46 Exiting, replying with alive: alive: alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" > alive: " +"2019-09-24 01:05:50.846 UTC [gossip.comm] sendToEndpoint -> DEBU 4e47 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.847 UTC [gossip.comm] sendToEndpoint -> DEBU 4e48 Exiting" +"2019-09-24 01:05:50.868 UTC [gossip.comm] func1 -> DEBU 4e49 Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.869 UTC [gossip.gossip] handleMessage -> DEBU 4e4a Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.869 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e4b Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.870 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4e4c Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:50.870 UTC [msp] DeserializeIdentity -> DEBU 4e4d Obtaining identity" +"2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4e4e Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e4f Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.871 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4e50 Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.871 UTC [policies] Evaluate -> DEBU 4e51 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:50.872 UTC [policies] Evaluate -> DEBU 4e52 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:50.872 UTC [policies] Evaluate -> DEBU 4e53 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:50.872 UTC [cauthdsl] func1 -> DEBU 4e54 0xc004733010 gate 1569287150872797400 evaluation starts" +"2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e55 0xc004733010 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e56 0xc004733010 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e57 0xc004733010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:50.873 UTC [cauthdsl] func2 -> DEBU 4e58 0xc004733010 principal evaluation fails" +"2019-09-24 01:05:50.873 UTC [cauthdsl] func1 -> DEBU 4e59 0xc004733010 gate 1569287150872797400 evaluation fails" +"2019-09-24 01:05:50.873 UTC [policies] Evaluate -> DEBU 4e5a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.873 UTC [policies] Evaluate -> DEBU 4e5b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.874 UTC [policies] Evaluate -> DEBU 4e5c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:50.874 UTC [cauthdsl] func1 -> DEBU 4e5d 0xc004733850 gate 1569287150874088200 evaluation starts" +"2019-09-24 01:05:50.874 UTC [cauthdsl] func2 -> DEBU 4e5e 0xc004733850 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.874 UTC [cauthdsl] func2 -> DEBU 4e5f 0xc004733850 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.875 UTC [cauthdsl] func2 -> DEBU 4e60 0xc004733850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:50.875 UTC [cauthdsl] func2 -> DEBU 4e61 0xc004733850 principal evaluation fails" +"2019-09-24 01:05:50.875 UTC [cauthdsl] func1 -> DEBU 4e62 0xc004733850 gate 1569287150874088200 evaluation fails" +"2019-09-24 01:05:50.875 UTC [policies] Evaluate -> DEBU 4e63 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.876 UTC [policies] Evaluate -> DEBU 4e64 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.876 UTC [policies] Evaluate -> DEBU 4e65 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:50.876 UTC [cauthdsl] func1 -> DEBU 4e66 0xc004744090 gate 1569287150876927800 evaluation starts" +"2019-09-24 01:05:50.877 UTC [cauthdsl] func2 -> DEBU 4e67 0xc004744090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.877 UTC [cauthdsl] func2 -> DEBU 4e68 0xc004744090 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.878 UTC [cauthdsl] func2 -> DEBU 4e69 0xc004744090 principal matched by identity 0" +"2019-09-24 01:05:50.878 UTC [msp.identity] Verify -> DEBU 4e6a Verify: digest = 00000000 13 d9 36 90 f6 2e 5f 73 92 b0 36 ff 20 19 aa c2 |..6..._s..6. ...| +00000010 7c 05 b8 9a 6c 9d 23 32 26 81 1c 74 c0 b9 4a 75 ||...l.#2&..t..Ju|" +"2019-09-24 01:05:50.878 UTC [msp.identity] Verify -> DEBU 4e6b Verify: sig = 00000000 30 44 02 20 7c 75 03 d5 c8 67 8c 4e 3a c3 7b 01 |0D. |u...g.N:.{.| +00000010 1f 70 70 25 4c 6a 09 76 c9 5d 97 fa db 6f 26 4e |.pp%Lj.v.]...o&N| +00000020 74 10 fb cb 02 20 74 a1 81 cf b2 2b fe a8 50 08 |t.... t....+..P.| +00000030 86 fb ee 6f 38 38 f4 f0 00 7f ec 83 92 54 6a 6e |...o88.......Tjn| +00000040 7b cd 5e 59 28 15 |{.^Y(.|" +"2019-09-24 01:05:50.878 UTC [cauthdsl] func2 -> DEBU 4e6c 0xc004744090 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:50.878 UTC [cauthdsl] func1 -> DEBU 4e6d 0xc004744090 gate 1569287150876927800 evaluation succeeds" +"2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e6e Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e6f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e70 Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:50.878 UTC [policies] Evaluate -> DEBU 4e71 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:50.878 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e72 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:50.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e73 Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}" +"2019-09-24 01:05:50.878 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e74 updating membership: timestamp: " +"2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e75 Updating aliveness data: membership: timestamp: " +"2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e76 Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership" +"2019-09-24 01:05:50.879 UTC [gossip.discovery] learnExistingMembers -> DEBU 4e77 Exiting" +"2019-09-24 01:05:50.879 UTC [gossip.discovery] handleAliveMessage -> DEBU 4e78 Exiting" +"2019-09-24 01:05:50.879 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4e79 Exiting" +"2019-09-24 01:05:50.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4e7a Entering endpoint:"peer0.org2.example.com:7051" pki_id:"*g\246\237k\322\232\211-\247\324\004\001\004\210$6\347\235[\265@p\203@\244NP3\307\035\362" " +"2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7b Obtaining identity" +"2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7c Obtaining identity" +"2019-09-24 01:05:50.879 UTC [msp] DeserializeIdentity -> DEBU 4e7d Obtaining identity" +"2019-09-24 01:05:50.879 UTC [gossip.comm] Send -> DEBU 4e7e Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.879 UTC [gossip.discovery] sendMemResponse -> DEBU 4e7f Exiting, replying with alive:" signature:"0E\002!\000\300Y\353pv\232\014\343:\343\266\272\317\224\350N\231\027\253Y\347\263\237\006C[D7\3424\305\001\002 ;)\305J\375\235c\265\347\036\032\177\352\307\366\304\375h+YU\233j\353 \260[\0003\375\375}" > alive: alive: alive: " +"2019-09-24 01:05:50.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e80 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.879 UTC [gossip.comm] sendToEndpoint -> DEBU 4e81 Exiting" +"2019-09-24 01:05:50.880 UTC [gossip.gossip] handleMessage -> DEBU 4e82 Exiting" +"2019-09-24 01:05:50.892 UTC [msp] GetDefaultSigningIdentity -> DEBU 4e83 Obtaining default signing identity" +"2019-09-24 01:05:50.893 UTC [msp.identity] Sign -> DEBU 4e84 Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...E31F120C08B4B5F3F0BFC8CEE3151038 " +"2019-09-24 01:05:50.893 UTC [msp.identity] Sign -> DEBU 4e85 Sign: digest: 4D1477FA332319B60426DD0A9531872FC1904FDE5CEFF1996786685EE7B02B78 " +"2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e86 Sending IDENTITY_MSG hello to peer1.org2.example.com:7051" +"2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e88 Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e89 Sending IDENTITY_MSG hello to peer1.org1.example.com:7051" +"2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e8a Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.894 UTC [gossip.pull] Hello -> DEBU 4e8b Sending IDENTITY_MSG hello to peer0.org2.example.com:7051" +"2019-09-24 01:05:50.894 UTC [gossip.comm] Send -> DEBU 4e8c Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8d Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.895 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8e Exiting" +"2019-09-24 01:05:50.894 UTC [msp] GetDefaultSigningIdentity -> DEBU 4e87 Obtaining default signing identity" +"2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e8f Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e90 Exiting" +"2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e91 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.896 UTC [gossip.comm] sendToEndpoint -> DEBU 4e92 Exiting" +"2019-09-24 01:05:50.896 UTC [msp.identity] Sign -> DEBU 4e93 Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 " +"2019-09-24 01:05:50.899 UTC [msp.identity] Sign -> DEBU 4e96 Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 " +"2019-09-24 01:05:50.900 UTC [gossip.comm] Send -> DEBU 4e97 Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.898 UTC [gossip.comm] func1 -> DEBU 4e94 Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.898 UTC [gossip.gossip] handleMessage -> DEBU 4e95 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.900 UTC [msp] DeserializeIdentity -> DEBU 4e98 Obtaining identity" +"2019-09-24 01:05:50.901 UTC [gossip.comm] sendToEndpoint -> DEBU 4e99 Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.902 UTC [gossip.pull] HandleMessage -> DEBU 4e9a GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.903 UTC [gossip.comm] func1 -> DEBU 4e9b Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.903 UTC [gossip.comm] Send -> DEBU 4e9c Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.904 UTC [msp] DeserializeIdentity -> DEBU 4e9f Obtaining identity" +"2019-09-24 01:05:50.905 UTC [gossip.comm] Send -> DEBU 4ea0 Entering, sending GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers" +"2019-09-24 01:05:50.905 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea1 Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.905 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea2 Exiting" +"2019-09-24 01:05:50.904 UTC [gossip.comm] sendToEndpoint -> DEBU 4e9d Exiting" +"2019-09-24 01:05:50.904 UTC [gossip.gossip] handleMessage -> DEBU 4e9e Exiting" +"2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea3 Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.905 UTC [gossip.pull] HandleMessage -> DEBU 4ea4 GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea5 Exiting" +"2019-09-24 01:05:50.905 UTC [gossip.gossip] handleMessage -> DEBU 4ea6 Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.906 UTC [gossip.pull] HandleMessage -> DEBU 4ea7 GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.906 UTC [gossip.gossip] handleMessage -> DEBU 4ea8 Exiting" +"2019-09-24 01:05:50.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4ea9 Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:5\345\336o\003N\311\207\355W\303\265\310\030\217\342\376&\2243lf\013\256\234\225\257*\354\210\305" > > , Envelope: 166 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.906 UTC [gossip.comm] sendToEndpoint -> DEBU 4eaa Exiting" +"2019-09-24 01:05:50.909 UTC [gossip.comm] func1 -> DEBU 4eab Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.909 UTC [gossip.gossip] handleMessage -> DEBU 4ead Entering, 172.18.0.9:7051 2a67a69f6bd29a892da7d4040104882436e79d5bb540708340a44e5033c71df2 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.910 UTC [gossip.gossip] handleMessage -> DEBU 4eae Exiting" +"2019-09-24 01:05:50.909 UTC [gossip.comm] func1 -> DEBU 4eac Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.910 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4eaf Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.910 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eb0 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:50.910 UTC [gossip.gossip] handleMessage -> DEBU 4eb1 Entering, 172.18.0.6:44178 9c6fc4e4580a3854297f955952a25e222c9f7f3ae19f754fb8122e0f8f7fb8da sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.911 UTC [msp.identity] Verify -> DEBU 4eb2 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +"2019-09-24 01:05:50.911 UTC [msp.identity] Verify -> DEBU 4eb3 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +00000040 9c 95 af 2a ec 88 c5 |...*...|" +"2019-09-24 01:05:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eb4 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.911 UTC [gossip.discovery] isSentByMe -> DEBU 4eb5 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.911 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eb6 Exiting" +"2019-09-24 01:05:50.912 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4eb7 Fetched identity of [65 94 136 155 142 103 136 225 10 25 226 159 4 185 188 85 140 162 223 202 146 230 58 43 138 175 97 83 112 113 24 247] from identity store" +"2019-09-24 01:05:50.912 UTC [msp] DeserializeIdentity -> DEBU 4eb8 Obtaining identity" +"2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4eb9 Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4e 66 30 74 2f 49 61 6e 4e 34 53 54 6e 2f 4a 63 5a 34 4b 56 63 38 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 54 6b 77 4f 54 49 30 4d 44 41 31 4f 54 41 77 57 68 63 4e 4d 6a 6b 77 4f 54 49 78 4d 44 41 31 4f 54 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 45 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 41 74 33 49 38 32 48 34 32 42 72 0a 53 2f 34 6d 44 45 67 6f 49 47 31 73 56 56 61 49 48 52 30 74 2f 63 6e 35 71 6a 32 73 39 74 48 46 6c 58 31 58 72 67 70 35 79 48 77 37 6e 5a 6b 49 67 42 69 46 72 32 57 6e 57 77 31 53 54 49 6a 38 0a 64 76 6a 69 35 65 7a 2f 64 62 2b 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 49 35 72 6c 64 42 2f 33 32 4e 4e 79 6c 2b 49 62 38 35 35 34 55 47 56 43 44 63 48 58 65 4e 4e 49 6e 53 42 6e 58 58 43 7a 4c 54 55 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 46 32 79 38 45 57 68 31 4f 76 45 63 65 79 54 44 47 47 46 72 64 4e 77 2f 76 6a 31 41 56 33 34 69 52 4c 39 66 42 39 4e 50 48 39 37 41 69 41 34 46 59 72 51 0a 73 7a 39 6a 6a 38 4a 32 45 6f 76 4f 79 6f 31 71 76 54 49 6b 61 71 52 6d 59 74 43 78 56 72 65 69 34 49 57 2b 69 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4eba Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.912 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4ebb Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:50.912 UTC [policies] Evaluate -> DEBU 4ebe == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:50.912 UTC [cauthdsl] func1 -> DEBU 4ebf 0xc0047a0420 gate 1569287150912925000 evaluation starts" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec0 0xc0047a0420 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec1 0xc0047a0420 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec2 0xc0047a0420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec3 0xc0047a0420 principal evaluation fails" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ec4 0xc0047a0420 gate 1569287150912925000 evaluation fails" +"2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.913 UTC [policies] Evaluate -> DEBU 4ec7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ec8 0xc0047a0c60 gate 1569287150913599000 evaluation starts" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ec9 0xc0047a0c60 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4eca 0xc0047a0c60 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ecb 0xc0047a0c60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func2 -> DEBU 4ecc 0xc0047a0c60 principal evaluation fails" +"2019-09-24 01:05:50.913 UTC [cauthdsl] func1 -> DEBU 4ecd 0xc0047a0c60 gate 1569287150913599000 evaluation fails" +"2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ece Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ecf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.914 UTC [policies] Evaluate -> DEBU 4ed0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:50.914 UTC [cauthdsl] func1 -> DEBU 4ed1 0xc0047a14a0 gate 1569287150914164100 evaluation starts" +"2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed2 0xc0047a14a0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed3 0xc0047a14a0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.914 UTC [cauthdsl] func2 -> DEBU 4ed4 0xc0047a14a0 principal matched by identity 0" +"2019-09-24 01:05:50.914 UTC [msp.identity] Verify -> DEBU 4ed5 Verify: digest = 00000000 d5 d5 79 3b 0d 49 85 81 e5 50 bf 6b 99 84 b0 ff |..y;.I...P.k....| +00000010 c7 19 66 35 d3 45 68 5c b0 8b 46 de c2 0b ac ed |..f5.Eh\..F.....|" +"2019-09-24 01:05:50.914 UTC [msp.identity] Verify -> DEBU 4ed6 Verify: sig = 00000000 30 44 02 20 5f fe 52 b0 8c 5f 5a d0 23 01 c9 dd |0D. _.R.._Z.#...| +00000010 6a 43 17 ca e7 f7 5a 54 77 6a ab 21 55 5c 7f b8 |jC....ZTwj.!U\..| +00000020 db da 46 ab 02 20 4d c7 4c 0b 8a a4 2e d8 b9 18 |..F.. M.L.......| +00000030 76 2c 17 88 23 39 f9 f7 5e b3 48 d7 51 f7 1b aa |v,..#9..^.H.Q...| +00000040 7d 9a eb 27 dc 37 |}..'.7|" +"2019-09-24 01:05:50.915 UTC [cauthdsl] func2 -> DEBU 4ed7 0xc0047a14a0 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:50.915 UTC [cauthdsl] func1 -> DEBU 4ed8 0xc0047a14a0 gate 1569287150914164100 evaluation succeeds" +"2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4ed9 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4eda == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4edb Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:50.915 UTC [policies] Evaluate -> DEBU 4edc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:50.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4edd Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:50.918 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ede Exiting" +"2019-09-24 01:05:50.918 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4edf Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:50.919 UTC [msp.identity] Verify -> DEBU 4ee0 Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +"2019-09-24 01:05:50.919 UTC [msp.identity] Verify -> DEBU 4ee1 Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +"2019-09-24 01:05:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ee2 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.919 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ee3 Exiting" +"2019-09-24 01:05:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee4 Exiting" +"2019-09-24 01:05:50.919 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ee5 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.920 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ee6 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:50.920 UTC [msp.identity] Verify -> DEBU 4ee7 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +"2019-09-24 01:05:50.920 UTC [msp.identity] Verify -> DEBU 4ee9 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +00000040 9c 95 af 2a ec 88 c5 |...*...|" +"2019-09-24 01:05:50.920 UTC [gossip.gossip] handleMessage -> DEBU 4ee8 Exiting" +"2019-09-24 01:05:50.921 UTC [gossip.gossip] handleMessage -> DEBU 4eea Entering, 172.18.0.8:7051 415e889b8e6788e10a19e29f04b9bc558ca2dfca92e63a2b8aaf6153707118f7 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.921 UTC [msp.identity] Verify -> DEBU 4eeb Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`|" +"2019-09-24 01:05:50.921 UTC [msp.identity] Verify -> DEBU 4eec Verify: sig = 00000000 30 44 02 20 4f ac cd 46 08 f0 47 e1 ca c0 e5 76 |0D. O..F..G....v| +00000010 b0 2f 94 28 8f aa c9 09 16 f3 43 c4 e3 61 51 18 |./.(......C..aQ.| +00000020 c9 ae af 8b 02 20 36 f3 9d 75 18 08 32 cb 42 10 |..... 6..u..2.B.| +00000030 99 e7 c8 aa 6c a4 9e 9f a8 e6 df b9 06 52 9e a4 |....l........R..| +00000040 96 1b 33 53 7b eb |..3S{.|" +"2019-09-24 01:05:50.922 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eed Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:50.922 UTC [gossip.discovery] isSentByMe -> DEBU 4eee Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes" +"2019-09-24 01:05:50.923 UTC [gossip.discovery] handleAliveMessage -> DEBU 4eef Exiting" +"2019-09-24 01:05:50.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ef0 Exiting" +"2019-09-24 01:05:50.923 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4ef1 Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes" +"2019-09-24 01:05:50.924 UTC [gossip.gossip] handleMessage -> DEBU 4ef2 Exiting" +"2019-09-24 01:05:50.923 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ef3 Fetched identity of [217 37 168 214 95 107 60 132 234 196 92 60 177 153 139 56 13 91 58 53 23 65 84 133 23 33 21 15 250 93 227 31] from identity store" +"2019-09-24 01:05:50.924 UTC [msp.identity] Verify -> DEBU 4ef4 Verify: digest = 00000000 4d 14 77 fa 33 23 19 b6 04 26 dd 0a 95 31 87 2f |M.w.3#...&...1./| +00000010 c1 90 4f de 5c ef f1 99 67 86 68 5e e7 b0 2b 78 |..O.\...g.h^..+x|" +"2019-09-24 01:05:50.925 UTC [msp.identity] Verify -> DEBU 4ef5 Verify: sig = 00000000 30 45 02 21 00 f6 9d 90 60 67 f9 a9 cd 05 80 1d |0E.!....`g......| +00000010 b1 0a 2b 0c c7 9b d5 d8 bf 4a a4 16 eb 2a d2 a5 |..+......J...*..| +00000020 5a dc 57 23 5c 02 20 3e 35 e5 de 6f 03 4e c9 87 |Z.W#\. >5..o.N..| +00000030 ed 57 c3 b5 c8 18 8f e2 fe 26 94 33 6c 66 0b ae |.W.......&.3lf..| +00000040 9c 95 af 2a ec 88 c5 |...*...|" +"2019-09-24 01:05:50.925 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ef6 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.925 UTC [gossip.discovery] isSentByMe -> DEBU 4ef7 Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.926 UTC [gossip.discovery] handleAliveMessage -> DEBU 4ef8 Exiting" +"2019-09-24 01:05:50.926 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4ef9 Fetched identity of [42 103 166 159 107 210 154 137 45 167 212 4 1 4 136 36 54 231 157 91 181 64 112 131 64 164 78 80 51 199 29 242] from identity store" +"2019-09-24 01:05:50.926 UTC [msp] DeserializeIdentity -> DEBU 4efa Obtaining identity" +"2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] getValidatedIdentity -> DEBU 4efb Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 66 69 66 43 4c 77 48 33 6e 42 72 4b 48 50 73 79 52 4b 4e 46 44 7a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 78 4f 54 41 35 4d 6a 51 77 4d 44 55 35 4d 44 42 61 46 77 30 79 4f 54 41 35 4d 6a 45 77 4d 44 55 35 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 43 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 44 72 4d 7a 47 69 4f 79 6a 68 53 2b 0a 56 57 65 2b 54 2f 38 4f 59 69 66 4b 6e 4b 54 76 66 49 66 33 69 77 4b 59 6a 4b 68 6c 31 67 43 65 57 56 5a 6e 48 59 4b 4f 50 62 55 75 49 50 74 37 61 4d 36 78 4c 39 33 79 75 76 78 6f 4d 64 33 69 0a 41 4a 6b 50 53 37 6f 64 32 36 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6a 6d 75 56 30 48 2f 66 59 30 33 4b 58 34 68 76 7a 6e 6e 68 51 5a 55 49 4e 77 64 64 34 30 30 69 64 49 47 64 64 63 4c 4d 74 4e 51 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 4e 63 71 55 2b 6e 70 32 55 68 39 77 6d 67 4f 37 36 58 45 32 6b 79 47 31 6e 38 6f 70 72 66 52 6a 44 33 42 77 35 31 67 57 4a 76 74 41 69 42 72 55 47 39 67 0a 46 72 61 49 31 39 31 4e 72 71 7a 35 6c 62 63 41 62 70 6b 54 2b 4a 53 74 54 50 71 37 36 4f 78 45 6f 2b 51 38 6e 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel]" +"2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4efc Got policy manager for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.927 UTC [peer.gossip.mcs] VerifyByChannel -> DEBU 4efd Got reader policy for channel [businesschannel] with flag [true]" +"2019-09-24 01:05:50.928 UTC [policies] Evaluate -> DEBU 4efe == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2019-09-24 01:05:50.928 UTC [policies] Evaluate -> DEBU 4eff This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2019-09-24 01:05:50.929 UTC [policies] Evaluate -> DEBU 4f00 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2019-09-24 01:05:50.929 UTC [cauthdsl] func1 -> DEBU 4f01 0xc0047cd090 gate 1569287150929336700 evaluation starts" +"2019-09-24 01:05:50.929 UTC [cauthdsl] func2 -> DEBU 4f02 0xc0047cd090 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.929 UTC [cauthdsl] func2 -> DEBU 4f03 0xc0047cd090 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.930 UTC [cauthdsl] func2 -> DEBU 4f04 0xc0047cd090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2019-09-24 01:05:50.930 UTC [cauthdsl] func2 -> DEBU 4f05 0xc0047cd090 principal evaluation fails" +"2019-09-24 01:05:50.930 UTC [cauthdsl] func1 -> DEBU 4f06 0xc0047cd090 gate 1569287150929336700 evaluation fails" +"2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f07 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f08 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2019-09-24 01:05:50.931 UTC [policies] Evaluate -> DEBU 4f09 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2019-09-24 01:05:50.931 UTC [cauthdsl] func1 -> DEBU 4f0a 0xc0047cd8d0 gate 1569287150931870900 evaluation starts" +"2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0b 0xc0047cd8d0 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0c 0xc0047cd8d0 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.932 UTC [cauthdsl] func2 -> DEBU 4f0d 0xc0047cd8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2019-09-24 01:05:50.933 UTC [cauthdsl] func2 -> DEBU 4f0e 0xc0047cd8d0 principal evaluation fails" +"2019-09-24 01:05:50.933 UTC [cauthdsl] func1 -> DEBU 4f0f 0xc0047cd8d0 gate 1569287150931870900 evaluation fails" +"2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f10 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f11 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2019-09-24 01:05:50.933 UTC [policies] Evaluate -> DEBU 4f12 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2019-09-24 01:05:50.934 UTC [cauthdsl] func1 -> DEBU 4f13 0xc0047e4110 gate 1569287150934155200 evaluation starts" +"2019-09-24 01:05:50.934 UTC [cauthdsl] func2 -> DEBU 4f14 0xc0047e4110 signed by 0 principal evaluation starts (used [false])" +"2019-09-24 01:05:50.934 UTC [cauthdsl] func2 -> DEBU 4f15 0xc0047e4110 processing identity 0 with bytes of 1150090" +"2019-09-24 01:05:50.935 UTC [cauthdsl] func2 -> DEBU 4f16 0xc0047e4110 principal matched by identity 0" +"2019-09-24 01:05:50.935 UTC [msp.identity] Verify -> DEBU 4f17 Verify: digest = 00000000 13 d9 36 90 f6 2e 5f 73 92 b0 36 ff 20 19 aa c2 |..6..._s..6. ...| +00000010 7c 05 b8 9a 6c 9d 23 32 26 81 1c 74 c0 b9 4a 75 ||...l.#2&..t..Ju|" +"2019-09-24 01:05:50.935 UTC [msp.identity] Verify -> DEBU 4f18 Verify: sig = 00000000 30 44 02 20 7c 75 03 d5 c8 67 8c 4e 3a c3 7b 01 |0D. |u...g.N:.{.| +00000010 1f 70 70 25 4c 6a 09 76 c9 5d 97 fa db 6f 26 4e |.pp%Lj.v.]...o&N| +00000020 74 10 fb cb 02 20 74 a1 81 cf b2 2b fe a8 50 08 |t.... t....+..P.| +00000030 86 fb ee 6f 38 38 f4 f0 00 7f ec 83 92 54 6a 6e |...o88.......Tjn| +00000040 7b cd 5e 59 28 15 |{.^Y(.|" +"2019-09-24 01:05:50.936 UTC [cauthdsl] func2 -> DEBU 4f19 0xc0047e4110 principal evaluation succeeds for identity 0" +"2019-09-24 01:05:50.936 UTC [cauthdsl] func1 -> DEBU 4f1a 0xc0047e4110 gate 1569287150934155200 evaluation succeeds" +"2019-09-24 01:05:50.936 UTC [policies] Evaluate -> DEBU 4f1b Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.936 UTC [policies] Evaluate -> DEBU 4f1c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2019-09-24 01:05:50.937 UTC [policies] Evaluate -> DEBU 4f1d Signature set satisfies policy /Channel/Application/Readers" +"2019-09-24 01:05:50.937 UTC [policies] Evaluate -> DEBU 4f1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2019-09-24 01:05:50.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f1f Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes" +"2019-09-24 01:05:50.938 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f20 Exiting" +"2019-09-24 01:05:50.938 UTC [gossip.gossip] ValidateAliveMsg -> DEBU 4f21 Fetched identity of [156 111 196 228 88 10 56 84 41 127 149 89 82 162 94 34 44 159 127 58 225 159 117 79 184 18 46 15 143 127 184 218] from identity store" +"2019-09-24 01:05:50.939 UTC [msp.identity] Verify -> DEBU 4f22 Verify: digest = 00000000 fe 86 3e 7a ed 17 7e f4 4d 1c 82 fe b6 ce 99 68 |..>z..~.M......h| +00000010 48 79 1c 2d 3d a7 25 b4 da 18 39 1e 9f 16 88 0f |Hy.-=.%...9.....|" +"2019-09-24 01:05:50.939 UTC [msp.identity] Verify -> DEBU 4f23 Verify: sig = 00000000 30 45 02 21 00 c0 59 eb 70 76 9a 0c e3 3a e3 b6 |0E.!..Y.pv...:..| +00000010 ba cf 94 e8 4e 99 17 ab 59 e7 b3 9f 06 43 5b 44 |....N...Y....C[D| +00000020 37 e2 34 c5 01 02 20 3b 29 c5 4a fd 9d 63 b5 e7 |7.4... ;).J..c..| +00000030 1e 1a 7f ea c7 f6 c4 fd 68 2b 59 55 9b 6a eb 20 |........h+YU.j. | +00000040 b0 5b 00 33 fd fd 7d |.[.3..}|" +"2019-09-24 01:05:50.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f24 Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes" +"2019-09-24 01:05:50.939 UTC [gossip.discovery] handleAliveMessage -> DEBU 4f25 Exiting" +"2019-09-24 01:05:50.939 UTC [gossip.discovery] handleMsgFromComm -> DEBU 4f26 Exiting" diff --git a/hyperledger_fabric/v1.4.3/scripts/download_images.sh b/hyperledger_fabric/v1.4.3/scripts/download_images.sh new file mode 100644 index 00000000..9ba90b4e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/download_images.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +pull_image() { + IMG=$1 + #if [ -z "$(docker images -q ${IMG} 2> /dev/null)" ]; then # not exist + # docker pull ${IMG} + #else + # echo "${IMG} already exist locally" + #fi + docker pull ${IMG} +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & +done + +pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag +# core.yaml requires a latest tag, but nodeenv is not available in docker hub yet +# pull_image hyperledger/fabric-nodeenv:latest +pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag +docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.3/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/env_setup.sh b/hyperledger_fabric/v1.4.3/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.3/scripts/func.sh b/hyperledger_fabric/v1.4.3/scripts/func.sh new file mode 100644 index 00000000..0285c14a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/func.sh @@ -0,0 +1,973 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path +chaincodeInstall () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommit channel org peer name version +chaincodeQueryCommit () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.3/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.3/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.3/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.3/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.3/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.3/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.3/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.3/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.3/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.3/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.3/scripts/json_flatter.py b/hyperledger_fabric/v1.4.3/scripts/json_flatter.py new file mode 100644 index 00000000..fb6957fc --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + if success: # result_bytes = b'xxxx\xx' + print('===================Start==================================') + print(raw) + print(result) + print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.3/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.3/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..e87bf4cd --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0 4peers..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.3/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.3/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.3/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.3/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.3/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.3/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.3/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.3/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.3/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.3/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.3/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.3/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.3/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.3/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.3/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.3/scripts/test_temp.sh b/hyperledger_fabric/v1.4.3/scripts/test_temp.sh new file mode 100644 index 00000000..38b8ede8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.3/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.3/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.3/scripts/variables.sh b/hyperledger_fabric/v1.4.3/scripts/variables.sh new file mode 100644 index 00000000..99ed5e7b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.15 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=1.4.3 + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=1.4.3 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.3/solo/README.md b/hyperledger_fabric/v1.4.3/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.3/solo/configtx.yaml b/hyperledger_fabric/v1.4.3/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.3/solo/logs/dev_all.log b/hyperledger_fabric/v1.4.3/solo/logs/dev_all.log new file mode 100644 index 00000000..a50be77c --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/logs/dev_all.log @@ -0,0 +1,882 @@ +Attaching to prometheus, peer0.org1.example.com, peer1.org2.example.com, peer0.org2.example.com, peer1.org1.example.com, fabric-cli, orderer0.example.com +prometheus | level=info ts=2019-04-22T06:20:06.4881626Z caller=main.go:243 msg="Starting Prometheus" version="(version=2.6.0, branch=HEAD, revision=dbd1d58c894775c0788470944b818cc724f550fb)" +prometheus | level=info ts=2019-04-22T06:20:06.4884758Z caller=main.go:244 build_context="(go=go1.11.3, user=root@bf5760470f13, date=20181217-15:14:46)" +prometheus | level=info ts=2019-04-22T06:20:06.4886141Z caller=main.go:245 host_details="(Linux 4.9.125-linuxkit #1 SMP Fri Sep 7 08:20:28 UTC 2018 x86_64 prometheus (none))" +prometheus | level=info ts=2019-04-22T06:20:06.4900294Z caller=main.go:246 fd_limits="(soft=1048576, hard=1048576)" +prometheus | level=info ts=2019-04-22T06:20:06.4901699Z caller=main.go:247 vm_limits="(soft=unlimited, hard=unlimited)" +prometheus | level=info ts=2019-04-22T06:20:06.4917652Z caller=main.go:561 msg="Starting TSDB ..." +prometheus | level=info ts=2019-04-22T06:20:06.4936325Z caller=web.go:429 component=web msg="Start listening for connections" address=0.0.0.0:9090 +peer0.org1.example.com | "2019-04-22 06:20:05.431 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org1.example.com | Version: 2.0.0 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.11.5 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger" +peer0.org1.example.com | "2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.7:7051" +peer0.org1.example.com | "2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +peer0.org1.example.com | "2019-04-22 06:20:05.439 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:20:05.440 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org1.example.com | "2019-04-22 06:20:05.539 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org1.example.com | "2019-04-22 06:20:05.573 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org1.example.com | "2019-04-22 06:20:05.573 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org1.example.com | "2019-04-22 06:20:05.590 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org1.example.com | "2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +peer0.org1.example.com | "2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +peer0.org1.example.com | "2019-04-22 06:20:05.619 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.695 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer0.org2.example.com | Version: 2.0.0 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.11.5 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger" +peer0.org2.example.com | "2019-04-22 06:20:04.696 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.5:7051" +peer0.org2.example.com | "2019-04-22 06:20:04.696 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org2.example.com:7051" +peer0.org2.example.com | "2019-04-22 06:20:04.728 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org2.example.com | "2019-04-22 06:20:04.728 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer0.org2.example.com | "2019-04-22 06:20:04.829 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer0.org2.example.com | "2019-04-22 06:20:04.906 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer0.org2.example.com | "2019-04-22 06:20:04.906 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer0.org2.example.com | "2019-04-22 06:20:04.944 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer0.org2.example.com | "2019-04-22 06:20:04.962 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com" +peer0.org2.example.com | "2019-04-22 06:20:04.962 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org2.example.com:7052" +peer0.org2.example.com | "2019-04-22 06:20:04.978 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.979 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org2.example.com | "2019-04-22 06:20:04.991 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.004 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org2.example.com | "2019-04-22 06:20:05.005 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org2.example.com:7051 started" +peer0.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.009 UTC [cscc] Init -> INFO 014 Init CSCC" +peer0.org2.example.com | "2019-04-22 06:20:05.010 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.012 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org2.example.com | "2019-04-22 06:20:05.012 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.015 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:20:05.015 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.017 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051]" +peer0.org2.example.com | "2019-04-22 06:20:05.048 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:07.047Z grpc.peer_address=192.168.224.6:45034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.5µs +peer0.org2.example.com | "2019-04-22 06:20:05.057 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:15.05Z grpc.peer_address=192.168.224.6:45034 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.9517ms +peer0.org2.example.com | "2019-04-22 06:20:05.065 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:07.065Z grpc.peer_address=192.168.224.6:45036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199µs +peer0.org2.example.com | "2019-04-22 06:20:09.665 UTC [endorser] callChaincode -> INFO 021 [][0e6a537a] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:09.674 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:20:09.684 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org2.example.com | "2019-04-22 06:20:09.721 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 28ms (state_validation=1ms block_commit=19ms state_commit=5ms)" +prometheus | level=info ts=2019-04-22T06:20:06.5121071Z caller=main.go:571 msg="TSDB started" +prometheus | level=info ts=2019-04-22T06:20:06.5121936Z caller=main.go:631 msg="Loading configuration file" filename=prometheus.yml +prometheus | level=info ts=2019-04-22T06:20:06.5222142Z caller=main.go:657 msg="Completed loading of configuration file" filename=prometheus.yml +prometheus | level=info ts=2019-04-22T06:20:06.5223456Z caller=main.go:530 msg="Server is ready to receive web requests." +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org2.example.com | Version: 2.0.0 +peer1.org2.example.com | Commit SHA: development build +peer1.org2.example.com | Go version: go1.11.5 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org2.example.com | Chaincode: +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org2.example.com | Docker Namespace: hyperledger" +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.6:7051" +peer1.org2.example.com | "2019-04-22 06:20:04.783 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org2.example.com:7051" +peer1.org2.example.com | "2019-04-22 06:20:04.788 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer1.org2.example.com | "2019-04-22 06:20:04.788 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org2.example.com | "2019-04-22 06:20:04.884 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org2.example.com | "2019-04-22 06:20:04.952 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org2.example.com | "2019-04-22 06:20:04.952 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org2.example.com | "2019-04-22 06:20:04.971 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org2.example.com | "2019-04-22 06:20:04.991 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com" +peer1.org2.example.com | "2019-04-22 06:20:04.991 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org2.example.com:7052" +peer1.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.007 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.008 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.008 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org2.example.com | "2019-04-22 06:20:05.020 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:05.032 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:05.033 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org2.example.com:7051 started" +peer1.org2.example.com | "2019-04-22 06:20:05.053 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.055 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:05.055 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.058 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org2.example.com | "2019-04-22 06:20:05.058 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.060 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:20:05.060 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org2.example.com | "2019-04-22 06:20:05.061 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org2.example.com | "2019-04-22 06:20:05.062 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org2.example.com | "2019-04-22 06:20:05.062 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:05.063 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051]" +peer1.org2.example.com | "2019-04-22 06:20:09.936 UTC [endorser] callChaincode -> INFO 01e [][b1499bdf] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:20:09.943 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:20:09.949 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org2.example.com | "2019-04-22 06:20:09.972 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 15ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:20:09.975 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org2.example.com | "2019-04-22 06:20:09.982 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:09.983 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:09.983 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:10.010 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org2.example.com | "2019-04-22 06:20:10.012 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.013 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:10.014 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.014 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org2.example.com | "2019-04-22 06:20:10.015 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.020 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org2.example.com | "2019-04-22 06:20:10.021 UTC [endorser] callChaincode -> INFO 02d [][b1499bdf] Exit chaincode: name:"cscc" (84ms)" +peer1.org2.example.com | "2019-04-22 06:20:10.021 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48510 grpc.code=OK grpc.call_duration=87.1282ms +peer1.org2.example.com | "2019-04-22 06:20:10.963 UTC [endorser] callChaincode -> INFO 02f [][fc1375b9] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:20:10.964 UTC [endorser] callChaincode -> INFO 030 [][fc1375b9] Exit chaincode: name:"cscc" (1ms)" +peer1.org2.example.com | "2019-04-22 06:20:10.964 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48518 grpc.code=OK grpc.call_duration=2.0759ms +peer1.org2.example.com | "2019-04-22 06:20:11.895 UTC [endorser] callChaincode -> INFO 032 [][36da690a] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:20:11.898 UTC [endorser] callChaincode -> INFO 033 [][36da690a] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:20:11.898 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48526 grpc.code=OK grpc.call_duration=4.1396ms +peer1.org2.example.com | "2019-04-22 06:20:14.984 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org2.example.com:7051]] , current view: [[peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-04-22 06:20:15.789 UTC [gossip.election] leaderElection -> INFO 036 863f11593b2e9a5a57e06dd37ec3ffa5ad6dd6a9857fdcae014053b01e5e75bd : Some peer is already a leader" +peer1.org2.example.com | "2019-04-22 06:20:15.806 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:15.852 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:20:15.853 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:20:15.898 UTC [committer.txvalidator] Validate -> INFO 03c [businesschannel] Validated block [1] in 91ms" +peer1.org2.example.com | "2019-04-22 06:20:15.941 UTC [kvledger] CommitWithPvtData -> INFO 03d [businesschannel] Committed block [1] with 1 transaction(s) in 41ms (state_validation=13ms block_commit=16ms state_commit=6ms)" +peer1.org2.example.com | "2019-04-22 06:20:15.942 UTC [gossip.privdata] StoreBlock -> INFO 03e [businesschannel] Received block [2] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:15.969 UTC [gossip.gossip] JoinChan -> INFO 03f Joining gossip network of channel businesschannel with 2 organizations" +peer1.org2.example.com | "2019-04-22 06:20:15.969 UTC [gossip.gossip] learnAnchorPeers -> INFO 040 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.970 UTC [gossip.gossip] learnAnchorPeers -> INFO 041 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:20:15.979 UTC [gossip.service] updateEndpoints -> WARN 042 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:20:16.000 UTC [committer.txvalidator] Validate -> INFO 043 [businesschannel] Validated block [2] in 57ms" +peer1.org2.example.com | "2019-04-22 06:20:16.008 UTC [gossip.comm] func1 -> WARN 044 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:20:16.008 UTC [gossip.discovery] expireDeadMembers -> WARN 045 Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org2.example.com | "2019-04-22 06:20:16.009 UTC [gossip.discovery] expireDeadMembers -> WARN 046 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:16.009 UTC [gossip.discovery] expireDeadMembers -> WARN 047 Exiting" +peer1.org2.example.com | "2019-04-22 06:20:16.030 UTC [kvledger] CommitWithPvtData -> INFO 048 [businesschannel] Committed block [2] with 1 transaction(s) in 28ms (state_validation=3ms block_commit=19ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:20:17.023 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:19.023Z grpc.peer_address=192.168.224.5:47852 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=144.5µs +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.comm] func1 -> WARN 04a peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.discovery] expireDeadMembers -> WARN 04b Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org2.example.com | "2019-04-22 06:20:17.036 UTC [gossip.discovery] expireDeadMembers -> WARN 04c Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org2.example.com | "2019-04-22 06:20:17.037 UTC [gossip.discovery] expireDeadMembers -> WARN 04d Exiting" +peer1.org2.example.com | "2019-04-22 06:20:17.253 UTC [comm.grpc.server] 1 -> INFO 04e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:19.253Z grpc.peer_address=192.168.224.7:48576 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=153.9µs +peer1.org2.example.com | "2019-04-22 06:20:19.876 UTC [endorser] callChaincode -> INFO 04f [][4c18f0e7] Entry chaincode: name:"_lifecycle" " +peer1.org2.example.com | "2019-04-22 06:20:19.877 UTC [endorser] callChaincode -> INFO 050 [][4c18f0e7] Exit chaincode: name:"_lifecycle" (1ms)" +peer1.org2.example.com | "2019-04-22 06:20:19.878 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48592 grpc.code=OK grpc.call_duration=2.2757ms +peer1.org2.example.com | "2019-04-22 06:20:19.984 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051 ] [peer0.org2.example.com:7051]]" +peer1.org2.example.com | "2019-04-22 06:20:21.462 UTC [gossip.gossip] validateMsg -> WARN 053 StateInfo message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914009445220600 seq_num:1555914018670163900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found" +peer1.org2.example.com | "2019-04-22 06:20:21.462 UTC [gossip.gossip] handleMessage -> WARN 054 Message GossipMessage: Channel: , nonce: 0, tag: CHAN_OR_ORG state_info_message: Timestamp:inc_num:1555914009445220600 seq_num:1555914018670163900 PKI-id:a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 channel MAC:0114f9d5147871a59e485a3361b348fe54d349ed8ad123a550a5b33d32fe6ef9 properties:ledger_height:3 , Envelope: 98 bytes, Signature: 71 bytes isn't valid" +peer1.org2.example.com | "2019-04-22 06:20:22.615 UTC [gossip.privdata] StoreBlock -> INFO 055 [businesschannel] Received block [3] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:22.623 UTC [committer.txvalidator] Validate -> INFO 056 [businesschannel] Validated block [3] in 8ms" +peer1.org2.example.com | "2019-04-22 06:20:22.631 UTC [confighistory] HandleStateUpdates -> ERRO 057 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0039d85c0)}" +peer1.org2.example.com | "2019-04-22 06:20:22.668 UTC [kvledger] CommitWithPvtData -> INFO 058 [businesschannel] Committed block [3] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=26ms state_commit=6ms)" +peer1.org2.example.com | "2019-04-22 06:20:25.096 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [4] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:25.101 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [4] in 4ms" +peer0.org2.example.com | "2019-04-22 06:20:09.726 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org2.example.com | "2019-04-22 06:20:09.742 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:09.743 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:09.743 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:09.770 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org2.example.com | "2019-04-22 06:20:09.773 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.774 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org2.example.com | "2019-04-22 06:20:09.774 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.775 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org2.example.com | "2019-04-22 06:20:09.775 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.776 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org2.example.com | "2019-04-22 06:20:09.777 UTC [endorser] callChaincode -> INFO 030 [][0e6a537a] Exit chaincode: name:"cscc" (111ms)" +peer0.org2.example.com | "2019-04-22 06:20:09.777 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34158 grpc.code=OK grpc.call_duration=114.2085ms +peer0.org2.example.com | "2019-04-22 06:20:10.809 UTC [endorser] callChaincode -> INFO 032 [][99660bfb] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:10.811 UTC [endorser] callChaincode -> INFO 033 [][99660bfb] Exit chaincode: name:"cscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:10.811 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34166 grpc.code=OK grpc.call_duration=2.768ms +peer0.org2.example.com | "2019-04-22 06:20:11.709 UTC [endorser] callChaincode -> INFO 035 [][5a165a5c] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:20:11.711 UTC [endorser] callChaincode -> INFO 036 [][5a165a5c] Exit chaincode: name:"qscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:20:11.712 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34174 grpc.code=OK grpc.call_duration=3.8837ms +peer0.org2.example.com | "2019-04-22 06:20:14.743 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org2.example.com:7051]] , current view: [[peer1.org2.example.com:7051]]" +peer0.org2.example.com | "2019-04-22 06:20:15.776 UTC [gossip.election] beLeader -> INFO 039 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 : Becoming a leader" +peer0.org2.example.com | "2019-04-22 06:20:15.777 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org2.example.com | "2019-04-22 06:20:15.794 UTC [gossip.privdata] StoreBlock -> INFO 03b [businesschannel] Received block [1] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] JoinChan -> INFO 03c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] learnAnchorPeers -> INFO 03d No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:20:15.810 UTC [gossip.gossip] learnAnchorPeers -> INFO 03e Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.822 UTC [committer.txvalidator] Validate -> INFO 03f [businesschannel] Validated block [1] in 27ms" +peer0.org2.example.com | "2019-04-22 06:20:15.849 UTC [kvledger] CommitWithPvtData -> INFO 040 [businesschannel] Committed block [1] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=18ms state_commit=3ms)" +peer0.org2.example.com | "2019-04-22 06:20:15.849 UTC [gossip.privdata] StoreBlock -> INFO 041 [businesschannel] Received block [2] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] JoinChan -> INFO 042 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 043 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 044 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:20:15.876 UTC [gossip.gossip] learnAnchorPeers -> INFO 045 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:20:15.924 UTC [committer.txvalidator] Validate -> INFO 046 [businesschannel] Validated block [2] in 73ms" +peer0.org2.example.com | "2019-04-22 06:20:15.955 UTC [kvledger] CommitWithPvtData -> INFO 047 [businesschannel] Committed block [2] with 1 transaction(s) in 31ms (state_validation=3ms block_commit=20ms state_commit=4ms)" +peer0.org2.example.com | "2019-04-22 06:20:15.973 UTC [comm.grpc.server] 1 -> INFO 048 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.973Z grpc.peer_address=192.168.224.7:60902 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=175µs +peer0.org2.example.com | "2019-04-22 06:20:15.986 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.985Z grpc.peer_address=192.168.224.6:45094 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=187.4µs +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer0.org1.example.com | "2019-04-22 06:20:05.638 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +peer0.org1.example.com | "2019-04-22 06:20:05.643 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer0.org1.example.com | "2019-04-22 06:20:05.644 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +peer0.org1.example.com | "2019-04-22 06:20:05.646 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.648 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org2.example.com | "2019-04-22 06:20:25.145 UTC [gossip.privdata] StoreBlock -> INFO 05b [businesschannel] Fetched all missing collection private write sets from remote peers for block [4] (42ms)" +peer1.org2.example.com | "2019-04-22 06:20:25.151 UTC [confighistory] HandleStateUpdates -> ERRO 05c Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0003e19a0)}" +peer1.org2.example.com | "2019-04-22 06:20:25.188 UTC [kvledger] CommitWithPvtData -> INFO 05d [businesschannel] Committed block [4] with 1 transaction(s) in 41ms (state_validation=4ms block_commit=22ms state_commit=11ms)" +peer1.org2.example.com | "2019-04-22 06:20:28.653 UTC [gossip.privdata] StoreBlock -> INFO 05e [businesschannel] Received block [5] from buffer" +peer1.org2.example.com | "2019-04-22 06:20:28.656 UTC [committer.txvalidator] Validate -> INFO 05f [businesschannel] Validated block [5] in 3ms" +peer1.org2.example.com | "2019-04-22 06:20:28.659 UTC [lifecycle] update -> INFO 060 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer1.org2.example.com | "2019-04-22 06:20:28.661 UTC [lifecycle] update -> INFO 061 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org2.example.com | "2019-04-22 06:20:28.661 UTC [cceventmgmt] HandleStateUpdates -> INFO 062 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org2.example.com | "2019-04-22 06:20:28.663 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 063 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org2.example.com | "2019-04-22 06:20:28.663 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 064 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org2.example.com | "2019-04-22 06:20:28.694 UTC [kvledger] CommitWithPvtData -> INFO 065 [businesschannel] Committed block [5] with 1 transaction(s) in 36ms (state_validation=9ms block_commit=15ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:20:29.951 UTC [gossip.channel] reportMembershipChanges -> INFO 066 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]]" +peer1.org2.example.com | "2019-04-22 06:21:07.531 UTC [gossip.privdata] StoreBlock -> INFO 067 [businesschannel] Received block [6] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:07.533 UTC [committer.txvalidator] Validate -> INFO 068 [businesschannel] Validated block [6] in 1ms" +peer1.org2.example.com | "2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 069 [businesschannel] Committed block [6] with 1 transaction(s) in 37ms (state_validation=0ms block_commit=21ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:21:12.978 UTC [gossip.privdata] StoreBlock -> INFO 06a [businesschannel] Received block [7] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:12.981 UTC [committer.txvalidator] Validate -> INFO 06b [businesschannel] Validated block [7] in 2ms" +peer1.org2.example.com | "2019-04-22 06:21:13.016 UTC [kvledger] CommitWithPvtData -> INFO 06c [businesschannel] Committed block [7] with 1 transaction(s) in 35ms (state_validation=2ms block_commit=26ms state_commit=3ms)" +peer1.org2.example.com | "2019-04-22 06:21:15.620 UTC [gossip.privdata] StoreBlock -> INFO 06d [businesschannel] Received block [8] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:15.631 UTC [committer.txvalidator] Validate -> INFO 06e [businesschannel] Validated block [8] in 8ms" +peer1.org2.example.com | "2019-04-22 06:21:15.657 UTC [kvledger] CommitWithPvtData -> INFO 06f [businesschannel] Committed block [8] with 1 transaction(s) in 23ms (state_validation=2ms block_commit=15ms state_commit=2ms)" +peer1.org2.example.com | "2019-04-22 06:21:29.156 UTC [gossip.privdata] StoreBlock -> INFO 070 [businesschannel] Received block [9] from buffer" +peer1.org2.example.com | "2019-04-22 06:21:29.159 UTC [cauthdsl] deduplicate -> WARN 071 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:21:29.159 UTC [cauthdsl] deduplicate -> WARN 072 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org2.example.com | "2019-04-22 06:21:29.177 UTC [gossip.gossip] JoinChan -> INFO 073 Joining gossip network of channel businesschannel with 3 organizations" +peer1.org2.example.com | "2019-04-22 06:21:29.178 UTC [gossip.gossip] learnAnchorPeers -> INFO 074 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org2.example.com | "2019-04-22 06:21:29.178 UTC [gossip.gossip] learnAnchorPeers -> INFO 075 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:21:29.183 UTC [gossip.gossip] learnAnchorPeers -> INFO 076 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org2.example.com | "2019-04-22 06:21:29.184 UTC [gossip.service] updateEndpoints -> WARN 077 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org2.example.com | "2019-04-22 06:21:29.207 UTC [committer.txvalidator] Validate -> INFO 078 [businesschannel] Validated block [9] in 50ms" +peer1.org2.example.com | "2019-04-22 06:21:29.217 UTC [comm.grpc.server] 1 -> INFO 079 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:47852 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m12.2932973s +peer1.org2.example.com | "2019-04-22 06:21:29.244 UTC [comm.grpc.server] 1 -> INFO 07a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:48576 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=1m12.0899635s +peer1.org2.example.com | "2019-04-22 06:21:29.258 UTC [kvledger] CommitWithPvtData -> INFO 07b [businesschannel] Committed block [9] with 1 transaction(s) in 50ms (state_validation=1ms block_commit=36ms state_commit=8ms)" +peer1.org2.example.com | "2019-04-22 06:21:46.985 UTC [endorser] callChaincode -> INFO 07c [][72bce4b6] Entry chaincode: name:"cscc" " +peer1.org2.example.com | "2019-04-22 06:21:46.986 UTC [endorser] callChaincode -> INFO 07d [][72bce4b6] Exit chaincode: name:"cscc" (0ms)" +peer1.org2.example.com | "2019-04-22 06:21:46.986 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48864 grpc.code=OK grpc.call_duration=2.5522ms +peer1.org2.example.com | "2019-04-22 06:21:47.876 UTC [endorser] callChaincode -> INFO 07f [][fe24346a] Entry chaincode: name:"qscc" " +peer1.org2.example.com | "2019-04-22 06:21:47.878 UTC [endorser] callChaincode -> INFO 080 [][fe24346a] Exit chaincode: name:"qscc" (2ms)" +peer1.org2.example.com | "2019-04-22 06:21:47.878 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:48874 grpc.code=OK grpc.call_duration=3.1544ms +peer0.org2.example.com | "2019-04-22 06:20:16.004 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:45036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.9378109s +peer0.org2.example.com | "2019-04-22 06:20:16.005 UTC [comm.grpc.server] 1 -> INFO 04b streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:26.003Z grpc.peer_address=192.168.224.6:45094 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.8677ms +peer0.org2.example.com | "2019-04-22 06:20:18.494 UTC [comm.grpc.server] 1 -> INFO 04c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.493Z grpc.peer_address=192.168.224.7:60930 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=170.9µs +peer0.org2.example.com | "2019-04-22 06:20:18.506 UTC [comm.grpc.server] 1 -> INFO 04d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.7:60902 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=2.5303407s +peer0.org2.example.com | "2019-04-22 06:20:18.512 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.498Z grpc.peer_address=192.168.224.7:60930 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.259ms +peer0.org2.example.com | "2019-04-22 06:20:18.577 UTC [comm.grpc.server] 1 -> INFO 04f unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.577Z grpc.peer_address=192.168.224.4:49264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=145.9µs +peer0.org2.example.com | "2019-04-22 06:20:18.594 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.579Z grpc.peer_address=192.168.224.4:49264 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.2766ms +peer0.org2.example.com | "2019-04-22 06:20:18.632 UTC [comm.grpc.server] 1 -> INFO 051 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.631Z grpc.peer_address=192.168.224.4:49268 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=141.3µs +peer0.org2.example.com | "2019-04-22 06:20:19.226 UTC [endorser] callChaincode -> INFO 052 [][8837409f] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:19.227 UTC [endorser] callChaincode -> INFO 053 [][8837409f] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:19.228 UTC [comm.grpc.server] 1 -> INFO 054 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34236 grpc.code=OK grpc.call_duration=2.5456ms +peer0.org2.example.com | "2019-04-22 06:20:19.743 UTC [gossip.channel] reportMembershipChanges -> INFO 055 Membership view has changed. peers went online: [[peer0.org1.example.com:7051 ]] , current view: [[peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:20:22.603 UTC [gossip.privdata] StoreBlock -> INFO 056 [businesschannel] Received block [3] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:22.607 UTC [committer.txvalidator] Validate -> INFO 057 [businesschannel] Validated block [3] in 3ms" +peer0.org2.example.com | "2019-04-22 06:20:22.620 UTC [confighistory] HandleStateUpdates -> ERRO 058 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00210c460)}" +peer0.org2.example.com | "2019-04-22 06:20:22.655 UTC [kvledger] CommitWithPvtData -> INFO 059 [businesschannel] Committed block [3] with 1 transaction(s) in 35ms (state_validation=9ms block_commit=16ms state_commit=6ms)" +peer0.org2.example.com | "2019-04-22 06:20:22.850 UTC [endorser] callChaincode -> INFO 05a [][3e79e4e9] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:22.851 UTC [endorser] callChaincode -> INFO 05b [][3e79e4e9] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org2.example.com | "2019-04-22 06:20:22.851 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34256 grpc.code=OK grpc.call_duration=2.6465ms +peer0.org2.example.com | "2019-04-22 06:20:23.060 UTC [endorser] callChaincode -> INFO 05d [][754a140f] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:20:23.062 UTC [endorser] callChaincode -> INFO 05e [][754a140f] Exit chaincode: name:"cscc" (2ms)" +peer0.org2.example.com | "2019-04-22 06:20:23.063 UTC [comm.grpc.server] 1 -> INFO 05f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34260 grpc.code=OK grpc.call_duration=3.872ms +peer0.org2.example.com | "2019-04-22 06:20:23.089 UTC [endorser] callChaincode -> INFO 060 [businesschannel][d2f85012] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:23.097 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 061 successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:23.098 UTC [endorser] callChaincode -> INFO 062 [businesschannel][d2f85012] Exit chaincode: name:"_lifecycle" (9ms)" +peer0.org2.example.com | "2019-04-22 06:20:23.106 UTC [comm.grpc.server] 1 -> INFO 063 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34260 grpc.code=OK grpc.call_duration=18.6144ms +peer0.org2.example.com | "2019-04-22 06:20:24.711 UTC [gossip.channel] reportMembershipChanges -> INFO 064 Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]]" +peer0.org2.example.com | "2019-04-22 06:20:25.088 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [4] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:25.092 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [4] in 3ms" +peer0.org2.example.com | "2019-04-22 06:20:25.094 UTC [confighistory] HandleStateUpdates -> ERRO 067 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc003075420)}" +peer0.org2.example.com | "2019-04-22 06:20:25.132 UTC [kvledger] CommitWithPvtData -> INFO 068 [businesschannel] Committed block [4] with 1 transaction(s) in 39ms (state_validation=0ms block_commit=20ms state_commit=12ms)" +peer0.org2.example.com | "2019-04-22 06:20:25.153 UTC [comm.grpc.server] 1 -> INFO 069 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:53.108Z grpc.peer_address=192.168.224.3:34262 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.082359s +peer0.org2.example.com | "2019-04-22 06:20:25.942 UTC [endorser] callChaincode -> INFO 06a [businesschannel][f2d1ac65] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:25.946 UTC [lifecycle] QueryApprovalStatus -> INFO 06b successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:25.946 UTC [endorser] callChaincode -> INFO 06c [businesschannel][f2d1ac65] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org2.example.com | "2019-04-22 06:20:25.947 UTC [comm.grpc.server] 1 -> INFO 06d unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34276 grpc.code=OK grpc.call_duration=5.821ms +peer0.org2.example.com | "2019-04-22 06:20:26.612 UTC [endorser] callChaincode -> INFO 06e [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:26.617 UTC [lifecycle] QueryApprovalStatus -> INFO 06f successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:26.619 UTC [lifecycle] CommitChaincodeDefinition -> INFO 070 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:26.620 UTC [endorser] callChaincode -> INFO 071 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (8ms)" +peer0.org2.example.com | "2019-04-22 06:20:26.621 UTC [comm.grpc.server] 1 -> INFO 072 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34288 grpc.code=OK grpc.call_duration=9.7708ms +peer0.org2.example.com | "2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 073 [businesschannel] Received block [5] from buffer" +peer0.org2.example.com | "2019-04-22 06:20:28.647 UTC [committer.txvalidator] Validate -> INFO 074 [businesschannel] Validated block [5] in 2ms" +peer0.org2.example.com | "2019-04-22 06:20:28.649 UTC [lifecycle] update -> INFO 075 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [lifecycle] update -> INFO 076 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [cceventmgmt] HandleStateUpdates -> INFO 077 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 078 Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org2.example.com | "2019-04-22 06:20:28.687 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 079 Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org2.example.com | "2019-04-22 06:20:28.721 UTC [kvledger] CommitWithPvtData -> INFO 07a [businesschannel] Committed block [5] with 1 transaction(s) in 73ms (state_validation=43ms block_commit=17ms state_commit=7ms)" +peer0.org2.example.com | "2019-04-22 06:20:28.753 UTC [comm.grpc.server] 1 -> INFO 07b streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:34290 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1285832s +peer0.org2.example.com | "2019-04-22 06:20:29.385 UTC [endorser] callChaincode -> INFO 07c [businesschannel][e2d69a25] Entry chaincode: name:"_lifecycle" " +peer0.org2.example.com | "2019-04-22 06:20:29.390 UTC [lifecycle] QueryChaincodeDefinition -> INFO 07d successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org2.example.com | "2019-04-22 06:20:29.390 UTC [endorser] callChaincode -> INFO 07e [businesschannel][e2d69a25] Exit chaincode: name:"_lifecycle" (5ms)" +peer0.org2.example.com | "2019-04-22 06:20:29.391 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34298 grpc.code=OK grpc.call_duration=6.738ms +peer0.org2.example.com | "2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 080 [businesschannel] Received block [6] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:07.536 UTC [committer.txvalidator] Validate -> INFO 081 [businesschannel] Validated block [6] in 8ms" +peer0.org2.example.com | "2019-04-22 06:21:07.576 UTC [kvledger] CommitWithPvtData -> INFO 082 [businesschannel] Committed block [6] with 1 transaction(s) in 38ms (state_validation=3ms block_commit=23ms state_commit=7ms)" +peer0.org2.example.com | "2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 083 [businesschannel] Received block [7] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:12.968 UTC [committer.txvalidator] Validate -> INFO 084 [businesschannel] Validated block [7] in 1ms" +peer0.org2.example.com | "2019-04-22 06:21:13.005 UTC [kvledger] CommitWithPvtData -> INFO 085 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +peer0.org2.example.com | "2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 086 [businesschannel] Received block [8] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:15.605 UTC [committer.txvalidator] Validate -> INFO 087 [businesschannel] Validated block [8] in 4ms" +peer0.org2.example.com | "2019-04-22 06:21:15.636 UTC [kvledger] CommitWithPvtData -> INFO 088 [businesschannel] Committed block [8] with 1 transaction(s) in 29ms (state_validation=4ms block_commit=20ms state_commit=2ms)" +peer0.org2.example.com | "2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 089 [businesschannel] Received block [9] from buffer" +peer0.org2.example.com | "2019-04-22 06:21:29.157 UTC [cauthdsl] deduplicate -> WARN 08a De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:21:29.163 UTC [cauthdsl] deduplicate -> WARN 08b De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org2.example.com | "2019-04-22 06:21:29.199 UTC [comm.grpc.server] 1 -> INFO 08c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.196Z grpc.peer_address=192.168.224.6:45332 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=219.7µs +peer0.org2.example.com | "2019-04-22 06:21:29.222 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.212Z grpc.peer_address=192.168.224.6:45332 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2039ms +peer0.org2.example.com | "2019-04-22 06:21:29.234 UTC [gossip.gossip] JoinChan -> INFO 08e Joining gossip network of channel businesschannel with 3 organizations" +peer0.org2.example.com | "2019-04-22 06:21:29.234 UTC [gossip.gossip] learnAnchorPeers -> INFO 08f No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org2.example.com | "2019-04-22 06:21:29.235 UTC [gossip.gossip] learnAnchorPeers -> INFO 090 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:21:29.235 UTC [gossip.gossip] learnAnchorPeers -> INFO 091 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org2.example.com | "2019-04-22 06:21:29.250 UTC [gossip.gossip] learnAnchorPeers -> INFO 092 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org2.example.com | "2019-04-22 06:21:29.279 UTC [comm.grpc.server] 1 -> INFO 093 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.277Z grpc.peer_address=192.168.224.7:32912 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=178.9µs +peer0.org2.example.com | "2019-04-22 06:21:29.299 UTC [committer.txvalidator] Validate -> INFO 094 [businesschannel] Validated block [9] in 164ms" +peer0.org2.example.com | "2019-04-22 06:21:29.307 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.306Z grpc.peer_address=192.168.224.4:49482 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=123.5µs +peer0.org2.example.com | "2019-04-22 06:21:29.316 UTC [comm.grpc.server] 1 -> INFO 096 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.29Z grpc.peer_address=192.168.224.7:32912 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=25.1056ms +peer0.org2.example.com | "2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 097 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:49268 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7703915s +peer0.org2.example.com | "2019-04-22 06:21:29.337 UTC [comm.grpc.server] 1 -> INFO 098 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.319Z grpc.peer_address=192.168.224.4:49482 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.7695ms +peer0.org2.example.com | "2019-04-22 06:21:29.340 UTC [comm.grpc.server] 1 -> INFO 099 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.339Z grpc.peer_address=192.168.224.7:32920 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=142.9µs +peer0.org2.example.com | "2019-04-22 06:21:29.355 UTC [kvledger] CommitWithPvtData -> INFO 09a [businesschannel] Committed block [9] with 1 transaction(s) in 53ms (state_validation=12ms block_commit=16ms state_commit=10ms)" +peer0.org2.example.com | "2019-04-22 06:21:29.381 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.38Z grpc.peer_address=192.168.224.6:45346 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=321.5µs +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [endorser] callChaincode -> INFO 09c [][627fba88] Entry chaincode: name:"cscc" " +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [endorser] callChaincode -> INFO 09d [][627fba88] Exit chaincode: name:"cscc" (0ms)" +peer0.org2.example.com | "2019-04-22 06:21:46.834 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34512 grpc.code=OK grpc.call_duration=1.4621ms +peer0.org2.example.com | "2019-04-22 06:21:47.716 UTC [endorser] callChaincode -> INFO 09f [][688e3212] Entry chaincode: name:"qscc" " +peer0.org2.example.com | "2019-04-22 06:21:47.718 UTC [endorser] callChaincode -> INFO 0a0 [][688e3212] Exit chaincode: name:"qscc" (1ms)" +peer0.org2.example.com | "2019-04-22 06:21:47.718 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:34522 grpc.code=OK grpc.call_duration=2.9946ms +peer0.org1.example.com | "2019-04-22 06:20:05.648 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.650 UTC [qscc] Init -> INFO 016 Init QSCC" +peer0.org1.example.com | "2019-04-22 06:20:05.651 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.652 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:20:05.652 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer0.org1.example.com | "2019-04-22 06:20:05.653 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:20:05.654 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +peer0.org1.example.com | "2019-04-22 06:20:06.572 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.571Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs +peer0.org1.example.com | "2019-04-22 06:20:06.583 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:16.575Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.5807ms +peer0.org1.example.com | "2019-04-22 06:20:06.588 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.587Z grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.3µs +peer0.org1.example.com | "2019-04-22 06:20:09.194 UTC [endorser] callChaincode -> INFO 021 [][d7a70671] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:09.201 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:20:09.205 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +peer0.org1.example.com | "2019-04-22 06:20:09.228 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:20:09.231 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:09.264 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer0.org1.example.com | "2019-04-22 06:20:09.266 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.266 UTC [cscc] Init -> INFO 02b Init CSCC" +peer0.org1.example.com | "2019-04-22 06:20:09.267 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.267 UTC [qscc] Init -> INFO 02d Init QSCC" +peer0.org1.example.com | "2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer0.org1.example.com | "2019-04-22 06:20:09.269 UTC [endorser] callChaincode -> INFO 030 [][d7a70671] Exit chaincode: name:"cscc" (74ms)" +peer0.org1.example.com | "2019-04-22 06:20:09.269 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55716 grpc.code=OK grpc.call_duration=76.3852ms +peer0.org1.example.com | "2019-04-22 06:20:10.473 UTC [endorser] callChaincode -> INFO 032 [][f9f9eb73] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:10.475 UTC [endorser] callChaincode -> INFO 033 [][f9f9eb73] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:10.475 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55724 grpc.code=OK grpc.call_duration=3.4108ms +peer0.org1.example.com | "2019-04-22 06:20:11.426 UTC [endorser] callChaincode -> INFO 035 [][dabe5c8d] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:20:11.429 UTC [endorser] callChaincode -> INFO 036 [][dabe5c8d] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:20:11.429 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55732 grpc.code=OK grpc.call_duration=3.4583ms +peer0.org1.example.com | "2019-04-22 06:20:14.243 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:04.231 UTC [nodeCmd] serve -> INFO 001 Starting peer: +peer1.org1.example.com | Version: 2.0.0 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.11.5 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger" +peer1.org1.example.com | "2019-04-22 06:20:04.264 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.4:7051" +peer1.org1.example.com | "2019-04-22 06:20:04.265 UTC [peer] getLocalAddress -> INFO 003 Returning peer1.org1.example.com:7051" +peer1.org1.example.com | "2019-04-22 06:20:04.280 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +peer0.org1.example.com | "2019-04-22 06:20:15.268 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +peer0.org1.example.com | "2019-04-22 06:20:15.268 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +peer0.org1.example.com | "2019-04-22 06:20:15.826 UTC [comm.grpc.server] 1 -> INFO 03b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.826Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.2µs +peer0.org1.example.com | "2019-04-22 06:20:15.840 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.828Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2234ms +peer0.org1.example.com | "2019-04-22 06:20:15.845 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.845Z grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=158.7µs +peer0.org1.example.com | "2019-04-22 06:20:15.869 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.868Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.4µs +peer0.org1.example.com | "2019-04-22 06:20:15.883 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.871Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8279ms +peer0.org1.example.com | "2019-04-22 06:20:15.900 UTC [comm.grpc.server] 1 -> INFO 040 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.9Z grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.9369ms +peer0.org1.example.com | "2019-04-22 06:20:15.916 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.914Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=949.4µs +peer0.org1.example.com | "2019-04-22 06:20:15.957 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.2288ms +peer0.org1.example.com | "2019-04-22 06:20:15.958 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.933Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=20.5323ms +peer0.org1.example.com | "2019-04-22 06:20:15.995 UTC [comm.grpc.server] 1 -> INFO 044 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.994Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=188µs +peer0.org1.example.com | "2019-04-22 06:20:16.014 UTC [comm.grpc.server] 1 -> INFO 045 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.998Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9576ms +peer0.org1.example.com | "2019-04-22 06:20:16.015 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.144ms +peer0.org1.example.com | "2019-04-22 06:20:17.640 UTC [endorser] callChaincode -> INFO 047 [][b0c8eda3] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:17.641 UTC [endorser] callChaincode -> INFO 048 [][b0c8eda3] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:17.642 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55776 grpc.code=OK grpc.call_duration=2.8919ms +peer0.org1.example.com | "2019-04-22 06:20:18.273 UTC [ConnProducer] NewConnection -> ERRO 04a Failed connecting to orderer1.example.com:7050 , error: context deadline exceeded" +peer0.org1.example.com | "2019-04-22 06:20:18.308 UTC [gossip.privdata] StoreBlock -> INFO 04b [businesschannel] Received block [1] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:18.351 UTC [gossip.gossip] JoinChan -> INFO 04c Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:18.352 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:20:18.366 UTC [committer.txvalidator] Validate -> INFO 050 [businesschannel] Validated block [1] in 58ms" +peer0.org1.example.com | "2019-04-22 06:20:18.401 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [1] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=24ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.402 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [2] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:18.432 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.431Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.7µs +peer0.org1.example.com | "2019-04-22 06:20:18.442 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.8527917s +peer0.org1.example.com | "2019-04-22 06:20:18.443 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.439Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.2399ms +peer0.org1.example.com | "2019-04-22 06:20:18.470 UTC [gossip.gossip] JoinChan -> INFO 056 Joining gossip network of channel businesschannel with 2 organizations" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 057 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:04.280 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +peer1.org1.example.com | "2019-04-22 06:20:04.372 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +peer1.org1.example.com | "2019-04-22 06:20:04.442 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +peer1.org1.example.com | "2019-04-22 06:20:04.442 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +peer1.org1.example.com | "2019-04-22 06:20:04.459 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +peer1.org1.example.com | "2019-04-22 06:20:04.487 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com" +peer1.org1.example.com | "2019-04-22 06:20:04.487 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer1.org1.example.com:7052" +peer1.org1.example.com | "2019-04-22 06:20:04.501 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.502 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +peer1.org1.example.com | "2019-04-22 06:20:04.522 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:04.526 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7, Metadata: " +peer1.org1.example.com | "2019-04-22 06:20:04.528 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer1.org1.example.com:7051 started" +peer1.org1.example.com | "2019-04-22 06:20:04.533 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.535 UTC [cscc] Init -> INFO 014 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:20:04.535 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.541 UTC [qscc] Init -> INFO 016 Init QSCC" +peer1.org1.example.com | "2019-04-22 06:20:04.541 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.544 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:20:04.544 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +peer1.org1.example.com | "2019-04-22 06:20:04.545 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:04.546 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051]" +peer1.org1.example.com | "2019-04-22 06:20:09.395 UTC [endorser] callChaincode -> INFO 01e [][03240af4] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:20:09.401 UTC [ledgermgmt] CreateLedger -> INFO 01f Creating ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:20:09.405 UTC [fsblkstorage] newBlockfileMgr -> INFO 020 Getting block information from block storage" +peer1.org1.example.com | "2019-04-22 06:20:09.433 UTC [kvledger] CommitWithPvtData -> INFO 021 [businesschannel] Committed block [0] with 1 transaction(s) in 19ms (state_validation=1ms block_commit=11ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:20:09.436 UTC [ledgermgmt] CreateLedger -> INFO 022 Created ledger [businesschannel] with genesis block" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] JoinChan -> INFO 023 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 024 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:09.445 UTC [gossip.gossip] learnAnchorPeers -> INFO 025 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:09.474 UTC [gossip.state] NewGossipStateProvider -> INFO 026 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +peer1.org1.example.com | "2019-04-22 06:20:09.476 UTC [sccapi] deploySysCC -> INFO 027 system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.476 UTC [cscc] Init -> INFO 028 Init CSCC" +peer1.org1.example.com | "2019-04-22 06:20:09.477 UTC [sccapi] deploySysCC -> INFO 029 system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.477 UTC [qscc] Init -> INFO 02a Init QSCC" +peer1.org1.example.com | "2019-04-22 06:20:09.478 UTC [sccapi] deploySysCC -> INFO 02b system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.478 UTC [sccapi] deploySysCC -> INFO 02c system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +peer1.org1.example.com | "2019-04-22 06:20:09.480 UTC [endorser] callChaincode -> INFO 02d [][03240af4] Exit chaincode: name:"cscc" (84ms)" +peer1.org1.example.com | "2019-04-22 06:20:09.480 UTC [comm.grpc.server] 1 -> INFO 02e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60416 grpc.code=OK grpc.call_duration=86.5435ms +peer1.org1.example.com | "2019-04-22 06:20:10.627 UTC [endorser] callChaincode -> INFO 02f [][78bc8b40] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:20:10.628 UTC [endorser] callChaincode -> INFO 030 [][78bc8b40] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 058 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 059 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:20:18.526 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [2] in 122ms" +peer0.org1.example.com | "2019-04-22 06:20:18.550 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [2] with 1 transaction(s) in 23ms (state_validation=1ms block_commit=14ms state_commit=5ms)" +peer0.org1.example.com | "2019-04-22 06:20:18.622 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.621Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=488.1µs +peer0.org1.example.com | "2019-04-22 06:20:18.638 UTC [comm.grpc.server] 1 -> INFO 05d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.629Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3762ms +peer0.org1.example.com | "2019-04-22 06:20:18.649 UTC [gossip.comm] func1 -> WARN 05e peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 05f Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 060 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer0.org1.example.com | "2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 061 Exiting" +peer0.org1.example.com | "2019-04-22 06:20:18.680 UTC [comm.grpc.server] 1 -> INFO 062 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.676Z grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.0373ms +peer0.org1.example.com | "2019-04-22 06:20:19.242 UTC [gossip.channel] reportMembershipChanges -> INFO 063 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-04-22 06:20:19.553 UTC [comm.grpc.server] 1 -> INFO 064 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:21.553Z grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.1µs +peer0.org1.example.com | "2019-04-22 06:20:20.374 UTC [endorser] callChaincode -> INFO 065 [][2457efbe] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:20.375 UTC [endorser] callChaincode -> INFO 066 [][2457efbe] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.376 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55808 grpc.code=OK grpc.call_duration=2.6513ms +peer0.org1.example.com | "2019-04-22 06:20:20.543 UTC [endorser] callChaincode -> INFO 068 [][1ba692c4] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:20:20.546 UTC [endorser] callChaincode -> INFO 069 [][1ba692c4] Exit chaincode: name:"cscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.546 UTC [comm.grpc.server] 1 -> INFO 06a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=3.7147ms +peer0.org1.example.com | "2019-04-22 06:20:20.568 UTC [endorser] callChaincode -> INFO 06b [businesschannel][8228dde0] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:20.571 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 06c successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:20.571 UTC [endorser] callChaincode -> INFO 06d [businesschannel][8228dde0] Exit chaincode: name:"_lifecycle" (4ms)" +peer0.org1.example.com | "2019-04-22 06:20:20.582 UTC [comm.grpc.server] 1 -> INFO 06e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=15.3831ms +peer0.org1.example.com | "2019-04-22 06:20:22.610 UTC [gossip.privdata] StoreBlock -> INFO 06f [businesschannel] Received block [3] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:22.658 UTC [committer.txvalidator] Validate -> INFO 070 [businesschannel] Validated block [3] in 47ms" +peer0.org1.example.com | "2019-04-22 06:20:22.672 UTC [confighistory] HandleStateUpdates -> ERRO 071 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0036bd060)}" +peer0.org1.example.com | "2019-04-22 06:20:22.687 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [3] with 1 transaction(s) in 19ms (state_validation=5ms block_commit=9ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:20:22.696 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:50.585Z grpc.peer_address=192.168.224.3:55814 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1106328s +peer0.org1.example.com | "2019-04-22 06:20:24.209 UTC [gossip.channel] reportMembershipChanges -> INFO 074 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +peer0.org1.example.com | "2019-04-22 06:20:25.090 UTC [gossip.privdata] StoreBlock -> INFO 075 [businesschannel] Received block [4] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:25.093 UTC [committer.txvalidator] Validate -> INFO 076 [businesschannel] Validated block [4] in 3ms" +peer0.org1.example.com | "2019-04-22 06:20:25.105 UTC [confighistory] HandleStateUpdates -> ERRO 077 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00380de60)}" +peer0.org1.example.com | "2019-04-22 06:20:25.130 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [4] with 1 transaction(s) in 35ms (state_validation=11ms block_commit=15ms state_commit=4ms)" +peer0.org1.example.com | "2019-04-22 06:20:25.752 UTC [endorser] callChaincode -> INFO 079 [businesschannel][c7a707e5] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:25.761 UTC [lifecycle] QueryApprovalStatus -> INFO 07a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:25.761 UTC [endorser] callChaincode -> INFO 07b [businesschannel][c7a707e5] Exit chaincode: name:"_lifecycle" (9ms)" +peer1.org1.example.com | "2019-04-22 06:20:10.628 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60424 grpc.code=OK grpc.call_duration=2.613ms +peer1.org1.example.com | "2019-04-22 06:20:11.564 UTC [endorser] callChaincode -> INFO 032 [][b64bc82f] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:20:11.566 UTC [endorser] callChaincode -> INFO 033 [][b64bc82f] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-04-22 06:20:11.566 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60432 grpc.code=OK grpc.call_duration=3.6799ms +peer1.org1.example.com | "2019-04-22 06:20:14.445 UTC [gossip.channel] reportMembershipChanges -> INFO 035 Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:15.285 UTC [gossip.election] leaderElection -> INFO 036 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:20:18.320 UTC [gossip.privdata] StoreBlock -> INFO 037 [businesschannel] Received block [1] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:18.396 UTC [gossip.gossip] JoinChan -> INFO 038 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:18.396 UTC [gossip.gossip] learnAnchorPeers -> INFO 039 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:20:18.397 UTC [gossip.gossip] learnAnchorPeers -> INFO 03a Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.397 UTC [gossip.service] updateEndpoints -> WARN 03b Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:20:18.445 UTC [gossip.comm] func1 -> WARN 03c peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:20:18.446 UTC [endorser] callChaincode -> INFO 03d [][e6a7328c] Entry chaincode: name:"_lifecycle" " +peer1.org1.example.com | "2019-04-22 06:20:18.447 UTC [gossip.discovery] expireDeadMembers -> WARN 03e Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:20:18.448 UTC [gossip.discovery] expireDeadMembers -> WARN 03f Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:20:18.448 UTC [gossip.discovery] expireDeadMembers -> WARN 040 Exiting" +peer1.org1.example.com | "2019-04-22 06:20:18.450 UTC [endorser] callChaincode -> INFO 041 [][e6a7328c] Exit chaincode: name:"_lifecycle" (4ms)" +peer1.org1.example.com | "2019-04-22 06:20:18.450 UTC [comm.grpc.server] 1 -> INFO 042 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60480 grpc.code=OK grpc.call_duration=4.8929ms +peer1.org1.example.com | "2019-04-22 06:20:18.475 UTC [committer.txvalidator] Validate -> INFO 043 [businesschannel] Validated block [1] in 155ms" +peer1.org1.example.com | "2019-04-22 06:20:18.540 UTC [kvledger] CommitWithPvtData -> INFO 044 [businesschannel] Committed block [1] with 1 transaction(s) in 61ms (state_validation=2ms block_commit=48ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:20:18.542 UTC [gossip.privdata] StoreBlock -> INFO 045 [businesschannel] Received block [2] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:18.568 UTC [gossip.gossip] JoinChan -> INFO 046 Joining gossip network of channel businesschannel with 2 organizations" +peer1.org1.example.com | "2019-04-22 06:20:18.569 UTC [gossip.gossip] learnAnchorPeers -> INFO 047 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.571 UTC [gossip.gossip] learnAnchorPeers -> INFO 048 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:20:18.571 UTC [gossip.service] updateEndpoints -> WARN 049 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:20:18.609 UTC [committer.txvalidator] Validate -> INFO 04a [businesschannel] Validated block [2] in 66ms" +peer1.org1.example.com | "2019-04-22 06:20:18.669 UTC [kvledger] CommitWithPvtData -> INFO 04b [businesschannel] Committed block [2] with 1 transaction(s) in 58ms (state_validation=5ms block_commit=24ms state_commit=18ms)" +peer1.org1.example.com | "2019-04-22 06:20:19.445 UTC [gossip.channel] reportMembershipChanges -> INFO 04c Membership view has changed. peers went offline: [[peer0.org1.example.com:7051]] , current view: []" +peer1.org1.example.com | "2019-04-22 06:20:22.628 UTC [gossip.privdata] StoreBlock -> INFO 04d [businesschannel] Received block [3] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:22.632 UTC [committer.txvalidator] Validate -> INFO 04e [businesschannel] Validated block [3] in 3ms" +peer1.org1.example.com | "2019-04-22 06:20:22.644 UTC [gossip.privdata] StoreBlock -> INFO 04f [businesschannel] Fetched all missing collection private write sets from remote peers for block [3] (10ms)" +peer1.org1.example.com | "2019-04-22 06:20:22.645 UTC [confighistory] HandleStateUpdates -> ERRO 050 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc002c42640)}" +peer1.org1.example.com | "2019-04-22 06:20:22.669 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [3] with 1 transaction(s) in 25ms (state_validation=1ms block_commit=13ms state_commit=6ms)" +peer1.org1.example.com | "2019-04-22 06:20:24.412 UTC [gossip.channel] reportMembershipChanges -> INFO 052 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051]]" +peer1.org1.example.com | "2019-04-22 06:20:24.530 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:26.53Z grpc.peer_address=192.168.224.6:58746 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=159µs +peer1.org1.example.com | "2019-04-22 06:20:25.107 UTC [gossip.privdata] StoreBlock -> INFO 054 [businesschannel] Received block [4] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:25.117 UTC [committer.txvalidator] Validate -> INFO 055 [businesschannel] Validated block [4] in 9ms" +peer1.org1.example.com | "2019-04-22 06:20:25.120 UTC [confighistory] HandleStateUpdates -> ERRO 056 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0030a3800)}" +peer1.org1.example.com | "2019-04-22 06:20:25.159 UTC [kvledger] CommitWithPvtData -> INFO 057 [businesschannel] Committed block [4] with 1 transaction(s) in 38ms (state_validation=0ms block_commit=18ms state_commit=14ms)" +peer1.org1.example.com | "2019-04-22 06:20:25.268 UTC [gossip.election] leaderElection -> INFO 058 a6a2130f828a906cf64ac96d5b7ce099a33e7d9fbcc54164d38a7ac9513262a7 : Some peer is already a leader" +peer1.org1.example.com | "2019-04-22 06:20:28.658 UTC [gossip.privdata] StoreBlock -> INFO 059 [businesschannel] Received block [5] from buffer" +peer1.org1.example.com | "2019-04-22 06:20:28.686 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [5] in 27ms" +peer1.org1.example.com | "2019-04-22 06:20:28.689 UTC [lifecycle] update -> INFO 05b Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:25.762 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55832 grpc.code=OK grpc.call_duration=10.6769ms +peer0.org1.example.com | "2019-04-22 06:20:26.400 UTC [endorser] callChaincode -> INFO 07d [][968d211d] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:26.401 UTC [endorser] callChaincode -> INFO 07e [][968d211d] Exit chaincode: name:"_lifecycle" (1ms)" +peer0.org1.example.com | "2019-04-22 06:20:26.401 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55842 grpc.code=OK grpc.call_duration=2.1624ms +peer0.org1.example.com | "2019-04-22 06:20:26.600 UTC [endorser] callChaincode -> INFO 080 [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:26.604 UTC [lifecycle] QueryApprovalStatus -> INFO 081 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:26.606 UTC [lifecycle] CommitChaincodeDefinition -> INFO 082 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:26.607 UTC [endorser] callChaincode -> INFO 083 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (7ms)" +peer0.org1.example.com | "2019-04-22 06:20:26.608 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55846 grpc.code=OK grpc.call_duration=9.3629ms +peer0.org1.example.com | "2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [5] from buffer" +peer0.org1.example.com | "2019-04-22 06:20:28.648 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [5] in 2ms" +peer0.org1.example.com | "2019-04-22 06:20:28.650 UTC [lifecycle] update -> INFO 087 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +peer0.org1.example.com | "2019-04-22 06:20:28.651 UTC [lifecycle] update -> INFO 088 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer0.org1.example.com | "2019-04-22 06:20:28.651 UTC [cceventmgmt] HandleStateUpdates -> INFO 089 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer0.org1.example.com | "2019-04-22 06:20:28.652 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 08a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer0.org1.example.com | "2019-04-22 06:20:28.652 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 08b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer0.org1.example.com | "2019-04-22 06:20:28.682 UTC [kvledger] CommitWithPvtData -> INFO 08c [businesschannel] Committed block [5] with 1 transaction(s) in 32ms (state_validation=8ms block_commit=12ms state_commit=3ms)" +peer0.org1.example.com | "2019-04-22 06:20:28.740 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:55848 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1146288s +peer0.org1.example.com | "2019-04-22 06:20:29.215 UTC [endorser] callChaincode -> INFO 08e [businesschannel][d82eabee] Entry chaincode: name:"_lifecycle" " +peer0.org1.example.com | "2019-04-22 06:20:29.230 UTC [lifecycle] QueryChaincodeDefinition -> INFO 08f successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +peer0.org1.example.com | "2019-04-22 06:20:29.233 UTC [endorser] callChaincode -> INFO 090 [businesschannel][d82eabee] Exit chaincode: name:"_lifecycle" (18ms)" +peer0.org1.example.com | "2019-04-22 06:20:29.235 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55856 grpc.code=OK grpc.call_duration=27.47ms +peer0.org1.example.com | "2019-04-22 06:20:29.934 UTC [endorser] callChaincode -> INFO 092 [businesschannel][32169d80] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:20:29.954 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 093 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +peer0.org1.example.com | "2019-04-22 06:21:05.510 UTC [endorser] callChaincode -> INFO 094 [businesschannel][32169d80] Exit chaincode: name:"exp02" (35610ms)" +peer0.org1.example.com | "2019-04-22 06:21:05.510 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55864 grpc.code=OK grpc.call_duration=35.6134186s +peer0.org1.example.com | "2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 096 [businesschannel] Received block [6] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:07.537 UTC [committer.txvalidator] Validate -> INFO 097 [businesschannel] Validated block [6] in 9ms" +peer0.org1.example.com | "2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 098 [businesschannel] Committed block [6] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=20ms state_commit=8ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.723 UTC [endorser] callChaincode -> INFO 099 [businesschannel][99e7611d] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:10.727 UTC [endorser] callChaincode -> INFO 09a [businesschannel][99e7611d] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.729 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55900 grpc.code=OK grpc.call_duration=7.6767ms +peer0.org1.example.com | "2019-04-22 06:21:10.941 UTC [endorser] callChaincode -> INFO 09c [businesschannel][967428f0] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:10.948 UTC [endorser] callChaincode -> INFO 09d [businesschannel][967428f0] Exit chaincode: name:"exp02" (7ms)" +peer0.org1.example.com | "2019-04-22 06:21:10.950 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55906 grpc.code=OK grpc.call_duration=11.4845ms +peer0.org1.example.com | "2019-04-22 06:21:11.190 UTC [endorser] callChaincode -> INFO 09f [businesschannel][f6ea81bf] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:11.193 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][f6ea81bf] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:11.194 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55912 grpc.code=OK grpc.call_duration=5.1112ms +peer0.org1.example.com | "2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 0a2 [businesschannel] Received block [7] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:12.973 UTC [committer.txvalidator] Validate -> INFO 0a3 [businesschannel] Validated block [7] in 5ms" +peer0.org1.example.com | "2019-04-22 06:21:13.010 UTC [kvledger] CommitWithPvtData -> INFO 0a4 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=24ms state_commit=2ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.373 UTC [endorser] callChaincode -> INFO 0a5 [businesschannel][2026f240] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.375 UTC [endorser] callChaincode -> INFO 0a6 [businesschannel][2026f240] Exit chaincode: name:"exp02" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.376 UTC [comm.grpc.server] 1 -> INFO 0a7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55916 grpc.code=OK grpc.call_duration=4.7757ms +peer0.org1.example.com | "2019-04-22 06:21:13.575 UTC [endorser] callChaincode -> INFO 0a8 [businesschannel][d0221f58] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.582 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][d0221f58] Exit chaincode: name:"exp02" (6ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.583 UTC [comm.grpc.server] 1 -> INFO 0aa unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55920 grpc.code=OK grpc.call_duration=9.5525ms +peer0.org1.example.com | "2019-04-22 06:21:13.813 UTC [endorser] callChaincode -> INFO 0ab [businesschannel][96c67ee2] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:13.817 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][96c67ee2] Exit chaincode: name:"exp02" (4ms)" +peer0.org1.example.com | "2019-04-22 06:21:13.818 UTC [comm.grpc.server] 1 -> INFO 0ad unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55926 grpc.code=OK grpc.call_duration=8.3056ms +peer0.org1.example.com | "2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 0ae [businesschannel] Received block [8] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:15.603 UTC [committer.txvalidator] Validate -> INFO 0af [businesschannel] Validated block [8] in 2ms" +peer0.org1.example.com | "2019-04-22 06:21:15.632 UTC [kvledger] CommitWithPvtData -> INFO 0b0 [businesschannel] Committed block [8] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.002 UTC [endorser] callChaincode -> INFO 0b1 [businesschannel][e59a9b97] Entry chaincode: name:"exp02" " +peer0.org1.example.com | "2019-04-22 06:21:16.005 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][e59a9b97] Exit chaincode: name:"exp02" (3ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.006 UTC [comm.grpc.server] 1 -> INFO 0b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55930 grpc.code=OK grpc.call_duration=5.1462ms +peer0.org1.example.com | "2019-04-22 06:21:16.534 UTC [endorser] callChaincode -> INFO 0b4 [businesschannel][96bad1cb] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:16.536 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][96bad1cb] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.536 UTC [comm.grpc.server] 1 -> INFO 0b6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55936 grpc.code=OK grpc.call_duration=2.768ms +peer0.org1.example.com | "2019-04-22 06:21:16.725 UTC [endorser] callChaincode -> INFO 0b7 [businesschannel][7962c131] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:16.727 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][7962c131] Exit chaincode: name:"qscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:16.727 UTC [comm.grpc.server] 1 -> INFO 0b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55940 grpc.code=OK grpc.call_duration=2.8224ms +peer0.org1.example.com | "2019-04-22 06:21:17.295 UTC [endorser] callChaincode -> INFO 0ba [businesschannel][4598da40] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.297 UTC [endorser] callChaincode -> INFO 0bb [businesschannel][4598da40] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.298 UTC [comm.grpc.server] 1 -> INFO 0bc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55948 grpc.code=OK grpc.call_duration=4.0243ms +peer0.org1.example.com | "2019-04-22 06:21:17.547 UTC [endorser] callChaincode -> INFO 0bd [businesschannel][0384b6f2] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.548 UTC [endorser] callChaincode -> INFO 0be [businesschannel][0384b6f2] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.549 UTC [comm.grpc.server] 1 -> INFO 0bf unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55952 grpc.code=OK grpc.call_duration=2.6047ms +peer0.org1.example.com | "2019-04-22 06:21:17.767 UTC [endorser] callChaincode -> INFO 0c0 [businesschannel][1f6e9f29] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:17.777 UTC [endorser] callChaincode -> INFO 0c1 [businesschannel][1f6e9f29] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:17.778 UTC [comm.grpc.server] 1 -> INFO 0c2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55956 grpc.code=OK grpc.call_duration=13.7744ms +peer0.org1.example.com | "2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 0c3 [businesschannel] Received block [9] from buffer" +peer0.org1.example.com | "2019-04-22 06:21:29.136 UTC [cauthdsl] deduplicate -> WARN 0c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:21:29.138 UTC [cauthdsl] deduplicate -> WARN 0c5 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] JoinChan -> INFO 0c6 Joining gossip network of channel businesschannel with 3 organizations" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c7 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c8 Anchor peer with same endpoint, skipping connecting to myself" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c9 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer0.org1.example.com | "2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0ca No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer0.org1.example.com | "2019-04-22 06:21:29.200 UTC [committer.txvalidator] Validate -> INFO 0cb [businesschannel] Validated block [9] in 66ms" +peer0.org1.example.com | "2019-04-22 06:21:29.220 UTC [comm.grpc.server] 1 -> INFO 0cc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.22Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.7µs +peer0.org1.example.com | "2019-04-22 06:21:29.240 UTC [comm.grpc.server] 1 -> INFO 0cd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.224Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.5775ms +peer0.org1.example.com | "2019-04-22 06:21:29.256 UTC [comm.grpc.server] 1 -> INFO 0ce unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.256Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.4µs +orderer0.example.com | 2019-04-22 06:20:01.935 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2019-04-22 06:20:02.024 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "" +orderer0.example.com | General.Cluster.ListenPort = 0 +orderer0.example.com | General.Cluster.ServerCertificate = "" +orderer0.example.com | General.Cluster.ServerPrivateKey = "" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2019-04-22 06:20:02.135 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +orderer0.example.com | "2019-04-22 06:20:02.148 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.commmon.multichannel] Initialize -> INFO 005 Starting system channel 'testchainid' with genesis block hash 5b624c739d1fc11be2f3412f11dda2aaba79612fe76f53357b77f21f65013cda and orderer type solo" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 006 Starting orderer: +orderer0.example.com | Version: 2.0.0 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.11.5 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 007 Beginning to serve requests" +orderer0.example.com | "2019-04-22 06:20:08.706 UTC [comm.grpc.server] 1 -> INFO 008 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33838 grpc.code=OK grpc.call_duration=37.7747ms +orderer0.example.com | "2019-04-22 06:20:08.714 UTC [fsblkstorage] newBlockfileMgr -> INFO 009 Getting block information from block storage" +orderer0.example.com | "2019-04-22 06:20:08.725 UTC [orderer.commmon.multichannel] newChain -> INFO 00a Created and starting new chain businesschannel" +orderer0.example.com | "2019-04-22 06:20:08.735 UTC [common.deliver] Handle -> WARN 00b Error reading from 192.168.224.3:33836: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:08.736 UTC [comm.grpc.server] 1 -> INFO 00c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.6362ms +orderer0.example.com | "2019-04-22 06:20:12.419 UTC [common.deliver] Handle -> WARN 00d Error reading from 192.168.224.3:33864: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:12.420 UTC [comm.grpc.server] 1 -> INFO 00e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33864 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.9713ms +orderer0.example.com | "2019-04-22 06:20:12.423 UTC [orderer.common.broadcast] Handle -> WARN 00f Error reading from 192.168.224.3:33866: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:12.424 UTC [comm.grpc.server] 1 -> INFO 010 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33866 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.119ms +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [lifecycle] update -> INFO 05c Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [cceventmgmt] HandleStateUpdates -> INFO 05d Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 05e Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +peer1.org1.example.com | "2019-04-22 06:20:28.690 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 05f Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +peer1.org1.example.com | "2019-04-22 06:20:28.728 UTC [kvledger] CommitWithPvtData -> INFO 060 [businesschannel] Committed block [5] with 1 transaction(s) in 40ms (state_validation=6ms block_commit=18ms state_commit=7ms)" +peer1.org1.example.com | "2019-04-22 06:20:29.413 UTC [gossip.channel] reportMembershipChanges -> INFO 061 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051 ] [peer0.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +peer1.org1.example.com | "2019-04-22 06:21:07.531 UTC [gossip.privdata] StoreBlock -> INFO 062 [businesschannel] Received block [6] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:07.534 UTC [committer.txvalidator] Validate -> INFO 063 [businesschannel] Validated block [6] in 1ms" +peer1.org1.example.com | "2019-04-22 06:21:07.570 UTC [kvledger] CommitWithPvtData -> INFO 064 [businesschannel] Committed block [6] with 1 transaction(s) in 35ms (state_validation=0ms block_commit=20ms state_commit=7ms)" +peer1.org1.example.com | "2019-04-22 06:21:13.014 UTC [gossip.privdata] StoreBlock -> INFO 065 [businesschannel] Received block [7] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:13.018 UTC [committer.txvalidator] Validate -> INFO 066 [businesschannel] Validated block [7] in 3ms" +peer1.org1.example.com | "2019-04-22 06:21:13.053 UTC [kvledger] CommitWithPvtData -> INFO 067 [businesschannel] Committed block [7] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=28ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:21:15.652 UTC [gossip.privdata] StoreBlock -> INFO 068 [businesschannel] Received block [8] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:15.656 UTC [committer.txvalidator] Validate -> INFO 069 [businesschannel] Validated block [8] in 2ms" +peer1.org1.example.com | "2019-04-22 06:21:15.675 UTC [kvledger] CommitWithPvtData -> INFO 06a [businesschannel] Committed block [8] with 1 transaction(s) in 17ms (state_validation=0ms block_commit=10ms state_commit=3ms)" +peer1.org1.example.com | "2019-04-22 06:21:29.139 UTC [gossip.privdata] StoreBlock -> INFO 06b [businesschannel] Received block [9] from buffer" +peer1.org1.example.com | "2019-04-22 06:21:29.153 UTC [cauthdsl] deduplicate -> WARN 06c De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:21:29.172 UTC [cauthdsl] deduplicate -> WARN 06d De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +peer1.org1.example.com | "2019-04-22 06:21:29.256 UTC [gossip.gossip] JoinChan -> INFO 06e Joining gossip network of channel businesschannel with 3 organizations" +peer1.org1.example.com | "2019-04-22 06:21:29.257 UTC [gossip.gossip] learnAnchorPeers -> INFO 06f Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:21:29.259 UTC [gossip.gossip] learnAnchorPeers -> INFO 070 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +peer1.org1.example.com | "2019-04-22 06:21:29.260 UTC [gossip.gossip] learnAnchorPeers -> INFO 071 No configured anchor peers of Org3MSP for channel businesschannel to learn about" +peer1.org1.example.com | "2019-04-22 06:21:29.260 UTC [gossip.service] updateEndpoints -> WARN 072 Failed to update ordering service endpoints, due to Channel with businesschannel id was not found" +peer1.org1.example.com | "2019-04-22 06:21:29.287 UTC [committer.txvalidator] Validate -> INFO 073 [businesschannel] Validated block [9] in 147ms" +peer1.org1.example.com | "2019-04-22 06:21:29.329 UTC [kvledger] CommitWithPvtData -> INFO 074 [businesschannel] Committed block [9] with 1 transaction(s) in 40ms (state_validation=15ms block_commit=17ms state_commit=4ms)" +peer1.org1.example.com | "2019-04-22 06:21:29.346 UTC [gossip.comm] func1 -> WARN 075 peer0.org1.example.com:7051, PKIid:c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:21:29.346 UTC [gossip.comm] func1 -> WARN 076 peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 077 Entering [c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d]" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 078 Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 079 Exiting" +peer1.org1.example.com | "2019-04-22 06:21:29.347 UTC [gossip.discovery] expireDeadMembers -> WARN 07a Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +peer1.org1.example.com | "2019-04-22 06:21:29.348 UTC [gossip.discovery] expireDeadMembers -> WARN 07b Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +peer1.org1.example.com | "2019-04-22 06:21:29.348 UTC [gossip.discovery] expireDeadMembers -> WARN 07c Exiting" +peer1.org1.example.com | "2019-04-22 06:21:29.404 UTC [comm.grpc.server] 1 -> INFO 07d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.404Z grpc.peer_address=192.168.224.5:46366 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=152.5µs +peer1.org1.example.com | "2019-04-22 06:21:29.412 UTC [comm.grpc.server] 1 -> INFO 07e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.411Z grpc.peer_address=192.168.224.7:40212 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=330.7µs +peer1.org1.example.com | "2019-04-22 06:21:46.690 UTC [endorser] callChaincode -> INFO 07f [][c7e2491b] Entry chaincode: name:"cscc" " +peer1.org1.example.com | "2019-04-22 06:21:46.692 UTC [endorser] callChaincode -> INFO 080 [][c7e2491b] Exit chaincode: name:"cscc" (1ms)" +peer1.org1.example.com | "2019-04-22 06:21:46.692 UTC [comm.grpc.server] 1 -> INFO 081 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60768 grpc.code=OK grpc.call_duration=2.2381ms +peer1.org1.example.com | "2019-04-22 06:21:47.581 UTC [endorser] callChaincode -> INFO 082 [][a06bf6dc] Entry chaincode: name:"qscc" " +peer1.org1.example.com | "2019-04-22 06:21:47.583 UTC [endorser] callChaincode -> INFO 083 [][a06bf6dc] Exit chaincode: name:"qscc" (2ms)" +peer1.org1.example.com | "2019-04-22 06:21:47.584 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:60780 grpc.code=OK grpc.call_duration=3.2818ms +peer0.org1.example.com | "2019-04-22 06:21:29.295 UTC [kvledger] CommitWithPvtData -> INFO 0cf [businesschannel] Committed block [9] with 1 transaction(s) in 94ms (state_validation=9ms block_commit=63ms state_commit=17ms)" +peer0.org1.example.com | "2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m9.8442242s +peer0.org1.example.com | "2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.272Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.8871ms +peer0.org1.example.com | "2019-04-22 06:21:29.306 UTC [comm.grpc.server] 1 -> INFO 0d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.305Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.4µs +peer0.org1.example.com | "2019-04-22 06:21:29.335 UTC [comm.grpc.server] 1 -> INFO 0d3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7535276s +peer0.org1.example.com | "2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 0d4 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.311Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.8218ms +peer0.org1.example.com | "2019-04-22 06:21:29.374 UTC [comm.grpc.server] 1 -> INFO 0d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.373Z grpc.peer_address=192.168.224.6:51284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=501.6µs +peer0.org1.example.com | "2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d6 [][264d8e67] Entry chaincode: name:"cscc" " +peer0.org1.example.com | "2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d7 [][264d8e67] Exit chaincode: name:"cscc" (1ms)" +peer0.org1.example.com | "2019-04-22 06:21:46.520 UTC [comm.grpc.server] 1 -> INFO 0d8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56068 grpc.code=OK grpc.call_duration=1.7062ms +peer0.org1.example.com | "2019-04-22 06:21:47.446 UTC [endorser] callChaincode -> INFO 0d9 [][19533012] Entry chaincode: name:"qscc" " +peer0.org1.example.com | "2019-04-22 06:21:47.448 UTC [endorser] callChaincode -> INFO 0da [][19533012] Exit chaincode: name:"qscc" (2ms)" +peer0.org1.example.com | "2019-04-22 06:21:47.448 UTC [comm.grpc.server] 1 -> INFO 0db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56080 grpc.code=OK grpc.call_duration=3.1853ms +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [orderer.common.broadcast] Handle -> WARN 011 Error reading from 192.168.224.3:33870: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [common.deliver] Handle -> WARN 013 Error reading from 192.168.224.3:33868: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 014 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33868 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9877ms +orderer0.example.com | "2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 012 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33870 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1068ms +orderer0.example.com | "2019-04-22 06:20:22.692 UTC [orderer.common.broadcast] Handle -> WARN 015 Error reading from 192.168.224.3:33940: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:22.692 UTC [comm.grpc.server] 1 -> INFO 016 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33940 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.125477s +orderer0.example.com | "2019-04-22 06:20:25.140 UTC [orderer.common.broadcast] Handle -> WARN 017 Error reading from 192.168.224.3:33950: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:25.140 UTC [comm.grpc.server] 1 -> INFO 018 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.0871074s +orderer0.example.com | "2019-04-22 06:20:28.738 UTC [orderer.common.broadcast] Handle -> WARN 019 Error reading from 192.168.224.3:33978: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:20:28.738 UTC [comm.grpc.server] 1 -> INFO 01a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1404733s +orderer0.example.com | "2019-04-22 06:21:05.524 UTC [orderer.common.broadcast] Handle -> WARN 01b Error reading from 192.168.224.3:33992: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:05.525 UTC [comm.grpc.server] 1 -> INFO 01c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.6297675s +orderer0.example.com | "2019-04-22 06:21:10.961 UTC [orderer.common.broadcast] Handle -> WARN 01d Error reading from 192.168.224.3:34034: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:10.961 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34034 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0365ms +orderer0.example.com | "2019-04-22 06:21:13.590 UTC [orderer.common.broadcast] Handle -> WARN 01f Error reading from 192.168.224.3:34048: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:13.591 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34048 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.775ms +orderer0.example.com | "2019-04-22 06:21:18.233 UTC [common.deliver] Handle -> WARN 021 Error reading from 192.168.224.3:34084: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.233 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.831ms +orderer0.example.com | "2019-04-22 06:21:18.487 UTC [common.deliver] Handle -> WARN 023 Error reading from 192.168.224.3:34086: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.487 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6038ms +orderer0.example.com | "2019-04-22 06:21:18.662 UTC [common.deliver] Handle -> WARN 025 Error reading from 192.168.224.3:34088: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.662 UTC [comm.grpc.server] 1 -> INFO 026 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9215ms +orderer0.example.com | "2019-04-22 06:21:18.842 UTC [common.deliver] Handle -> WARN 027 Error reading from 192.168.224.3:34090: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:18.844 UTC [comm.grpc.server] 1 -> INFO 028 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34090 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0676ms +orderer0.example.com | "2019-04-22 06:21:19.024 UTC [common.deliver] Handle -> WARN 029 Error reading from 192.168.224.3:34092: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.024 UTC [comm.grpc.server] 1 -> INFO 02a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34092 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6537ms +orderer0.example.com | "2019-04-22 06:21:19.214 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.3:34094: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.214 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34094 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3594ms +orderer0.example.com | "2019-04-22 06:21:19.412 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.3:34096: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.412 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34096 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3394ms +orderer0.example.com | "2019-04-22 06:21:19.621 UTC [common.deliver] Handle -> WARN 02f Error reading from 192.168.224.3:34098: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.621 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34098 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.243ms +orderer0.example.com | "2019-04-22 06:21:19.815 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.3:34100: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:19.816 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34100 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0868ms +orderer0.example.com | "2019-04-22 06:21:20.032 UTC [common.deliver] Handle -> WARN 033 Error reading from 192.168.224.3:34102: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.037 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34102 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8613ms +orderer0.example.com | "2019-04-22 06:21:20.227 UTC [common.deliver] Handle -> WARN 035 Error reading from 192.168.224.3:34104: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.227 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34104 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3969ms +orderer0.example.com | "2019-04-22 06:21:20.413 UTC [common.deliver] Handle -> WARN 037 Error reading from 192.168.224.3:34106: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.414 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34106 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.4072ms +orderer0.example.com | "2019-04-22 06:21:20.619 UTC [common.deliver] Handle -> WARN 039 Error reading from 192.168.224.3:34108: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.619 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34108 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.493ms +orderer0.example.com | "2019-04-22 06:21:20.786 UTC [common.deliver] Handle -> WARN 03b Error reading from 192.168.224.3:34110: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.787 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34110 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.553ms +orderer0.example.com | "2019-04-22 06:21:20.964 UTC [common.deliver] Handle -> WARN 03d Error reading from 192.168.224.3:34112: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:20.969 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3481ms +orderer0.example.com | "2019-04-22 06:21:29.079 UTC [cauthdsl] deduplicate -> WARN 03f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.081 UTC [cauthdsl] deduplicate -> WARN 040 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.105 UTC [cauthdsl] deduplicate -> WARN 041 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.107 UTC [cauthdsl] deduplicate -> WARN 042 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +orderer0.example.com | "2019-04-22 06:21:29.108 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.3:34118: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:29.108 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4341ms +orderer0.example.com | "2019-04-22 06:21:29.110 UTC [orderer.common.broadcast] Handle -> WARN 045 Error reading from 192.168.224.3:34120: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:29.110 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9849ms +orderer0.example.com | "2019-04-22 06:21:31.255 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.3:34146: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.256 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.6908ms +orderer0.example.com | "2019-04-22 06:21:31.428 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.3:34148: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.429 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0852ms +orderer0.example.com | "2019-04-22 06:21:31.977 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.3:34152: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:31.978 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34152 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3668ms +orderer0.example.com | "2019-04-22 06:21:32.170 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.3:34156: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.170 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34156 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.3639ms +orderer0.example.com | "2019-04-22 06:21:32.348 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.3:34158: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.348 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2183ms +orderer0.example.com | "2019-04-22 06:21:32.542 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.3:34160: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.542 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34160 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.006ms +orderer0.example.com | "2019-04-22 06:21:32.763 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.3:34162: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.763 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34162 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.7006ms +orderer0.example.com | "2019-04-22 06:21:32.983 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.3:34164: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:32.983 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34164 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3717ms +orderer0.example.com | "2019-04-22 06:21:33.188 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.3:34166: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34166 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6536ms +orderer0.example.com | "2019-04-22 06:21:33.395 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.3:34168: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.395 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34168 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.7137ms +orderer0.example.com | "2019-04-22 06:21:33.579 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.3:34170: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.579 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34170 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2506ms +orderer0.example.com | "2019-04-22 06:21:33.793 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.3:34172: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.793 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.1524ms +orderer0.example.com | "2019-04-22 06:21:33.990 UTC [common.deliver] Handle -> WARN 05f Error reading from 192.168.224.3:34174: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:33.990 UTC [comm.grpc.server] 1 -> INFO 060 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34174 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.721ms +orderer0.example.com | "2019-04-22 06:21:34.184 UTC [common.deliver] Handle -> WARN 061 Error reading from 192.168.224.3:34176: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.184 UTC [comm.grpc.server] 1 -> INFO 062 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0644ms +orderer0.example.com | "2019-04-22 06:21:34.379 UTC [common.deliver] Handle -> WARN 063 Error reading from 192.168.224.3:34178: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.379 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5151ms +orderer0.example.com | "2019-04-22 06:21:34.611 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.3:34180: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.612 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5181ms +orderer0.example.com | "2019-04-22 06:21:34.768 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.3:34182: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.768 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.3984ms +orderer0.example.com | "2019-04-22 06:21:34.960 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.3:34184: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2019-04-22 06:21:34.961 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2266ms diff --git a/hyperledger_fabric/v1.4.3/solo/logs/dev_orderer.log b/hyperledger_fabric/v1.4.3/solo/logs/dev_orderer.log new file mode 100644 index 00000000..17ee0c28 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/logs/dev_orderer.log @@ -0,0 +1,197 @@ +2019-04-22 06:20:01.935 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +"2019-04-22 06:20:02.024 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "" + General.Cluster.ListenPort = 0 + General.Cluster.ServerCertificate = "" + General.Cluster.ServerPrivateKey = "" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2019-04-22 06:20:02.135 UTC [orderer.common.server] initializeServerConfig -> INFO 003 Starting orderer with TLS enabled" +"2019-04-22 06:20:02.148 UTC [fsblkstorage] newBlockfileMgr -> INFO 004 Getting block information from block storage" +"2019-04-22 06:20:02.234 UTC [orderer.commmon.multichannel] Initialize -> INFO 005 Starting system channel 'testchainid' with genesis block hash 5b624c739d1fc11be2f3412f11dda2aaba79612fe76f53357b77f21f65013cda and orderer type solo" +"2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 006 Starting orderer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64" +"2019-04-22 06:20:02.234 UTC [orderer.common.server] Start -> INFO 007 Beginning to serve requests" +"2019-04-22 06:20:08.706 UTC [comm.grpc.server] 1 -> INFO 008 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33838 grpc.code=OK grpc.call_duration=37.7747ms +"2019-04-22 06:20:08.714 UTC [fsblkstorage] newBlockfileMgr -> INFO 009 Getting block information from block storage" +"2019-04-22 06:20:08.725 UTC [orderer.commmon.multichannel] newChain -> INFO 00a Created and starting new chain businesschannel" +"2019-04-22 06:20:08.735 UTC [common.deliver] Handle -> WARN 00b Error reading from 192.168.224.3:33836: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:08.736 UTC [comm.grpc.server] 1 -> INFO 00c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33836 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=79.6362ms +"2019-04-22 06:20:12.419 UTC [common.deliver] Handle -> WARN 00d Error reading from 192.168.224.3:33864: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:12.420 UTC [comm.grpc.server] 1 -> INFO 00e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33864 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.9713ms +"2019-04-22 06:20:12.423 UTC [orderer.common.broadcast] Handle -> WARN 00f Error reading from 192.168.224.3:33866: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:12.424 UTC [comm.grpc.server] 1 -> INFO 010 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33866 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=40.119ms +"2019-04-22 06:20:14.591 UTC [orderer.common.broadcast] Handle -> WARN 011 Error reading from 192.168.224.3:33870: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:14.591 UTC [common.deliver] Handle -> WARN 013 Error reading from 192.168.224.3:33868: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 014 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:33868 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=34.9877ms +"2019-04-22 06:20:14.591 UTC [comm.grpc.server] 1 -> INFO 012 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33870 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=24.1068ms +"2019-04-22 06:20:22.692 UTC [orderer.common.broadcast] Handle -> WARN 015 Error reading from 192.168.224.3:33940: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:22.692 UTC [comm.grpc.server] 1 -> INFO 016 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33940 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.125477s +"2019-04-22 06:20:25.140 UTC [orderer.common.broadcast] Handle -> WARN 017 Error reading from 192.168.224.3:33950: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:25.140 UTC [comm.grpc.server] 1 -> INFO 018 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.0871074s +"2019-04-22 06:20:28.738 UTC [orderer.common.broadcast] Handle -> WARN 019 Error reading from 192.168.224.3:33978: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:20:28.738 UTC [comm.grpc.server] 1 -> INFO 01a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33978 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=2.1404733s +"2019-04-22 06:21:05.524 UTC [orderer.common.broadcast] Handle -> WARN 01b Error reading from 192.168.224.3:33992: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:05.525 UTC [comm.grpc.server] 1 -> INFO 01c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:33992 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.6297675s +"2019-04-22 06:21:10.961 UTC [orderer.common.broadcast] Handle -> WARN 01d Error reading from 192.168.224.3:34034: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:10.961 UTC [comm.grpc.server] 1 -> INFO 01e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34034 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.0365ms +"2019-04-22 06:21:13.590 UTC [orderer.common.broadcast] Handle -> WARN 01f Error reading from 192.168.224.3:34048: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:13.591 UTC [comm.grpc.server] 1 -> INFO 020 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34048 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=18.775ms +"2019-04-22 06:21:18.233 UTC [common.deliver] Handle -> WARN 021 Error reading from 192.168.224.3:34084: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.233 UTC [comm.grpc.server] 1 -> INFO 022 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34084 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.831ms +"2019-04-22 06:21:18.487 UTC [common.deliver] Handle -> WARN 023 Error reading from 192.168.224.3:34086: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.487 UTC [comm.grpc.server] 1 -> INFO 024 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34086 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.6038ms +"2019-04-22 06:21:18.662 UTC [common.deliver] Handle -> WARN 025 Error reading from 192.168.224.3:34088: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.662 UTC [comm.grpc.server] 1 -> INFO 026 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34088 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.9215ms +"2019-04-22 06:21:18.842 UTC [common.deliver] Handle -> WARN 027 Error reading from 192.168.224.3:34090: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:18.844 UTC [comm.grpc.server] 1 -> INFO 028 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34090 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.0676ms +"2019-04-22 06:21:19.024 UTC [common.deliver] Handle -> WARN 029 Error reading from 192.168.224.3:34092: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.024 UTC [comm.grpc.server] 1 -> INFO 02a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34092 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.6537ms +"2019-04-22 06:21:19.214 UTC [common.deliver] Handle -> WARN 02b Error reading from 192.168.224.3:34094: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.214 UTC [comm.grpc.server] 1 -> INFO 02c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34094 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3594ms +"2019-04-22 06:21:19.412 UTC [common.deliver] Handle -> WARN 02d Error reading from 192.168.224.3:34096: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.412 UTC [comm.grpc.server] 1 -> INFO 02e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34096 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3394ms +"2019-04-22 06:21:19.621 UTC [common.deliver] Handle -> WARN 02f Error reading from 192.168.224.3:34098: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.621 UTC [comm.grpc.server] 1 -> INFO 030 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34098 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.243ms +"2019-04-22 06:21:19.815 UTC [common.deliver] Handle -> WARN 031 Error reading from 192.168.224.3:34100: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:19.816 UTC [comm.grpc.server] 1 -> INFO 032 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34100 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0868ms +"2019-04-22 06:21:20.032 UTC [common.deliver] Handle -> WARN 033 Error reading from 192.168.224.3:34102: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.037 UTC [comm.grpc.server] 1 -> INFO 034 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34102 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8613ms +"2019-04-22 06:21:20.227 UTC [common.deliver] Handle -> WARN 035 Error reading from 192.168.224.3:34104: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.227 UTC [comm.grpc.server] 1 -> INFO 036 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34104 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3969ms +"2019-04-22 06:21:20.413 UTC [common.deliver] Handle -> WARN 037 Error reading from 192.168.224.3:34106: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.414 UTC [comm.grpc.server] 1 -> INFO 038 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34106 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=6.4072ms +"2019-04-22 06:21:20.619 UTC [common.deliver] Handle -> WARN 039 Error reading from 192.168.224.3:34108: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.619 UTC [comm.grpc.server] 1 -> INFO 03a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34108 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.493ms +"2019-04-22 06:21:20.786 UTC [common.deliver] Handle -> WARN 03b Error reading from 192.168.224.3:34110: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.787 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34110 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.553ms +"2019-04-22 06:21:20.964 UTC [common.deliver] Handle -> WARN 03d Error reading from 192.168.224.3:34112: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:20.969 UTC [comm.grpc.server] 1 -> INFO 03e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34112 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=13.3481ms +"2019-04-22 06:21:29.079 UTC [cauthdsl] deduplicate -> WARN 03f De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.081 UTC [cauthdsl] deduplicate -> WARN 040 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.105 UTC [cauthdsl] deduplicate -> WARN 041 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.107 UTC [cauthdsl] deduplicate -> WARN 042 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.108 UTC [common.deliver] Handle -> WARN 043 Error reading from 192.168.224.3:34118: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:29.108 UTC [comm.grpc.server] 1 -> INFO 044 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34118 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=43.4341ms +"2019-04-22 06:21:29.110 UTC [orderer.common.broadcast] Handle -> WARN 045 Error reading from 192.168.224.3:34120: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:29.110 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=192.168.224.3:34120 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.9849ms +"2019-04-22 06:21:31.255 UTC [common.deliver] Handle -> WARN 047 Error reading from 192.168.224.3:34146: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.256 UTC [comm.grpc.server] 1 -> INFO 048 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34146 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.6908ms +"2019-04-22 06:21:31.428 UTC [common.deliver] Handle -> WARN 049 Error reading from 192.168.224.3:34148: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.429 UTC [comm.grpc.server] 1 -> INFO 04a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34148 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0852ms +"2019-04-22 06:21:31.977 UTC [common.deliver] Handle -> WARN 04b Error reading from 192.168.224.3:34152: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:31.978 UTC [comm.grpc.server] 1 -> INFO 04c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34152 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.3668ms +"2019-04-22 06:21:32.170 UTC [common.deliver] Handle -> WARN 04d Error reading from 192.168.224.3:34156: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.170 UTC [comm.grpc.server] 1 -> INFO 04e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34156 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.3639ms +"2019-04-22 06:21:32.348 UTC [common.deliver] Handle -> WARN 04f Error reading from 192.168.224.3:34158: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.348 UTC [comm.grpc.server] 1 -> INFO 050 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34158 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2183ms +"2019-04-22 06:21:32.542 UTC [common.deliver] Handle -> WARN 051 Error reading from 192.168.224.3:34160: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.542 UTC [comm.grpc.server] 1 -> INFO 052 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34160 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.006ms +"2019-04-22 06:21:32.763 UTC [common.deliver] Handle -> WARN 053 Error reading from 192.168.224.3:34162: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.763 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34162 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.7006ms +"2019-04-22 06:21:32.983 UTC [common.deliver] Handle -> WARN 055 Error reading from 192.168.224.3:34164: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:32.983 UTC [comm.grpc.server] 1 -> INFO 056 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34164 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.3717ms +"2019-04-22 06:21:33.188 UTC [common.deliver] Handle -> WARN 057 Error reading from 192.168.224.3:34166: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.188 UTC [comm.grpc.server] 1 -> INFO 058 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34166 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.6536ms +"2019-04-22 06:21:33.395 UTC [common.deliver] Handle -> WARN 059 Error reading from 192.168.224.3:34168: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.395 UTC [comm.grpc.server] 1 -> INFO 05a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34168 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.7137ms +"2019-04-22 06:21:33.579 UTC [common.deliver] Handle -> WARN 05b Error reading from 192.168.224.3:34170: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.579 UTC [comm.grpc.server] 1 -> INFO 05c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34170 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.2506ms +"2019-04-22 06:21:33.793 UTC [common.deliver] Handle -> WARN 05d Error reading from 192.168.224.3:34172: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.793 UTC [comm.grpc.server] 1 -> INFO 05e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34172 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=10.1524ms +"2019-04-22 06:21:33.990 UTC [common.deliver] Handle -> WARN 05f Error reading from 192.168.224.3:34174: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:33.990 UTC [comm.grpc.server] 1 -> INFO 060 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34174 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.721ms +"2019-04-22 06:21:34.184 UTC [common.deliver] Handle -> WARN 061 Error reading from 192.168.224.3:34176: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.184 UTC [comm.grpc.server] 1 -> INFO 062 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34176 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.0644ms +"2019-04-22 06:21:34.379 UTC [common.deliver] Handle -> WARN 063 Error reading from 192.168.224.3:34178: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.379 UTC [comm.grpc.server] 1 -> INFO 064 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34178 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=9.5151ms +"2019-04-22 06:21:34.611 UTC [common.deliver] Handle -> WARN 065 Error reading from 192.168.224.3:34180: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.612 UTC [comm.grpc.server] 1 -> INFO 066 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34180 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.5181ms +"2019-04-22 06:21:34.768 UTC [common.deliver] Handle -> WARN 067 Error reading from 192.168.224.3:34182: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.768 UTC [comm.grpc.server] 1 -> INFO 068 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34182 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.3984ms +"2019-04-22 06:21:34.960 UTC [common.deliver] Handle -> WARN 069 Error reading from 192.168.224.3:34184: rpc error: code = Canceled desc = context canceled" +"2019-04-22 06:21:34.961 UTC [comm.grpc.server] 1 -> INFO 06a streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=192.168.224.3:34184 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2266ms diff --git a/hyperledger_fabric/v1.4.3/solo/logs/dev_peer.log b/hyperledger_fabric/v1.4.3/solo/logs/dev_peer.log new file mode 100644 index 00000000..ebea8ab8 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/logs/dev_peer.log @@ -0,0 +1,2305 @@ +[001 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer: + Version: 1.0.4 + Go version: go1.9.2 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.3.2 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger + +[002 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize -> INFO Initializing ledger mgmt +[003 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> INFO Initializing ledger provider +[004 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[005 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[006 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.openIDStore.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[007 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[008 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[009 12-05 07:29:40.50 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[00a 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> DEBU Constructing leveldb VersionedDBProvider +[00b 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[00c 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[00d 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[00e 12-05 07:29:40.51 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewVersionedDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[00f 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[010 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[011 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[012 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/common/ledger/util] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.NewHistoryDBProvider.NewProvider.Open.CreateDirIfMissing.logDirStatus -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[013 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider -> INFO ledger provider Initialized +[014 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.recoverUnderConstructionLedger -> DEBU Recovering under construction ledger +[015 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize.NewProvider.recoverUnderConstructionLedger -> DEBU No under construction ledger found. Quitting recovery +[016 12-05 07:29:40.52 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] main.Execute.ExecuteC.execute.func1.serve.Initialize.Do.func1.initialize -> INFO ledger mgmt initialized +[017 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer with TLS enabled +[018 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering BLOCK +[019 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering CHAINCODE +[01a 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering REJECTION +[01b 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] main.Execute.ExecuteC.execute.func1.serve.createEventHubServer.NewEventsServer.initializeEvents.addInternalEventTypes.AddEventType -> DEBU Registering REGISTER +[01c 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/events/producer] -> INFO Event processor started +[01d 12-05 07:29:40.53 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport -> DEBU Chaincode startup timeout value set to 5m0s +[01e 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> INFO Chaincode support using peerAddress: peer0.org1.example.com:7052 +[01f 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> DEBU Turn off keepalive(value 0) +[020 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport -> DEBU Setting execute timeout value to 30s +[021 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport.getLogLevelFromViper -> DEBU CORE_CHAINCODE_LEVEL set to level info +[022 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.NewChaincodeSupport.getLogLevelFromViper -> DEBU CORE_CHAINCODE_SHIM set to level warning +[023 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[024 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[025 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode escc(github.com/hyperledger/fabric/core/scc/escc) registered +[026 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode vscc(github.com/hyperledger/fabric/core/scc/vscc) registered +[027 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.registerChaincodeSupport.RegisterSysCCs.RegisterSysCC -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/chaincode/qscc) registered +[028 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> DEBU Running peer +[029 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.NewEndorserServer.GetLocalMSP -> DEBU Returning existing local MSP +[02a 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.GetLocalSigningIdentityOrPanic.GetLocalMSP -> DEBU Returning existing local MSP +[02b 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.GetLocalSigningIdentityOrPanic.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[02c 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/gossip/service] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1 -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[02d 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[02e 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity -> INFO Obtaining identity +[02f 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[030 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.GetLocalMSPIdentifier.GetLocalMSP -> DEBU Returning existing local MSP +[031 12-05 07:29:40.54 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewIdentityMapper.Put.ValidateIdentity.getValidatedIdentity.Validate.Validate -> DEBU MSP Org1MSP validating identity +[032 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[033 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.DeserializeIdentity -> INFO Obtaining identity +[034 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.OrgByPeerIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[035 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/discovery] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.NewDiscoveryService -> INFO Started {peer0.org1.example.com:7051 [] [87 254 40 172 224 130 233 118 32 0 101 135 155 98 10 13 107 42 197 18 142 226 92 151 20 251 18 179 182 138 173 181] peer0.org1.example.com:7051} incTime is 1512458980556593600 +[036 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/gossip] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService -> INFO Creating gossip service with self membership of {peer0.org1.example.com:7051 [] [87 254 40 172 224 130 233 118 32 0 101 135 155 98 10 13 107 42 197 18 142 226 92 151 20 251 18 179 182 138 173 181] peer0.org1.example.com:7051} +[037 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.GetLocalDeserializer.GetLocalMSP -> DEBU Returning existing local MSP +[038 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity -> INFO Obtaining identity +[039 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.DeserializeIdentity.deserializeIdentityInternal.newIdentity -> DEBU Creating identity instance for ID -----BEGIN CERTIFICATE----- +MIICGTCCAb+gAwIBAgIQJgBYBKOHst//mfTjpUw1gzAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MTlaFw0yNzExMjkxMzU3MTla +MFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcxLmV4YW1wbGUuY29tMFkw +EwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE2iZEUIvLgKANslGKRrDsQ67PZuvMBlD4 +s0XhzjlArKmtSEGzhr1O43IKz4TR8B3viyT0jO6L1RVDUgtdCsH5AaNNMEswDgYD +VR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgejjZ4+nTXyF3 +xi1tKI3DL8VylH+vPkEFOLmgRS6hq/gwCgYIKoZIzj0EAwIDSAAwRQIhAPICTsf5 +Yr2bvGRg2G85IveggOvKM6+3IyhjSP4E3xH2AiBW4QjCDtZlYyGK5vilFR7hzeZV +ibHlRV1ViFqHbzF3ww== +-----END CERTIFICATE----- +[03a 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.GetLocalMSPIdentifier.GetLocalMSP -> DEBU Returning existing local MSP +[03b 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.Put.ValidateIdentity.getValidatedIdentity.Validate.Validate -> DEBU MSP Org1MSP validating identity +[03c 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp/mgmt] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[03d 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[03e 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/gossip/discovery] -> DEBU Sleeping 5s +[03f 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.Sign -> DEBU Sign: plaintext: 1801AA01B1060A2057FE28ACE082E976...0A2D2D2D2D2D454E44202D2D2D2D2D0A +[040 12-05 07:29:40.55 UTC] [github.com/hyperledger/fabric/msp] main.Execute.ExecuteC.execute.func1.serve.InitGossipService.InitGossipServiceCustomDeliveryFactory.Do.func1.NewGossipComponent.NewGossipService.newCertStore.createIdentityMessage.Sign.func1.Sign.Sign.Sign.Sign -> DEBU Sign: digest: FAB80B0E7011C864E8AD9AED2F6711087CF755E09B33858AA16743A6B6442CDF +[041 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=cscc,version=1.0.4,txid=ebf1e200-7fdf-49de-8d99-8efdac6862f1,syscc=true,proposal=0x0,canname=cscc:1.0.4 +[042 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode cscc:1.0.4 is being launched +[043 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[044 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[045 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: cscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[046 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[047 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=cscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[048 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(cscc-1.0.4) lock +[049 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (cscc-1.0.4) lock +[04a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for cscc-1.0.4 +[04b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(cscc-1.0.4) +[04c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/gossip] -> INFO Gossip instance peer0.org1.example.com:7051 started +[04d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/discovery] Connect -> DEBU Skipping connecting to myself +[04e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for cscc-1.0.4 +[04f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[050 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[051 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/gossip] -> DEBU Entering discovery sync with interval 4s +[052 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[053 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[054 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.Sign -> DEBU Sign: plaintext: 18012ADE060A3F0A1B70656572302E6F...0A2D2D2D2D2D454E44202D2D2D2D2D0A +[055 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.Sign.func1.Sign.Sign.Sign -> DEBU Sign: digest: 8732BB4A5DD65C55142FBAE459418DF480931486636FB5A8FFC9613084545D9B +[056 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.GetLocalMSP -> DEBU Returning existing local MSP +[057 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.GetDefaultSigningIdentity -> DEBU Obtaining default signing identity +[058 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.Sign -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[059 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp] InitiateSync.createMembershipRequest.createAliveMessage.SignMessage.SignSecret.func1.Sign.Sign.Sign -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[05a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for cscc-1.0.4 +[05b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[05c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=cscc:1.0.4 +[05d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[05e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[05f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[060 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[061 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode cscc:1.0.4 +[062 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.0.4" , sending back REGISTERED +[063 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[064 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[065 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[066 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[067 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode cscc:1.0.4 launch seq completed +[068 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[069 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[06a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Move state message READY +[06b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: READY in state established +[06c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [ebf1e200]Entered state ready +[06d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:ebf1e200-7fdf-49de-8d99-8efdac6862f1 +[06e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]sending state message READY +[06f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Received message READY from shim +[070 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: READY(state:established) +[071 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[072 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[073 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[074 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[075 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [ebf1e200]Inside sendExecuteMessage. Message INIT +[076 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[077 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [ebf1e200]sendExecuteMsg trigger event INIT +[078 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Move state message INIT +[079 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[07a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[07b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]sending state message INIT +[07c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Received message INIT from shim +[07d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: INIT(state:ready) +[07e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[07f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [ebf1e200]Received INIT, initializing chaincode +[080 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Init -> INFO Init CSCC +[081 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetLocalMSP -> DEBU Returning existing local MSP +[082 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Init get response status: 200 +[083 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Init succeeded. Sending COMPLETED +[084 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]Move state message COMPLETED +[085 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ebf1e200]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[086 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ebf1e200]send state message COMPLETED +[087 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ebf1e200]Received message COMPLETED from shim +[088 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[089 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ebf1e200-7fdf-49de-8d99-8efdac6862f1]HandleMessage- COMPLETED. Notify +[08a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ebf1e200-7fdf-49de-8d99-8efdac6862f1 +[08b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[08c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[08d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=lscc,version=1.0.4,txid=0019f517-2706-4f93-afef-03f480d65ff0,syscc=true,proposal=0x0,canname=lscc:1.0.4 +[08e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode lscc:1.0.4 is being launched +[08f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[090 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[091 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: lscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[092 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[093 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=lscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[095 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(lscc-1.0.4) lock +[096 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (lscc-1.0.4) lock +[097 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for lscc-1.0.4 +[098 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(lscc-1.0.4) +[099 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for lscc-1.0.4 +[09a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[09b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[09c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for lscc-1.0.4 +[094 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/gossip/discovery] -> DEBU Sleeping 25s +[09d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[09e 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=lscc:1.0.4 +[09f 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[0a0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[0a1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[0a2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[0a3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode lscc:1.0.4 +[0a4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.0.4" , sending back REGISTERED +[0a5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[0a6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[0a7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[0a8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[0a9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode lscc:1.0.4 launch seq completed +[0aa 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[0ab 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0ac 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Move state message READY +[0ad 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: READY in state established +[0ae 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [0019f517]Entered state ready +[0af 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:0019f517-2706-4f93-afef-03f480d65ff0 +[0b0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]sending state message READY +[0b1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Received message READY from shim +[0b2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: READY(state:established) +[0b3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[0b4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[0b5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[0b6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[0b7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [0019f517]Inside sendExecuteMessage. Message INIT +[0b8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0b9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [0019f517]sendExecuteMsg trigger event INIT +[0ba 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Move state message INIT +[0bb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[0bc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[0bd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]sending state message INIT +[0be 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Received message INIT from shim +[0bf 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: INIT(state:ready) +[0c0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[0c1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [0019f517]Received INIT, initializing chaincode +[0c2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetPolicyChecker.GetPolicyChecker.NewPolicyChecker.GetLocalMSP -> DEBU Returning existing local MSP +[0c3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Init get response status: 200 +[0c4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Init succeeded. Sending COMPLETED +[0c5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]Move state message COMPLETED +[0c6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0019f517]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[0c7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0019f517]send state message COMPLETED +[0c8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0019f517]Received message COMPLETED from shim +[0c9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[0ca 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0019f517-2706-4f93-afef-03f480d65ff0]HandleMessage- COMPLETED. Notify +[0cb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0019f517-2706-4f93-afef-03f480d65ff0 +[0cc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[0cd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0ce 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=escc,version=1.0.4,txid=8bbc4b00-7043-45a4-a6a5-09d6a09935a7,syscc=true,proposal=0x0,canname=escc:1.0.4 +[0cf 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode escc:1.0.4 is being launched +[0d0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[0d1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[0d2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: escc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[0d3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0d4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=escc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[0d5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(escc-1.0.4) lock +[0d6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (escc-1.0.4) lock +[0d7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for escc-1.0.4 +[0d8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(escc-1.0.4) +[0d9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for escc-1.0.4 +[0da 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[0db 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[0dc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for escc-1.0.4 +[0dd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[0de 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=escc:1.0.4 +[0df 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[0e0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[0e1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[0e2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[0e3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode escc:1.0.4 +[0e4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"escc:1.0.4" , sending back REGISTERED +[0e5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[0e6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[0e7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[0e8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[0e9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode escc:1.0.4 launch seq completed +[0ea 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[0eb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0ec 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Move state message READY +[0ed 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: READY in state established +[0ee 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [8bbc4b00]Entered state ready +[0ef 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:8bbc4b00-7043-45a4-a6a5-09d6a09935a7 +[0f0 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]sending state message READY +[0f1 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Received message READY from shim +[0f2 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: READY(state:established) +[0f3 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[0f4 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[0f5 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[0f6 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[0f7 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8bbc4b00]Inside sendExecuteMessage. Message INIT +[0f8 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[0f9 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8bbc4b00]sendExecuteMsg trigger event INIT +[0fa 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Move state message INIT +[0fb 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[0fc 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[0fd 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]sending state message INIT +[0fe 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Received message INIT from shim +[0ff 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: INIT(state:ready) +[100 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[101 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [8bbc4b00]Received INIT, initializing chaincode +[102 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc/escc] Init -> INFO Successfully initialized ESCC +[103 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Init get response status: 200 +[104 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Init succeeded. Sending COMPLETED +[105 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]Move state message COMPLETED +[106 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8bbc4b00]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[107 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8bbc4b00]send state message COMPLETED +[108 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8bbc4b00]Received message COMPLETED from shim +[109 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[10a 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8bbc4b00-7043-45a4-a6a5-09d6a09935a7]HandleMessage- COMPLETED. Notify +[10b 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:8bbc4b00-7043-45a4-a6a5-09d6a09935a7 +[10c 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[10d 12-05 07:29:40.56 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode escc/(github.com/hyperledger/fabric/core/scc/escc) deployed +[10e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=vscc,version=1.0.4,txid=8a2131e4-69be-414f-8030-ed18225f882d,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[10f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode vscc:1.0.4 is being launched +[110 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[111 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[112 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: vscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[113 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[114 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=vscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[115 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(vscc-1.0.4) lock +[116 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (vscc-1.0.4) lock +[117 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for vscc-1.0.4 +[118 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(vscc-1.0.4) +[119 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for vscc-1.0.4 +[11a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[11b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[11c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for vscc-1.0.4 +[11d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[11e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=vscc:1.0.4 +[11f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[120 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[121 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[122 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[123 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode vscc:1.0.4 +[124 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"vscc:1.0.4" , sending back REGISTERED +[125 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[126 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode vscc:1.0.4 launch seq completed +[127 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[128 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[129 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Move state message READY +[12a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: READY in state established +[12b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [8a2131e4]Entered state ready +[12c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:8a2131e4-69be-414f-8030-ed18225f882d +[12d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]sending state message READY +[12e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[12f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[130 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[131 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[132 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8a2131e4]Inside sendExecuteMessage. Message INIT +[133 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[134 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [8a2131e4]sendExecuteMsg trigger event INIT +[135 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[136 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[137 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[138 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Received message READY from shim +[139 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: READY(state:established) +[13a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Move state message INIT +[13b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[13c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[13d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]sending state message INIT +[13e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Received message INIT from shim +[13f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: INIT(state:ready) +[140 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[141 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [8a2131e4]Received INIT, initializing chaincode +[142 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Init get response status: 200 +[143 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Init succeeded. Sending COMPLETED +[144 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]Move state message COMPLETED +[145 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [8a2131e4]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[146 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [8a2131e4]send state message COMPLETED +[147 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [8a2131e4]Received message COMPLETED from shim +[148 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[149 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [8a2131e4-69be-414f-8030-ed18225f882d]HandleMessage- COMPLETED. Notify +[14a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:8a2131e4-69be-414f-8030-ed18225f882d +[14b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[14c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode vscc/(github.com/hyperledger/fabric/core/scc/vscc) deployed +[14d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=3bb78f79-7308-4fc2-a4e3-a20f4f893f69,syscc=true,proposal=0x0,canname=qscc:1.0.4 +[14e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode qscc:1.0.4 is being launched +[14f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[150 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[151 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container: qscc:1.0.4(networkid:dev,peerid:peer0.org1.example.com) +[152 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[153 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=qscc:1.0.4 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[154 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(qscc-1.0.4) lock +[155 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (qscc-1.0.4) lock +[156 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] do.do.Start.getInstance -> DEBU chaincode instance created for qscc-1.0.4 +[157 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(qscc-1.0.4) +[158 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode-support started for qscc-1.0.4 +[159 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[15a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/msp/mgmt] HandleChaincodeStream.HandleChaincodeStream.newChaincodeSupportHandler.GetLocalMSP -> DEBU Returning existing local MSP +[15b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/container/inproccontroller] -> DEBU chaincode started for qscc-1.0.4 +[15c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU in proc [chaincode -peer.address=peer0.org1.example.com:7052] +[15d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc -> DEBU starting chat with peer using name=qscc:1.0.4 +[15e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] StartInProc.chatWithPeer -> DEBU Registering.. sending REGISTER +[15f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[160 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[161 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[162 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode qscc:1.0.4 +[163 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.0.4" , sending back REGISTERED +[164 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[165 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU []Received message REGISTERED from shim +[166 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU []Handling ChaincodeMessage of type: REGISTERED(state:created) +[167 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func1.beforeRegistered -> DEBU Received REGISTERED, ready for invocations +[168 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode qscc:1.0.4 launch seq completed +[169 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready -> DEBU sending READY +[16a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[16b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Move state message READY +[16c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: READY in state established +[16d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [3bb78f79]Entered state ready +[16e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:3bb78f79-7308-4fc2-a4e3-a20f4f893f69 +[16f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]sending state message READY +[170 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Received message READY from shim +[171 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: READY(state:established) +[172 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU sending init completed +[173 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU LaunchChaincode complete +[174 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[175 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[176 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [3bb78f79]Inside sendExecuteMessage. Message INIT +[177 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[178 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [3bb78f79]sendExecuteMsg trigger event INIT +[179 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Move state message INIT +[17a 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[17b 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[17c 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]sending state message INIT +[17d 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Received message INIT from shim +[17e 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: INIT(state:ready) +[17f 12-05 07:29:40.57 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[180 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [3bb78f79]Received INIT, initializing chaincode +[181 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Init -> INFO Init QSCC +[182 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/msp/mgmt] Init.GetLocalMSP -> DEBU Returning existing local MSP +[183 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Init get response status: 200 +[184 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Init succeeded. Sending COMPLETED +[185 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]Move state message COMPLETED +[186 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [3bb78f79]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[187 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [3bb78f79]send state message COMPLETED +[188 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [3bb78f79]Received message COMPLETED from shim +[189 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[18a 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [3bb78f79-7308-4fc2-a4e3-a20f4f893f69]HandleMessage- COMPLETED. Notify +[18b 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:3bb78f79-7308-4fc2-a4e3-a20f4f893f69 +[18c 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/chaincode] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[18d 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/core/scc] main.Execute.ExecuteC.execute.func1.serve.initSysCCs.DeploySysCCs.deploySysCC -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/chaincode/qscc) deployed +[18e 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve.initSysCCs -> INFO Deployed system chaincodess +[18f 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[190 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/peer/node] main.Execute.ExecuteC.execute.func1.serve -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[191 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'msp/identity' logger enabled for log level 'WARNING' +[192 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'configvalues/msp' logger enabled for log level 'WARNING' +[193 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'msp' logger enabled for log level 'WARNING' +[194 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/discovery' logger enabled for log level 'WARNING' +[195 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/comm' logger enabled for log level 'WARNING' +[196 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/pull' logger enabled for log level 'WARNING' +[197 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/gossip' logger enabled for log level 'WARNING' +[198 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/service' logger enabled for log level 'WARNING' +[199 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/state' logger enabled for log level 'WARNING' +[19a 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'peer/gossip/sa' logger enabled for log level 'WARNING' +[19b 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'peer/gossip/mcs' logger enabled for log level 'WARNING' +[19c 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'gossip/election' logger enabled for log level 'WARNING' +[19d 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'kvledger' logger enabled for log level 'INFO' +[19e 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'ledgermgmt' logger enabled for log level 'INFO' +[19f 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'kvledger.util' logger enabled for log level 'INFO' +[1a0 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'cauthdsl' logger enabled for log level 'WARNING' +[1a1 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'policies' logger enabled for log level 'WARNING' +[1a2 12-05 07:29:40.58 UTC] [github.com/hyperledger/fabric/common/flogging] main.Execute.ExecuteC.execute.func1.serve.SetLogLevelFromViper.SetModuleLevel.setModuleLevel -> DEBU Module 'grpc' logger enabled for log level 'ERROR' +[1a3 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[1a4 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc4216238f0 +[1a5 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 1 +[1a6 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[1a7 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[1a8 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[1a9 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[1aa 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc4215bfe50, header 0xc421623980 +[1ab 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[1ac 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 +[1ad 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 channel id: +[1ae 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 channel id: version: 1.0.4 +[1af 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=cscc,version=1.0.4,txid=ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1,syscc=true,proposal=0xc4215bfe50,canname=cscc:1.0.4 +[1b0 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : cscc:1.0.4 +[1b1 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[1b2 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[1b3 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ccd54f80]Inside sendExecuteMessage. Message TRANSACTION +[1b4 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[1b5 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[1b6 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ccd54f80]sendExecuteMsg trigger event TRANSACTION +[1b7 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]Move state message TRANSACTION +[1b8 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[1b9 12-05 07:29:43.55 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[1ba 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]sending state message TRANSACTION +[1bb 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Received message TRANSACTION from shim +[1bc 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ccd54f80]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[1bd 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ccd54f80]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[1be 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Invoke -> DEBU Invoke function: JoinChain +[1bf 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] Invoke.joinChain.CreateChainFromBlock.CreateLedger -> INFO Creating ledger [businesschannel] with genesis block +[1c0 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[1c1 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> INFO No info about blocks file found in the db. + This could happen if this is the first time the ledger is constructed or the index is dropped. + Scanning blocks dir for the latest info +[1c2 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> DEBU Retrieving checkpoint info from block files +[1c3 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles.retrieveLastFileSuffix -> DEBU retrieveLastFileSuffix() +[1c4 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles.retrieveLastFileSuffix -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[1c5 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> DEBU Last file number found = -1 +[1c6 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.constructCheckpointInfoFromBlockFiles -> INFO No block file found +[1c7 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr -> INFO Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc4216fcb20)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[1c8 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.newBlockIndex -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[1c9 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO No block indexed, Last block present in block files=[0] +[1ca 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO Start building index from block [0] +[1cb 12-05 07:29:43.56 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.newBlockStream.newBlockfileStream -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[0] +[1cc 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.nextBlockBytesAndPlacementInfo.nextBlockBytesAndPlacementInfo -> DEBU Finished reading file number [0] +[1cd 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex.nextBlockBytesAndPlacementInfo -> DEBU blockbytes [0] read from file [0] +[1ce 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.openInternal.OpenBlockStore.newFsBlockStore.newBlockfileMgr.syncIndex -> INFO Finished building index. Last block indexed [0] +[1cf 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[1d0 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc421587900), Data:(*common.BlockData)(0xc4216ac8c0), Metadata:(*common.BlockMetadata)(0xc4216ac900)}, doMVCCValidation=true +[1d1 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[1d2 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Skipping mvcc validation for Block [0] Transaction index [0] because, the transaction type is [CONFIG] +[1d3 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0xf0, 0xbf, 0x75, 0xab, 0xa3, 0xf5, 0x13, 0xfa, 0xa, 0x7b, 0xfc, 0x92, 0x5, 0x7c, 0x72, 0x12, 0x4, 0x8e, 0x2b, 0x4e, 0x50, 0x71, 0x5e, 0x78, 0xb3, 0xc7, 0xe9, 0x7e, 0x1f, 0xb9, 0x4, 0x91} txOffsets= +txId= locPointer=offset=38, bytesLength=11901 +] +[1d4 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=38, bytesLength=11901] for tx ID: [] to index +[1d5 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=38, bytesLength=11901] for tx number:[0] ID: [] to blockNumTranNum index +[1d6 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[11945], isChainEmpty=[false], lastBlockNumber=[0] +[1d7 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit -> INFO Channel [businesschannel]: Created block [0] with 1 transaction(s) +[1d8 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Committing updates to state database +[1d9 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[1da 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Updates committed to state database +[1db 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[1dc 12-05 07:29:43.57 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[1dd 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] Invoke.joinChain.CreateChainFromBlock.CreateLedger.Create.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[1de 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/core/ledger/ledgermgmt] Invoke.joinChain.CreateChainFromBlock.CreateLedger -> INFO Created ledger [businesschannel] with genesis block +[1df 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues -> DEBU Initializing protos for *config.ChannelProtos +[1e0 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: HashingAlgorithm +[1e1 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BlockDataHashingStructure +[1e2 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: OrdererAddresses +[1e3 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewInitializer.newResources.NewRoot.NewChannelGroup.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: Consortium +[1e4 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel +[1e5 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application +[1e6 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application/Org1MSP +[1e7 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Application/Org1MSP/MSP +[1e8 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[1e9 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[1ea 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[1eb 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Application/Org2MSP +[1ec 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Application/Org2MSP/MSP +[1ed 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[1ee 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[1ef 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[1f0 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[1f1 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[1f2 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[1f3 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Orderer +[1f4 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Groups] /Channel/Orderer/OrdererOrg +[1f5 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/OrdererOrg/MSP +[1f6 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[1f7 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[1f8 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig...recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[1f9 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/BatchTimeout +[1fa 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/ChannelRestrictions +[1fb 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/ConsensusType +[1fc 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Orderer/BatchSize +[1fd 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[1fe 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[1ff 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[200 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[201 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/Consortium +[202 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/HashingAlgorithm +[203 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/OrdererAddresses +[204 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Values] /Channel/BlockDataHashingStructure +[205 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Readers +[206 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Writers +[207 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.MapConfig.recurseConfig.addToMap -> DEBU Adding to config map: [Policy] /Channel/Admins +[208 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/configtx] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig -> DEBU Beginning new config for channel businesschannel +[209 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues -> DEBU Initializing protos for *config.ChannelProtos +[20a 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: HashingAlgorithm +[20b 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BlockDataHashingStructure +[20c 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: OrdererAddresses +[20d 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup.proposeGroup.BeginValueProposals.Allocate.NewChannelConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: Consortium +[20e 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationConfig.NewStandardValues -> DEBU Initializing protos for *struct {} +[20f 12-05 07:29:43.58 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[210 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[211 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.ApplicationOrgProtos +[212 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: AnchorPeers +[213 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[214 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[215 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[216 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[217 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.ApplicationOrgProtos +[218 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: AnchorPeers +[219 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[21a 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewApplicationOrgConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[21b 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues -> DEBU Initializing protos for *config.OrdererProtos +[21c 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: ConsensusType +[21d 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BatchSize +[21e 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: BatchTimeout +[21f 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: KafkaBrokers +[220 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrdererConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: ChannelRestrictions +[221 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrganizationConfig.NewStandardValues -> DEBU Initializing protos for *config.OrganizationProtos +[222 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.processConfig.proposeGroup...proposeGroup.BeginValueProposals.Allocate.NewOrganizationConfig.NewStandardValues.initializeProtosStruct -> DEBU Processing field: MSP +[223 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate -> DEBU Anchor peers for org Org2MSP are +[224 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.Validate.validateMSP -> DEBU Setting up MSP for org Org2MSP +[225 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate -> DEBU Anchor peers for org Org1MSP are +[226 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.Validate.validateMSP -> DEBU Setting up MSP for org Org1MSP +[227 12-05 07:29:43.59 UTC] [github.com/hyperledger/fabric/common/config] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.processConfig.preCommit...preCommit.PreCommit.Validate.validateMSP -> DEBU Setting up MSP for org OrdererOrg +[228 12-05 07:29:43.60 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots -> DEBU Updating trusted root authorities for channel businesschannel +[229 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU updating root CAs for channel [businesschannel] +[22a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[22b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding app root CAs for MSP [Org2MSP] +[22c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.CreateChainFromBlock.createChain.NewManagerImpl.commitCallbacks.func2.updateTrustedRoots.buildTrustedRootsForChain -> DEBU adding app root CAs for MSP [Org1MSP] +[22d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/peer] Invoke.joinChain.InitChain -> DEBU Init chain businesschannel +[22e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/peer/node] Invoke.joinChain.InitChain.func2 -> DEBU Deploying system CC, for chain +[22f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[230 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [c65c0d86-1416-42c9-be44-491e0e2f9dbf] +[231 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=cscc,version=1.0.4,txid=93d426d7-f9f8-47c3-9e24-8083f670b21b,syscc=true,proposal=0x0,canname=cscc:1.0.4 +[232 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : cscc:1.0.4 +[233 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[234 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: cscc:1.0.4 +[235 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [93d426d7]Inside sendExecuteMessage. Message INIT +[236 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[237 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [93d426d7]sendExecuteMsg trigger event INIT +[238 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]Move state message INIT +[239 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[23a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[23b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]sending state message INIT +[23c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Received message INIT from shim +[23d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [93d426d7]Handling ChaincodeMessage of type: INIT(state:ready) +[23e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[23f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [93d426d7]Received INIT, initializing chaincode +[240 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/scc/cscc] Init -> INFO Init CSCC +[241 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Init get response status: 200 +[242 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Init succeeded. Sending COMPLETED +[243 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]Move state message COMPLETED +[244 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [93d426d7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[245 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [93d426d7]send state message COMPLETED +[246 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [93d426d7]Received message COMPLETED from shim +[247 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[248 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [93d426d7-f9f8-47c3-9e24-8083f670b21b]HandleMessage- COMPLETED. Notify +[249 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:93d426d7-f9f8-47c3-9e24-8083f670b21b +[24a 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[24b 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[24c 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [c65c0d86-1416-42c9-be44-491e0e2f9dbf] +[24d 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[24e 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [9fd5ddf6-32f1-4612-a1e7-7736bc16e667] +[24f 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b,syscc=true,proposal=0x0,canname=lscc:1.0.4 +[250 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[251 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[252 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[253 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f4f96a0b]Inside sendExecuteMessage. Message INIT +[254 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[255 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f4f96a0b]sendExecuteMsg trigger event INIT +[256 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]Move state message INIT +[257 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[258 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[259 12-05 07:29:43.61 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]sending state message INIT +[25a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Received message INIT from shim +[25b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f4f96a0b]Handling ChaincodeMessage of type: INIT(state:ready) +[25c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[25d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [f4f96a0b]Received INIT, initializing chaincode +[25e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Init get response status: 200 +[25f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Init succeeded. Sending COMPLETED +[260 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]Move state message COMPLETED +[261 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f4f96a0b]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[262 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f4f96a0b]send state message COMPLETED +[263 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f4f96a0b]Received message COMPLETED from shim +[264 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[265 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b]HandleMessage- COMPLETED. Notify +[266 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:f4f96a0b-2f1e-4a91-b677-51aa8e3dc03b +[267 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[268 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[269 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [9fd5ddf6-32f1-4612-a1e7-7736bc16e667] +[26a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[26b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [e66fafd6-1db0-40d6-a5ea-ddf912a3787d] +[26c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=f3ed19c0-7dd4-44a5-b3bf-fb90755acff7,syscc=true,proposal=0x0,canname=escc:1.0.4 +[26d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[26e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[26f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[270 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f3ed19c0]Inside sendExecuteMessage. Message INIT +[271 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[272 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [f3ed19c0]sendExecuteMsg trigger event INIT +[273 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]Move state message INIT +[274 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[275 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[276 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]sending state message INIT +[277 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Received message INIT from shim +[278 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f3ed19c0]Handling ChaincodeMessage of type: INIT(state:ready) +[279 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[27a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [f3ed19c0]Received INIT, initializing chaincode +[27b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Init -> INFO Successfully initialized ESCC +[27c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Init get response status: 200 +[27d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Init succeeded. Sending COMPLETED +[27e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]Move state message COMPLETED +[27f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [f3ed19c0]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[280 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [f3ed19c0]send state message COMPLETED +[281 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [f3ed19c0]Received message COMPLETED from shim +[282 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[283 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [f3ed19c0-7dd4-44a5-b3bf-fb90755acff7]HandleMessage- COMPLETED. Notify +[284 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:f3ed19c0-7dd4-44a5-b3bf-fb90755acff7 +[285 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[286 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode escc/businesschannel(github.com/hyperledger/fabric/core/scc/escc) deployed +[287 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [e66fafd6-1db0-40d6-a5ea-ddf912a3787d] +[288 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[289 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [edd9919e-0f8b-4d7e-a3f9-3c4a3366fa02] +[28a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=a5d7d2da-65a8-42bf-acbf-8c762232a10d,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[28b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[28c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[28d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[28e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [a5d7d2da]Inside sendExecuteMessage. Message INIT +[28f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[290 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [a5d7d2da]sendExecuteMsg trigger event INIT +[291 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]Move state message INIT +[292 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[293 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[294 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]sending state message INIT +[295 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Received message INIT from shim +[296 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a5d7d2da]Handling ChaincodeMessage of type: INIT(state:ready) +[297 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[298 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [a5d7d2da]Received INIT, initializing chaincode +[299 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Init get response status: 200 +[29a 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Init succeeded. Sending COMPLETED +[29b 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]Move state message COMPLETED +[29c 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a5d7d2da]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[29d 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a5d7d2da]send state message COMPLETED +[29e 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a5d7d2da]Received message COMPLETED from shim +[29f 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2a0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a5d7d2da-65a8-42bf-acbf-8c762232a10d]HandleMessage- COMPLETED. Notify +[2a1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:a5d7d2da-65a8-42bf-acbf-8c762232a10d +[2a2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[2a3 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode vscc/businesschannel(github.com/hyperledger/fabric/core/scc/vscc) deployed +[2a4 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [edd9919e-0f8b-4d7e-a3f9-3c4a3366fa02] +[2a5 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[2a6 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [d9c06935-ee2d-40cf-8aa0-142e7d7dadf8] +[2a7 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=qscc,version=1.0.4,txid=e5f39d3f-65ed-488c-8050-20c023726e73,syscc=true,proposal=0x0,canname=qscc:1.0.4 +[2a8 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[2a9 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Entry +[2aa 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[2ab 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [e5f39d3f]Inside sendExecuteMessage. Message INIT +[2ac 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[2ad 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute.sendExecuteMessage -> DEBU [e5f39d3f]sendExecuteMsg trigger event INIT +[2ae 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]Move state message INIT +[2af 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[2b0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[2b1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]sending state message INIT +[2b2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Received message INIT from shim +[2b3 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [e5f39d3f]Handling ChaincodeMessage of type: INIT(state:ready) +[2b4 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU Entered state ready +[2b5 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func4.beforeInit -> DEBU [e5f39d3f]Received INIT, initializing chaincode +[2b6 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Init -> INFO Init QSCC +[2b7 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Init get response status: 200 +[2b8 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Init succeeded. Sending COMPLETED +[2b9 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]Move state message COMPLETED +[2ba 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [e5f39d3f]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2bb 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [e5f39d3f]send state message COMPLETED +[2bc 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [e5f39d3f]Received message COMPLETED from shim +[2bd 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2be 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [e5f39d3f-65ed-488c-8050-20c023726e73]HandleMessage- COMPLETED. Notify +[2bf 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:e5f39d3f-65ed-488c-8050-20c023726e73 +[2c0 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/chaincode] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ExecuteWithErrorFilter.ExecuteWithErrorFilter.Execute.Execute -> DEBU Exit +[2c1 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/scc] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/chaincode/qscc) deployed +[2c2 12-05 07:29:43.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.joinChain.InitChain.func2.DeploySysCCs.deploySysCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [d9c06935-ee2d-40cf-8aa0-142e7d7dadf8] +[2c3 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> DEBU Entry +[2c4 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [0] +[2c5 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Entry +[2c6 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[2c7 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[2c8 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent.Send -> DEBU Exit +[2c9 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/events/producer] Invoke.joinChain.SendProducerBlockEvent -> DEBU Exit +[2ca 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Transaction completed. Sending COMPLETED +[2cb 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]Move state message COMPLETED +[2cc 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ccd54f80]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2cd 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ccd54f80]send state message COMPLETED +[2ce 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ccd54f80]Received message COMPLETED from shim +[2cf 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2d0 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1]HandleMessage- COMPLETED. Notify +[2d1 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ccd54f80eb39c559c728c92f6478c606a3e76f14c7038955d5470018f4b4ada1 +[2d2 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[2d3 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[2d4 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[2d5 12-05 07:29:43.63 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[2d6 12-05 07:29:45.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[2d7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421a6bec0 +[2d8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[2d9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[2da 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[2db 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[2dc 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[2dd 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421a77e00, header 0xc421a6bef0 +[2de 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[2df 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 +[2e0 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 channel id: +[2e1 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 channel id: version: 1.0.4 +[2e2 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=lscc,version=1.0.4,txid=be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693,syscc=true,proposal=0xc421a77e00,canname=lscc:1.0.4 +[2e3 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[2e4 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[2e5 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[2e6 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [be3e0ef9]Inside sendExecuteMessage. Message TRANSACTION +[2e7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[2e8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[2e9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [be3e0ef9]sendExecuteMsg trigger event TRANSACTION +[2ea 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]Move state message TRANSACTION +[2eb 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef9]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[2ec 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[2ed 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]sending state message TRANSACTION +[2ee 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Received message TRANSACTION from shim +[2ef 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [be3e0ef9]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[2f0 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [be3e0ef9]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[2f1 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Transaction completed. Sending COMPLETED +[2f2 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]Move state message COMPLETED +[2f3 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [be3e0ef9]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[2f4 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [be3e0ef9]send state message COMPLETED +[2f5 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [be3e0ef9]Received message COMPLETED from shim +[2f6 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef9]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[2f7 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693]HandleMessage- COMPLETED. Notify +[2f8 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:be3e0ef93481f3e7b1399bc23cead2bede20e3ef49c87241407c430178b94693 +[2f9 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[2fa 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[2fb 12-05 07:29:45.11 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[2fc 12-05 07:29:45.12 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[2fd 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[2fe 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421bcae10 +[2ff 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[300 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[301 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[302 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[303 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[304 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421bb9090, header 0xc421bcae40 +[305 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[306 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[307 12-05 07:29:46.55 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] +[308 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[309 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [8167ca4f-2917-497f-bf3d-de91e667f803] +[30a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel +[30b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel version: 1.0.4 +[30c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=true,proposal=0xc421bb9090,canname=lscc:1.0.4 +[30d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[30e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[30f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[310 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message TRANSACTION +[311 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[312 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[313 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event TRANSACTION +[314 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message TRANSACTION +[315 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[316 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[317 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message TRANSACTION +[318 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message TRANSACTION from shim +[319 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[31a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bb4adfec]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[31b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.getCCInstance.GetState.handleGetState -> DEBU [bb4adfec]Sending GET_STATE +[31c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message GET_STATE from shim +[31d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[31e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [bb4adfec]Received GET_STATE, invoking get state from ledger +[320 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec] getting state for chaincode lscc, key mycc, channel businesschannel +[321 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[322 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]No state associated with key: mycc. Sending RESPONSE with an empty payload +[323 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]handleGetState serial send RESPONSE +[324 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message RESPONSE from shim +[325 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[326 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]before send +[327 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]after send +[328 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [bb4adfec]Received RESPONSE, communicated (state:ready) +[329 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.getCCInstance.GetState.handleGetState -> DEBU [bb4adfec]GetState received payload RESPONSE +[32a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Inside putstate +[31f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[32b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Sending PUT_STATE +[32c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[32d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[32e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[32f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[330 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[331 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[332 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[333 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[334 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[335 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[336 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message RESPONSE from shim +[337 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[338 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]before send +[339 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [bb4adfec]after send +[33a 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [bb4adfec]Received RESPONSE, communicated (state:ready) +[33b 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.executeDeploy.createChaincode.putChaincodeData.PutState.handlePutState -> DEBU [bb4adfec]Received RESPONSE. Successfully updated state +[33c 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Transaction completed. Sending COMPLETED +[33d 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Move state message COMPLETED +[33e 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[33f 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]send state message COMPLETED +[340 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[341 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[342 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[343 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[344 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[345 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=false,proposal=0xc421bb9090,canname=mycc:1.0 +[346 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU launchAndWaitForRegister fetched 1818 bytes from file system +[347 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU chaincode mycc:1.0 is being launched +[348 12-05 07:29:46.56 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Executable is chaincode +[349 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.getArgsAndEnv -> DEBU Args [chaincode -peer.address=peer0.org1.example.com:7052] +[34a 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container: mycc:1.0(networkid:dev,peerid:peer0.org1.example.com) +[34b 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[34c 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister -> DEBU start container with env: + CORE_CHAINCODE_ID_NAME=mycc:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +[34d 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU waiting for container(dev-peer0.org1.example.com-mycc-1.0) lock +[34e 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container] lockContainer -> DEBU got container (dev-peer0.org1.example.com-mycc-1.0) lock +[34f 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Cleanup container dev-peer0.org1.example.com-mycc-1.0 +[350 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Stop container dev-peer0.org1.example.com-mycc-1.0(No such container: dev-peer0.org1.example.com-mycc-1.0) +[351 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Kill container dev-peer0.org1.example.com-mycc-1.0 (No such container: dev-peer0.org1.example.com-mycc-1.0) +[352 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.stopInternal -> DEBU Remove container dev-peer0.org1.example.com-mycc-1.0 (No such container: dev-peer0.org1.example.com-mycc-1.0) +[353 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Start container dev-peer0.org1.example.com-mycc-1.0 +[354 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer.getDockerHostConfig -> DEBU docker container hostconfig NetworkMode: 104_default +[355 12-05 07:29:46.57 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Create container: dev-peer0.org1.example.com-mycc-1.0 +[356 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU start-could not find image (container id ), because of ...attempt to recreate image +[357 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/chaincode/platforms] do.do.Start.func1.GenerateDockerBuild.generateDockerfile -> DEBU +FROM hyperledger/fabric-baseos:x86_64-0.3.2 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="mycc" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.0.4" \ + org.hyperledger.fabric.base.version="0.3.2" +ENV CORE_CHAINCODE_BUILDLEVEL=1.0.4 +ENV CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +COPY peer.crt /etc/hyperledger/fabric/peer.crt +[358 12-05 07:29:46.58 UTC] [github.com/hyperledger/fabric/core/chaincode/platforms/util] generateDockerBuild.GenerateDockerBuild.DockerBuild -> DEBU Attempting build with image hyperledger/fabric-ccenv:x86_64-1.0.4 +[359 12-05 07:29:49.61 UTC] [github.com/hyperledger/fabric/core/deliverservice] leaderElection.beLeader.func1.StartDeliverForChannel -> DEBU This peer will pass blocks from orderer service to other peers for channel businesschannel +[35a 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect -> DEBU Connected to orderer.example.com:7050 +[35b 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect -> DEBU Establishing gRPC stream with orderer.example.com:7050 ... +[35c 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect -> DEBU Entering +[35d 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect.func1.RequestBlocks -> DEBU Starting deliver with block [1] for channel businesschannel +[35e 12-05 07:29:49.62 UTC] [github.com/hyperledger/fabric/core/deliverservice] DeliverBlocks.Recv.try.doAction.connect.afterConnect -> DEBU Exiting +[35f 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.deployImage -> DEBU Created image: dev-peer0.org1.example.com-mycc-1.0-384f11f484b9302df90b453200cfb25174305fce8f53f4e94d45ee3b6cab0ce9 +[360 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU start-recreated image successfully +[361 12-05 07:30:05.00 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Create container: dev-peer0.org1.example.com-mycc-1.0 +[362 12-05 07:30:05.09 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start.createContainer -> DEBU Created container: dev-peer0.org1.example.com-mycc-1.0-384f11f484b9302df90b453200cfb25174305fce8f53f4e94d45ee3b6cab0ce9 +[363 12-05 07:30:05.48 UTC] [github.com/hyperledger/fabric/core/container/dockercontroller] do.do.Start -> DEBU Started container dev-peer0.org1.example.com-mycc-1.0 +[364 12-05 07:30:05.48 UTC] [github.com/hyperledger/fabric/core/container] unlockContainer -> DEBU container lock deleted(dev-peer0.org1.example.com-mycc-1.0) +[365 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream -> DEBU Current context deadline = 0001-01-01 00:00:00 +0000 UTC, ok = false +[366 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU []Received message REGISTER from shim +[367 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU []Fabric side Handling ChaincodeMessage of type: REGISTER in state created +[368 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Received REGISTER in state created +[369 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent.registerHandler -> DEBU registered handler complete for chaincode mycc:1.0 +[36a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.beforeEventCallbacks.func1.beforeRegisterEvent -> DEBU Got REGISTER for chaincodeID = name:"mycc:1.0" , sending back REGISTERED +[36b 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func12.enterEstablishedState.notifyDuringStartup -> DEBU Notifying during startup +[36c 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.launchAndWaitForRegister.func1 -> DEBU chaincode mycc:1.0 launch seq completed +[36d 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready -> DEBU sending READY +[36e 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[36f 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch.sendReady.ready.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[370 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message READY +[371 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: READY in state established +[372 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState -> DEBU [bb4adfec]Entered state ready +[373 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.Transition.func1.enterStateCallbacks.func13.enterReadyState.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[374 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message READY +[375 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU sending init completed +[376 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Launch -> DEBU LaunchChaincode complete +[377 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU Entry +[378 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[379 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message INIT +[37a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[37b 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[37c 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event INIT +[37d 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message INIT +[37e 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: INIT in state ready +[37f 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[380 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message INIT +[381 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[382 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[383 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[384 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[385 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[386 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[387 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[388 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[389 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[38a 12-05 07:30:05.52 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[38b 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message PUT_STATE from shim +[38c 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[38d 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[38e 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]state is ready +[38f 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [bb4adfec]Completed PUT_STATE. Sending RESPONSE +[390 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [bb4adfec]enterBusyState trigger event RESPONSE +[391 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message RESPONSE +[392 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[393 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[394 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message RESPONSE +[395 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[396 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[397 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[398 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[399 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.Execute.Execute -> DEBU Exit +[39a 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[39b 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[39c 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [8167ca4f-2917-497f-bf3d-de91e667f803] +[39d 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[39e 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel chaincode id: name:"lscc" +[39f 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[3a0 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb channel id: businesschannel version: 1.0.4 +[3a1 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb,syscc=true,proposal=0xc421bb9090,canname=escc:1.0.4 +[3a2 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[3a3 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[3a4 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[3a5 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]Inside sendExecuteMessage. Message TRANSACTION +[3a6 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[3a7 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[3a8 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bb4adfec]sendExecuteMsg trigger event TRANSACTION +[3a9 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Move state message TRANSACTION +[3aa 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[3ab 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[3ac 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]sending state message TRANSACTION +[3ad 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Received message TRANSACTION from shim +[3ae 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[3af 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bb4adfec]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[3b0 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[3b1 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[3b2 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Transaction completed. Sending COMPLETED +[3b3 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]Move state message COMPLETED +[3b4 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bb4adfec]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[3b5 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bb4adfec]send state message COMPLETED +[3b6 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bb4adfec]Received message COMPLETED from shim +[3b7 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[3b8 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb]HandleMessage- COMPLETED. Notify +[3b9 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[3ba 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[3bb 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[3bc 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[3bd 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [8167ca4f-2917-497f-bf3d-de91e667f803] +[3be 12-05 07:30:05.53 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[3bf 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [1], peers number [1] +[3c0 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [1], peers number [1] +[3c1 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[3c2 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[3c3 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[3c4 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc421623710 +[3c5 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\352\225\231\321\005\020\254\227\263\210\002\"\017businesschannel*@bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----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\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030\304\0254\214\263\227?\006\tC\313k.\361\207\000\215\t\024\220K\257\315Z" +[3c6 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[3c7 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[3c8 12-05 07:30:07.57 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[3c9 12-05 07:30:07.58 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[3ca 12-05 07:30:07.59 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[3cb 12-05 07:30:07.59 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc42165ea80, header channel_header:"\010\003\032\014\010\352\225\231\321\005\020\254\227\263\210\002\"\017businesschannel*@bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----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\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030\304\0254\214\263\227?\006\tC\313k.\361\207\000\215\t\024\220K\257\315Z" +[3cc 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[3cd 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[3ce 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[3cf 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[3d0 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] +[3d1 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[3d2 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[3d3 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [a8072a34-1069-4f19-80ad-4721ff18c010] +[3d4 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=a833999c-9788-44be-aa79-6d58d2e0d3c2,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[3d5 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb chaindID businesschannel +[3d6 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[3d7 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[3d8 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[3d9 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [a833999c]Inside sendExecuteMessage. Message TRANSACTION +[3da 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[3db 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [a833999c]sendExecuteMsg trigger event TRANSACTION +[3dc 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]Move state message TRANSACTION +[3dd 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[3de 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[3df 12-05 07:30:07.60 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]sending state message TRANSACTION +[3e0 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Received message TRANSACTION from shim +[3e1 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a833999c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[3e2 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [a833999c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[3e3 12-05 07:30:07.61 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[3e4 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[3e5 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC info: doing special validation for LSCC +[3e6 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[3e7 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[3e8 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Namespace lscc +[3e9 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetQueryExecutorForLedger.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [b8ec976a-233a-48a5-b071-9a1f82b95726] +[3ea 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[3eb 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.Done -> DEBU Done with transaction simulation / query execution [b8ec976a-233a-48a5-b071-9a1f82b95726] +[3ec 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Validating deploy for cc mycc version 1.0 +[3ed 12-05 07:30:07.62 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation.checkInstantiationPolicy -> DEBU VSCC info: checkInstantiationPolicy starts, policy is &cauthdsl.policy{evaluator:(func([]*common.SignedData, []bool) bool)(0x954570)} +[3ee 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[3ef 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Transaction completed. Sending COMPLETED +[3f0 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]Move state message COMPLETED +[3f1 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [a833999c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[3f2 12-05 07:30:07.63 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [a833999c]send state message COMPLETED +[3f3 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [a833999c]Received message COMPLETED from shim +[3f4 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[3f5 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [a833999c-9788-44be-aa79-6d58d2e0d3c2]HandleMessage- COMPLETED. Notify +[3f6 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:a833999c-9788-44be-aa79-6d58d2e0d3c2 +[3f7 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[3f8 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [a8072a34-1069-4f19-80ad-4721ff18c010] +[3f9 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[3fa 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[3fb 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc421586280), Data:(*common.BlockData)(0xc421a96a40), Metadata:(*common.BlockMetadata)(0xc421a96a80)}, doMVCCValidation=true +[3fc 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[3fd 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[3fe 12-05 07:30:07.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [1] Transaction index [0] TxId [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] marked as valid by state validator +[3ff 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xf4, 0x6f, 0x6e, 0xab, 0xc2, 0x16, 0xcc, 0x19, 0xce, 0x35, 0xf2, 0xd1, 0x24, 0x18, 0x27, 0xf2, 0xf2, 0x3a, 0x7f, 0x1b, 0x75, 0x2, 0x65, 0x19, 0x46, 0x4e, 0x41, 0x5f, 0xaa, 0xec, 0x69, 0xe2} txOffsets= +txId=bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb locPointer=offset=70, bytesLength=3389 +] +[400 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=12015, bytesLength=3389] for tx ID: [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] to index +[401 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=12015, bytesLength=3389] for tx number:[0] ID: [bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb] to blockNumTranNum index +[402 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[17162], isChainEmpty=[false], lastBlockNumber=[1] +[403 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [1] with 1 transaction(s) +[404 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[405 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[406 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x6d, 0x79, 0x63, 0x63}] +[407 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[408 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[409 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[40a 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[40b 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[40c 12-05 07:30:07.65 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[40d 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [1] contains transaction id: bb4adfec32a71b150069f83029ec5df3ef2450de3972f7618f18a38e0c2f42cb +[40e 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [1] +[40f 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[410 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[411 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[412 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[413 12-05 07:30:07.66 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[414 12-05 07:30:23.86 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [2], peers number [1] +[416 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[415 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [2], peers number [1] +[417 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[418 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[419 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc4224e6000 +[41a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\375\225\231\321\005\020\214\274\276\305\002\"\017businesschannel*@74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----\nMIICGTCCAb+gAwIBAgIQH+2gkHQVSYGwHNmdjVW1rjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0xNzEyMDExMzU3MjBaFw0yNzExMjkxMzU3MjBa\nMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmcyLmV4YW1wbGUuY29tMFkw\nEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET/+qXCi/uacyRNUXz+LFWiWkzfYbic4W\nymEpJzPNA+mwjJOFuDF7uqVkTf+zGBgb6Ih8L1kEe5La3B+Kun2HsqNNMEswDgYD\nVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgTF1STg1Ne6+W\nG94Eyv+QtAEu1mY6RxelTc3xwanTyvwwCgYIKoZIzj0EAwIDSAAwRQIhANVALHka\nBTD5RPSYY6ZFBlmnRvO6KyjuKqY5Dfg7TgdNAiA5RfzGkLcrXN/06xg4uHAvgSdb\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\246\362\213'\253\030~\332\264n\307'_\362\231\r\225\324\245\240\032\247N\240" +[41b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[41c 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[41d 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org2MSP 4e712ad34f75c75845d706cd650231032af5f4450097cd3cdb64dfe19731dcbe} +[41e 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[41f 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[420 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc42024aa80, header channel_header:"\010\003\032\014\010\375\225\231\321\005\020\214\274\276\305\002\"\017businesschannel*@74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4:\010\022\006\022\004lscc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\246\362\213'\253\030~\332\264n\307'_\362\231\r\225\324\245\240\032\247N\240" +[421 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[422 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[423 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[424 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[425 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] +[426 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[427 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[428 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [9e5f2d6c-0530-444e-bc7b-e1dd5089ecbb] +[429 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=124797f0-c7b3-4575-b011-470e185a7de7,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[42a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 chaindID businesschannel +[42b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[42c 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[42d 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[42e 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [124797f0]Inside sendExecuteMessage. Message TRANSACTION +[42f 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[430 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [124797f0]sendExecuteMsg trigger event TRANSACTION +[431 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]Move state message TRANSACTION +[432 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[433 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[434 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]sending state message TRANSACTION +[435 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Received message TRANSACTION from shim +[436 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [124797f0]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[437 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [124797f0]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[438 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[439 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[43a 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC info: doing special validation for LSCC +[43b 12-05 07:30:23.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[43c 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x27, 0x8, 0x1, 0x12, 0xb, 0x12, 0x4, 0x6d, 0x79, 0x63, 0x63, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[43d 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Namespace lscc +[43e 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetQueryExecutorForLedger.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [fb53e3af-c795-4e0b-8061-32461d647b31] +[43f 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] Invoke.ValidateLSCCInvocation.getInstantiatedCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[440 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] Invoke.ValidateLSCCInvocation.getInstantiatedCC.Done -> DEBU Done with transaction simulation / query execution [fb53e3af-c795-4e0b-8061-32461d647b31] +[441 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation -> DEBU Validating deploy for cc mycc version 1.0 +[442 12-05 07:30:23.88 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.ValidateLSCCInvocation.checkInstantiationPolicy -> DEBU VSCC info: checkInstantiationPolicy starts, policy is &cauthdsl.policy{evaluator:(func([]*common.SignedData, []bool) bool)(0x954570)} +[443 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> ERRO VSCC error: ValidateLSCCInvocation failed, err Chaincode mycc is already instantiated +[444 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Transaction completed. Sending COMPLETED +[445 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]Move state message COMPLETED +[446 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [124797f0]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[447 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [124797f0]send state message COMPLETED +[448 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [124797f0]Received message COMPLETED from shim +[449 12-05 07:30:23.89 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[44a 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [124797f0-c7b3-4575-b011-470e185a7de7]HandleMessage- COMPLETED. Notify +[44b 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:124797f0-c7b3-4575-b011-470e185a7de7 +[44c 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[44d 12-05 07:30:23.90 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> ERRO VSCC check failed for transaction txid=74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4, error Chaincode mycc is already instantiated +[44e 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [9e5f2d6c-0530-444e-bc7b-e1dd5089ecbb] +[44f 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> ERRO VSCCValidateTx for transaction txId = 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 returned error Chaincode mycc is already instantiated +[450 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[451 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[452 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc42237ae00), Data:(*common.BlockData)(0xc4224e2000), Metadata:(*common.BlockMetadata)(0xc4224e2040)}, doMVCCValidation=true +[453 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[454 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> WARN Block [2] Transaction index [0] marked as invalid by committer. Reason code [10] +[455 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0xb3, 0xd6, 0xd5, 0x31, 0x73, 0xa, 0x8b, 0x30, 0x6e, 0x34, 0x46, 0xd2, 0xa6, 0x50, 0xbb, 0xb1, 0xd8, 0xc9, 0x3a, 0xbe, 0x77, 0xd6, 0x28, 0x7c, 0xed, 0x47, 0x66, 0x4, 0x54, 0xbc, 0xa4, 0x1b} txOffsets= +txId=74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 locPointer=offset=70, bytesLength=3387 +] +[456 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=17232, bytesLength=3387] for tx ID: [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] to index +[457 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=17232, bytesLength=3387] for tx number:[0] ID: [74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4] to blockNumTranNum index +[458 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22375], isChainEmpty=[false], lastBlockNumber=[2] +[459 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [2] with 1 transaction(s) +[45a 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[45b 12-05 07:30:23.91 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[45c 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[45d 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[45e 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Skipping history write for invalid transaction number 0 +[45f 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[460 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[461 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [2] contains transaction id: 74f4437e9b5f5871abbf5bb6b6c86cecefac5d8c37d017673f521092e68f7ad4 +[462 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [2] +[463 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[464 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[465 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[466 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[467 12-05 07:30:23.92 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[468 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[469 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424a77e30 +[46a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[46b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[46c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[46d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[46e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[46f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a7d5e0, header 0xc424a77e60 +[470 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[471 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[472 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] +[473 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[474 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [711daa80-1389-4030-8ece-df6ae5d1c629] +[475 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel +[476 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=true,proposal=0xc424a7d5e0,canname=lscc:1.0.4 +[477 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[478 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[479 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[47a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[47b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[47c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[47d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[47e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[47f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[480 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[481 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[482 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message TRANSACTION from shim +[483 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[484 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [b108583e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[485 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [b108583e]Sending GET_STATE +[486 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[487 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[488 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[489 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[48a 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode lscc, key mycc, channel businesschannel +[48b 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[48c 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[48d 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[48e 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message RESPONSE from shim +[48f 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[490 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [b108583e]before send +[491 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [b108583e]after send +[492 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [b108583e]Received RESPONSE, communicated (state:ready) +[493 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [b108583e]GetState received payload RESPONSE +[494 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Transaction completed. Sending COMPLETED +[495 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Move state message COMPLETED +[496 12-05 07:30:42.80 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[497 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]send state message COMPLETED +[498 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[499 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[49a 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[49b 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[49c 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[49d 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[49e 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel version: 1.0 +[49f 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=false,proposal=0xc424a7d5e0,canname=mycc:1.0 +[4a0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[4a1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[4a2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[4a3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[4a4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[4a5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[4a6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[4a7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[4a8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[4a9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4aa 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[4ab 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[4ac 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[4ad 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[4af 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode mycc, key a, channel businesschannel +[4b0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[4b1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[4b2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[4ae 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4b3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message GET_STATE from shim +[4b4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[4b5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [b108583e]Received GET_STATE, invoking get state from ledger +[4b6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4b7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e] getting state for chaincode mycc, key b, channel businesschannel +[4b8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=b +[4b9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Got state. Sending RESPONSE +[4ba 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]handleGetState serial send RESPONSE +[4bb 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message PUT_STATE from shim +[4bc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[4bd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4be 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]state is ready +[4bf 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Completed PUT_STATE. Sending RESPONSE +[4c0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]enterBusyState trigger event RESPONSE +[4c1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message RESPONSE +[4c2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[4c3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4c4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message RESPONSE +[4c5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message PUT_STATE from shim +[4c6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: PUT_STATE in state ready +[4c7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4c8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]state is ready +[4c9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [b108583e]Completed PUT_STATE. Sending RESPONSE +[4ca 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [b108583e]enterBusyState trigger event RESPONSE +[4cb 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message RESPONSE +[4cc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: RESPONSE in state ready +[4cd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4ce 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message RESPONSE +[4cf 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[4d0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[4d1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[4d2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[4d3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[4d4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[4d5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[4d6 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [711daa80-1389-4030-8ece-df6ae5d1c629] +[4d7 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[4d8 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel chaincode id: name:"mycc" +[4d9 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[4da 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 channel id: businesschannel version: 1.0.4 +[4db 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361,syscc=true,proposal=0xc424a7d5e0,canname=escc:1.0.4 +[4dc 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[4dd 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[4de 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[4df 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]Inside sendExecuteMessage. Message TRANSACTION +[4e0 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[4e1 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[4e2 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [b108583e]sendExecuteMsg trigger event TRANSACTION +[4e3 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Move state message TRANSACTION +[4e4 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[4e5 12-05 07:30:42.81 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[4e6 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]sending state message TRANSACTION +[4e7 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Received message TRANSACTION from shim +[4e8 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[4e9 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [b108583e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[4ea 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[4eb 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[4ec 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Transaction completed. Sending COMPLETED +[4ed 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]Move state message COMPLETED +[4ee 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [b108583e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[4ef 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [b108583e]send state message COMPLETED +[4f0 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [b108583e]Received message COMPLETED from shim +[4f1 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[4f2 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361]HandleMessage- COMPLETED. Notify +[4f3 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[4f4 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[4f5 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[4f6 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[4f7 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [711daa80-1389-4030-8ece-df6ae5d1c629] +[4f8 12-05 07:30:42.82 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[4f9 12-05 07:30:44.85 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [3], peers number [1] +[4fa 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [3], peers number [1] +[4fb 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[4fc 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[4fd 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[4fe 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc424d5ced0 +[4ff 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\242\226\231\321\005\020\310\266\206\375\002\"\017businesschannel*@b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----\nMIICGTCCAcCgAwIBAgIRAJ2fVqGC32XC5QpgYsmvYxEwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMTcxMjAxMTM1NzE5WhcNMjcxMTI5MTM1NzE5\nWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZ\nMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGUuRHqQywQQQiwBw/px51OzDqFxOPs5\nTnZn/BmMlSxx0TY08lymYLrbgJTnZnQEm2FBjKIhXnYfiKyISkhGfA+jTTBLMA4G\nA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIHo42ePp018h\nd8YtbSiNwy/FcpR/rz5BBTi5oEUuoav4MAoGCCqGSM49BAMCA0cAMEQCIAKwtEBA\nfiVJNh1LZ9FQvBXAkaIfhZRcnm92VIPDg7cYAiAU7xMJG90eDj2BSIib/R7QNkFx\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030C\177D:@\244\305z\336\2571%\320\223\3406H\2049\345\253\367\251\311" +[500 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[501 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[502 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[503 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[504 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[505 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc424b6d000, header channel_header:"\010\003\032\014\010\242\226\231\321\005\020\310\266\206\375\002\"\017businesschannel*@b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org1MSP\022\200\006-----BEGIN -----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\nzekLSULI9G2UUYA77A==\n-----END -----\n\022\030C\177D:@\244\305z\336\2571%\320\223\3406H\2049\345\253\367\251\311" +[506 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[507 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[508 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[509 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[50a 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] +[50b 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[50c 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [c9f2e5d0-6685-48d6-9f24-1026b15224bc] +[50d 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[50e 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.Done -> DEBU Done with transaction simulation / query execution [c9f2e5d0-6685-48d6-9f24-1026b15224bc] +[50f 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[510 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [6eea44f0-ea6c-419b-952d-29a92c96e276] +[511 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=bfb08cca-0245-4a76-ae44-c81abcb03f45,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[512 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 chaindID businesschannel +[513 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[514 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[515 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[516 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bfb08cca]Inside sendExecuteMessage. Message TRANSACTION +[517 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[518 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [bfb08cca]sendExecuteMsg trigger event TRANSACTION +[519 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]Move state message TRANSACTION +[51a 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[51b 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[51c 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]sending state message TRANSACTION +[51d 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Received message TRANSACTION from shim +[51e 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bfb08cca]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[51f 12-05 07:30:44.86 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [bfb08cca]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[520 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[521 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[522 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[523 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Transaction completed. Sending COMPLETED +[524 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]Move state message COMPLETED +[525 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [bfb08cca]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[526 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [bfb08cca]send state message COMPLETED +[527 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [bfb08cca]Received message COMPLETED from shim +[528 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[529 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [bfb08cca-0245-4a76-ae44-c81abcb03f45]HandleMessage- COMPLETED. Notify +[52a 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:bfb08cca-0245-4a76-ae44-c81abcb03f45 +[52b 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[52c 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [6eea44f0-ea6c-419b-952d-29a92c96e276] +[52d 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[52e 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[52f 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc424d62280), Data:(*common.BlockData)(0xc424d82020), Metadata:(*common.BlockMetadata)(0xc424d82060)}, doMVCCValidation=true +[530 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[531 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[532 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=a +[533 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=b +[534 12-05 07:30:44.87 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [3] Transaction index [0] TxId [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] marked as valid by state validator +[535 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0xae, 0xfc, 0x62, 0xed, 0x8f, 0x6e, 0x9d, 0x4c, 0x39, 0xc9, 0x3b, 0xa2, 0x34, 0x61, 0x77, 0x99, 0x41, 0x4e, 0x6c, 0xcc, 0xa1, 0xe5, 0xff, 0x96, 0x8a, 0x7c, 0x97, 0xdf, 0x86, 0x47, 0x62, 0x27} txOffsets= +txId=b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 locPointer=offset=70, bytesLength=2849 +] +[536 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=22445, bytesLength=2849] for tx ID: [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] to index +[537 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=22445, bytesLength=2849] for tx number:[0] ID: [b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361] to blockNumTranNum index +[538 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[27051], isChainEmpty=[false], lastBlockNumber=[3] +[539 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [3] with 1 transaction(s) +[53a 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[53b 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[53c 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[53d 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[53e 12-05 07:30:44.88 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[53f 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[540 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[541 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[542 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [3] contains transaction id: b108583edba27f1ac8b4b5f8b2619e62852ef417395ec852d54ed2fded49a361 +[543 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [3] +[544 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[545 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[546 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[547 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[548 12-05 07:30:44.89 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[549 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[54a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421b83800 +[54b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[54c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[54d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[54e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[54f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[550 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc421b796d0, header 0xc421b83830 +[551 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[552 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[553 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd] +[554 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[555 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [fa67ca22-37f4-4d44-b15e-83723c98808d] +[556 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel +[557 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=true,proposal=0xc421b796d0,canname=lscc:1.0.4 +[558 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[559 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[55a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[55b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[55c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[55d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[55e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[55f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[560 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[561 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[562 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[563 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message TRANSACTION from shim +[564 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[565 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c8cc8373]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[566 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [c8cc8373]Sending GET_STATE +[567 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message GET_STATE from shim +[568 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[569 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [c8cc8373]Received GET_STATE, invoking get state from ledger +[56a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[56b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373] getting state for chaincode lscc, key mycc, channel businesschannel +[56c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[56d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373]Got state. Sending RESPONSE +[56e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c8cc8373]handleGetState serial send RESPONSE +[56f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message RESPONSE from shim +[570 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[571 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c8cc8373]before send +[572 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c8cc8373]after send +[573 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c8cc8373]Received RESPONSE, communicated (state:ready) +[574 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [c8cc8373]GetState received payload RESPONSE +[575 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Transaction completed. Sending COMPLETED +[576 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Move state message COMPLETED +[577 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[578 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]send state message COMPLETED +[579 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[57a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[57b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[57c 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[57d 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[57e 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[57f 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel version: 1.0 +[580 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=false,proposal=0xc421b796d0,canname=mycc:1.0 +[581 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[582 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[583 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[584 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[585 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[586 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[587 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[588 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[589 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[58a 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[58b 12-05 07:31:08.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[58c 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message GET_STATE from shim +[58d 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[58e 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [c8cc8373]Received GET_STATE, invoking get state from ledger +[58f 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[590 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373] getting state for chaincode mycc, key a, channel businesschannel +[591 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[592 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [c8cc8373]Got state. Sending RESPONSE +[593 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c8cc8373]handleGetState serial send RESPONSE +[594 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[595 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[596 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[597 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[598 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[599 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[59a 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[59b 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [fa67ca22-37f4-4d44-b15e-83723c98808d] +[59c 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[59d 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel chaincode id: name:"mycc" +[59e 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[59f 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd channel id: businesschannel version: 1.0.4 +[5a0 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd,syscc=true,proposal=0xc421b796d0,canname=escc:1.0.4 +[5a1 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[5a2 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[5a3 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[5a4 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]Inside sendExecuteMessage. Message TRANSACTION +[5a5 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[5a6 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[5a7 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c8cc8373]sendExecuteMsg trigger event TRANSACTION +[5a8 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Move state message TRANSACTION +[5a9 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[5aa 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[5ab 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]sending state message TRANSACTION +[5ac 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Received message TRANSACTION from shim +[5ad 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[5ae 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c8cc8373]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[5af 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[5b0 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[5b1 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Transaction completed. Sending COMPLETED +[5b2 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]Move state message COMPLETED +[5b3 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c8cc8373]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[5b4 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c8cc8373]send state message COMPLETED +[5b5 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c8cc8373]Received message COMPLETED from shim +[5b6 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[5b7 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd]HandleMessage- COMPLETED. Notify +[5b8 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c8cc8373fcce30d68c434ea84541b8bd52e467ceea79188239bed5cb86843fbd +[5b9 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[5ba 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[5bb 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[5bc 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [fa67ca22-37f4-4d44-b15e-83723c98808d] +[5bd 12-05 07:31:08.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[5be 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Adding payload locally, buffer seqNum = [4], peers number [1] +[5bf 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/deliverservice/blocksprovider] DeliverBlocks -> DEBU [businesschannel] Gossiping block [4], peers number [1] +[5c0 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer] commitBlock.Commit -> DEBU Validating block +[5c1 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU START Block Validation +[5c2 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction peer.ValidateTransaction() +[5c3 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope starts for envelope 0xc421ece360 +[5c4 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU Header is channel_header:"\010\003\032\014\010\274\226\231\321\005\020\324\327\221\227\001\"\017businesschannel*@4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\tP\036\260gY7\367\205\207P\360\016\324u\222\213\372]\036\035\005\261\313" +[5c5 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[5c6 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[5c7 12-05 07:31:10.37 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org2MSP 4e712ad34f75c75845d706cd650231032af5f4450097cd3cdb64dfe19731dcbe} +[5c8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[5c9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[5ca 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction starts for data 0xc421608000, header channel_header:"\010\003\032\014\010\274\226\231\321\005\020\324\327\221\227\001\"\017businesschannel*@4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302:\010\022\006\022\004mycc" signature_header:"\n\214\006\n\007Org2MSP\022\200\006-----BEGIN -----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\nXk1Xy2C2aVQjOcr++w==\n-----END -----\n\022\030\tP\036\260gY7\367\205\207P\360\016\324u\222\213\372]\036\035\005\261\313" +[5cb 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: there are 1 actions +[5cc 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction.validateEndorserTransaction -> DEBU validateEndorserTransaction info: signature header is valid +[5cd 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/validation] commitBlock.Commit.Validate.ValidateTransaction -> DEBU ValidateTransactionEnvelope returns err %!s() +[5ce 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Transaction is for chain businesschannel +[5cf 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Validate.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] +[5d0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU Validating transaction vscc tx validate +[5d1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.NewQueryExecutor.NewQueryExecutor.NewQueryExecutor.newQueryExecutor -> DEBU constructing new query executor [decf1f82-f6be-4aa2-bef9-e3c79a7e3739] +[5d2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[5d3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.GetInfoForValidate.getCDataForCC.Done -> DEBU Done with transaction simulation / query execution [decf1f82-f6be-4aa2-bef9-e3c79a7e3739] +[5d4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[5d5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetContext.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [f677798c-50d1-48ea-95b5-fb37cae38189] +[5d6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.GetCCContext.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=vscc,version=1.0.4,txid=555df838-14bd-42c3-9035-6f665feb5aba,syscc=true,proposal=0x0,canname=vscc:1.0.4 +[5d7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC -> DEBU Invoking VSCC txid 4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 chaindID businesschannel +[5d8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : vscc:1.0.4 +[5d9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[5da 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: vscc:1.0.4 +[5db 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [555df838]Inside sendExecuteMessage. Message TRANSACTION +[5dc 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[5dd 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [555df838]sendExecuteMsg trigger event TRANSACTION +[5de 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]Move state message TRANSACTION +[5df 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[5e0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[5e1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]sending state message TRANSACTION +[5e2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Received message TRANSACTION from shim +[5e3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [555df838]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[5e4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [555df838]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[5e5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC invoked +[5e6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke.deduplicateIdentity -> DEBU Signature set is of size 1 out of 1 endorsement(s) +[5e7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/scc/vscc] Invoke -> DEBU VSCC exists successfully +[5e8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Transaction completed. Sending COMPLETED +[5e9 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]Move state message COMPLETED +[5ea 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [555df838]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[5eb 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [555df838]send state message COMPLETED +[5ec 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [555df838]Received message COMPLETED from shim +[5ed 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[5ee 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [555df838-14bd-42c3-9035-6f665feb5aba]HandleMessage- COMPLETED. Notify +[5ef 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:555df838-14bd-42c3-9035-6f665feb5aba +[5f0 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/chaincode] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ExecuteChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[5f1 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Validate.VSCCValidateTx.VSCCValidateTxForCC.ReleaseContext.Done -> DEBU Done with transaction simulation / query execution [f677798c-50d1-48ea-95b5-fb37cae38189] +[5f2 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/committer/txvalidator] commitBlock.Commit.Validate -> DEBU END Block Validation +[5f3 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.ValidateAndPrepare -> DEBU Validating new block with num trans = [1] +[5f4 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU New block arrived for validation:&common.Block{Header:(*common.BlockHeader)(0xc4249597c0), Data:(*common.BlockData)(0xc421ed0880), Metadata:(*common.BlockMetadata)(0xc421ed08c0)}, doMVCCValidation=true +[5f5 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Validating a block with [1] transactions +[5f6 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=lscc, key=mycc +[5f7 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=a +[5f8 12-05 07:31:10.38 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch.validateEndorserTX.validateTx.validateReadSet.validateKVRead.GetState -> DEBU GetState(). ns=mycc, key=b +[5f9 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/validator/statebasedval] commitBlock.Commit.Commit.Commit.ValidateAndPrepare.ValidateAndPrepareBatch -> DEBU Block [4] Transaction index [0] TxId [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] marked as valid by state validator +[5fa 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x64, 0xa3, 0xcc, 0x55, 0x10, 0x3d, 0x9b, 0x60, 0x6f, 0x36, 0xb2, 0xd5, 0x1b, 0xdd, 0x2e, 0xff, 0x58, 0x0, 0xf2, 0x4, 0x7d, 0x6f, 0xe4, 0x7, 0x53, 0x24, 0x4f, 0x76, 0x2, 0xf1, 0x2b, 0x64} txOffsets= +txId=4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 locPointer=offset=70, bytesLength=2849 +] +[5fb 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=27121, bytesLength=2849] for tx ID: [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] to index +[5fc 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.indexBlock -> DEBU Adding txLoc [fileSuffixNum=0, offset=27121, bytesLength=2849] for tx number:[0] ID: [4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302] to blockNumTranNum index +[5fd 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] commitBlock.Commit.Commit.Commit.AddBlock.addBlock.updateCheckpoint -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[31728], isChainEmpty=[false], lastBlockNumber=[4] +[5fe 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger] commitBlock.Commit.Commit.Commit -> INFO Channel [businesschannel]: Created block [4] with 1 transaction(s) +[5ff 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Committing updates to state database +[600 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Write lock acquired for committing updates to state database +[601 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x62}] +[602 12-05 07:31:10.39 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] commitBlock.Commit.Commit.Commit.Commit.ApplyUpdates -> DEBU Channel [businesschannel]: Applying key=[[]byte{0x6d, 0x79, 0x63, 0x63, 0x0, 0x61}] +[603 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] commitBlock.Commit.Commit.Commit.Commit -> DEBU Updates committed to state database +[604 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[605 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/history/historydb/historyleveldb] commitBlock.Commit.Commit.Commit.Commit -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[606 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Entry +[607 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Channel [businesschannel]: Block event for block number [4] contains transaction id: 4fcd21b4a6f589e505b751bea50b0ad293e18e88f23272cae4580a4f577d3302 +[608 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> INFO Channel [businesschannel]: Sending event for block number [4] +[609 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Entry +[60a 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event processor timeout > 0 +[60b 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Event sent successfully +[60c 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent.Send -> DEBU Exit +[60d 12-05 07:31:10.40 UTC] [github.com/hyperledger/fabric/events/producer] commitBlock.Commit.SendProducerBlockEvent -> DEBU Exit +[60e 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[60f 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424d5cc60 +[610 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[611 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[612 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[613 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[614 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[615 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424b36410, header 0xc424d5cc90 +[616 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"mycc" +[617 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[618 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d] +[619 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[61a 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[61b 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel +[61c 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=true,proposal=0xc424b36410,canname=lscc:1.0.4 +[61d 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[61e 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Entry +[61f 12-05 07:31:11.61 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[620 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[621 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[622 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[623 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[624 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[625 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[626 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[627 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[628 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message TRANSACTION from shim +[629 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[62a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [6ca9040c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[62b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [6ca9040c]Sending GET_STATE +[62c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message GET_STATE from shim +[62d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[62e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [6ca9040c]Received GET_STATE, invoking get state from ledger +[62f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[630 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c] getting state for chaincode lscc, key mycc, channel businesschannel +[631 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[632 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c]Got state. Sending RESPONSE +[633 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [6ca9040c]handleGetState serial send RESPONSE +[634 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message RESPONSE from shim +[635 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[636 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [6ca9040c]before send +[637 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [6ca9040c]after send +[638 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [6ca9040c]Received RESPONSE, communicated (state:ready) +[639 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [6ca9040c]GetState received payload RESPONSE +[63a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Transaction completed. Sending COMPLETED +[63b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Move state message COMPLETED +[63c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[63d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]send state message COMPLETED +[63e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[63f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[640 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[641 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[642 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.getCDSFromLSCC.GetChaincodeDataFromLSCC.ExecuteChaincode.Execute.Execute -> DEBU Exit +[643 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.CheckInsantiationPolicy.GetChaincodeData -> DEBU Getting chaincode data for from cache +[644 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel version: 1.0 +[645 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=mycc,version=1.0,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=false,proposal=0xc424b36410,canname=mycc:1.0 +[646 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : mycc:1.0 +[647 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[648 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: mycc:1.0 +[649 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[64a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[64b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[64c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[64d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[64e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[64f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[650 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[651 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message GET_STATE from shim +[652 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[653 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [6ca9040c]Received GET_STATE, invoking get state from ledger +[654 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[655 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c] getting state for chaincode mycc, key a, channel businesschannel +[656 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=mycc, key=a +[657 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [6ca9040c]Got state. Sending RESPONSE +[658 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [6ca9040c]handleGetState serial send RESPONSE +[659 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[65a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[65b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[65c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processStreamingRPC._ChaincodeSupport_Register_Handler.Register.HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[65d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[65e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[65f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[660 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[661 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[662 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel chaincode id: name:"mycc" +[663 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"mycc" is escc +[664 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d channel id: businesschannel version: 1.0.4 +[665 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d,syscc=true,proposal=0xc424b36410,canname=escc:1.0.4 +[666 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[667 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[668 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[669 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]Inside sendExecuteMessage. Message TRANSACTION +[66a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[66b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[66c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [6ca9040c]sendExecuteMsg trigger event TRANSACTION +[66d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Move state message TRANSACTION +[66e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[66f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[670 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]sending state message TRANSACTION +[671 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Received message TRANSACTION from shim +[672 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[673 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [6ca9040c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[674 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[675 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[676 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Transaction completed. Sending COMPLETED +[677 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]Move state message COMPLETED +[678 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [6ca9040c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[679 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [6ca9040c]send state message COMPLETED +[67a 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [6ca9040c]Received message COMPLETED from shim +[67b 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[67c 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d]HandleMessage- COMPLETED. Notify +[67d 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:6ca9040c6b1349a2271d9ec6338d60b5fb37b323852c811bb771793fba2c077d +[67e 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[67f 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[680 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[681 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [7ae600a3-24d0-4ddc-9da2-cbf3c546b2ba] +[682 12-05 07:31:11.62 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[683 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[684 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421ce22a0 +[685 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[686 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[687 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[688 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[689 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[68a 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc42233bae0, header 0xc421ce22d0 +[68b 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[68c 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[68d 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5] +[68e 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[68f 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [14030388-1b5d-42fb-9342-ea052c545267] +[690 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel +[691 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel version: 1.0.4 +[692 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5,syscc=true,proposal=0xc42233bae0,canname=lscc:1.0.4 +[693 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[694 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[695 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[696 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]Inside sendExecuteMessage. Message TRANSACTION +[697 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[698 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[699 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]sendExecuteMsg trigger event TRANSACTION +[69a 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Move state message TRANSACTION +[69b 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[69c 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[69d 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]sending state message TRANSACTION +[69e 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message TRANSACTION from shim +[69f 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6a0 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [7990219e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6a1 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [7990219e]Sending GET_STATE +[6a2 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message GET_STATE from shim +[6a3 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[6a4 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [7990219e]Received GET_STATE, invoking get state from ledger +[6a5 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6a6 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [7990219e] getting state for chaincode lscc, key mycc, channel businesschannel +[6a7 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[6a8 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [7990219e]Got state. Sending RESPONSE +[6a9 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [7990219e]handleGetState serial send RESPONSE +[6aa 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message RESPONSE from shim +[6ab 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[6ac 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [7990219e]before send +[6ae 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [7990219e]GetState received payload RESPONSE +[6ad 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [7990219e]after send +[6af 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [7990219e]Received RESPONSE, communicated (state:ready) +[6b0 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Transaction completed. Sending COMPLETED +[6b1 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Move state message COMPLETED +[6b2 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[6b3 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]send state message COMPLETED +[6b4 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message COMPLETED from shim +[6b5 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[6b6 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5]HandleMessage- COMPLETED. Notify +[6b7 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[6b8 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[6b9 12-05 07:31:18.14 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[6ba 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[6bb 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [14030388-1b5d-42fb-9342-ea052c545267] +[6bc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[6bd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel chaincode id: name:"lscc" +[6be 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[6bf 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 channel id: businesschannel version: 1.0.4 +[6c0 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5,syscc=true,proposal=0xc42233bae0,canname=escc:1.0.4 +[6c1 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[6c2 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[6c3 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[6c4 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]Inside sendExecuteMessage. Message TRANSACTION +[6c5 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[6c6 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[6c7 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [7990219e]sendExecuteMsg trigger event TRANSACTION +[6c8 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Move state message TRANSACTION +[6c9 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[6ca 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6cb 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]sending state message TRANSACTION +[6cc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Received message TRANSACTION from shim +[6cd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6ce 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [7990219e]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6cf 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[6d0 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[6d1 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Transaction completed. Sending COMPLETED +[6d2 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]Move state message COMPLETED +[6d3 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [7990219e]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[6d4 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [7990219e]send state message COMPLETED +[6d5 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [7990219e]Received message COMPLETED from shim +[6d6 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[6d7 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5]HandleMessage- COMPLETED. Notify +[6d8 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:7990219e383209a7ba627c3033b9057307ca3dfafbd7c926d20441f75d3d15a5 +[6d9 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[6da 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[6db 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[6dc 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [14030388-1b5d-42fb-9342-ea052c545267] +[6dd 12-05 07:31:18.15 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[6de 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[6df 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421c79b30 +[6e0 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[6e1 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[6e2 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[6e3 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[6e4 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[6e5 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a454f0, header 0xc421c79b60 +[6e6 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[6e7 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[6e8 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c] +[6e9 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[6ea 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[6eb 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel +[6ec 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel version: 1.0.4 +[6ed 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c,syscc=true,proposal=0xc424a454f0,canname=lscc:1.0.4 +[6ee 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[6ef 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[6f0 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[6f1 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]Inside sendExecuteMessage. Message TRANSACTION +[6f2 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[6f3 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[6f4 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]sendExecuteMsg trigger event TRANSACTION +[6f5 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Move state message TRANSACTION +[6f6 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[6f7 12-05 07:31:18.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[6f8 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]sending state message TRANSACTION +[6f9 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message TRANSACTION from shim +[6fa 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[6fb 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0c44f7a5]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[6fc 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0c44f7a5]Sending GET_STATE +[6fd 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message GET_STATE from shim +[6fe 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[6ff 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [0c44f7a5]Received GET_STATE, invoking get state from ledger +[700 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0c44f7a5] getting state for chaincode lscc, key mycc, channel businesschannel +[701 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[702 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0c44f7a5]Got state. Sending RESPONSE +[703 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [0c44f7a5]handleGetState serial send RESPONSE +[704 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message RESPONSE from shim +[705 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[706 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0c44f7a5]before send +[707 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0c44f7a5]after send +[708 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [0c44f7a5]Received RESPONSE, communicated (state:ready) +[709 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0c44f7a5]GetState received payload RESPONSE +[70a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Transaction completed. Sending COMPLETED +[70b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Move state message COMPLETED +[70c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[70d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]send state message COMPLETED +[70e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[70f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message COMPLETED from shim +[710 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[711 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c]HandleMessage- COMPLETED. Notify +[712 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[713 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[714 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[715 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[716 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[717 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[718 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel chaincode id: name:"lscc" +[719 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[71a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c channel id: businesschannel version: 1.0.4 +[71b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c,syscc=true,proposal=0xc424a454f0,canname=escc:1.0.4 +[71c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[71d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[71e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[71f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]Inside sendExecuteMessage. Message TRANSACTION +[720 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[721 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[722 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0c44f7a5]sendExecuteMsg trigger event TRANSACTION +[723 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Move state message TRANSACTION +[724 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[725 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[726 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]sending state message TRANSACTION +[727 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Received message TRANSACTION from shim +[728 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[729 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0c44f7a5]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[72a 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[72b 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[72c 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Transaction completed. Sending COMPLETED +[72d 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]Move state message COMPLETED +[72e 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0c44f7a5]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[72f 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0c44f7a5]send state message COMPLETED +[730 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0c44f7a5]Received message COMPLETED from shim +[731 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a5]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[732 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c]HandleMessage- COMPLETED. Notify +[733 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0c44f7a525be85ca37e36e4b0db16b59a079a0ae5d1b33c7f1f186614717df4c +[734 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[735 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[736 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[737 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [5df10a94-afd3-422c-82dd-cc7d70c926f3] +[738 12-05 07:31:18.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[739 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[73a 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421d0a2d0 +[73b 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[73c 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[73d 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[73e 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[73f 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[740 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a10f00, header 0xc421d0a300 +[741 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[742 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[743 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284] +[744 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[745 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [313fa3e2-259d-4445-95c3-022062a81146] +[746 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel +[747 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel version: 1.0.4 +[748 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284,syscc=true,proposal=0xc424a10f00,canname=lscc:1.0.4 +[749 12-05 07:31:18.45 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[74a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[74b 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[74c 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]Inside sendExecuteMessage. Message TRANSACTION +[74d 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[74e 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[74f 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]sendExecuteMsg trigger event TRANSACTION +[750 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Move state message TRANSACTION +[751 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[752 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[753 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]sending state message TRANSACTION +[754 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message TRANSACTION from shim +[755 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[756 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0b41eb23]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[757 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0b41eb23]Sending GET_STATE +[758 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message GET_STATE from shim +[759 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: GET_STATE in state ready +[75a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func3.afterGetState -> DEBU [0b41eb23]Received GET_STATE, invoking get state from ledger +[75b 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[75c 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0b41eb23] getting state for chaincode lscc, key mycc, channel businesschannel +[75d 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/statedb/stateleveldb] GetState.getState.GetState -> DEBU GetState(). ns=lscc, key=mycc +[75e 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU [0b41eb23]Got state. Sending RESPONSE +[75f 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [0b41eb23]handleGetState serial send RESPONSE +[760 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message RESPONSE from shim +[761 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[762 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0b41eb23]before send +[763 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [0b41eb23]after send +[764 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [0b41eb23]Received RESPONSE, communicated (state:ready) +[765 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getCCInstance.GetState.handleGetState -> DEBU [0b41eb23]GetState received payload RESPONSE +[766 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Transaction completed. Sending COMPLETED +[767 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Move state message COMPLETED +[768 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[769 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]send state message COMPLETED +[76a 12-05 07:31:18.46 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message COMPLETED from shim +[76b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[76c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284]HandleMessage- COMPLETED. Notify +[76d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[76e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[76f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[770 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[771 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [313fa3e2-259d-4445-95c3-022062a81146] +[772 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[773 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel chaincode id: name:"lscc" +[774 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[775 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: 0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 channel id: businesschannel version: 1.0.4 +[776 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284,syscc=true,proposal=0xc424a10f00,canname=escc:1.0.4 +[777 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[778 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[779 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[77a 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]Inside sendExecuteMessage. Message TRANSACTION +[77b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[77c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[77d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [0b41eb23]sendExecuteMsg trigger event TRANSACTION +[77e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Move state message TRANSACTION +[77f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[780 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[781 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]sending state message TRANSACTION +[782 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Received message TRANSACTION from shim +[783 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[784 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [0b41eb23]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[785 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[786 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[787 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Transaction completed. Sending COMPLETED +[788 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]Move state message COMPLETED +[789 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [0b41eb23]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[78a 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [0b41eb23]send state message COMPLETED +[78b 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [0b41eb23]Received message COMPLETED from shim +[78c 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb23]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[78d 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284]HandleMessage- COMPLETED. Notify +[78e 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:0b41eb234d88f0e417e624b6310c3ae05b69f88746957ca3ce5d8d835e8ac284 +[78f 12-05 07:31:18.47 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[790 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[791 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[792 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [313fa3e2-259d-4445-95c3-022062a81146] +[793 12-05 07:31:18.48 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[794 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[795 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc42179acc0 +[796 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[797 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[798 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[799 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[79a 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[79b 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc4217cf4a0, header 0xc42179acf0 +[79c 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[79d 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[79e 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c] +[79f 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[7a0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7a1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel +[7a2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel version: 1.0.4 +[7a3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c,syscc=true,proposal=0xc4217cf4a0,canname=lscc:1.0.4 +[7a4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[7a5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7a6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[7a7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]Inside sendExecuteMessage. Message TRANSACTION +[7a8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7a9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7aa 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]sendExecuteMsg trigger event TRANSACTION +[7ab 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Move state message TRANSACTION +[7ac 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7ad 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7ae 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]sending state message TRANSACTION +[7af 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Received message TRANSACTION from shim +[7b0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7b1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ec65cab1]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7b2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Transaction completed. Sending COMPLETED +[7b3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Move state message COMPLETED +[7b4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[7b5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]send state message COMPLETED +[7b6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Received message COMPLETED from shim +[7b7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[7b8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c]HandleMessage- COMPLETED. Notify +[7b9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[7ba 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[7bb 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[7bc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[7bd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7be 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[7bf 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel chaincode id: name:"lscc" +[7c0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[7c1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c channel id: businesschannel version: 1.0.4 +[7c2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c,syscc=true,proposal=0xc4217cf4a0,canname=escc:1.0.4 +[7c3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[7c4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7c5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[7c6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]Inside sendExecuteMessage. Message TRANSACTION +[7c7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7c8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7c9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [ec65cab1]sendExecuteMsg trigger event TRANSACTION +[7ca 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Move state message TRANSACTION +[7cb 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7cc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7cd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]sending state message TRANSACTION +[7ce 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Received message TRANSACTION from shim +[7cf 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7d0 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [ec65cab1]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7d1 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[7d2 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[7d3 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Transaction completed. Sending COMPLETED +[7d4 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]Move state message COMPLETED +[7d5 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [ec65cab1]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[7d6 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [ec65cab1]send state message COMPLETED +[7d7 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [ec65cab1]Received message COMPLETED from shim +[7d8 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab1]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[7d9 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c]HandleMessage- COMPLETED. Notify +[7da 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:ec65cab131a411f97c90510624dabf7146df9a7dee6443bacbefa26790f8957c +[7db 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[7dc 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[7dd 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[7de 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [73a6d2f5-87cd-4038-83a1-46121a5fca48] +[7df 12-05 07:31:18.64 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[7e0 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[7e1 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc424da68a0 +[7e2 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[7e3 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[7e4 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[7e5 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[7e6 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[7e7 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424e74500, header 0xc424da68d0 +[7e8 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[7e9 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[7ea 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.GetTransactionByID.GetTransactionByID.RetrieveTxByID.retrieveTransactionByID -> DEBU retrieveTransactionByID() - txId = [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560] +[7eb 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator -> DEBU constructing new tx simulator +[7ec 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.getTxSimulator.NewTxSimulator.NewTxSimulator.NewTxSimulator.newLockBasedTxSimulator -> DEBU constructing new tx simulator [777d3720-fde9-4a58-9964-85ecf5cf9140] +[7ed 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel +[7ee 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel version: 1.0.4 +[7ef 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=lscc,version=1.0.4,txid=c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560,syscc=true,proposal=0xc424e74500,canname=lscc:1.0.4 +[7f0 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : lscc:1.0.4 +[7f1 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[7f2 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: lscc:1.0.4 +[7f3 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]Inside sendExecuteMessage. Message TRANSACTION +[7f4 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[7f5 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[7f6 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]sendExecuteMsg trigger event TRANSACTION +[7f7 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Move state message TRANSACTION +[7f8 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[7f9 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[7fa 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]sending state message TRANSACTION +[7fb 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message TRANSACTION from shim +[7fc 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[7fd 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c63148c7]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[7fe 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.GetStateByRange.handleGetStateByRange.handleGetStateByRange -> DEBU [c63148c7]Sending GET_STATE_BY_RANGE +[7ff 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message GET_STATE_BY_RANGE from shim +[800 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[801 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func4.afterGetStateByRange -> DEBU Received GET_STATE_BY_RANGE, invoking get state from ledger +[802 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/common/ledger/util/leveldbhelper] GetStateRangeScanIterator.getStateRangeScanIterator.newResultsItr.GetStateRangeScanIterator.GetIterator -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[803 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/rwsetutil] getQueryResponse.Next.updateRangeQueryInfo.AddResult -> DEBU Adding a result +[804 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU Got keys and values. Sending RESPONSE +[805 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c63148c7]handleGetStateByRange serial send RESPONSE +[806 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message RESPONSE from shim +[807 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[808 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]before send +[809 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]after send +[80a 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c63148c7]Received RESPONSE, communicated (state:ready) +[80b 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.GetStateByRange.handleGetStateByRange.handleGetStateByRange -> DEBU [c63148c7]Received RESPONSE. Successfully got range +[80c 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.Close.handleQueryStateClose -> DEBU [c63148c7]Sending QUERY_STATE_CLOSE +[80d 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func4.afterGetStateByRange -> DEBU Exiting GET_STATE_BY_RANGE +[80e 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[80f 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message QUERY_STATE_CLOSE from shim +[810 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[811 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func8.afterQueryStateClose -> DEBU Received QUERY_STATE_CLOSE, invoking query state close from ledger +[813 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] -> DEBU Closed. Sending RESPONSE +[814 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] 1 -> DEBU [c63148c7]handleQueryStateClose serial send RESPONSE +[815 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message RESPONSE from shim +[816 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: RESPONSE(state:ready) +[817 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]before send +[818 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse.sendChannel -> DEBU [c63148c7]after send +[819 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.afterEventCallbacks.func2.afterResponse -> DEBU [c63148c7]Received RESPONSE, communicated (state:ready) +[81a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] Invoke.getChaincodes.Close.handleQueryStateClose -> DEBU [c63148c7]Received RESPONSE. Successfully got range +[81b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Transaction completed. Sending COMPLETED +[81c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Move state message COMPLETED +[81d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[81e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]send state message COMPLETED +[812 12-05 07:31:18.75 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.Event.afterEventCallbacks.func8.afterQueryStateClose -> DEBU Exiting QUERY_STATE_CLOSE +[81f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[820 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message COMPLETED from shim +[821 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[822 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560]HandleMessage- COMPLETED. Notify +[823 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[824 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[825 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[826 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults -> DEBU Simulation completed, getting simulation results +[827 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.GetTxSimulationResults.Done -> DEBU Done with transaction simulation / query execution [777d3720-fde9-4a58-9964-85ecf5cf9140] +[828 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[829 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel chaincode id: name:"lscc" +[82a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU info: escc for chaincode id name:"lscc" is escc +[82b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Entry - txid: c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 channel id: businesschannel version: 1.0.4 +[82c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=businesschannel,chaincode=escc,version=1.0.4,txid=c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560,syscc=true,proposal=0xc424e74500,canname=escc:1.0.4 +[82d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : escc:1.0.4 +[82e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[82f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: escc:1.0.4 +[830 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]Inside sendExecuteMessage. Message TRANSACTION +[831 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[832 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[833 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [c63148c7]sendExecuteMsg trigger event TRANSACTION +[834 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Move state message TRANSACTION +[835 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[836 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[837 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]sending state message TRANSACTION +[838 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Received message TRANSACTION from shim +[839 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[83a 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [c63148c7]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[83b 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC starts: 8 args +[83c 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/scc/escc] Invoke -> DEBU ESCC exits successfully +[83d 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Transaction completed. Sending COMPLETED +[83e 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]Move state message COMPLETED +[83f 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [c63148c7]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[840 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [c63148c7]send state message COMPLETED +[841 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [c63148c7]Received message COMPLETED from shim +[842 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c7]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[843 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560]HandleMessage- COMPLETED. Notify +[844 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:c63148c76889c877849e4cff92d5854a24f1df4cfda5fd0d4ffa8f95e4d8c560 +[845 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[846 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal.callChaincode -> DEBU Exit +[847 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.endorseProposal -> DEBU Exit +[848 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/ledger/kvledger/txmgmt/txmgr/lockbasedtxmgr] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.Done -> DEBU Done with transaction simulation / query execution [777d3720-fde9-4a58-9964-85ecf5cf9140] +[849 12-05 07:31:18.76 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[84a 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[84b 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421d0bc20 +[84c 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[84d 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[84e 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[84f 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[850 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[851 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424a11a90, header 0xc421d0bc50 +[852 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[853 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 +[854 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 channel id: +[855 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: 38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 channel id: version: 1.0.4 +[856 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757,syscc=true,proposal=0xc424a11a90,canname=qscc:1.0.4 +[857 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[858 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[859 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[85a 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [38e7f5c3]Inside sendExecuteMessage. Message TRANSACTION +[85b 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[85c 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[85d 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [38e7f5c3]sendExecuteMsg trigger event TRANSACTION +[85e 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]Move state message TRANSACTION +[85f 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[860 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[861 12-05 07:31:19.09 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]sending state message TRANSACTION +[862 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Received message TRANSACTION from shim +[863 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [38e7f5c3]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[864 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [38e7f5c3]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[865 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Invoke -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[866 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Transaction completed. Sending COMPLETED +[867 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]Move state message COMPLETED +[868 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [38e7f5c3]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[869 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [38e7f5c3]send state message COMPLETED +[86a 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [38e7f5c3]Received message COMPLETED from shim +[86b 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[86c 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757]HandleMessage- COMPLETED. Notify +[86d 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:38e7f5c3201ff7beb35c04485c7b69ac802a21fb954a33c6bd4d0face2b07757 +[86e 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[86f 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[870 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[871 12-05 07:31:19.10 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit +[872 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Entry +[873 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage -> DEBU ValidateProposalMessage starts for signed proposal 0xc421b1e2a0 +[874 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateCommonHeader.validateChannelHeader -> DEBU validateChannelHeader info: header type 3 +[875 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator starts +[876 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is &{Org1MSP fa22925f40fb1f9442b57936a4ccb1f8427a5cf69db4a483ec77d96af42c6ac0} +[877 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator info: creator is valid +[878 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.checkSignatureFromCreator -> DEBU checkSignatureFromCreator exists successfully +[879 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage starts for proposal 0xc424e75450, header 0xc421b1e2d0 +[87a 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/validation] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.ValidateProposalMessage.validateChaincodeProposalMessage -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[87b 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU processing txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 +[87c 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Entry - txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 channel id: +[87d 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Entry - txid: fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 channel id: version: 1.0.4 +[87e 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/common/ccprovider] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.NewCCContext -> DEBU NewCCCC (chain=,chaincode=qscc,version=1.0.4,txid=fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979,syscc=true,proposal=0xc424e75450,canname=qscc:1.0.4 +[87f 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Launch -> DEBU chaincode is running(no need to launch) : qscc:1.0.4 +[880 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Entry +[881 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU chaincode canonical name: qscc:1.0.4 +[882 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [fa2f592c]Inside sendExecuteMessage. Message TRANSACTION +[883 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Setting chaincode proposal context... +[884 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage.setChaincodeProposal -> DEBU Proposal different from nil. Creating chaincode proposal context... +[885 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute.sendExecuteMessage -> DEBU [fa2f592c]sendExecuteMsg trigger event TRANSACTION +[886 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]Move state message TRANSACTION +[887 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c]Fabric side Handling ChaincodeMessage of type: TRANSACTION in state ready +[888 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.filterError -> DEBU Ignoring NoTransitionError: no transition +[889 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]sending state message TRANSACTION +[88a 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Received message TRANSACTION from shim +[88b 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [fa2f592c]Handling ChaincodeMessage of type: TRANSACTION(state:ready) +[88c 12-05 07:31:19.26 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage.Event.beforeEventCallbacks.func5.beforeTransaction -> DEBU [fa2f592c]Received TRANSACTION, invoking transaction on chaincode(Src:ready, Dst:ready) +[88d 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/scc/qscc] Invoke -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[88e 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber -> DEBU retrieveBlockByNumber() - blockNum = [2] +[88f 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.newBlockfileStream -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[17162] +[890 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.nextBlockBytes.nextBlockBytesAndPlacementInfo -> DEBU Remaining bytes=[14566], Going to peek [8] bytes +[891 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/common/ledger/blkstorage/fsblkstorage] Invoke.getBlockByNumber.GetBlockByNumber.GetBlockByNumber.RetrieveBlockByNumber.retrieveBlockByNumber.fetchBlock.fetchBlockBytes.nextBlockBytes.nextBlockBytesAndPlacementInfo -> DEBU Returning blockbytes - length=[5211], placementInfo={fileNum=[0], startOffset=[17162], bytesOffset=[17164]} +[892 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Transaction completed. Sending COMPLETED +[893 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]Move state message COMPLETED +[894 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] handleMessage -> DEBU [fa2f592c]Handling ChaincodeMessage of type: COMPLETED(state:ready) +[895 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode/shim] -> DEBU [fa2f592c]send state message COMPLETED +[896 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream -> DEBU [fa2f592c]Received message COMPLETED from shim +[897 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c]Fabric side Handling ChaincodeMessage of type: COMPLETED in state ready +[898 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage -> DEBU [fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979]HandleMessage- COMPLETED. Notify +[899 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] HandleChaincodeStream.HandleChaincodeStream.processStream.HandleMessage.notify -> DEBU notifying Txid:fa2f592c946759f945804166e44dbbc8edbddf1d346953cd677f526cabf67979 +[89a 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/chaincode] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode.ExecuteChaincode.Execute.Execute -> DEBU Exit +[89b 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal.callChaincode -> DEBU Exit +[89c 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal.simulateProposal -> DEBU Exit +[89d 12-05 07:31:19.27 UTC] [github.com/hyperledger/fabric/core/endorser] handleStream.processUnaryRPC._Endorser_ProcessProposal_Handler.ProcessProposal -> DEBU Exit diff --git a/hyperledger_fabric/v1.4.3/solo/logs/dev_peer0.log b/hyperledger_fabric/v1.4.3/solo/logs/dev_peer0.log new file mode 100644 index 00000000..e66afa94 --- /dev/null +++ b/hyperledger_fabric/v1.4.3/solo/logs/dev_peer0.log @@ -0,0 +1,227 @@ +"2019-04-22 06:20:05.431 UTC [nodeCmd] serve -> INFO 001 Starting peer: + Version: 2.0.0 + Commit SHA: development build + Go version: go1.11.5 + OS/Arch: linux/amd64 + Chaincode: + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger" +"2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 002 Auto-detected peer address: 192.168.224.7:7051" +"2019-04-22 06:20:05.432 UTC [peer] getLocalAddress -> INFO 003 Returning peer0.org1.example.com:7051" +"2019-04-22 06:20:05.439 UTC [ledgermgmt] initialize -> INFO 004 Initializing ledger mgmt" +"2019-04-22 06:20:05.440 UTC [kvledger] NewProvider -> INFO 005 Initializing ledger provider" +"2019-04-22 06:20:05.539 UTC [kvledger] NewProvider -> INFO 006 ledger provider Initialized" +"2019-04-22 06:20:05.573 UTC [ledgermgmt] initialize -> INFO 007 ledger mgmt initialized" +"2019-04-22 06:20:05.573 UTC [lifecycle] InitializeLocalChaincodes -> INFO 008 Initialized lifecycle cache with 0 already installed chaincodes" +"2019-04-22 06:20:05.590 UTC [nodeCmd] serve -> INFO 009 Starting peer with TLS enabled" +"2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00a Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com" +"2019-04-22 06:20:05.600 UTC [nodeCmd] computeChaincodeEndpoint -> INFO 00b Exit with ccEndpoint: peer0.org1.example.com:7052" +"2019-04-22 06:20:05.619 UTC [sccapi] registerSysCC -> INFO 00c system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00d system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00e system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered" +"2019-04-22 06:20:05.620 UTC [sccapi] registerSysCC -> INFO 00f system chaincode _lifecycle(github.com/hyperledger/fabric/core/chaincode/lifecycle) registered" +"2019-04-22 06:20:05.638 UTC [gossip.service] func1 -> INFO 010 Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051]" +"2019-04-22 06:20:05.643 UTC [gossip.gossip] NewGossipService -> INFO 011 Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d, Metadata: " +"2019-04-22 06:20:05.644 UTC [gossip.gossip] start -> INFO 012 Gossip instance peer0.org1.example.com:7051 started" +"2019-04-22 06:20:05.646 UTC [sccapi] deploySysCC -> INFO 013 system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:20:05.648 UTC [cscc] Init -> INFO 014 Init CSCC" +"2019-04-22 06:20:05.648 UTC [sccapi] deploySysCC -> INFO 015 system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:20:05.650 UTC [qscc] Init -> INFO 016 Init QSCC" +"2019-04-22 06:20:05.651 UTC [sccapi] deploySysCC -> INFO 017 system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:20:05.652 UTC [sccapi] deploySysCC -> INFO 018 system chaincode _lifecycle/(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:20:05.652 UTC [nodeCmd] serve -> INFO 019 Deployed system chaincodes" +"2019-04-22 06:20:05.653 UTC [discovery] NewService -> INFO 01a Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000" +"2019-04-22 06:20:05.653 UTC [nodeCmd] registerDiscoveryService -> INFO 01b Discovery service activated" +"2019-04-22 06:20:05.653 UTC [nodeCmd] serve -> INFO 01c Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:20:05.654 UTC [nodeCmd] serve -> INFO 01d Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051]" +"2019-04-22 06:20:06.572 UTC [comm.grpc.server] 1 -> INFO 01e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.571Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=230.9µs +"2019-04-22 06:20:06.583 UTC [comm.grpc.server] 1 -> INFO 01f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:16.575Z grpc.peer_address=192.168.224.4:34332 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.5807ms +"2019-04-22 06:20:06.588 UTC [comm.grpc.server] 1 -> INFO 020 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:08.587Z grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.3µs +"2019-04-22 06:20:09.194 UTC [endorser] callChaincode -> INFO 021 [][d7a70671] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:09.201 UTC [ledgermgmt] CreateLedger -> INFO 022 Creating ledger [businesschannel] with genesis block" +"2019-04-22 06:20:09.205 UTC [fsblkstorage] newBlockfileMgr -> INFO 023 Getting block information from block storage" +"2019-04-22 06:20:09.228 UTC [kvledger] CommitWithPvtData -> INFO 024 [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=1ms block_commit=8ms state_commit=3ms)" +"2019-04-22 06:20:09.231 UTC [ledgermgmt] CreateLedger -> INFO 025 Created ledger [businesschannel] with genesis block" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] JoinChan -> INFO 026 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 027 No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:20:09.241 UTC [gossip.gossip] learnAnchorPeers -> INFO 028 No configured anchor peers of Org1MSP for channel businesschannel to learn about" +"2019-04-22 06:20:09.264 UTC [gossip.state] NewGossipStateProvider -> INFO 029 Updating metadata information, current ledger sequence is at = 0, next expected block is = 1" +"2019-04-22 06:20:09.266 UTC [sccapi] deploySysCC -> INFO 02a system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed" +"2019-04-22 06:20:09.266 UTC [cscc] Init -> INFO 02b Init CSCC" +"2019-04-22 06:20:09.267 UTC [sccapi] deploySysCC -> INFO 02c system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed" +"2019-04-22 06:20:09.267 UTC [qscc] Init -> INFO 02d Init QSCC" +"2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02e system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed" +"2019-04-22 06:20:09.268 UTC [sccapi] deploySysCC -> INFO 02f system chaincode _lifecycle/businesschannel(github.com/hyperledger/fabric/core/chaincode/lifecycle) deployed" +"2019-04-22 06:20:09.269 UTC [endorser] callChaincode -> INFO 030 [][d7a70671] Exit chaincode: name:"cscc" (74ms)" +"2019-04-22 06:20:09.269 UTC [comm.grpc.server] 1 -> INFO 031 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55716 grpc.code=OK grpc.call_duration=76.3852ms +"2019-04-22 06:20:10.473 UTC [endorser] callChaincode -> INFO 032 [][f9f9eb73] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:10.475 UTC [endorser] callChaincode -> INFO 033 [][f9f9eb73] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:20:10.475 UTC [comm.grpc.server] 1 -> INFO 034 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55724 grpc.code=OK grpc.call_duration=3.4108ms +"2019-04-22 06:20:11.426 UTC [endorser] callChaincode -> INFO 035 [][dabe5c8d] Entry chaincode: name:"qscc" " +"2019-04-22 06:20:11.429 UTC [endorser] callChaincode -> INFO 036 [][dabe5c8d] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:20:11.429 UTC [comm.grpc.server] 1 -> INFO 037 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55732 grpc.code=OK grpc.call_duration=3.4583ms +"2019-04-22 06:20:14.243 UTC [gossip.channel] reportMembershipChanges -> INFO 038 Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]]" +"2019-04-22 06:20:15.268 UTC [gossip.election] beLeader -> INFO 039 c4503d5f6d3b9c8cc45f767e84a1d9754a146b3829f591b2366894351236d32d : Becoming a leader" +"2019-04-22 06:20:15.268 UTC [gossip.service] func1 -> INFO 03a Elected as a leader, starting delivery service for channel businesschannel" +"2019-04-22 06:20:15.826 UTC [comm.grpc.server] 1 -> INFO 03b unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.826Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.2µs +"2019-04-22 06:20:15.840 UTC [comm.grpc.server] 1 -> INFO 03c streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.828Z grpc.peer_address=192.168.224.5:42150 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2234ms +"2019-04-22 06:20:15.845 UTC [comm.grpc.server] 1 -> INFO 03d unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.845Z grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=158.7µs +"2019-04-22 06:20:15.869 UTC [comm.grpc.server] 1 -> INFO 03e unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.868Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=143.4µs +"2019-04-22 06:20:15.883 UTC [comm.grpc.server] 1 -> INFO 03f streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.871Z grpc.peer_address=192.168.224.6:51026 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.8279ms +"2019-04-22 06:20:15.900 UTC [comm.grpc.server] 1 -> INFO 040 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.9Z grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1.9369ms +"2019-04-22 06:20:15.916 UTC [comm.grpc.server] 1 -> INFO 041 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.914Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=949.4µs +"2019-04-22 06:20:15.957 UTC [comm.grpc.server] 1 -> INFO 042 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42152 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.2288ms +"2019-04-22 06:20:15.958 UTC [comm.grpc.server] 1 -> INFO 043 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.933Z grpc.peer_address=192.168.224.5:42158 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=20.5323ms +"2019-04-22 06:20:15.995 UTC [comm.grpc.server] 1 -> INFO 044 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:17.994Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=188µs +"2019-04-22 06:20:16.014 UTC [comm.grpc.server] 1 -> INFO 045 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:25.998Z grpc.peer_address=192.168.224.6:51036 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9576ms +"2019-04-22 06:20:16.015 UTC [comm.grpc.server] 1 -> INFO 046 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.6:51028 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.144ms +"2019-04-22 06:20:17.640 UTC [endorser] callChaincode -> INFO 047 [][b0c8eda3] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:17.641 UTC [endorser] callChaincode -> INFO 048 [][b0c8eda3] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:17.642 UTC [comm.grpc.server] 1 -> INFO 049 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55776 grpc.code=OK grpc.call_duration=2.8919ms +"2019-04-22 06:20:18.273 UTC [ConnProducer] NewConnection -> ERRO 04a Failed connecting to orderer1.example.com:7050 , error: context deadline exceeded" +"2019-04-22 06:20:18.308 UTC [gossip.privdata] StoreBlock -> INFO 04b [businesschannel] Received block [1] from buffer" +"2019-04-22 06:20:18.351 UTC [gossip.gossip] JoinChan -> INFO 04c Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:18.352 UTC [gossip.gossip] learnAnchorPeers -> INFO 04d Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04e Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:20:18.353 UTC [gossip.gossip] learnAnchorPeers -> INFO 04f No configured anchor peers of Org2MSP for channel businesschannel to learn about" +"2019-04-22 06:20:18.366 UTC [committer.txvalidator] Validate -> INFO 050 [businesschannel] Validated block [1] in 58ms" +"2019-04-22 06:20:18.401 UTC [kvledger] CommitWithPvtData -> INFO 051 [businesschannel] Committed block [1] with 1 transaction(s) in 34ms (state_validation=1ms block_commit=24ms state_commit=4ms)" +"2019-04-22 06:20:18.402 UTC [gossip.privdata] StoreBlock -> INFO 052 [businesschannel] Received block [2] from buffer" +"2019-04-22 06:20:18.432 UTC [comm.grpc.server] 1 -> INFO 053 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.431Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=177.7µs +"2019-04-22 06:20:18.442 UTC [comm.grpc.server] 1 -> INFO 054 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34334 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=11.8527917s +"2019-04-22 06:20:18.443 UTC [comm.grpc.server] 1 -> INFO 055 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.439Z grpc.peer_address=192.168.224.4:34410 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.2399ms +"2019-04-22 06:20:18.470 UTC [gossip.gossip] JoinChan -> INFO 056 Joining gossip network of channel businesschannel with 2 organizations" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 057 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 058 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:20:18.471 UTC [gossip.gossip] learnAnchorPeers -> INFO 059 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:20:18.526 UTC [committer.txvalidator] Validate -> INFO 05a [businesschannel] Validated block [2] in 122ms" +"2019-04-22 06:20:18.550 UTC [kvledger] CommitWithPvtData -> INFO 05b [businesschannel] Committed block [2] with 1 transaction(s) in 23ms (state_validation=1ms block_commit=14ms state_commit=5ms)" +"2019-04-22 06:20:18.622 UTC [comm.grpc.server] 1 -> INFO 05c unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.621Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=488.1µs +"2019-04-22 06:20:18.638 UTC [comm.grpc.server] 1 -> INFO 05d streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:20:28.629Z grpc.peer_address=192.168.224.4:34416 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=8.3762ms +"2019-04-22 06:20:18.649 UTC [gossip.comm] func1 -> WARN 05e peer0.org2.example.com:7051, PKIid:06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030 isn't responsive: EOF" +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 05f Entering [06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030]" +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 060 Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: 06cca350fdfd53b6e757741b4bccbaed83ed924d3661d37329138df61af92030, Metadata: " +"2019-04-22 06:20:18.650 UTC [gossip.discovery] expireDeadMembers -> WARN 061 Exiting" +"2019-04-22 06:20:18.680 UTC [comm.grpc.server] 1 -> INFO 062 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:20.676Z grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.0373ms +"2019-04-22 06:20:19.242 UTC [gossip.channel] reportMembershipChanges -> INFO 063 Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer1.org2.example.com:7051 ]]" +"2019-04-22 06:20:19.553 UTC [comm.grpc.server] 1 -> INFO 064 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:20:21.553Z grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=140.1µs +"2019-04-22 06:20:20.374 UTC [endorser] callChaincode -> INFO 065 [][2457efbe] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:20.375 UTC [endorser] callChaincode -> INFO 066 [][2457efbe] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:20.376 UTC [comm.grpc.server] 1 -> INFO 067 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55808 grpc.code=OK grpc.call_duration=2.6513ms +"2019-04-22 06:20:20.543 UTC [endorser] callChaincode -> INFO 068 [][1ba692c4] Entry chaincode: name:"cscc" " +"2019-04-22 06:20:20.546 UTC [endorser] callChaincode -> INFO 069 [][1ba692c4] Exit chaincode: name:"cscc" (2ms)" +"2019-04-22 06:20:20.546 UTC [comm.grpc.server] 1 -> INFO 06a unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=3.7147ms +"2019-04-22 06:20:20.568 UTC [endorser] callChaincode -> INFO 06b [businesschannel][8228dde0] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:20.571 UTC [lifecycle] ApproveChaincodeDefinitionForOrg -> INFO 06c successfully approved definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:20.571 UTC [endorser] callChaincode -> INFO 06d [businesschannel][8228dde0] Exit chaincode: name:"_lifecycle" (4ms)" +"2019-04-22 06:20:20.582 UTC [comm.grpc.server] 1 -> INFO 06e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55812 grpc.code=OK grpc.call_duration=15.3831ms +"2019-04-22 06:20:22.610 UTC [gossip.privdata] StoreBlock -> INFO 06f [businesschannel] Received block [3] from buffer" +"2019-04-22 06:20:22.658 UTC [committer.txvalidator] Validate -> INFO 070 [businesschannel] Validated block [3] in 47ms" +"2019-04-22 06:20:22.672 UTC [confighistory] HandleStateUpdates -> ERRO 071 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc0036bd060)}" +"2019-04-22 06:20:22.687 UTC [kvledger] CommitWithPvtData -> INFO 072 [businesschannel] Committed block [3] with 1 transaction(s) in 19ms (state_validation=5ms block_commit=9ms state_commit=2ms)" +"2019-04-22 06:20:22.696 UTC [comm.grpc.server] 1 -> INFO 073 streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:50.585Z grpc.peer_address=192.168.224.3:55814 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1106328s +"2019-04-22 06:20:24.209 UTC [gossip.channel] reportMembershipChanges -> INFO 074 Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]]" +"2019-04-22 06:20:25.090 UTC [gossip.privdata] StoreBlock -> INFO 075 [businesschannel] Received block [4] from buffer" +"2019-04-22 06:20:25.093 UTC [committer.txvalidator] Validate -> INFO 076 [businesschannel] Validated block [4] in 3ms" +"2019-04-22 06:20:25.105 UTC [confighistory] HandleStateUpdates -> ERRO 077 Config history manager is expected to recieve events only if at least one chaincode is updated stateUpdates = ledger.StateUpdates{"_lifecycle":(*ledger.KVStateUpdates)(0xc00380de60)}" +"2019-04-22 06:20:25.130 UTC [kvledger] CommitWithPvtData -> INFO 078 [businesschannel] Committed block [4] with 1 transaction(s) in 35ms (state_validation=11ms block_commit=15ms state_commit=4ms)" +"2019-04-22 06:20:25.752 UTC [endorser] callChaincode -> INFO 079 [businesschannel][c7a707e5] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:25.761 UTC [lifecycle] QueryApprovalStatus -> INFO 07a successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: false), validation info: (plugin: 'vscc', policy: '12202f4368616e6e656c2f4170706c69636174696f6e2f456e646f7273656d656e74'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:25.761 UTC [endorser] callChaincode -> INFO 07b [businesschannel][c7a707e5] Exit chaincode: name:"_lifecycle" (9ms)" +"2019-04-22 06:20:25.762 UTC [comm.grpc.server] 1 -> INFO 07c unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55832 grpc.code=OK grpc.call_duration=10.6769ms +"2019-04-22 06:20:26.400 UTC [endorser] callChaincode -> INFO 07d [][968d211d] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:26.401 UTC [endorser] callChaincode -> INFO 07e [][968d211d] Exit chaincode: name:"_lifecycle" (1ms)" +"2019-04-22 06:20:26.401 UTC [comm.grpc.server] 1 -> INFO 07f unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55842 grpc.code=OK grpc.call_duration=2.1624ms +"2019-04-22 06:20:26.600 UTC [endorser] callChaincode -> INFO 080 [businesschannel][0ddd88a6] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:26.604 UTC [lifecycle] QueryApprovalStatus -> INFO 081 successfully queried approval status for definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:26.606 UTC [lifecycle] CommitChaincodeDefinition -> INFO 082 successfully committed definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:26.607 UTC [endorser] callChaincode -> INFO 083 [businesschannel][0ddd88a6] Exit chaincode: name:"_lifecycle" (7ms)" +"2019-04-22 06:20:26.608 UTC [comm.grpc.server] 1 -> INFO 084 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55846 grpc.code=OK grpc.call_duration=9.3629ms +"2019-04-22 06:20:28.645 UTC [gossip.privdata] StoreBlock -> INFO 085 [businesschannel] Received block [5] from buffer" +"2019-04-22 06:20:28.648 UTC [committer.txvalidator] Validate -> INFO 086 [businesschannel] Validated block [5] in 2ms" +"2019-04-22 06:20:28.650 UTC [lifecycle] update -> INFO 087 Updating cached definition for chaincode 'exp02' on channel 'businesschannel'" +"2019-04-22 06:20:28.651 UTC [lifecycle] update -> INFO 088 Chaincode with package ID 'exp02_1.0:1f060a1d05b057d98ed98ca8fd57e3a6542d8dfe383aeff64e289718ab851e2b' now available on channel businesschannel for chaincode definition exp02:1.0" +"2019-04-22 06:20:28.651 UTC [cceventmgmt] HandleStateUpdates -> INFO 089 Channel [businesschannel]: Handling deploy or update of chaincode [exp02]" +"2019-04-22 06:20:28.652 UTC [ccprovider] ExtractStatedbArtifactsForChaincode -> INFO 08a Error while loading installation package for ccname=exp02, ccversion=1.0. Err=open /var/hyperledger/production/chaincodes/exp02.1.0: no such file or directory" +"2019-04-22 06:20:28.652 UTC [cceventmgmt] HandleChaincodeDeploy -> INFO 08b Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x80, 0x18, 0x18, 0x55, 0xe9, 0x53, 0x83, 0x5a, 0x2f, 0x99, 0x39, 0x2d, 0xf9, 0xbb, 0xc0, 0x40, 0x38, 0xb, 0xf1, 0x5, 0x7b, 0x30, 0xb0, 0xf8, 0x4f, 0x6e, 0x9c, 0xb4, 0xc2, 0xe8, 0xae, 0x45}] is not installed hence no need to create chaincode artifacts for endorsement" +"2019-04-22 06:20:28.682 UTC [kvledger] CommitWithPvtData -> INFO 08c [businesschannel] Committed block [5] with 1 transaction(s) in 32ms (state_validation=8ms block_commit=12ms state_commit=3ms)" +"2019-04-22 06:20:28.740 UTC [comm.grpc.server] 1 -> INFO 08d streaming call completed" grpc.service=protos.Deliver grpc.method=DeliverFiltered grpc.request_deadline=2019-04-22T06:20:56.624Z grpc.peer_address=192.168.224.3:55848 error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=2.1146288s +"2019-04-22 06:20:29.215 UTC [endorser] callChaincode -> INFO 08e [businesschannel][d82eabee] Entry chaincode: name:"_lifecycle" " +"2019-04-22 06:20:29.230 UTC [lifecycle] QueryChaincodeDefinition -> INFO 08f successfully queried definition sequence: 1, endorsement info: (version: '1.0', plugin: 'escc', init required: true), validation info: (plugin: 'vscc', policy: '0a28120c120a080112020800120208011a0b12090a074f7267314d53501a0b12090a074f7267324d5350'), collections: (), name 'exp02'" +"2019-04-22 06:20:29.233 UTC [endorser] callChaincode -> INFO 090 [businesschannel][d82eabee] Exit chaincode: name:"_lifecycle" (18ms)" +"2019-04-22 06:20:29.235 UTC [comm.grpc.server] 1 -> INFO 091 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55856 grpc.code=OK grpc.call_duration=27.47ms +"2019-04-22 06:20:29.934 UTC [endorser] callChaincode -> INFO 092 [businesschannel][32169d80] Entry chaincode: name:"exp02" " +"2019-04-22 06:20:29.954 UTC [chaincode.platform.golang] GenerateDockerBuild -> INFO 093 building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"'" +"2019-04-22 06:21:05.510 UTC [endorser] callChaincode -> INFO 094 [businesschannel][32169d80] Exit chaincode: name:"exp02" (35610ms)" +"2019-04-22 06:21:05.510 UTC [comm.grpc.server] 1 -> INFO 095 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55864 grpc.code=OK grpc.call_duration=35.6134186s +"2019-04-22 06:21:07.527 UTC [gossip.privdata] StoreBlock -> INFO 096 [businesschannel] Received block [6] from buffer" +"2019-04-22 06:21:07.537 UTC [committer.txvalidator] Validate -> INFO 097 [businesschannel] Validated block [6] in 9ms" +"2019-04-22 06:21:07.571 UTC [kvledger] CommitWithPvtData -> INFO 098 [businesschannel] Committed block [6] with 1 transaction(s) in 34ms (state_validation=0ms block_commit=20ms state_commit=8ms)" +"2019-04-22 06:21:10.723 UTC [endorser] callChaincode -> INFO 099 [businesschannel][99e7611d] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:10.727 UTC [endorser] callChaincode -> INFO 09a [businesschannel][99e7611d] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:21:10.729 UTC [comm.grpc.server] 1 -> INFO 09b unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55900 grpc.code=OK grpc.call_duration=7.6767ms +"2019-04-22 06:21:10.941 UTC [endorser] callChaincode -> INFO 09c [businesschannel][967428f0] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:10.948 UTC [endorser] callChaincode -> INFO 09d [businesschannel][967428f0] Exit chaincode: name:"exp02" (7ms)" +"2019-04-22 06:21:10.950 UTC [comm.grpc.server] 1 -> INFO 09e unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55906 grpc.code=OK grpc.call_duration=11.4845ms +"2019-04-22 06:21:11.190 UTC [endorser] callChaincode -> INFO 09f [businesschannel][f6ea81bf] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:11.193 UTC [endorser] callChaincode -> INFO 0a0 [businesschannel][f6ea81bf] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:21:11.194 UTC [comm.grpc.server] 1 -> INFO 0a1 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55912 grpc.code=OK grpc.call_duration=5.1112ms +"2019-04-22 06:21:12.966 UTC [gossip.privdata] StoreBlock -> INFO 0a2 [businesschannel] Received block [7] from buffer" +"2019-04-22 06:21:12.973 UTC [committer.txvalidator] Validate -> INFO 0a3 [businesschannel] Validated block [7] in 5ms" +"2019-04-22 06:21:13.010 UTC [kvledger] CommitWithPvtData -> INFO 0a4 [businesschannel] Committed block [7] with 1 transaction(s) in 36ms (state_validation=5ms block_commit=24ms state_commit=2ms)" +"2019-04-22 06:21:13.373 UTC [endorser] callChaincode -> INFO 0a5 [businesschannel][2026f240] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.375 UTC [endorser] callChaincode -> INFO 0a6 [businesschannel][2026f240] Exit chaincode: name:"exp02" (2ms)" +"2019-04-22 06:21:13.376 UTC [comm.grpc.server] 1 -> INFO 0a7 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55916 grpc.code=OK grpc.call_duration=4.7757ms +"2019-04-22 06:21:13.575 UTC [endorser] callChaincode -> INFO 0a8 [businesschannel][d0221f58] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.582 UTC [endorser] callChaincode -> INFO 0a9 [businesschannel][d0221f58] Exit chaincode: name:"exp02" (6ms)" +"2019-04-22 06:21:13.583 UTC [comm.grpc.server] 1 -> INFO 0aa unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55920 grpc.code=OK grpc.call_duration=9.5525ms +"2019-04-22 06:21:13.813 UTC [endorser] callChaincode -> INFO 0ab [businesschannel][96c67ee2] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:13.817 UTC [endorser] callChaincode -> INFO 0ac [businesschannel][96c67ee2] Exit chaincode: name:"exp02" (4ms)" +"2019-04-22 06:21:13.818 UTC [comm.grpc.server] 1 -> INFO 0ad unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55926 grpc.code=OK grpc.call_duration=8.3056ms +"2019-04-22 06:21:15.600 UTC [gossip.privdata] StoreBlock -> INFO 0ae [businesschannel] Received block [8] from buffer" +"2019-04-22 06:21:15.603 UTC [committer.txvalidator] Validate -> INFO 0af [businesschannel] Validated block [8] in 2ms" +"2019-04-22 06:21:15.632 UTC [kvledger] CommitWithPvtData -> INFO 0b0 [businesschannel] Committed block [8] with 1 transaction(s) in 28ms (state_validation=0ms block_commit=15ms state_commit=9ms)" +"2019-04-22 06:21:16.002 UTC [endorser] callChaincode -> INFO 0b1 [businesschannel][e59a9b97] Entry chaincode: name:"exp02" " +"2019-04-22 06:21:16.005 UTC [endorser] callChaincode -> INFO 0b2 [businesschannel][e59a9b97] Exit chaincode: name:"exp02" (3ms)" +"2019-04-22 06:21:16.006 UTC [comm.grpc.server] 1 -> INFO 0b3 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55930 grpc.code=OK grpc.call_duration=5.1462ms +"2019-04-22 06:21:16.534 UTC [endorser] callChaincode -> INFO 0b4 [businesschannel][96bad1cb] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:16.536 UTC [endorser] callChaincode -> INFO 0b5 [businesschannel][96bad1cb] Exit chaincode: name:"qscc" (1ms)" +"2019-04-22 06:21:16.536 UTC [comm.grpc.server] 1 -> INFO 0b6 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55936 grpc.code=OK grpc.call_duration=2.768ms +"2019-04-22 06:21:16.725 UTC [endorser] callChaincode -> INFO 0b7 [businesschannel][7962c131] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:16.727 UTC [endorser] callChaincode -> INFO 0b8 [businesschannel][7962c131] Exit chaincode: name:"qscc" (1ms)" +"2019-04-22 06:21:16.727 UTC [comm.grpc.server] 1 -> INFO 0b9 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55940 grpc.code=OK grpc.call_duration=2.8224ms +"2019-04-22 06:21:17.295 UTC [endorser] callChaincode -> INFO 0ba [businesschannel][4598da40] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.297 UTC [endorser] callChaincode -> INFO 0bb [businesschannel][4598da40] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.298 UTC [comm.grpc.server] 1 -> INFO 0bc unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55948 grpc.code=OK grpc.call_duration=4.0243ms +"2019-04-22 06:21:17.547 UTC [endorser] callChaincode -> INFO 0bd [businesschannel][0384b6f2] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.548 UTC [endorser] callChaincode -> INFO 0be [businesschannel][0384b6f2] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.549 UTC [comm.grpc.server] 1 -> INFO 0bf unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55952 grpc.code=OK grpc.call_duration=2.6047ms +"2019-04-22 06:21:17.767 UTC [endorser] callChaincode -> INFO 0c0 [businesschannel][1f6e9f29] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:17.777 UTC [endorser] callChaincode -> INFO 0c1 [businesschannel][1f6e9f29] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:17.778 UTC [comm.grpc.server] 1 -> INFO 0c2 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:55956 grpc.code=OK grpc.call_duration=13.7744ms +"2019-04-22 06:21:29.133 UTC [gossip.privdata] StoreBlock -> INFO 0c3 [businesschannel] Received block [9] from buffer" +"2019-04-22 06:21:29.136 UTC [cauthdsl] deduplicate -> WARN 0c4 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.138 UTC [cauthdsl] deduplicate -> WARN 0c5 De-duplicating identity [Org1MSP832bfd52ec81dfd43638ec66a3242d2be2cfa0cdcb08ffea79b2cbab0a56a9ec] at index 2 in signature set" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] JoinChan -> INFO 0c6 Joining gossip network of channel businesschannel with 3 organizations" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c7 Learning about the configured anchor peers of Org1MSP for channel businesschannel : [{peer0.org1.example.com 7051}]" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c8 Anchor peer with same endpoint, skipping connecting to myself" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0c9 Learning about the configured anchor peers of Org2MSP for channel businesschannel : [{peer0.org2.example.com 7051}]" +"2019-04-22 06:21:29.180 UTC [gossip.gossip] learnAnchorPeers -> INFO 0ca No configured anchor peers of Org3MSP for channel businesschannel to learn about" +"2019-04-22 06:21:29.200 UTC [committer.txvalidator] Validate -> INFO 0cb [businesschannel] Validated block [9] in 66ms" +"2019-04-22 06:21:29.220 UTC [comm.grpc.server] 1 -> INFO 0cc unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.22Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=149.7µs +"2019-04-22 06:21:29.240 UTC [comm.grpc.server] 1 -> INFO 0cd streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.224Z grpc.peer_address=192.168.224.6:51270 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.5775ms +"2019-04-22 06:21:29.256 UTC [comm.grpc.server] 1 -> INFO 0ce unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.256Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=199.4µs +"2019-04-22 06:21:29.295 UTC [kvledger] CommitWithPvtData -> INFO 0cf [businesschannel] Committed block [9] with 1 transaction(s) in 94ms (state_validation=9ms block_commit=63ms state_commit=17ms)" +"2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d0 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.5:42202 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m9.8442242s +"2019-04-22 06:21:29.297 UTC [comm.grpc.server] 1 -> INFO 0d1 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.272Z grpc.peer_address=192.168.224.5:42404 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=21.8871ms +"2019-04-22 06:21:29.306 UTC [comm.grpc.server] 1 -> INFO 0d2 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.305Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=134.4µs +"2019-04-22 06:21:29.335 UTC [comm.grpc.server] 1 -> INFO 0d3 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=192.168.224.4:34420 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m10.7535276s +"2019-04-22 06:21:29.332 UTC [comm.grpc.server] 1 -> INFO 0d4 streaming call completed" grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2019-04-22T06:21:39.311Z grpc.peer_address=192.168.224.4:34630 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.8218ms +"2019-04-22 06:21:29.374 UTC [comm.grpc.server] 1 -> INFO 0d5 unary call completed" grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2019-04-22T06:21:31.373Z grpc.peer_address=192.168.224.6:51284 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=501.6µs +"2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d6 [][264d8e67] Entry chaincode: name:"cscc" " +"2019-04-22 06:21:46.519 UTC [endorser] callChaincode -> INFO 0d7 [][264d8e67] Exit chaincode: name:"cscc" (1ms)" +"2019-04-22 06:21:46.520 UTC [comm.grpc.server] 1 -> INFO 0d8 unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56068 grpc.code=OK grpc.call_duration=1.7062ms +"2019-04-22 06:21:47.446 UTC [endorser] callChaincode -> INFO 0d9 [][19533012] Entry chaincode: name:"qscc" " +"2019-04-22 06:21:47.448 UTC [endorser] callChaincode -> INFO 0da [][19533012] Exit chaincode: name:"qscc" (2ms)" +"2019-04-22 06:21:47.448 UTC [comm.grpc.server] 1 -> INFO 0db unary call completed" grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=192.168.224.3:56080 grpc.code=OK grpc.call_duration=3.1853ms